Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
27 Cards in this Set
- Front
- Back
Does Exchange 5.5 support OWA?
|
yes
|
|
What is the maximum size of the message store on 5.5?
|
limited only by storage space
|
|
What three methods does 5.5 support for encrypted email?
|
X.509 certificates, S/MIME, and SSL
|
|
What are the three components of the Exchange database architecture?
|
information store, database engine, and OS disk I/O
|
|
What is the information store responsible for?
|
storing data
|
|
What two databases comprise the information store?
|
the private information store database (priv.edb) and the public information store database (pub.edb)
|
|
What size are the pages used by Exchange Server?
|
4 Kb
|
|
What is the Exchange term for a page in memory that has been written with data?
|
"dirty"
|
|
How does Exchange handle dirty pages?
|
it periodically writes them to the information store
|
|
What drawback does Exchange's data caching scheme present?
|
the information on disk is never up-to-date while Exchange is running
|
|
What Exchange component is responsible for securing a copy of all of the dirty pages?
|
the transaction log files
|
|
What does Exchange do if other services need memory in use by Exchange?
|
it flushes pages to disk and reduces buffer size
|
|
What is a transaction?
|
a set of changes to a database which obeys ACID
|
|
What does ACID stand for?
|
Atomic, Consistent, Isolated, Durable
|
|
What does the A in ACID stand for?
|
Atomic: either all operations occur or none occur
|
|
What does the C in ACID stand for?
|
Consistent: the database is transformed from one correct state to another
|
|
What does the I in ACID stand for?
|
Isolated: changes are not visible until committed
|
|
What does the D in ACID stand for?
|
Durable: committed transactions are preserved in database even if system crashes
|
|
Why is it best to keep transaction logs on a dedicated disk?
|
so disk failures that corrupt the database won't affect the transaction logs
|
|
How much data can each log file contain?
|
5 Mb
|
|
What happens when a log file is full?
|
a new log file is created (unless circular logging is turned on)
|
|
What does Exchange do to keep track of log files?
|
it associates each log file with a generation number
|
|
What does Exchange use to track data that hasn't been written to the database file?
|
a checkpoint file (edb.chk)
|
|
What does the checkpoint file do?
|
indicates where in the log file a recovery should start from
|
|
Where is the checkpoint file located?
|
on the system disk
|
|
How does circular logging handle logging?
|
once a log's size limit is reached, it is deleted and a new log is created
|
|
Why is circular logging a bad idea?
|
it negates the ability to recover in the case of a hardware failure
|