Ticker

6/recent/ticker-posts

Google IT Support Professional:System Administration and IT Infrastructure Services (Week 4) Directory Services.


Don't just copy for the sake of completion. 
Make sure you understand first.


★Centralized Management and LDAP★

Q1.Which of these are examples of centralized management? Check all that apply.

  1. Role-based access control
  2. Centralized configuration management
  3. Copying configurations to various systems
  4. Local authentication
Role-based access control makes it easier to administer access rights by changing role membership and allowing for inheritance to grant permissions (instead of granting each permission individually for each user account). Centralized configuration management is an easier way to manage configurations for services and hardware. By centralizing this, it becomes easier to push changes to multiple systems at once.

Q2.Which of these are components of an LDAP entry? Check all that apply.

  1. Uncommon Name
  2. Common Name
  3. Organizational User
  4. Distinguished Name
The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.

Q3.What's does the LDAP Bind operation do exactly?

  1. Modifies entries in a directory server
  2. Looks up information in a directory server
  3. Authenticates a client to the directory server
  4. Changes the password for a user account on the directory server
The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.

Q4.Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.

  1. Anonymous
  2. Simple
  3. Complex
  4. SASL
Bind operations support three different mechanisms for authentication: (1) Anonymous, which doesn't actually authenticate at all, and allows anyone to query the server; (2) Simple, which involves sending the password in plaintext; and (3) SASL, or Simple Authentication and Security Layer, which involves a secure challenge-response authentication mechanism.
 ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€ä¸€
           Machine Learning Coursera-All weeks solutions [Assignment + Quiz] click here
       &
                         Coursera Google Data Analytics Professional Quiz Answers   click here
    &
                       Coursera Google IT Support Professional   click here

Have no concerns to ask doubts in the comment section. I will give my best to answer it.If you find this helpful kindly comment and share the post.
This is the simplest way to encourage me to keep doing such work.

Thanks & Regards,
- Wolf    

Post a Comment

0 Comments