Information Technology Reference
In-Depth Information
c. Site link bridges
d. NTDS settings
21. You want to decrease users' logon time at SiteA but not increase replication traffic drasti-
cally. You have 50 users at this site with one domain controller. Overall, your network con-
tains 3000 user and computer accounts. What solution can decrease logon times with the
least impact on replication traffic?
a. Configure the domain controller as a domain naming master.
b. Configure the domain controller as a global catalog server.
c. Configure multiple connection objects between the domain controller in SiteA and a
remote global catalog server.
d. Enable universal group membership caching.
22. Which of the following configurations should you avoid?
a. Domain naming master and schema master on the same domain controller
b. PDC emulator and RID master on the same computer
c. Infrastructure master configured as a global catalog server
d. Schema master configured as a global catalog server
23. Users usually notice a failure of the domain naming master immediately. True or False?
24. User authentications are taking a long time. The domain controller performing which FSMO
role will most likely decrease authentication times if it's upgraded?
a. RID master
b. PDC emulator
c. Infrastructure master
d. Domain naming master
25. You're taking an older server performing the RID master role out of service and will be
replacing it with a new server configured as a domain controller. What should you do to
ensure the smoothest transition?
a.
10
Transfer the RID master role to the new domain controller, and then shut down the old
server.
b.
Shut down the current RID master and seize the RID master role from the new domain
controller.
c.
Back up the domain controller that's currently the RID master, restore it to the new
domain controller, and then shut down the old RID master.
d.
Shut down the current RID master, and then transfer the RID master role to the new
domain controller.
Case Projects
Case Project 10-1: Working with Trusts
Examine the network in Figure 10-28. You need to configure this network to meet the fol-
lowing requirements:
1. All users in the abc.com forest should be authenticated to all resources in the xyz.com
forest.
2. Selected users in the xyz.com domains should be authenticated to selected resources in
the abc.com forest.
3. No users in the jkl.com domain tree should be authenticated to the abc.com forest.
4. Users in the uk.jkl.com domain access resources in the phx.usa.abc.com domain
frequently. Latency should be kept to a minimum.
 
Search WWH ::




Custom Search