Active Directory - Coursera
Active Directory - Coursera
              Correct
              That's right! Active Directory is Microsoft's specific implementation.
              Windows of a directory server. It is fully compatible with
              LDAP, so it works with any LDAP-compatible client,
              although it has some exclusive features of the ecosystem
              Windows.
2. What is the difference between an organizational unit and a normal container? 0 / 1 point
They are not different; they just have different names for a container.
              Incorrect
              Not exactly. An organizational unit is a special type of
              a container that can hold other containers and ordinary objects.
  3. When you create an Active Directory domain, what is the name of the                        1 / 1 point
      default user account?
Superuser
Root
Username
Administrator
                  Correct
                  Correct! The default user in an AD domain is Administrator.
True
False
                  Correct
                  Correct! While domain controllers are technically
                  computers, are not included in the group of computers of
                  domain. The domain group of computers has all the
                  computers connected to a domain for an organization, except for the
                  domain controllers, which belong to the DC group.
                  Incorrect
                  Not exactly. Both groups are used to group accounts of
                  user. However, distribution groups are only used for the
                  communication by email, while the groups of
                  security can be used to grant access to resources.
  6. What is the difference between changing a password and resetting one?                            0 / 1 point
         password?
                  Incorrect
                  Not exactly. Changing a password requires the password.
                  previously, while resetting a password only requires access
                  of administrator.
  7.True or false: joining a computer to Active Directory involves joining the                        0 / 1 point
      computer to a workgroup.
True
False
Incorrect
The provided link does not contain any translatable text.ToCover=true                                               3/8
February 25, 2023, 11:17 PM                                         Active Directory | Coursera
Centralized authentication
                  Correct
                  Impressive! Active Directory can be used to manage
                  centrally computers that connect to it applying objects of
                  group policy. Computers joined to a domain also
                  they will authenticate using Active Directory user accounts instead of
                  local accounts, which also offers centralized authentication.
                  Correct
                  Impressive! Active Directory can be used to manage
                  centrally computers that join it by applying objects of
                  group policy. Computers joined to a domain also
                  they will authenticate using Active Directory user accounts instead
                  of local accounts, which also provides centralized authentication.
Better performance
              Correct
              Exactly! GPOs are objects in AD that contain
              settings and preferences that can be applied to accounts of
              user or computer accounts. GPOs allow for management
              centralized accounts and computers.
              Correct
              Exactly! The directives are settings that AD applies over and over.
              regularly, while the preferences are set for
              various settings, but they can be modified by the users.
  11. With a new AD domain, what do you need to change before you can                        1 / 1 point
          to allocate
          user and machine groups with GPO?
Correct
              Incorrect
              Not exactly. When the GPOs collide, they are applied first.
              by site and second by domain. Then, any organizational unit will
              apply from less specific to more specific.
  13. What can we use to determine which directives will apply to a                           1 / 1 point
       determined machine?
Gpupdate
A control panel
A test domain
A RSOP report
               Correct
               Good job! An RSOP report or resultant set of policies,
               It will generate a report that contains a list of directives that will be applied.
               to a certain machine. This takes into account the information of
               inheritance and precedence.
Make a DNS query to request the SRV record for the domain
               Incorrect
               Not exactly. How can this be sent through GPO if the
               client, first of all, can’t find the domain controller?
               domain will have SRV records that contain information about the
               domain controllers.
  15. Which of the following options could prevent you from logging in to a                                 0 / 1 point
          computer connected to a domain? Mark all that apply.
                Correct
                Correct! If the machine cannot reach the domain controller.
                Whatever the reason, it could not authenticate against AD. Like the
                AD authentication is based on Kerberos for encryption, the
                Authentication against AD will depend on the time it syncs with
                a five-minute margin between server and client. And, of course, if
                the user account is locked, you will not be able to authenticate to the account or
                log in to the computer.
               Correct
               Correct! If the machine cannot reach the domain controller
               whatever the reason, it could not authenticate against AD. Since the
               AD authentication is based on Kerberos for encryption, the
               authentication against AD will depend on the time it synchronizes with
               a margin of five minutes between server and client. And, of course, if
               the user account is locked, you will not be able to authenticate on the account or
               log in to the computer.