• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
ACL
Access Control List

A list of all security descriptions that have been set up for a particular object
Attribute
A characteristic associated with a folder or file used to help manage access
cache
A cache (pronounced CASH) is a place to store something temporarily.
DFS
Distributed File System

A system that enables folders shared from multiple computers to appear as though they exist in one centralizes hierarchy of folders instead of on many different computers.
Load Balancing
On a single server, distributing resources across multiple server disk drives and paths for better server response; and on multiple network servers, distributing resources across two or more servers.
DFS Load Balancing
Dfs takes advantage of the share redundancy provided by replica sets to distribute demand.

The root and child nodes of a Dfs link must be backed by more than one physical server when using Load Balancing. Dfs provides a degree of load balancing because clients randomly select a physical server to connect to from the list of replicas returned by the Dfs server.
What is file attribute Read?
Only allows a file to be read, but nothing can be written to the file.
What is file attribute Archive?
Tells Windows Backup to backup the file.
What is file attribute System?
System file.
What is file attribute Hidden?
File will not be shown when doing a regular dir from DOS.
File Attribute
File attributes are settings associated with computer files that grant or deny certain rights to how a user or the operating system can access that file. For example, IBM compatible computers running MS-DOS or Microsoft Windows have capabilities of having read, archive, system, and hidden attributes.
What is NTFS File permission Full Control?
Read, write, modify, execute, change attributes, permissions, and take ownership of the file.
What is NTFS File permission Modify
Read, write, modify, execute, and change the file's attributes.
What is NTFS File permission Read & Execute?
Display the file's data, attributes, owner, and permissions, and run the file (if it's a program or has a program associated with it for which you have the necessary permissions).
What is NTFS File permission Read?
Display the file's data, attributes, owner, and permissions.
What is NTFS File permission Write?
Write to the file, append to the file, and read or change its attributes.
Share Permissions
Shares are administered through the MMC, My Computer or through Explorer and permissions can be set on a share in the "Share Permissions" tab. Share level permissions only apply when a file or folder is being accessed via the network and do not apply to a user logged into the machine locally. The following are the different share-level permissions:
What is share permission Read?
View files and subdirectories. Execute applications. No changes can be made.
What is share permission Change?
Includes read permissions and the ability to add, delete or change files or subdirectories
What is share permission Full Control?
Can perform any and all functions on all files and folders within the share.
What is share permission deny?
The Deny permission can also be applied to shares. The Deny permission overrides all others.
Hub and spoke topology
In a hub and spoke topology, you designate one server as the hub. Other servers, called spokes, connect to the hub. This topology is typically used for WANs that consist of faster network connections between major computing hubs and slower links connecting branch offices. In this topology, files replicate from the hub server to the spoke servers and vice versa, but files do not replicate directly between two spoke servers. When you choose this topology, you must choose which server will act as the hub. If you want to set up multiple hubs, use a custom topology. Using multiple hubs is recommended, because using only one hub means that the hub is a single point of failure.
Full Mesh Topology
In a full mesh topology, every server connects to every other server. A file created on one server replicates directly to all other servers. Because each member connects to every other member, the propagation of change orders for replicating files can impose a heavy burden on the network. To reduce unnecessary traffic, use a different topology or delete connections you do not actually need. A full mesh topology is not recommended for replica sets with five or more members.
Ring Topology
In a ring topology, files replicate from one server to another in a circular configuration, with each server connected to the servers on either side of it in the ring. Choose a ring topology if your physical network topology resembles a ring topology. For example, if each server is located in a different site and has existing connectivity with neighboring servers, you can choose the ring topology so that each server connects only to neighboring servers. Because the ring topology is bidirectional, each connection is fault tolerant. If a single connection or server fails, data can still replicate to all members in the opposite direction.
Custom Topology
With a custom topology, you create the connections between the servers yourself. One example of a custom topology is a redundant hub and spoke topology. In this configuration, a hub site might contain two file servers that are connected by a high-speed link. Each of these two hub servers might connect with four branch file servers in a hub and spoke arrangement.
UNC
Universal Naming Convention

A naming convention that designates network servers, computers and shared resources. The format for a UNC name is for example, \\servername\namespace\folder\file.
Network print device
a printing device such as a laser printer, connected to a print server through a network.
Network print client
A print client is a system that utilizes configured print queues.
print client
client or computer that generates a print job
print queue
A stack or a lineup of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler service.
Print Services
Print Services enables you to share printers on a network, as well as to centralize print server and network printer management tasks. It also enables you to migrate print servers and deploy printer connections using Group Policy.
spooler
A collection of dynamic link library files that format the job to be printed in order for the printer to understand the file and process it
Auditing
In windows server 2008, a security capability that tracks activity on an object, such as reading, writing, creating, or deleting a file in a folder
The ____ counter for the System object measures the number of execution threads waiting for access to a CPU.
Select one:
a. Processor Queue Length
b. Interrupts/sec
c. System Calls/sec
d. Execution queue
d. Execution queue
EFS
Encrypting File System

Set by an attribute of NTFS, this file system enables a user to encrypt the contents of a folder or a file so that it can only be accessed via private key code by the user who encrypted it. EFS adheres to the data encryption standard's expanded version for data protection.
If you encrypt a folder is it hidden?
No
What happens to the folder once it has been encrypted?
It turns green
What happens when you place a $ at the end of a share name?
The user must have the exact location of the share drive, this is called an administrative distance
The DataCorp.ecpi network users currently make use of a standalone computer for storing encrypted files. How should you ensure you are able to read the contents of the encrypted files of all users on the standalone computer?


Select one:


a. You should consider having the Cipher.exe /r command run and have a data recovery agent added from the local security policy.

b. You should consider having User Account Control (UAC) disabled.

c. You should consider assigning your user account the Full Control permission to all encrypted files.

d. You should consider installing a Certificate Authority and enrolling for an EFS certificate.
a. You should consider having the Cipher.exe /r command run and have a data recovery agent added from the local security policy.
A ____ tracks information using objects, counters, and instances.


Select one:


a. performance counter set

b. data collector set

c. performance counter report

d. data performance set
c. performance counter report