5. Which two of the following features need to be applied in order to make certain a domain controller in a compromised area is as secure as possible? (Choose two.) A. Read-only domain controller B. Active Directory Domain Services C. Federation Services D. Windows BitLocker E. Security identifiers 6. Which of the following is not a component of a site link? A. Site-link name B. Site-link cost C. Site-link schedule D. Site-link identifier 7. If you needed to support Windows NT in your domain, which of the following server roles would you require? A. Backup domain controller B. Federation server C. Primary domain controller D. Domain controller E. File server 8. Designing a domain to run completely independently of any MCTS Exam other forest or domain struc- ture other than itself in order to make certain it doesn?t communicate with any other net- work is a design concept called what? A. Centralized administration B. Decentralized administration C. Centralized automation D. Autonomy E. Isolation 9. What is the maximum number of schemas that can exist in any given forest if the adminis- trator installs a relative identifier master on the primary domain controller? A. 0 B. 1 C. 2 D. 3 10. Which of the following is not a category of requirements you should consider in designing your forest structure? A. Organizational requirements B. Software requirements C. Operational requirements D. Legal requirements 11. You are the enterprise administrator for MyCorp, a medium-sized business with 200 employees. Your superior, John Mayer, has come to you with a new design concern. In the research and development branch of the company, the MCTS Certificate engineers have been designing a new program that is designed to stress test networks and examine computers that exist throughout the infrastructure. Because of this, John has asked you to create a solution in Active Directory that will accommodate the research and development group, as well as the group?s new software. Which of the following summarizes the best action to take? A. Create a new group of users called ?Research and Development.?Assign a template to this group in Group Policy that restricts the usage of the network application to only those users, and then apply the policy. B. Create a new group of users called ?Research and Development.?In Group Policy, require that users of the network application log onto the centralized domain controller in order to authenticate the software. C. Create a new forest. Inside this forest, place a new group called ?Research and Devel - opment?in the default domain, and adapt the isolation model. D. Create a new domain within your forest. Inside this domain, place a new group called ?Research and Development,?and adapt the isolation model. Answers to Review Questions 5. A, B. By using read-only domain controllers, the domain controller in the exposed area will not be able to be written to and will cache credentials. Additionally, if that server is physi- cally compromised, Windows BitLocker will keep the server from having its hard disk exposed to data extraction. 6. D. The three main components of a site link are the site-link name, cost, and schedule. The name identi?es the site link, the cost indicates the speed and priority of the connection, and the schedule indicates when the site can be used to replicate across the network. At the enterprise level, you have to make sure site links are assigned the appropriate speed so that they are as ef?cient as possible. 7. C. A primary domain controller emulator is used to communicate with pre?Active Direc - tory systems in order to support the legacy software with Windows Server 2008 technology. 8. E. The process of isolation is ensuring that an individual piece of the network can be accessed by nothing else in the entire network. This is usually done to isolate pieces of soft- ware or volatile user accounts from the rest of the infrastructure. 9. B. Remember, the rule of thumb with schemas is that there is only one schema per forest. If there were multiple schemas per forest, it would be really bad because there would be con-stant con?icts over the overall design of the infrastructure. 10. B. Software requirements are de?nitely part of the design consideration process, but they are covered under operational requirements. When designing a forest, you have to consider an organization?s organizational, operational, and legal requirements. 11. C. This scenario is a classic case of the need for the isolation model within a unique forest. If users are using a network application that could compromise the rest of your infrastruc-ture, it’s best to completely isolate these users. Thus, it’s best to create a separate forest with a completely separate group inside an individual domain.
Related Articles -
MCTS Windows 7 Configuration, MCSE 2003, MCSE 2008,
|