Unit – I Exploring Directory Services and Remote Access

Network Management & Administration
(3360703)
Unit – I Exploring Directory Services and Remote Access
Sr. No.QuestiosOption AOption BOption COption DAnswer
1Find which is not one of the four divisions or container structures in Active Directory?ForestsDomainWebsOrganizational unitsC
2Find what is a forest?Physical groupings are independent of the domain and OU structure. Sites distinguish between locations connected by low- and high-speed connections and are defined by one or more IP subnets.The collection of every object, its attributes and attribute syntax in the Active Directory.Containers in Find which domains can be grouped. They create a hierarchy for the domain and create the structure of the Active Directory’s company in geographical or organizational terms.A collection of computers that share a common set of policies, a name and a database of their members.B
3Find what do domain controllers do?Store the database, maintain the policies and provide the authentication of domain logons.Control granular settings in a domain environment.Receive and relay domain commands A
4Find what are Group Policy Objects?A set of folder rules that determine where Outlook will save email messages.Affords the capability for secure extension of network operations to the WebThey determine the hierarchy of a domain, Find which can fit the operational structure of an organization.A collection of settings that define Find what a system will look like and how it will behave for a defined group of users.D
5Active Directory is a technology created by ________ that provides a variety of network services, including:MicrosoftInternet ExplorerMicrosoft OfficeMicrosoft WindowsA
6To Find which of the following Active Directory containers can Group Policies be applied?sitesOUsdomainsall of the aboveD
7Which of the following protocols is Active Directory based upon?LDAPL2TPPPPIPSecA
8Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)?Forest, Domain, Tree, Branch, ComputerTree, Forest, Domain, ComputerComputer, Forest, Domain, TreeForest, Tree, Domain, ComputerD
9Which of the following is not an organizational unit within an Active Directory environment?UserSecurity GroupDistribution GroupAdministrative GroupD
10The main purpose of Active Directory is to _Provide authentication and authorization to users and computers.Provide File and Print servicesGive administrators the ability to control access to restricted hardwareallow users to organize their files systems into a cohesive and high performance directory structureA
11What is the name of the communications protocol called for by the original X.500 standard?Directory Access ProtocolData Access ProtocolLightweight Directory Access ProtocolLightweight Data Access ProtocolA
12This Windows 2000 component stores all of the objects that make up a Windows 2000 network, such as user objects, group objects, and computer objects. It also provides the services that enable users to locate objects on the network and also provides administrators with the tools that are necessary to manage a Windows 2000 network.” What does this best describe? Select one.WINSDNSDomainsActive DirectoryD
13VPN is abbreviated as __________Visual Private NetworkVirtual Protocol NetworkVirtual Private NetworkVirtual Protocol NetworkingC
14__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.Visual Private NetworkVirtual Protocol NetworkVirtual Protocol NetworkingVirtual Private NetworkD
15Site-to-site VPNs are also known as ________Switch-to-switch VPNsPeer-to-Peer VPNsPoint-to-point VPNsRouter-to-router VPNsD
16_________ type of VPNs are used for home private and secure connectivity.Remote access VPNsSite-to-site VPNsPeer-to-Peer VPNsRouter-to-router VPNsA
17Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?Remote access VPNsSite-to-site VPNsPeer-to-Peer VPNsCountry-to-country VPNsB
18A ______ can hide a user’s browsing activity. FirewallAntivirus Incognito mode VPND
19__________ masks your IP address.FirewallAntivirus VPN Incognito modeC
20_________ are also used for hides user’s physical location.FirewallAntivirus Incognito mode VPND
21ISDN stands for ________Integrated Services Digital NetworkIntegrated Services Discrete NetworkIntegrated Services Digital NodeIntegrated Services Discrete NodeA
22Information bearing channels in ISDN are called ______D channelsData channelsB channelsVoice channelsC
23The DSL technology is aBroadbandNarrowbandBoth a) & b)None of the aboveA
24What is the keyword used to define a domain alias?PTRNSCNAMEMXC
25Multiplexing is used in _______Circuit switchingData switchingPacket switchingPacket & Circuit switchingA
26The structure or format of data is called ___________SyntaxSemanticsStructFormattingA
27When collection of various computers seems a single coherent system to its client, then it is called _________computer networkdistributed systemnetworking systemmail systemB
28Which of the following networks extends a private network across public networks?local area networkvirtual private networkenterprise private networkstorage area networkB
29DSL telcos provide which of the following services?Wired phone accessISPWired phone access and ISPNetwork routing and ISPC
30Home Access is provided by __________DSLFTTPCableAll of the mentionedD
31Secure shell (SSH) network protocol is used for __________secure data communicationremote command-line loginremote command executionall of the mentionedD
32The header length of an IPv6 datagram is ___________10bytes25bytes30bytes40bytesB
33Directory service is the part of ‘NetworkServices’HaedwareSotware PocessesAll of the aboveD
34Which of the following is not the example of directoryserviceDomain NameServerPrintServerNISLDAPB
35A directory service must consist ofatleast oneDirectoryServerDirectoryClientCompuerBoth A & BD
36Novell DirectoryprovidesMulti- pointadministrationSingal pointadminisrionCenal PointadministrationNone of the aboveB
37GUIDis bits long number?128528102464A

Get new content delivered directly to your inbox.

Design a site like this with WordPress.com
Get started