Active Directory Service in Windows
79 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of the access control vestibule in a data center?

  • To store data center hardware
  • To act as an emergency exit
  • To control access through a particular area (correct)
  • To provide a waiting room for visitors
  • How many doors are typically found in an access control vestibule?

  • Five
  • Three (correct)
  • Four
  • One
  • In some implementations, what happens to the other doors when one door is opened in the access control vestibule?

  • All other doors automatically lock (correct)
  • All other doors remain closed
  • All other doors ring an alarm
  • All other doors open simultaneously
  • What action is typically required to unlock a door in a secure data center environment?

    <p>Badging in</p> Signup and view all the answers

    What must the person going into the data center do after entering the access control vestibule?

    <p>Close the door</p> Signup and view all the answers

    How does the access control system ensure only one person enters the data center at a time?

    <p>By locking all doors except the one being accessed</p> Signup and view all the answers

    What is a common way to provide access control to a highly secure environment?

    <p>Using a fingerprint scanner</p> Signup and view all the answers

    What type of reader is commonly used for access to a particular room in an office building?

    <p>Magnetic stripe reader</p> Signup and view all the answers

    What technology can a video surveillance system use to identify a person walking by?

    <p>License plate recognition</p> Signup and view all the answers

    In what circumstances might an alarm system be triggered by duress?

    <p>When a red button is pushed</p> Signup and view all the answers

    What component of a proximity card sends the signal that allows access through the door?

    <p>Middle RFID chip</p> Signup and view all the answers

    What type of lock at home might slide a piece of metal between the door and the door frame?

    <p>Deadbolt</p> Signup and view all the answers

    What type of collateral is commonly required to check out a key in an organization?

    <p>ID card</p> Signup and view all the answers

    What is commonly combined with alarm systems for enhanced protection against changes in the environment?

    <p>Motion detection</p> Signup and view all the answers

    What type of technology may be used in some alarm systems where a circuit is broken upon opening a door or window?

    <p>Motion detection</p> Signup and view all the answers

    What type of authentication uses a handprint, fingerprint, or retina scan?

    <p>Biometric authentication</p> Signup and view all the answers

    What can you use to unlock an electronic door lock at home?

    <p>Personal identification PIN</p> Signup and view all the answers

    Why is it difficult to change a fingerprint or a handprint for authentication?

    <p>Because they are unique and don't change easily</p> Signup and view all the answers

    What feature allows an organization to have multiple views of their facility on a single screen?

    <p>Closed circuit television (CCTV)</p> Signup and view all the answers

    What does a retina scanner primarily use to differentiate between users?

    <p>Capillaries in the eye</p> Signup and view all the answers

    What does BYOD stand for in the context of the text?

    <p>Bring Your Own Device</p> Signup and view all the answers

    What is the purpose of keeping an office well lit at night according to the text?

    <p>To enhance security and visibility</p> Signup and view all the answers

    What is the primary function of a magnetometer that individuals often encounter at airports?

    <p>Detecting metal objects</p> Signup and view all the answers

    What is the purpose of using an MDM in the context of the text?

    <p>To protect company data on personal devices</p> Signup and view all the answers

    What is one reason why infrared cameras might not be used extensively for surveillance according to the text?

    <p>Regular light cameras offer better detail</p> Signup and view all the answers

    How does a retina scanner differentiate between individual users?

    <p>Unique capillaries in the eye</p> Signup and view all the answers

    What is the purpose of the large concrete planters mentioned in the text?

    <p>To prevent people from driving through the planters</p> Signup and view all the answers

    Why are data centers surrounded by water, as mentioned in the text?

    <p>To restrict access and create a controlled entry point</p> Signup and view all the answers

    What is a common physical security control mentioned in the text?

    <p>Security fences</p> Signup and view all the answers

    Why might some fences be constructed with razor wire and increased height?

    <p>To prevent unauthorized climbing over the fence</p> Signup and view all the answers

    What is the purpose of using key fobs for access control as mentioned in the text?

