Term
What is the first job of the BIOS at stystem startup? |
|
Definition
Run the power-on self-test (POST) |
|
|
Term
What does the CMOS store and what other component uses this information? |
|
Definition
The configuration information about the computer; BIOS |
|
|
Term
How is main memory distinguished from secondary memory? |
|
Definition
By the speed between the main and secondary memory |
|
|
Term
When power is removed from the computer, what happens to the stored information in ROM? |
|
Definition
Its contents remain in memory |
|
|
Term
Why is RAM considered as volatile memory? |
|
Definition
Because the contents are erased from memory |
|
|
Term
How are dynamic RAM and static RAM different? |
|
Definition
DRAM chips must be refreshed constantly or they lose their contents. |
|
|
Term
What is cache memory and what is normally stored in it? |
|
Definition
Temp Storage area; a collection of data duplicating original values |
|
|
Term
What is the main goal of buffers? |
|
Definition
to temp hold data used by some type of hardware device until the device is ready to utilize the data |
|
|
Term
What is the purpose of the DMA controller? |
|
Definition
To move data and to freeing up the CPU to process data |
|
|
Term
|
Definition
a asynchronous signal from a computer hardware device indicating the need for attention or a synchronous event in a software application program indicating the need for a change in execution |
|
|
Term
How are interrupts commonly used? |
|
Definition
for computer multitasking, especially in real-time computing |
|
|
Term
|
Definition
a method in which the computer ensures the data it processes is accurate |
|
|
Term
What is the difference between error correction code (ECC) memory and the parity method? |
|
Definition
the parity method can only detect an error while ECC memory can both detect and correct errors |
|
|
Term
3 examples of storage devices that can be placed in a SAN |
|
Definition
Disk Arrays, CD/DVD towers, tapelibraries |
|
|
Term
How can using a SAN make equipment failure easier to repair? |
|
Definition
the data does not need to be affected; you can replace only the server |
|
|
Term
What are the 3 protocols listed that support a SAN? |
|
Definition
Fibre Channel, ATA overEthernet, iSCSI |
|
|
Term
How does SAN and a NAS differ? |
|
Definition
a SAN appears to the server to be physically attached; the NAS is treated as a network drive |
|
|
Term
What are the 3 concepts of RAID? |
|
Definition
Mirroring, striping, and error correction |
|
|
Term
Why is RAID 5 considered to be more efficient when it comes to parity checks? |
|
Definition
because you do not need separate harddrives for parity checks |
|
|
Term
What are "nested RAID arrays"? |
|
Definition
because one array type is "nested" within anothr array type |
|
|
Term
|
Definition
Instructions written or existing in a form acceptable by a computer |
|
|
Term
What is the distinction of an interpreted language? |
|
Definition
No permanent object code is produced |
|
|
Term
What are some characteristics of HOL? |
|
Definition
-Use English-like statements to increase user understanding |
|
|
Term
|
Definition
|
|
Term
What are some characteristics of assembler language. |
|
Definition
Programmer writes mnemonics, which are converted directly to machine language by a language processor (machine specific) |
|
|
Term
What is the European Organization for Nuclear Research commonly known as? |
|
Definition
CERN - world's largest particle physics lab |
|
|
Term
How would you best describe a URL? |
|
Definition
the address of a file or resource accessible on the internet |
|
|
Term
|
Definition
Set of markup symbols or codes inserted in a file intended for display on a web browser page |
|
|
Term
What significant role with XHTML play in the future? |
|
Definition
most likely to succeed HTML for internet purposes |
|
|
Term
|
Definition
standard method for a web server to pass a web user's request to an application program and to exchange data back to the user |
|
|
Term
What is session management? |
|
Definition
the process of keeping track of a user's activity across sessions of interaction with th ecomputer system |
|
|
Term
Why is session management useful when using the internet? |
|
Definition
with out it, you would have to re-authenticate yourself every time you clicked on a hyperlink, rendering internet almost useless for secure communication |
|
|
Term
Example of session management used for security |
|
Definition
