Term
____________ contain active Directory resources that are connected by reliable high-bandwidth net work links – a min of ___ megabits. |
|
Definition
|
|
Term
What provides universal group information for the user account that is attempting to log on to the network? |
|
Definition
|
|
Term
How many different operations master roles are there? |
|
Definition
|
|
Term
Of the different Operations Masters roles which one acts as a windows NT primary domain controller? |
|
Definition
|
|
Term
Which one is responsible for maintaining all interdomain object references? |
|
Definition
|
|
Term
When is the Infrastructure Master not needed? |
|
Definition
When all the domain controllers are global catalog servers as well |
|
|
Term
In Exchange, SMTP supports two services, what are they? |
|
Definition
- Realtime Blackhole Lists (RBLs) - Improved Antivirus Support |
|
|
Term
What protocol provides users access to newgroups either internally or over the internet? |
|
Definition
Network News Transfer Protocol (NNTP) |
|
|
Term
What are the Minimum Hardware Requirements for Exchange Server 2003 Installation? |
|
Definition
Processor Pentium 133. Operating system Windows 2000 Server SP3. Memory 256 megabytes (MB). Disk space 200 MB on system drive, 500 MB on partition where Exchange Server 2003 is installed. Drive CD-ROM drive. Display VGA or better. File system All partitions involving Exchange Server 2003 must be NTFS. |
|
|
Term
What are the Recommended Hardware Requirements for Exchange Server 2003 Installation? |
|
Definition
Processor Pentium III 500 (Exchange Server 2003, Standard Edition). Pentium III 733 (Exchange Server 2003, Enterprise Edition). Operating system Windows Server 2003. Memory 512 MB. Disk space 200 MB on system drive, 500 MB on partition Where Exchange Server 2003 is installed; separate Physical disks for the Exchange binaries, database files, and transaction logs. Drive CD-ROM drive. Display SVGA or better. File system All partitions involving Exchange must be NTFS. |
|
|
Term
For setup to complete successfully, you must have the following services installed and enabled on your sever: |
|
Definition
- Microsoft .NET framework - Microsoft ASP.NET - WWW service - SMTP service - NNTP service |
|
|
Term
Before you install Exchange you have to prepare Active Directory for the installation. Preparing AD involves running _______________ and ______________. |
|
Definition
ForestPrep and DomainPrep |
|
|
Term
If you run ForestPrep in a domain that does not contain your ___________ it will end prematurely. |
|
Definition
|
|
Term
Run ForestPrep from _______________________. |
|
Definition
d:\setup\j386\setup.exe/forestprep |
|
|
Term
What are the minimum required permissions to run forest prep for the first time? |
|
Definition
Schema and Enterprise admin |
|
|
Term
____________ is available in 2003 but has to be manually enabled and installed. ________ framework is built into operating system. |
|
Definition
|
|
Term
What is the setup switch that extends the Active Directory schema to include Exchange Server 2003–specific classes and attributes? |
|
Definition
|
|
Term
DomainPrep prepares the domain partition, and must be run in each of the following domains: |
|
Definition
- The forest root domain - All domains that will contain Exchange Server 2003 - All domains that will contain Exchange mailbox-enabled objects (users and groups), even if the domain does not have its own Exchange Server 2003 server |
|
|
Term
How many ways are there to remove an Exchange Server and what are they? |
|
Definition
- Using the Microsoft Exchange Installation Wizard - Forcibly Removing Exchange Server 2003 |
|
|
Term
What prerequisites must be met to remove the Exchange server using the Wizard? |
|
Definition
- You must move all mailboxes to another Exchange server in the organization or remove them from each user account. - The server must not be a bridgehead server or routing group master. If it is, the role must first be transferred to another Exchange server in the routing group. - The server must not be a part of any connection agreements. - The server must not have any connectors installed and in use. - The server must not have any special roles. For example, if it holds the offline address book for an administrative group, you must copy this to another server. |
|
|
Term
When you are doing a forceable removal you have to remove several registry keys where? |
|
Definition
Delete several registry keys in the HKEY_LOCAL_MACHINE hive |
|
|
Term
__________________ model is used in small to medium sized networks. |
|
Definition
|
|
Term
______________ is used in larger networks. |
|
Definition
|
|
Term
_______________ are dependent upon physical layout |
|
Definition
|
|
Term
You can only move servers between routing groups with the __________________________. |
|
Definition
same administrative group |
|
|
Term
In ________________, you can move servers between groups that are in different admin groups. |
|
Definition
|