    <p>To provide electronic access through locked doors</p> Signup and view all the answers

    What functionality do smart cards typically have, as per the text?

    <p>They contain certificates and provide authentication</p> Signup and view all the answers

    Why is it mentioned that having only a smart card for authentication is usually a bad idea?

    <p>Single-factor authentication is less secure.</p> Signup and view all the answers

    What role do card readers play in conjunction with smart cards?

    <p>They read and verify the certificates on smart cards.</p> Signup and view all the answers

    What purpose does a key cabinet serve in an organization as mentioned in the text?

    <p>To organize and manage keys used by the organization.</p> Signup and view all the answers

    Why might some organizations prefer mechanical locks over electronic locks, according to the text?

    <p>Mechanical locks are more cost-effective.</p> Signup and view all the answers

    What technology can be combined with door locks to ensure that the correct person is gaining access?

    <p>RFID tags</p> Signup and view all the answers

    In a data center, what is a common security measure for protecting equipment inside racks?

    <p>Adding locks to racks</p> Signup and view all the answers

    What is the purpose of having a security guard in some environments as mentioned in the text?

    <p>To confirm identities and manage access</p> Signup and view all the answers

    What is an example of a physical security measure seen outside office buildings mentioned in the text?

    <p>Barricades or bollards</p> Signup and view all the answers

    What additional security measure might be needed to gain access through a door with an RFID reader?

    <p>Providing a personal identification number</p> Signup and view all the answers

    Why are there locks on the 19-inch racks in a data center as described in the text?

    <p>To secure the equipment stored inside</p> Signup and view all the answers

    What role does an access list play in building security based on the text?

    <p>It documents everyone allowed access</p> Signup and view all the answers

    In what ways can barricades or bollards be used outside office buildings according to the text?

    <p>To stop both vehicles and pedestrians</p> Signup and view all the answers

    What type of biometric authentication method is NOT mentioned in the text for gaining access through doors?

    <p>Eye iris scans</p> Signup and view all the answers

    What precaution should be taken when closing a door after gaining access through a door lock with biometrics?

    <p>Check that all equipment inside the door is cooled correctly</p> Signup and view all the answers

    What is one benefit of using Mobile Device Management (MDM) for company devices?

    <p>Ensuring company data can be deleted without affecting private data</p> Signup and view all the answers

    Why is least privilege an important concept in IT security?

    <p>It limits user access to only necessary data for their job function</p> Signup and view all the answers

    Which technique is commonly used to control what traffic should be allowed or disallowed through a network address translation?

    <p>Access Control Lists (ACLs)</p> Signup and view all the answers

    What is a common authentication factor used during the login process?

    <p>Token generator code</p> Signup and view all the answers

    How does MDM handle company data if an individual leaves the organization?

    <p>Deletes all company data but leaves private data intact</p> Signup and view all the answers

    What is the primary purpose of using access control lists (ACLs) on a router?

    <p>Controlling traffic allowed through the router</p> Signup and view all the answers

    Why should users not run with administrative rights according to the text?

    <p>To limit their access to necessary data only</p> Signup and view all the answers

    What does a password represent in the context of authentication factors?

    <p>Something you do</p> Signup and view all the answers

    How do Mobile Device Management (MDM) systems enhance security according to the text?

    <p>By creating logical partitions separating company and private data</p> Signup and view all the answers

    What does a token generator code represent in terms of authentication factors?

    <p>Something you have</p> Signup and view all the answers

    What is the purpose of configuring scripts under User Configuration-Policies-Windows Settings in group policy management?

    <p>To assign different scripts to different organizational units</p> Signup and view all the answers

    How does the hierarchy of OUs benefit administrators when using group policy management?

    <p>It enables the assignment of different scripts to different units</p> Signup and view all the answers

    What can be customized for users based on their organizational unit in group policy management?

    <p>Access to different network drives</p> Signup and view all the answers

    In the example provided, which drives have been assigned to the user logged into the Atlantis OU?

    <p>C drive and DVD drive</p> Signup and view all the answers

    How can administrators control what a user will see during login in a group policy management environment?