session being terminated for inactivity and user having to reauthenticate to get back to site |
|
|
Term
What are the methods of optimizing your system? |
|
Definition
task manager, disk defrag, ckdsk, disk quotas |
|
|
Term
What triggers can you set the task manager to launch a program on? |
|
Definition
daily, weekly, monthly, one time only, computer stars up, log on |
|
|
Term
How can you best describe a radix and what does it indicate? |
|
Definition
"base" and it indicates the number of digits used in a particualr numbering system |
|
|
Term
what is an exponent and what does it indicate? |
|
Definition
written superscript and it indicates how many times a number is to multiplied by itself |
|
|
Term
Explain the difference between the most and least significant digits |
|
Definition
MSD - left most nonzero digit (greatest possible value) |
|
|
Term
whatis the purpose of fractional point? |
|
Definition
the point that separates the whole portion of the number from the fractional portion of a number |
|
|
Term
From an IT contingency planning perspective, what are the two primary functions of risk management? |
|
Definition
1. identify threats and vulnerabilities |
|
|
Term
3 main classifications of threat |
|
Definition
Natural, human, environmental |
|
|
Term
|
Definition
restores organizational essential fucntions at an alternate site for up to 30 days |
|
|
Term
What should a contingency plan spell out? |
|
Definition
systems prioritized in what order to protect them and for bringing them back online |
|
|
Term
What criteria should you consider when selecting an offsite storage facility? |
|
Definition
Geographic area, accessibility, security, environment and cost |
|
|
Term
5 types of alternate sites |
|
Definition
cold, warm, hot, mobile, mirrored |
|
|
Term
Why should you focus most of your backup efforts on data instead of programs? |
|
Definition
date is unique and software can always be reloaded |
|
|
Term
What 3 factors is the choice of back media based on? |
|
Definition
|
|
Term
4 different types of backup you can schedule |
|
Definition
Full (AKA Normal), differential, incremental, daily |
|
|
Term
Why should you keep a copy of your backups at an alternate site? |
|
Definition
problem or damage only effects the primary site |
|
|
Term
What is the key to understanding AD? |
|
Definition
Understanding AD structural terms |
|
|
Term
What may be contained within objects? |
|
Definition
network users, computers, printers, groups, data files, applications |
|
|
Term
Why is the global catalog server a critical component in a domain? |
|
Definition
it has a "master list" of all AD objects from all domains in the forest |
|
|
Term
What are GPOs applied against? |
|
Definition
"Leaf objects" such as users and computers but not security or distribution groups |
|
|
Term
Which command do you use to launch the AD Installation Wizard to prote a server to a domain controller? |
|
Definition
|
|
Term
When can a command line interface be better than a GUI? |
|
Definition
Uses less RAM and less power from the microprocessor than any other interface |
|
|
Term
What is the biggest advantage of a GUI? |
|
Definition
|
|
Term
What are 4 elements most GUIs are composed of? |
|
Definition
Windows, Icons, Menus, Pointing devices |
|
|
Term
What are the 2 methods of installing Windows Server 2003? |
|
Definition
|
|
Term
What is the difference between a hot fix and a service pack? |
|
Definition
hotifx- program to quickly fix a specific problem |
|
|
Term
How are a forward lookup and a reverse lookup different? |
|
Definition
forward - you provide domain name and request an IP |
|
|
Term
How do recursive queries and non-recursive queries differ? |
|
Definition
recursive - made by client applications |
|
|
Term
Explain the importance, in DNS, of the "root". |
|
Definition
root consists of 13 name server clusters located world wide. These servers form the upper most layer of the DNS name space |
|
|
Term
What 3 things must AF DNS servers do? |
|
Definition
Provide reverse lookup capa. |
|
|
Term
What does DHCP server do? |
|
Definition
Manages a pool of IP addresses available for lease by authorized clients for a specific period of time |
|
|
Term
What must you be aware of when using more than one DHCP server on a network? |
|
Definition
Make sure each scope is unique so you do not cause the creation of duplicate IP addresses |
|
|
Term
What does AF policy say about using DHCP? |
|
Definition
Manage all base IP address space through utilization of DHCP |
|
|
Term