|
Term
The number of connectors is given by the formula _______________. |
|
Definition
|
|
Term
You can not operate _______________ in Native Mode |
|
Definition
|
|
Term
2003 works in ______________ mode by default. |
|
Definition
|
|
Term
Which manages the Microsoft exchange information store, including mailbox stores and public folder stores? |
|
Definition
Microsoft Exchange Information Store |
|
|
Term
What are the system requirements for running Microsoft Exchange System Management tools? |
|
Definition
|
|
Term
Native mode provides the following advantages: |
|
Definition
- Greater flexibility for defining routing groups and administrative groups. - The ability to move mailboxes between servers in different administrative groups. - The ability to move servers between routing groups. - Query-based distribution groups (QDGs). QDGs allow membership of distribution groups to be dynamic rather than static. - If routing bridgehead pairs are upgraded to Exchange Server 2003 in a native-mode organization, they will use 8BITMIME data transfers instead of converting down to 7-bit. This results in considerably less traffic over WAN connections. |
|
|
Term
Recipient objects can be categorized into the following four types: |
|
Definition
- User - Contact - Group - Public Folder |
|
|
Term
A ________________________ is a user account that has mailbox in the Exchange organization and can send and receive e-mail through the Exchange Server 2003 infrastrucsture. |
|
Definition
|
|
Term
__________ users are similar to mailbox-enabled users in that have domain user accounts in the AD domain. However, a _____________ user does not have a mailbox in the Exchange organization, only an e-mail address. |
|
Definition
|
|
Term
A _________________ has an e-mail address but is not part of the exchange server and it is not apart of the AD domain. |
|
Definition
|
|
Term
___________________ resemble mail-enabled user in that they have e-mail addresses that are part of Exchange but they do not have mail-boxes that store e-mail. |
|
Definition
|
|
Term
_______________ allows you to delete the mailbox without deleting the user account. |
|
Definition
|
|
Term
Query-Based Distribution Groups can only be created in ___________________. |
|
Definition
|
|
Term
What are Two types of Group recipients? |
|
Definition
Security groups and Distribution groups |
|
|
Term
_________________ groups cannot be assigned permissions |
|
Definition
|
|
Term
What type of email address has two names associated with it? |
|
Definition
|
|
Term
What type of group that changes frequently would be easy to maintain? |
|
Definition
Query Based Distribution Group |
|
|
Term
Users can use either _______________ or _____________________ to create their own public folders inside top-level folders to which they have been granted permission. |
|
Definition
Outlook or the Exchange Server 2003 version of Microsoft Outlook Web Access |
|
|
Term
What are the default items for a new public folder? |
|
Definition
|
|
Term
__________________ are not visible or accessible to Outlook or OWA user, and only NNTP clients such as Microsoft Outlook Express and HTTp clients such as Microsoft Internet Explorer can access them. |
|
Definition
General purpose public folder trees |
|
|
Term
Why would you add an alias to a public folder? Where would you do that? |
|
Definition
If the folder name is too long.
In the Exchange General Tab |
|
|
Term
How many ways are there to configure storage limits? |
|
Definition
Three
You can set storage limits on an entire public store or on individual public folders. You also can create a public store policy and apply the policy to as many public stores as necessary. When you set limits on the public store, all folders in the store inherit those settings. |
|
|
Term
What does an age limit do? |
|
Definition
An age limit determines the amount of time a folder retains items before automatically deleting them. |
|
|
Term
What do directory rights do? |
|
Definition
Directory rights control which users and groups have permission to change e-mail-related attributes of a mail-enabled public folder. |
|
|
Term
T/F : Circular logging is typically disabled for Mailbox stores? |
|
Definition
|
|
Term
Why do you enable Circular logging? |
|
Definition
- To limit the number of transaction log files and filling the available disk space |
|
|
Term
What are the other items for a public folder? |
|
Definition
- Calendar Items - Contact Items - Journal Items - Note Items - Task Items |
|
|
Term
What program do you use to create a general purpose public folder? |
|
Definition
|
|
Term
What does the user need to do in order to access the general purpose public folder? |
|
Definition
- They have to use a specific URL for the virtual directory |
|
|
Term
What determines the amount of time a folder retains items before automatically deleting them? |
|
Definition
|
|
Term
What requires that all messages be approved before being posted to a public folder? |
|
Definition
