Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
88 Cards in this Set
- Front
- Back
Once a partition is formatted, it is called a volume and can be assigned a drive letter. |
True |
|
A ____ volume is stored on 2 to 32 dynamic disks that are treated as one volume. |
spanned |
|
____ RAID implements fault tolerance through the server's operating system. |
Software |
|
Disk mirroring involves creating a shadow copy of data on a backup disk and is RAID ____. |
level 1 |
|
____ volumes are often referred to as RAID-0 |
Striped |
|
____ backup only backs up files that are new or that have been updated. |
incremental |
|
does not use traditional partitioning |
Dynamic Disk |
|
located in the first sector and track of the hard disk and has startup information about partitions and how to access the disk |
MBR |
|
uses traditional disk management techniques and contains primary partitions, extended partitions, and logical drives |
Basic Disk |
|
contains information about each partition created, such as the type of partition on MBR Disks, size, and location |
Partition Disk |
|
a set of standards for lengthening disk life and preventing data loss |
RAID |
|
two or more disks that are combined like a volume set, but that are striped for RAID level 0 or RAID level 5 |
Stripe Set |
|
a server folder that is associated with a user's account and that is a designated workspace for the user to store files |
Home Directory |
|
the partition that contains the hardware-specific files needed to load the operating system |
System Partition |
|
tool that provides a central location for viewing disk information and performing tasks such as creating and deleting partitions and volumes |
Disk Management |
|
When DNS forwarding is set so that only the DNS server receiving the request attempts resolution (and not the server that forwarded the request), this is called ____ forwarding. |
exclusive |
|
The ____ is a DNS resource record that provides information in response to queries about secondary DNS servers for an authoritative server and information about offsite primary servers that are not authoritative for the domain. |
NS |
|
The ____ is a DNS resource record that associates a particular TCP/IP service to a server along with the domain of the server and its protocol. |
SRV |
|
Usually a DNS caching server contain zone databases. |
False |
|
A Windows Server 2008 server can be configured in the role of a DHCP server using Microsoft DHCP services. |
True |
|
used to register NetBIOS computer names and map them to IP addresses for any systems that use NetBIOS name resolution |
WINS |
|
an IP address that is manually configured and not automatically leased by DHCP |
Static IP Address |
|
used to provide fast queries because the results of each query are stored in RAM |
Cashing Server |
|
provides the DNS namespace for an enterprise |
DNS Server |
|
in IP version 4, a host record |
Host Address (A) Resource record |
|
a DNS server that has a large number of entries in its zones can load those entries as a background process |
Background Zone Loading |
|
a modern form of DNS that enables client computers and DHCP servers to automatically register IP addresses |
Dynamic DNS |
|
contains the IP address-to-host name |
Pointer (PTR) resource record |
|
the newer version of IP that is used primarily on educational and experimental networks |
IPV6 |
|
____ is a DNS resource record that links a computer or network host name to its IP address. |
host (A) |
|
a data encryption technique employed between a server and a client, such as between a client's browser and an Internet server |
SSL |
|
enables forwarding on the basis of MAC addressing (which is the physical address of the network interface) in addition to IP addressing |
Layer two forwarding |
|
enable routing and remote access through two means: virtual private networking and dial-up networking |
RRAS |
|
encapsulates a packet, usually TCP/IP, so that it can be transmitted from a point at one end of a WAN to another point |
Remote access protocol |
|
offers PPP-based authentication techniques and encrypts data carried by PPTP through using Microsoft Point-to-Point Encryption |
PPTP |
|
a modulator/demodulator that converts a transmitted digital signal to an analog signal for a telephone line |
Modem |
|
a technology that uses advanced modulation techniques on regular telephone lines for high-speed networking at speeds of up to about 52 Mbps between subscribers and a telecommunications company |
DSL |
|
originally designed for UNIX environments for point-to-point communications among computers, servers, and hosts using TCP/IP |
SLIP |
|
an older packet-switching protocol for connecting remote networks at speeds up to 2.048 Mbps |
X.25 |
|
____, popularly called a digital modem, links a computer or a fax to an ISDN line. |
terminal adapter |
|
____ is a modem from which communications occur in discrete units, and in which the start of a unit is signaled by a start bit at the front, and a stop bit at the back signals the end of the unit. |
asynchronous modem |
|
____ is a WAN communications technology that relies on packet switching and virtual connection techniques to transmit at rates from 56 Kbps to 45 Mbps. |
Frame relay |
|
____ is the most commonly used transport protocol, and so it is most typically encapsulated in a remote access protocol for transport over a WAN. |
TCP/IP |
|
