• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/88

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

88 Cards in this Set

  • Front
  • Back

Once a partition is formatted, it is called a volume and can be assigned a drive letter.

True

A ____ volume is stored on 2 to 32 dynamic disks that are treated as one volume.

spanned

____ RAID implements fault tolerance through the server's operating system.

Software

Disk mirroring involves creating a shadow copy of data on a backup disk and is RAID ____.

level 1

____ volumes are often referred to as RAID-0

Striped

____ backup only backs up files that are new or that have been updated.

incremental

does not use traditional partitioning

Dynamic Disk

located in the first sector and track of the hard disk and has startup information about partitions and how to access the disk

MBR

uses traditional disk management techniques and contains primary partitions, extended partitions, and logical drives

Basic Disk

contains information about each partition created, such as the type of partition on MBR Disks, size, and location

Partition Disk

a set of standards for lengthening disk life and preventing data loss

RAID

two or more disks that are combined like a volume set, but that are striped for RAID level 0 or RAID level 5

Stripe Set

a server folder that is associated with a user's account and that is a designated workspace for the user to store files

Home Directory

the partition that contains the hardware-specific files needed to load the operating system

System Partition

tool that provides a central location for viewing disk information and performing tasks such as creating and deleting partitions and volumes

Disk Management

When DNS forwarding is set so that only the DNS server receiving the request attempts resolution (and not the server that forwarded the request), this is called ____ forwarding.

exclusive

The ____ is a DNS resource record that provides information in response to queries about secondary DNS servers for an authoritative server and information about offsite primary servers that are not authoritative for the domain.

NS

The ____ is a DNS resource record that associates a particular TCP/IP service to a server along with the domain of the server and its protocol.

SRV

Usually a DNS caching server contain zone databases.

False

A Windows Server 2008 server can be configured in the role of a DHCP server using Microsoft DHCP services.

True

used to register NetBIOS computer names and map them to IP addresses for any systems that use NetBIOS name resolution

WINS

an IP address that is manually configured and not automatically leased by DHCP

Static IP Address

used to provide fast queries because the results of each query are stored in RAM

Cashing Server

provides the DNS namespace for an enterprise

DNS Server

in IP version 4, a host record

Host Address (A) Resource record

a DNS server that has a large number of entries in its zones can load those entries as a background process

Background Zone Loading

a modern form of DNS that enables client computers and DHCP servers to automatically register IP addresses

Dynamic DNS

contains the IP address-to-host name

Pointer (PTR) resource record

the newer version of IP that is used primarily on educational and experimental networks

IPV6

____ is a DNS resource record that links a computer or network host name to its IP address.

host (A)

a data encryption technique employed between a server and a client, such as between a client's browser and an Internet server

SSL

enables forwarding on the basis of MAC addressing (which is the physical address of the network interface) in addition to IP addressing

Layer two forwarding

enable routing and remote access through two means: virtual private networking and dial-up networking

RRAS

encapsulates a packet, usually TCP/IP, so that it can be transmitted from a point at one end of a WAN to another point

Remote access protocol

offers PPP-based authentication techniques and encrypts data carried by PPTP through using Microsoft Point-to-Point Encryption

PPTP

a modulator/demodulator that converts a transmitted digital signal to an analog signal for a telephone line

Modem

a technology that uses advanced modulation techniques on regular telephone lines for high-speed networking at speeds of up to about 52 Mbps between subscribers and a telecommunications company

DSL

originally designed for UNIX environments for point-to-point communications among computers, servers, and hosts using TCP/IP

SLIP

an older packet-switching protocol for connecting remote networks at speeds up to 2.048 Mbps

X.25

____, popularly called a digital modem, links a computer or a fax to an ISDN line.

terminal adapter

____ is a modem from which communications occur in discrete units, and in which the start of a unit is signaled by a start bit at the front, and a stop bit at the back signals the end of the unit.

asynchronous modem

____ is a WAN communications technology that relies on packet switching and virtual connection techniques to transmit at rates from 56 Kbps to 45 Mbps.

Frame relay

____ is the most commonly used transport protocol, and so it is most typically encapsulated in a remote access protocol for transport over a WAN.

TCP/IP

____ is a digital modem device designed for use with the cable TV system, providing high-speed data transfer.

cable modem

____ was developed by IBM and the National Security Agency in cooperation with the National Bureau of Standards (now called the National Institute of Standards and Technology) as an encryption technique using a secret key between the communicating stations.

DES

RSoP ____ mode generates a report and provides the result of proposed policy changes.

planning

The operating system can employ ____ to bar access to an account (including the true account owner) after a number of unsuccessful tries.

account lockout

Group policies are secured so that they can be changed by individual users.

False

RSoP ____ mode generates a report based on the current policies in place and provides the resulting policy settings.

logging

a way to bring consistent security and other management to Windows Server 2008 and to clients connecting to a server

Group Policy

the standard deployed by the U.S. federal government and is intended to be more secure than DES

AES

a set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF)

IPsec

prevents an intruder from bypassing ACL file and folder protections

BitLocker Drive encryption

a security specification for a hardware device that can be used to secure information on a different hardware device, such as a hard drive

TPM

a server role to complement the client applications that can take advantage of Rights Management Services safeguards

AD RMS

a subset of individual policies within a larger group policy for a site, domain, OU, or local computer

Security Policies

used to make the implementation and troubleshooting of group policies much simpler for an administrator

RSoP

an Active Directory object that contains group policy settings (a set of group policies) for a site, domain, OU, or local computer

GPO

RMS information protection goes beyond access control lists (ACLs) and the Windows Firewall.

True

The best way to get a feel for a server's performance is to establish a ____ and then frequently monitor server performance

baseline

The ____ tab of the Task Manager shows vital CPU and memory performance information through bar charts, line graphs, and performance statistics.

Performance

The most important way to get to know your server is to use monitoring tools to establish normal server performance characteristics.

True

With the Performance Monitor tool, you can monitor one or more objects at a time as a way to get a better understanding of how particular objects interact.

True

critical process used for graphics and graphic commands

csrss.exe

enables server events to be logged for later review or diagnosis in case problems occur

Windows event log

occur whenever memory pages must be called from disk (from the paging file)

Page Faults

creates a way to diagnose problems and identify components that need to be upgraded or replaced

Benchmark

Desktop Window Manager for the GUI effects of open windows

dwm.exe

enables data and services to be stored and protected by using private key authentication

Protected storage service

used to start a program at a specified time and works with the software Task Scheduler

task scheduler service

can be used to monitor components such as hard disks, memory, the processor, a network interface, a started process, and the paging file

Performance monitor

important process that enables users to log on and log off the system

winlogon.exe

The ____ tab in Task Manager enables you to monitor network performance on all NICs installed in the server.

Networking

The ____ process is an important service for starting and stopping processes while the operating system is running, booting, and shutting down

services.exe

___ log tracks occurrences of specific operations, such as when a disk drive is added.

operational

files used to start up the operating system when you boot

System protected files

records access and security information about logon accesses and file, folder, and system policy changes

Security Log

reboots the server into a local mode so that the server is not available to users as a domain controller

Directory services restore mode

enables drivers without the proper digital signature to be installed

Disable driver signature enforcement

records information about how software applications are performing if the programmer has designed the software to write information into the log

Application log

boots the system while transmitting debug data to be viewed at another computer over a serial connection, which can be used by Microsoft technicians to troubleshoot problems

Debugging mode

command used to show a file's contents

Type

command used to create a new directory

md

command used to repair damage files

chkdsk

The ____ boot option is used to create a record of devices and drivers that started, so you can check a log for points of failure.

Enable Boot Logging

With the ____ advanced boot option, the system boots using the minimum configuration of devices and drivers, and has network connectivity.

Safe Mode with Networking

The more you know about the server's network context, the faster you'll be able to resolve a problem, such as slow server performance.

True

The ____ command lists the contents of a directory (folder).

dir