Term
Routing and Remote Access Services (RRAS) |
|
Definition
is a role service to configure and manage network routing in Windows Server 2008. |
|
|
Term
Routing and Remote Access Services (RRAS) |
|
Definition
provides Dynamic Host Configuration Protocol (DHCP) relay agent functionality for networks. |
|
|
Term
|
Definition
are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes. |
|
|
Term
|
Definition
|
|
Term
|
Definition
route traffic based on information they discover about remote networks from other routers. |
|
|
Term
|
Definition
RIPv2 uses ____ in determining routes it can use for forwarding packets of data. |
|
|
Term
|
Definition
A(n) ____ forwards DHCPDiscover messages for subnets that do not have a DHCP server and that are not connected to a router that supports passing DHCP broadcast messages. |
|
|
Term
|
Definition
The ____ component of RRAS provides support for multicast network traffic by routing multicast traffice to networks that host these services. |
|
|
Term
Routing and Remote Access Services (RRAS) |
|
Definition
In situations where you do not have a RFC 1542-complaint router, you can create a DHCP relay agent using ____. |
|
|
Term
|
Definition
____ supports securing VPNs using 128-bit RC4 encryption. |
|
|
Term
Layer 2 Tunneling Protocol (L2TP) |
|
Definition
____ works by encapsulating PPP frames before they are transmitted across a network. |
|
|
Term
Secure Socket Tunneling Protocol (SSTP) |
|
Definition
____ uses PPP to encapsulate traffic for transmission across network using a secure socket layer (SSL). |
|
|
Term
|
Definition
The ____ is a role service that provides you with a framework for creating and enforcing network access policies for client health, along with policies for authentication and authorization of connection requests. |
|
|
Term
|
Definition
The _____ is the central utility for managing RADIUS clients and remote RADIUS servers, network health and access policies, NAP settings for NAP scenarios, and logging settings. |
|
|
Term
|
Definition
_____ is an industry-standard protocol that provides centralized authentication, authorization, and accounting for network access devices such as wireless access points and remote access servers. |
|
|
Term
|
Definition
A _____ is any device such as a remote access server, wireless access point or VPN concentrator, that accepts remote connections from remote access clients. |
|
|
Term
|
Definition
A _____ is responsible for providing network access to remote access clients such as users needing VPN or dial-in network access. |
|
|
Term
|
Definition
A(n)____ is a setting used to route RADIUS messages between the access client and the appropriate RADIUS server. |
|
|
Term
|
Definition
____ are used on networks to perform authentication, authorization, and accounting for RADIUS clients, or convey authentication requests to other centralized authenticating systems. |
|
|
Term
|
Definition
A(n)____ is the database used by a RADIUS server to authenticate users. |
|
|
Term
|
Definition
_____ is the first component of the RADIUS process in which the identity of a user connecting to a resource is verified. |
|
|
Term
|
Definition
A(n)_____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port. |
|
|
Term
|
Definition
Clients us a (n)____ to determine to what type of network they are connected. |
|
|
Term
|
Definition
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files. |
|
|
Term
New Technology File System (NTFS) |
|
Definition
Along with providing file security through Access Control Lists,_____ allows users to perform file-based encryption through the Encrypting Files Service(EFS). |
|
|
Term
|
Definition
With ____, each user has a public key that is available to everyone and a private key that is known only to the user. |
|
|
Term
|
Definition
_____is a command-line utility that allows you to manage EFS through scripts or the command prompt. |
|
|
Term
|
Definition
_____provides hard drive-based encryption of servers and Windows Vista computers. |
|
|
Term
Trusted Protection Module |
|
Definition
A_____is a microchip that performs basic security tasks with encryption keys. |
|
|
Term
|
Definition
Using BitLocker with a TPM and a PIN or a USB flash drive is called _____. |
|
|
Term
|
Definition
_____ attacks are performed by flooding a host or a network router with more traffic than it can handle. |
|
|
Term
|
Definition
A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers. |
|
|
Term
|
Definition
_____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong. |
|
|
Term
|
Definition
_____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network. |
|
|
Term
|
Definition
IPSec's _____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN) solutions for remote access. |
|
|
Term
|
Definition
IPSec's ____ provides secure communications between two networks through a single node. |
|
|
Term
|
Definition
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions. |
|
|
Term
|
Definition
The term _____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications. |
|
|
Term
Encapsulating Security Payload |
|
Definition
_____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303. |
|
|
Term
|
Definition
_____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported. |
|
|
Term
challenge-response protocol |
|
Definition
All forms of NTLM use the _____. |
|
|
Term
|
Definition
The _____ is responsible for managing the network health and connectivity policies on a network. |
|
|
Term
|
Definition
_____ provides a command-line utility so that you can perform automated installations or removals of roles, role services, and features. |
|
|
Term
Windows Server Update Services (WSUS) |
|
Definition
_____ centralizes the updating tasks for client and server computers and allows you to relocate them from the WAN onto the local network. |
|
|
Term
Windows Server Update Services (WSUS) |
|
Definition
_____ provides a central administrative console for downloading the list of the latest updates from Microsoft Update servers, approving updates to be deployed to network clients, and viewing reports on the status of your network clients. |
|
|
Term
WSUS Administrative console |
|
Definition
The _____ allows you to generate reports, manage updates, and monitor the computer through the console. |
|
|
Term
Microsoft Baseline Security Analyzer |
|
Definition
_____ provides security recommendations from Microsoft and guidance for improving a computer's security posture. |
|
|
Term
Reliability and Performance |
|
Definition
The _____ console provides a suite of utilities for monitoring and capturing performance data for local and remote systems. |
|
|
Term
|
Definition
_____ are central repositories for gathering information for Reliability and Performance Monitor. |
|
|
Term
|
Definition
_____ data is collected from trace providers, which are components of the operating system or of individual applications that report actions or events. |
|
|
Term
|
Definition
The _____ can display real-time or historical data of local or remote computers. |
|
|
Term
|
Definition
New in Windows Server 2008, the _____ snap-in provides an overview of system stability by listing details about event that have affected reliability. |
|
|
Term
|
Definition
The _____ acts as a central repository for gathering information for Reliability and Performance Monitor. |
|
|
Term
|
Definition
The _____ organizes data collection points into a single component that you can use to review or log performance in many ways. |
|
|
Term
|
Definition
_____ is a built-in utility for capturing and viewing network traffic as it arrives or leaves a server. |
|
|
Term
|
Definition
_____ helps to determine whether traffic is reaching a destination and lets you view encrypted ESP packets to verify that IPSec policies are being properly applied. |
|
|
Term
|
Definition
______ displays a process name if one exists for traffic so that you can easily track data back to its source. |
|
|
Term
|
Definition
_____ allows you to track disk usage by users and enforce disk space limits on disk volumes. |
|
|
Term
|
Definition
The Volume Shadow Copy service (VSS) is a feature of Windows Server 2008 that allows you to set up manual or automatic backup copies, known as _____, of files or folders on a specific volume at a specific point in time. |
|
|
Term
|
Definition
_____ provides backup and recovery of your files, folders, volumes, and application data on Windows Server 2008. |
|
|
Term
|
Definition
_____ increases the amount of time necessary for performing your backup but does not affect the overall performance of your server or performance when restoring files. |
|
|
Term
|
Definition
_____ backs up only the blocks that have changed since the last backup was performed. |
|
|
Term
|
Definition
A(n)_____ is a process where a server can be restored to a clean machine(no installed) in a single step. |
|
|