Question

In: Computer Science

What is the default protocol used in AD?What is Kerberos?Describe what the following are:...


  1. What is the default protocol used in AD?

  2. What is Kerberos?

  3. Describe what the following are: Trees, Forest, Domains, and OU

  4. Where is the default database for AD located?

Solutions

Expert Solution

Answer 1:

The default protocol used in AD is LDAP ( Lightweight Directory Access Protocol).

Answer 2:

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

Answer 3:

The Active Directory framework that holds the objects can be viewed at a number of levels. The forest, tree, and domain are the logical divisions in an Active Directory network.

Tree: A tree is a collection of one or more domains and domain trees in a contiguous namespace, and is linked in a transitive trust hierarchy.

Forest: At the top of the structure is the forest. A forest is a collection of trees that share a common global catalog, directory schema, logical structure, and directory configuration. The forest represents the security boundary within which users, computers, groups, and other objects are accessible.

Domains: A domain is defined as a logical group of network objects (computers, users, devices) that share the same Active Directory database.

OU (Organisational units): The objects held within a domain can be grouped into Organizational Units (OUs).[19] OUs can provide hierarchy to a domain, ease its administration, and can resemble the organization's structure in managerial or geographical terms. OUs can contain other OUs—domains are containers in this sense.

Answer 4:

The default active directory database file locationis C:\Windows\NTDS.


Related Solutions

What is the 2PC protocol, and what is it used for?
What is the 2PC protocol, and what is it used for?
What is a metric in a routing protocol? What is a metric used for? List and...
What is a metric in a routing protocol? What is a metric used for? List and describe two major metrics used in routing protocols.
1.Yogurt a.)Outline the protocol used of making yogurt in a lab. Describe the process of the...
1.Yogurt a.)Outline the protocol used of making yogurt in a lab. Describe the process of the symbiotic relationship of the two bacterial organism S. thermophilus and L. Bulgaricus in yogurt making. b.) Discuss the similarities and dissimilarities of making yogurt at home and in the lab.
The following questions relate to the protocol used to manage the health of the network and...
The following questions relate to the protocol used to manage the health of the network and allow network devices to communicate to each other to keep network traffic flowing freely. An example of a common command that uses this protocol is ‘ping’. (10 marks total) What is the name of this protocol? (1 mark) What layer of the TCP/IP network model does this protocol belong? (1 mark) What is the command used to display a path that network traffic takes...
. The following is a key exchange protocol used by two clients, A and B, to...
. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
What is the form of an IP address? What protocol is used by all computer connections...
What is the form of an IP address? What protocol is used by all computer connections to the Internet? 1.5 What is the task of a DNS name server?
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
For each of the following situations, use an AD/AS model to describe what happens to price...
For each of the following situations, use an AD/AS model to describe what happens to price levels and output in Canada in the short run. In each case, assume the economy starts in long- and short-run equilibrium, and describe the appropriate shifts in the AS or AD curves. Instructions: You may select more than one answer. Click the box with a check mark for correct answers, and click to empty the box for the wrong answers. a. A stock market...
For each of the following situations, use an AD/AS model to describe what happens to price...
For each of the following situations, use an AD/AS model to describe what happens to price levels and output in the United States in the short run. In each case assume the economy starts at potential GDP, and describe the appropriate shifts in the AS or AD curves. a. A stock market crash reduces people’s wealth.    Yes/No Aggregate demand shifts to the left Yes/No Aggregate demand shifts to the right Yes/No Aggregate supply shifts to the left Yes/No Aggregate...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT