The flashcards below were created by user
on FreezingBlue Flashcards.
adds a new IPv4 failover relationship on the DHCP server services
*** add-dhcpserver4failover -partnerserver2 -scopeid 10.0.0.0
adds the computer running the DHCP server service to the list of authorized DHCP server services in AD
Single-label name resolution rather than using suffix search
- add-dnsserverrosourcerecord cname
- Definition of a Zone Transfer: A Zone Transfer is the term used to refer to the process by which the contents of a DNS Zone file are copied from a primary DNS server to a secondary DNS server.
- A Zone transfer will occur during any of the following scenarios:
- When starting the DNS Service on the secondary DNS server.
- When the refresh time expires.
- When changes are saved to the Primary Zone file and there is a Notify List.
- Zone Transfers are always initiated by the secondary DNS server. The primary DNS server simply answers the request for a Zone Transfer.
Outside Forest access
- Create a one-way forest trust
- Modify the permission on the server1 object
- configure selective authentication on the trust
increase security by authenticating the origin of DNS data.
Dynamic Access Control
enables administrators to apply access-control permissions and restrictions based on well-defined rules that can include the sensitivity of the resources, the job or role of the user, and the configuration of the device that is used to access these resources.
For example, a user might have different permissions when they access a resource from their office computer versus when they are using a portable computer over a virtual private network. Or access may be allowed only if a device meets the security requirements that are defined by the network administrators. When Dynamic Access Control is used, a user’s permissions change dynamically without additional administrator intervention if the user’s job or role changes (resulting in changes to the user’s account attributes in AD DS).
Dynamic Access Control
- Central Access Polices
- Central Access Rules
- Claim Types
- Resource Properties
- Resource Property Lists
- Shutdown all of the virtual machines in Cluster1
- mask the shared storage to prevent the storage from being accessed by cluster1
- Unmask the shared storage to present the storage to cluster 2
- from failover cluster manager in cluster2, run the migrate a cluster wizard
- start the vitual machines in cluster2
Third party certificate
- install a certificate obtained from a trusted third-party CA
- install and configure active directory federation
- services (AD FS)
- Enable the device registration service
- install and configure a web application proxy
IPAM Manual provisioning method can not be changed
uninstall-windows feature -Name -IPAM
creates a read-only domain controller RODC account that can be used to install an RODC in AD.
ensure that server1 can issue an Online Certificate Status Protocol
Prevent users from encrypting new content in AD RMS
- from the Active directory rights management services console, create a user exclusion policy
- from the active directory rights management services console, modify the rights policy templates
Deploy a certification authority