Term
True OR Flase All Windows Server 2008 editions support disk hot-replace or hot-add if the hardware supports it? |
|
Definition
|
|
Term
How many days after installation will Windows Server operate without activation before an administrator cannot log on? |
|
Definition
|
|
Term
After configuring networkign on a server, most people test the configuration by using ping, a network testin and troubleshooting tool that send a series of _____ packets to a destination IP address to see whether there is a replu. |
|
Definition
|
|
Term
True or False It is a good idea for an adminitrator to use the automatic setting to download patches? |
|
Definition
|
|
Term
A(n) ____ is generally a collection of all bug fixes and security updates since the OS release. |
|
Definition
|
|
Term
_____ consist of a group of servers is connected by both cabling and software, so if one server fails, another takes over to provide those services. |
|
Definition
|
|
Term
True or False It is recommended to install server core as the first server in a network? |
|
Definition
|
|
Term
A(n) ____ is a layer of software between the hardware and OSs that allows multiple OSs or multiple instances of the same OS to share physical hardware resouces. |
|
Definition
|
|
Term
True or False Virtual machines run in the background until you connect to then in Hyper-V Manager. |
|
Definition
|
|
Term
Which Windows 2008 Server edition is geared toweards meduim to large businesses? |
|
Definition
|
|
Term
What is condisdered to be the most imprtant feature of NTFS? |
|
Definition
Capability to set user and group permissions on both files and folders |
|
|
Term
Which component is the foundation of a Windows network enviroment? |
|
Definition
|
|
Term
True or False The domain model is preferred for a computer network that has more than ten computer or requires centralzied security and resource managment. |
|
Definition
|
|
Term
A(n) ____ is part of the OS that sends requests to a server to access network resources. |
|
Definition
|
|
Term
_____ is a new Windows Server 2008 installation option tht uses a limited version of the GUI to take up fewer resources. |
|
Definition
|
|
Term
A software enviroment that simulates the computer hardware an OS requires for installation is known a s a(n) ____. |
|
Definition
|
|
Term
After Active Dierectory is installed, you can explore it by using active directory users and computers MMC via Administartive tools or _____ |
|
Definition
|
|
Term
The _____ is the core logical structure container in Active Directory. |
|
Definition
|
|
Term
True or False OUs may be nested |
|
Definition
|
|
Term
True or Flase OUs are not allowed to have the same name under any circumstances |
|
Definition
|
|
Term
What are the 3 object types that can be assigned permissions to access and active directory object? |
|
Definition
|
|
Term
The ____ permission overrides the Allow Permission. |
|
Definition
|
|
Term
Each section of an Active Directory database is referred to as a(n) _____ partition. |
|
Definition
|
|
Term
The KCC is designed to ensure no more than ____ hops between any two domain controllers occur. |
|
Definition
|
|
Term
Which statement accurately reflects trusts in Active Directory? |
|
Definition
Trusts can exist between domains and between forests |
|
|
Term
Which trust is configured manually between domains to bypass the normal referral process? |
|
Definition
|
|
Term
True or False Some terms are standard for the industry, but others might not be? |
|
Definition
|
|
Term
In the Network and Sharing Center, _____ displays a graphical view of the network from you cpmputers prespective |
|
Definition
|
|
Term
Inthe Network and Sharing Center, a user can click the ___ link at the top right to see a more detailed network map |
|
Definition
|
|
Term
Which item can set in the Sharing and Discovery secton of the Network and Sharing Center? |
|
Definition
|
|
Term
Which item can set in the Tasks section of the Network and Sharing Center? |
|
Definition
|
|
Term
True or False The difference between TCP/IPv4 and TCP/Ipv6 are likited to the TCP part of the protocol |
|
Definition
|
|
Term
How may bytes are in a IPv4 address? |
|
Definition
|
|
Term
How mayny Bytes are in an IPv6 address? |
|
Definition
|
|
Term
Which command displays the route packets take between two computers? |
|
Definition
|
|
Term
Which type of DNS lookup responds with the best informaiton it has to satify the query? |
|
Definition
|
|
Term
DNS clients maintain a text file called ____ that can contain static DNS entries. |
|
Definition
|
|
Term
Which DNS server role is a DNS server to which other DNS servers send requests targeted for a specific domain? |
|
Definition
|
|
Term
Which DNS zone contains a read-only copy of only the SOA and NS records for a Zone and the necessay A records to resolve NS records? |
|
Definition
|
|
Term
Which term identifies an operation that copies all or part of a zone from one DNS server to another and occures becasue of secondary server requesting the transfer from another server. |
|
Definition
|
|
Term
True or False There is no need to configure WINS on a Windows Server 2008 network in todays computing enviroment? |
|
Definition
|
|
Term
True or False Dnssmd.exe is a more powerful tool than Perfaormance Monitor for Monitoring DNS issues. |
|
Definition
|
|
Term
|
Definition
the windows directory service that enables administrators to create and manage users and group, set network-wide user and computer policies, manage security, and organize network resources. |
|
|
Term
|
Definition
the core structural unit of active directory; contains OUs and represents administrative, security, and policy boundaries. |
|
|
Term
|
Definition
a windows server that has active directory installed and is responsible for allowing client computers access to domain controllers. |
|
|
Term
|
Definition
the part of the OS that sends requests to a server to access network resources |
|