According to AF ploicy, how long should noncritical workstations' IP addresses be leased for? |
|
Definition
|
|
Term
On what servers can you install RIS? |
|
Definition
any server that meets the Window Server 2003 minimum requirements |
|
|
Term
What directory does the RIS service default to? |
|
Definition
|
|
Term
When deciding on a default directory for TIS, what are 2 rules you must follow? |
|
Definition
direcotry has to be on a partition other than the partition that holds the OS and must be formatted with NTFS |
|
|
Term
What are the services that IIS can provide? |
|
Definition
FTP, SNMP, NNTP, WWW publishing services |
|
|
Term
Why is IIS 6.0 not activated automatically? |
|
Definition
reduces number of access points for hackers |
|
|
Term
What are IIS's components? |
|
Definition
WWW server, SMTP, NNTP, FTP server, |
|
|
Term
What is usually the sole purpose of installing IIS on an AF server? |
|
Definition
to facilitate the installation of Microsoft Exchange Server |
|
|
Term
Explain what a snap-in is |
|
Definition
Interface for a program designed to integrate with the MMC |
|
|
Term
As an Administrator, how would MMC make accomplishing your duties easier? |
|
Definition
simplifies the management of the server and network |
|
|
Term
What are the 2 places a user account can be created? |
|
Definition
on a local computer or a domain controller |
|
|
Term
What is the difference between permissions and rights? |
|
Definition
permissions - control access to an object |
|
|
Term
Where is a domain user accoutn valid? |
|
Definition
on any computer in the domain for which the account was created |
|
|
Term
Which snap-in to the MMC would you use to create a new user account? |
|
Definition
|
|
Term
Why would you use group nesting? |
|
Definition
to simplify and reduce security management overhead |
|
|
Term
What scopes can apply to special identities? |
|
Definition
none - Group scopes do not apply to special identities |
|
|
Term
What do permisisons define? |
|
Definition
rules by which operations can be performed on a particular resource |
|
|
Term
What is the only way to secure resources on FAT partitions? |
|
Definition
|
|
Term
What are the 4 shared folder permissions? |
|
Definition
Full control, change read, and no access |
|
|
Term
Which permission over rides all others? |
|
Definition
|
|
Term
What are the 6 NTFS permissions? |
|
Definition
Read, Write, execute, delete, change permissions, take ownership |
|
|
Term
Why would you remove full control permission from the everyone group? |
|
Definition
with those permissions, anyone on the network could delete or modify resources |
|
|
Term
What does Microsoft Exchange Server integrate tightly with to provide its many features? |
|
Definition
TCP/IP infrastructure provided by Microsoft Windows Server 2003 and AD service |
|
|
Term
What protocols does Exchange server use to support web based mail client connectivity? |
|
Definition
HTTP, SMTP, POP3, IMAP4, NNTP |
|
|
Term
What is the core data sotrage repository for Microsfot Exchange server? |
|
Definition
Exchange information store service |
|
|
Term
What are the 2 Microsoft Exchange server roles? |
|
Definition
Mailbox server & bridgehead server |
|
|
Term
What must the account you use to install the first Exchnage 2003 server in the forest be? |
|
Definition
Must be a member of the domain admin group in the local domain and a local computer admin |
|
|
Term
What are data structures designed to do? |
|
Definition
Organize data to suit a specific programming purpose |
|
|
Term
What is the purpose of a schema? |
|
Definition
describes the objects that are represented in the database and the relationship among them |
|
|
Term
Why do we define a group of ordered data items or elements as a linked list? |
|
Definition
b/c we use pointers to connect each element together thus specifying their order |
|
|
Term
How are columns and rows identified in a table? |
|
Definition
|
|
Term
How do base tables and derived talbes differ? |
|
Definition
|
|
Term
When referring to databases, what is a view? |
|
Definition
a virtual or logical table composed of the result set of a query |
|
|
Term
Descirbe a relational database |
|
Definition
collection of data items organized as a set of formally descirbed tables from which data can be accessed in different ways without having to reorg the database tables |
|
|
Term
What 3 values form the bais of the 3 valued logic used by SQL? |
|
Definition
|
|
Term
3 basic types of SQL statements |
|
Definition
data, transaction, and schema statements |
|
|