week
week
The name of the machine account associated with a machine named TOM-PC would
be TOM-PC$.
5. Suppose our company creates a new department for Quality Assurance. What
type of containers should we use to group all Quality Assurance users so that
policies can be applied consistently to them?
You should use an Organizational Unit (OU). OUs help group users and apply
policies to them easily.
10. What is name of network share used to distribute GPOs to domain machines?
The name of the network share used to distribute GPOs to domain machines is
SYSVOL.
15. What is a group of Windows domains that share the same namespace called?
A group of Windows domains that share the same namespace is called a tree.
16. What should be configured between two domains for a user in Domain A to
access a resource in Domain B?
17. What popular website can be used to verify if your email address or
password has ever been exposed in a publicly disclosed data breach?
A popular website to check if your email or password has been exposed in a data
breach is Have I Been Pwned
18. What does OSINT stand for and what is it?
OSINT stands for Open Source Intelligence. It means collecting information from
public sources like websites, social media, or news. It is used to gather useful data.
19.
20. By
using OSINT techniques, what can you possibly uncover that can
compromise an AD domain?
Using OSINT techniques, you can uncover information like exposed credentials,
email addresses, domain details or misconfigured systems. These can be used to
compromise an Active Directory (AD) domain.
22. Explain one way that phishing can be used to breach AD.
Phishing can trick users into giving their AD login credentials. Attackers send fake
emails with links to fake login pages. When users enter their details attackers steal
them and access the domain.