Term
What two basic types of computers can be on an enterprise network? |
|
Definition
|
|
Term
This creates a single sign on environment by implementing trust relationships that enable users on one network to access applications on other networks without providing a secondary set of logon credentials. |
|
Definition
Active Directory Federation Services (ADFS) |
|
|
Term
Distributed File System consists of what 2 role services? |
|
Definition
DFS Namespace DFS Replication |
|
|
Term
Enables admins to create a virtual directory tree consisting of folders stored on different servers |
|
Definition
DFS Namespace role service |
|
|
Term
Maintains duplicate copies of the DFS Namespace in remote locations |
|
Definition
DFS Replication role service |
|
|
Term
This enables admins to create and enforce storage quotas, specify file types that are permitted on network volumes, and generate storage reports. |
|
Definition
File Server Resource Manager (FSRM) |
|
|
Term
This allows a UNIX clients to access files stored on a Windows Server by implementing NSF on a windows server 2008 computer. |
|
Definition
Services for Network File System |
|
|
Term
This is not separate product but is an installation option included with the Windows Server 2008 Standard, Enterprise, and Datacenter editions. |
|
Definition
|
|
Term
Windows NT Server first appeared with gripes about the GUI wasting the systems resources and eventually led to... |
|
Definition
Server displays being character based and based on remote admin tools like telnet and ultimately led to the development of Server Core, which is a bare bones installation with roles and services that can be added |
|
|
Term
What two images does Windows Deployment Services require to perform remote client installations? |
|
Definition
Install Image and Boot image The boot image is boot.wim and located in the \sources folder which loads windows PE 2.1 on the client computer. |
|
|
Term
|
Definition
-Enables the web server to forward incoming requests for a specific URL to another URL (when a site changes domain names) -Useful when you move a web site to a new domain due to product name change, merger etc. to forward user traffic to a new URL |
|
|
Term
CGI (Common Gateway Interface) |
|
Definition
Provides a scripting interface that enables a web server to pass incoming information to another program |
|
|
Term
(WPAS) Windows Process Activation Service |
|
Definition
The component that manages the request pipeline, the servers application pools and worker processes running them |
|
|
Term
An alias that points to a folder in another physical location, aka a shortcut that enables you to publish content found on different drives or different computers without copying or moving it. |
|
Definition
|
|
Term
What are the 3 HTTP Binding options for IIS7? |
|
Definition
Ip address Port number (80) Host Header |
|
|
Term
|
Definition
the binding for each site determines how the listener will identify its requests |
|
|
Term
To use this, you must install it in a Windows Server 2008 computer that is already running the Web Server (IIS) Role |
|
Definition
|
|
Term
You must configure a DNS server to perform _______________ by creating a ______________ and creating a ________ record for the addresses you want the server to resolve. |
|
Definition
Reverse name resolution reverse look up zone PTR (pointer) |
|
|
Term
Only ___________ _______________ is integrated into an IIS7 installation by default. All of the other authentication methods require the selection of additional role services. |
|
Definition
|
|
Term
What are the 2 authentication protocols supported by IIS7 Windows authentication module? |
|
Definition
|
|
Term
|
Definition
A challenge/response authentication protocol used by windows computers that are NOT members of an Active Directory domain. |
|
|
Term
|
Definition
A ticket based authentication protocol used by Windows computers that ARE members of an Active Directory domain. |
|
|
Term
Participants are issued two keys, one public and one private. The private key is kept a secret, while the public key is freely available in the digital certificate. Data on the private key can only be decrypted using the public key and vice versa. Any data that the client encrypts using the severs public key can only be decrypted and read by the server. What is this called? |
|
Definition
Public Key Infrastructure |
|
|
Term
NTFS permissions are realized as access control lists (ACL's). Which consist of two basic types of access control entries (ACES's). What are the two ACE's? |
|
Definition
|
|
Term
Web Applications use a three-tiered architecture. What are the tiers? |
|
Definition
Client Web Server Database Server |
|
|
Term
A protocol that enables a web server to run an application specified in a client request and pass the request to that application for processing. (like a trigger) |
|
Definition
Common Gateway Interface (CGI) |
|
|
Term
|
Definition
Simple Mail Transfer Protocol- Standard email protocol for the internet. |
|
|
Term
As you increase the quality and/or ___________ of a video image you also increase the amount of ___________ the stream consumes. |
|
Definition
|
|
Term
Differences between downloading and Streaming |
|
Definition
Downloading is where the content cannot be played until the downloaded file is complete. Streaming is where the multimedia content can begin playing soon after the file starts streaming |
|
|
Term
|
Definition
Streaming begins when the user requests it Typically used for pre-recorded content |
|
|
Term
|
Definition
Streaming begins at a pre-arranged time Typically used for live content |
|
|
Term
This is NOT a role and has its own installation program and requires you to install its dependent features manually. |
|
Definition
|
|