|
Term
|
Definition
a file system used on windows OSs that support compression, encryption, and fine-tuned permissions |
|
|
Term
|
Definition
a major function or service that a server provides |
|
|
Term
|
Definition
an authentication feature that makes it possible for users to access resources in their own organization as well as partner organizations with just a single logon |
|
|
Term
|
Definition
a software environment that stimulates that computer hardware an OS requires for installation. |
|
|
Term
|
Definition
OSs running in virtual machines on host computers |
|
|
Term
|
Definition
the physical computer on which server 2008 is installed |
|
|
Term
|
Definition
an OSs running virtualization software for the purpose of running virtual machines or guest operating systems |
|
|
Term
|
Definition
software updates normally intended to fix security vulnerabilities and software bugs |
|
|
Term
|
Definition
a utility used to test network connectivity and IP address configuration |
|
|
Term
|
Definition
a collection of bug fixes and security updates or patches that can be installed on an OS to bring it up to date |
|
|
Term
|
Definition
a set of files containing a virtual machines state at a particular time |
|
|
Term
|
Definition
a process that confirms a users identity; the account is then assigned permissions and rights that authorize the user to access resources and perform certain tasks on the computer or domain |
|
|
Term
|
Definition
user accounts created automatically during installations |
|
|
Term
|
Definition
a user account created in active directory the provides a single logon for users to access all resources in the domain for which they have been authorized |
|
|
Term
|
Definition
a user account defined on a local computer that is authorized to access resources only on the computer, they are not usually part of an active directory domain |
|
|
Term
|
Definition
an active directory container used to organize a networks users and resources into logical administrative units |
|
|
Term
|
Definition
settings that define which resources users can and what level of access they have to resources |
|
|
Term
|
Definition
a physical location in which domain controllers communicate and replicate information regularly |
|
|
Term
|
Definition
a grouping of domains that share a common naming structure |
|
|
Term
fully qualified domain name |
|
Definition
a domain name that includes all parts of the name, including the top level domain |
|
|
Term
|
Definition
a collection of users personal files and settings that define his or her working environment |
|
|
Term
|
Definition
a user profile stored on the same system where the user logs on |
|
|
Term
|
Definition
a user profile that can be changed during a users logon session, but the next time the user logs on, the changes aren't saves, and the profile reverts back to its original state |
|
|
Term
|
Definition
|
|
Term
|
Definition
a user profile that follow the user no matter which computer he or she log on to. Its stored on the network share so that when the user logs on to any computer, the profile is copied from the network share to the profile folder on the local computer |
|
|
Term
dual-ip layer architecture |
|
Definition
the current implememtation of ipv6 in windows vista and server 2008. Both ipv4 and ipv6 share the other components of the stack; the dual stack layer used by windows xp and server 2003 duplicates the other tcp/ip layers |
|
|
Term
|
Definition
similar in function to the ipv4 apipa addresses link local ipv6 address begin with fe80 are self configuring and cant be routed |
|
|
Term
|
Definition
the process whereby a computer finds other computers on a network and allows other computers to find it |
|
|
Term
|
Definition
an icon in the network connections windows that shows the components needed for the computer to connect to the network |
|
|
Term
|
Definition
an 8 bit value; a number from 1 to 255 that's on of the four numbers found in a dotted decimal ip address |
|
|
Term
|
Definition
a computer that accesses resources on another computer via a network |
|
|
Term
|
Definition
a computer that has its own CPU and can be used as a stand-alone or network computer |
|
|
Term
|
Definition
the ability to run two or more programs at the same time |
|
|
Term
|
Definition
a suite of protocols and utilities that support communication across lans and the internet |
|
|
Term
|
Definition
involves assigning a dotted decimal address that becomes each workstations permanent, unique ip address |
|
|
Term
|
Definition
automatically assigns an ip address to a computer each time it is logged on |
|
|
Term
|
Definition
a tcp\ip application protocol that enables a DNS server to resolve domain and computer names to ip addresses or ip addresses to domain and computer names |
|
|
Term
|
Definition
enables a windows server 2008 server with dhcp services to detect the presence of a new workstation, assign an ip address to that workstation |
|
|
Term
|
Definition
like a tunnel through a larger network that is restricted to designated member clients only |
|
|
Term
|
Definition
means using a telecommunications line and a modem to dial into a network or specific computers on a network |
|
|
Term
|
Definition
provide a basis for comparing data collected during problem situation with data showing normal performance conditions |
|
|
Term
|
Definition
a portion of a network that is between two networks such as between a private network and the internet |
|
|
Term
|
Definition
can be used to monitor components such as hard disk, memory, the processor, a network interface, a started process, and the paging file |
|
|
Term
|
Definition
displays current tcp/ip network configuration values, updates, or releases |
|
|
Term
|
Definition
sends icmp echo request messages to verify that tcp\ip is configured correctly and that a tcp\ip host is available |
|
|
Term
|
Definition
dispays the path of tcp\ip host |
|
|