|
|
Term
What controls which users and groups have permission to change e-mail-related attributes of a mail-enabled public folder? |
|
Definition
|
|
Term
What is the System Attendant? |
|
Definition
Controls the creation and deletion of all resources in the virtual server. |
|
|
Term
_________________ is the default method of accessing a virtual server. |
|
Definition
|
|
Term
Which type of authentication is the most secure method? |
|
Definition
Integrated Windows Authentication is the most secure. |
|
|
Term
When do you use encryption? |
|
Definition
You only use encryption when you are using basic authentication. |
|
|
Term
What are the requirements for an exchange virtual server? |
|
Definition
- A static IP address - A network name - One or more dedicated physical disks for shared storage - An Exchange 2003 Server System Attendant resource (this installs other Exchange resources) |
|
|
Term
When Exchange Server 2003 is installed, it automatically installs, configures, and enables a ____________________________. |
|
Definition
default SMTP virtual server |
|
|
Term
What are the three diagnostic logging levels? |
|
Definition
- Minimum - High-level events—that is, a single entry for each major task performed by the service - Medium - Maximum |
|
|
Term
ESMTP uses the standard SMTP commands (with the exception of _____________) and some additional commands mostly to support encryption and authentication. |
|
Definition
|
|
Term
SMTP commands work over Port ____________ |
|
Definition
|
|
Term
What command can be used to test connectivity between your Exchange Server 2003 server and a remote SMTP host? |
|
Definition
|
|
Term
If the remote host responds with a 250 reply, then it supports ______________ commands. If the reply code is 500 then it does not support ____________. |
|
Definition
|
|
Term
What are the 3 SMTP service folders? |
|
Definition
- Pickup - Queue - Bad Mail |
|
|
Term
Why do you use a smart host? |
|
Definition
- In the case of a non-persistant connection |
|
|
Term
If you have one server configured as the smart host, should you enable the other server as well? |
|
Definition
|
|
Term
What helps prevent IP spoofing? |
|
Definition
|
|
Term
However, a few IMAP4 clients cannot interpret HTML. To provide _______________ for those clients, you configure their IMAP4 options on a ____________. |
|
Definition
plain text messages
per-user basis |
|
|
Term
Therefore, many organizations implement two firewalls: an external firewall between their front-end servers (and other computers such as Web servers) and the Internet or other external networks, and an internal firewall that prevents external users accessing the company intranets. The front-end servers are then said to be in a perimeter network, sometimes referred to as a _____________________________. |
|
Definition
|
|
Term
A -----> B A Signs with A’s Private Key B Verifies with A’s Public Key |
|
Definition
|
|
Term
A -----> B A encrypts with B’s Public Key B will decrypt with B’s Private Key |
|
Definition
|
|
Term
Digital and Encryption are part of the ________________ process. |
|
Definition
|
|
Term
If, for example, you send zipped files as self-extracting executable (.exe) packages, most filters block them. What do you do to fix that problem? |
|
Definition
Have them resend it as a non-self extracting file. |
|
|
Term
A ______________ protects your network from unauthorized access and also can provide virus protection. |
|
Definition
|
|
Term
Security systems need to protect against __________________________________________. |
|
Definition
the malicious or careless insider as much as an external attack. |
|
|
Term
What are the security utilities? |
|
Definition
- Microsoft Baseline Security Analyzer (MBSA) - Checks for missing patches, blank or weak passwords, and vulnerabilities on servers running Microsoft Windows 2000 or later, IIS, Microsoft SQL Server, and Microsoft Internet Explorer 5.01 or later - Microsoft Software Update Services (SUS) - Helps keep Windows-based computers and servers up to date with the latest critical updates - Microsoft Systems Management Server (SMS) - Automates the distribution and installation of the recommended security fixes for large companies with multiple locations |
|
|
Term
SCL values range from ________________—the lower the value, the higher the probability that the message is junk mail. |
|
Definition
|
|
Term
What does the Certificate Template do? |
|
Definition
Defines the content and purpose of a certificate. |
|
|
Term
The following services are required to provide compatibility with earlier versions of Exchange: |
|
Definition
- Microsoft Exchange Event Service - Microsoft Exchange Site Replication Service - Exchange MTA Stacks (Exchange Server 5.5 compatibility only) |
|
|
Term
The default log file format for SMTP is ______________________. |
|
Definition
W3C Extended Log File Format |
|
|
Term
The default log file format for NNTP is.... |
|
Definition
Microsoft IIS Log File Format |
|
|