    <p>By configuring scripts under User Configuration–Policies–Windows Settings</p> Signup and view all the answers

    What is a common way of generating authentication codes for logging in?

    <p>Using software token generators</p> Signup and view all the answers

    What is a potential security risk associated with using SMS for authentication?

    <p>Third parties can intercept the authentication code</p> Signup and view all the answers

    Why might organizations prefer using a secure app for authentication over SMS?

    <p>Apps provide a more secure form of authentication</p> Signup and view all the answers

    What technique is used to block unsolicited emails and attachments?

    <p>Email filtering at the gateway</p> Signup and view all the answers

    What is the main function of Active Directory in a corporate network?

    <p>To store network configuration and user data</p> Signup and view all the answers

    What type of authentication factor sends a code through a voice call instead of an SMS?

    <p>Phone callback for code delivery</p> Signup and view all the answers

    Why might receiving a code through a voice call still pose a security risk?

    <p>Voice calls can be forwarded or intercepted</p> Signup and view all the answers

    What function does Active Directory serve in user authentication?

    <p>Storing login credentials and checking against them</p> Signup and view all the answers

    What is the primary reason organizations might not use SMS for authentication?

    <p>Security vulnerabilities with SMS interception or forwarding</p> Signup and view all the answers

    What is the main benefit of using software token generators for authentication?

    <p>Increased security compared to other methods</p> Signup and view all the answers

    What is used to access the central database in the domain?

    <p>Active Directory service</p> Signup and view all the answers

    What can be used as a central point for troubleshooting in a network?

    <p>Active Directory Domain Services</p> Signup and view all the answers

    What concept is used to manage users and computers in a large organization?

    <p>Organizational units</p> Signup and view all the answers

    What can be applied to organizational units after they are created?

    <p>Group policy management</p> Signup and view all the answers

    Which tool is used to view the list of users and computers added to the domain?

    <p>Active Directory Users and Computers</p> Signup and view all the answers

    What scripts can automate tasks like mapping drives or sharing printers upon user login?

    <p>.vbs scripts</p> Signup and view all the answers

    In which OU would we find the Atlantis organizational unit?

    <p>Pegasus OU</p> Signup and view all the answers

    What is typically done from the same front end as resetting a user's domain password?

    <p>Adding a user to a domain</p> Signup and view all the answers

    Study Notes

    • Access control vestibules are small rooms used by organizations to regulate access to secure areas, such as data centers.
    • These rooms typically have multiple doors: one leading to the secure area and one or more leading to the vestibule itself.
    • Access to the vestibule may be controlled through various means, including unlocked doors, badge readers, or biometric authentication.
    • Once inside the vestibule, individuals may be required to provide additional authentication or clearance before entering the secure area.
    • Some vestibules have features that limit the number of people able to enter at once, ensuring that only authorized individuals gain access.
    • Proximity cards, often used in combination with door locks or access readers, are a common security feature.
    • These cards can be magnetic or use radio frequency identification (RFID) or near field communication (NFC) technology to grant access.
    • Video surveillance systems, also known as closed circuit television (CCTV), are common security measures in secure environments.
    • Such systems can provide live or recorded footage of areas, as well as capabilities such as license plate recognition or facial recognition.
    • Alarm systems are another common security feature, designed to alert security personnel of unauthorized access or other security breaches.
    • Door locks, which can be conventional, electronic, or biometric, are used to secure doors and prevent unauthorized entry.
    • In data centers, racks may be securely locked to protect the equipment inside.
    • Security guards are employed in many facilities to provide on-site security, including checking identification and granting access to authorized individuals.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about accessing a central database, troubleshooting, and managing domain configurations and user passwords using the Active Directory service in Windows operating systems.

    More Like This

    Active Directory Services (AD DS) Overview
    10 questions
    Active Directory Services Quiz
    18 questions
    Windows Server 2012: Active Directory
    10 questions

    Windows Server 2012: Active Directory

    SufficientCalifornium2707 avatar
    SufficientCalifornium2707
    Use Quizgecko on...
    Browser
    Browser