____ is a digital modem device designed for use with the cable TV system, providing high-speed data transfer. |
cable modem |
|
____ was developed by IBM and the National Security Agency in cooperation with the National Bureau of Standards (now called the National Institute of Standards and Technology) as an encryption technique using a secret key between the communicating stations. |
DES |
|
RSoP ____ mode generates a report and provides the result of proposed policy changes. |
planning |
|
The operating system can employ ____ to bar access to an account (including the true account owner) after a number of unsuccessful tries. |
account lockout |
|
Group policies are secured so that they can be changed by individual users. |
False |
|
RSoP ____ mode generates a report based on the current policies in place and provides the resulting policy settings. |
logging |
|
a way to bring consistent security and other management to Windows Server 2008 and to clients connecting to a server |
Group Policy |
|
the standard deployed by the U.S. federal government and is intended to be more secure than DES |
AES |
|
a set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF) |
IPsec |
|
prevents an intruder from bypassing ACL file and folder protections |
BitLocker Drive encryption |
|
a security specification for a hardware device that can be used to secure information on a different hardware device, such as a hard drive |
TPM |
|
a server role to complement the client applications that can take advantage of Rights Management Services safeguards |
AD RMS |
|
a subset of individual policies within a larger group policy for a site, domain, OU, or local computer |
Security Policies |
|
used to make the implementation and troubleshooting of group policies much simpler for an administrator |
RSoP |
|
an Active Directory object that contains group policy settings (a set of group policies) for a site, domain, OU, or local computer |
GPO |
|
RMS information protection goes beyond access control lists (ACLs) and the Windows Firewall. |
True |
|
The best way to get a feel for a server's performance is to establish a ____ and then frequently monitor server performance |
baseline |
|
The ____ tab of the Task Manager shows vital CPU and memory performance information through bar charts, line graphs, and performance statistics. |
Performance |
|
The most important way to get to know your server is to use monitoring tools to establish normal server performance characteristics. |
True |
|
With the Performance Monitor tool, you can monitor one or more objects at a time as a way to get a better understanding of how particular objects interact. |
True |
|
critical process used for graphics and graphic commands |
csrss.exe |
|
enables server events to be logged for later review or diagnosis in case problems occur |
Windows event log |
|
occur whenever memory pages must be called from disk (from the paging file) |
Page Faults |
|
creates a way to diagnose problems and identify components that need to be upgraded or replaced |
Benchmark |
|
Desktop Window Manager for the GUI effects of open windows |
dwm.exe |
|
enables data and services to be stored and protected by using private key authentication |
Protected storage service |
|
used to start a program at a specified time and works with the software Task Scheduler |
task scheduler service |
|
can be used to monitor components such as hard disks, memory, the processor, a network interface, a started process, and the paging file |
Performance monitor |
|
important process that enables users to log on and log off the system |
winlogon.exe |
|
The ____ tab in Task Manager enables you to monitor network performance on all NICs installed in the server. |
Networking |
|
The ____ process is an important service for starting and stopping processes while the operating system is running, booting, and shutting down |
services.exe |
|
___ log tracks occurrences of specific operations, such as when a disk drive is added. |
operational |
|
files used to start up the operating system when you boot |
System protected files |
|
records access and security information about logon accesses and file, folder, and system policy changes |
Security Log |
|
reboots the server into a local mode so that the server is not available to users as a domain controller |
Directory services restore mode |
|
enables drivers without the proper digital signature to be installed |
Disable driver signature enforcement |
|
records information about how software applications are performing if the programmer has designed the software to write information into the log |
Application log |
|
boots the system while transmitting debug data to be viewed at another computer over a serial connection, which can be used by Microsoft technicians to troubleshoot problems |
Debugging mode |
|
command used to show a file's contents |
Type |
|
command used to create a new directory |
md |
|
command used to repair damage files |
chkdsk |
|
The ____ boot option is used to create a record of devices and drivers that started, so you can check a log for points of failure. |
Enable Boot Logging |
|
With the ____ advanced boot option, the system boots using the minimum configuration of devices and drivers, and has network connectivity. |
Safe Mode with Networking |
|
The more you know about the server's network context, the faster you'll be able to resolve a problem, such as slow server performance. |
True |
|
The ____ command lists the contents of a directory (folder). |
dir |