Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
What are the 4 editions of Windows Server 2003 (from least capable to most capable)
|
Web Edition
Standard Edition Enterprise Edition Data Center Edition |
|
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Web Edition
|
2 GB RAM
2 Processors |
|
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Standard Edition
|
4 GB RAM
4 Processors |
|
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Enterprise Edition
|
32 GB RAM
8 Processors |
|
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Data Center Edition
|
64 GB RAM
32 Processors |
|
How many different MMC consoles are there.
|
4
|
|
What are the three different User MMC console modes.
|
Full Access
Limited Access with Multiple Windows Limited Access with Single Window |
|
What is the Definition of a Domain
|
A domain provides administrative and security boundaries and allows resources to be grouped logically
|
|
What are the two types of MMC Snap-ins
|
Standalone - Listed under the Console root (ADUC)
Extension - provides additional functionality to specific standalone snap ins |
|
Members of the Local Administrators Group are by default given access to what, and how are more users given access to this feature.
|
Members are automatically granted remote access permissions, and users that need this access must be added to the Remote Desktop Users list under the Remote Users tab of the system properties
|
|
What are the 3 primary logs under the event viewer.
|
Application Log
Security Log System Log |
|
What information can you find in the Application Log
|
The application log shows information for computer programs
|
|
What information can you find in the Security Log
|
The security log contains events having to do with security of the system (failed login attempts, attempts to access protected resources)
|
|
What information can you find in the System Log
|
The system log reports events pertaining to system components, such as services and device drivers.
|
|
What are the 5 types of Backups?
|
Full(Normal)
Incremental Differential Copy Daily |
|
What is a Full (Normal) Back up
|
All files are backed up and archive bit is reset.
|
|
What is a Copy
|
All files are backed up and the archive bit is NOT reset
|
|
What is an Incremental back up
|
Only files that have been modified since the last normal or incremental back up are backed up, and the archive bit is reset.
|
|
What is a Differential Back up
|
Only files that have been modified since the last normal or incremental back up are backed up, and the archive bit is NOT reset
|
|
What is a Daily
|
Only files that have been modified or created based of the current date are backed up, and the archive bit is NOT reset.
|
|
What is an Archive Bit
|
An Archive Bit is a marker that marks a file, when it has been created or modified, to be archived by the next back up performed.
When the back up is finished the archive bit is turned off or left alone, depending on the type of back up. |
|
What is a typical Back up scheme.
|
the Grandfather, Father, Son Scheme.
|
|
In the Grandfather, Father, Son Back up Scheme, what does each term represent
|
The Son represents the set of tapes used for daily back ups that are reused on a weekly basis.
The Father represents the set of tapes used for weekly back ups that are reused on a monthly basis. The Grandfather represents the set of tapes used for monthly back ups that are reused on a yearly basis. |
|
What is Volume Shadowing
|
It is a library of multiple versions of various selected files.
|
|
How is Volume Shadowing used
|
Volume Shadowing must be enabled for a particular volume on the server. Under the volume tab on the Disk Properties window, you select the volume you want shadowed. It will only shadow files that are STORED IN SHARED FOLDERS, and the volume must be NTFS FORMAT.
|
|
Which is faster type of compression. Hardware or Software.
|
Hardware
|
|
Under Group Properties window, which tab will allow you to change the scope of the group.
|
The General Tab
|
|
Give an example of a scope for a Security Group or Distribution Group.
|
Domain Local
Global Universal |
|
Can Group Policies be assigned to groups.
|
No
|
|
What are the four Domain Functional Levels, and what Operating Systems are compatible with them.
|
Windows 2000 mixed (2000, 20003, and NT)
Windows 2000 native (2000 and 2003 only) Windows Server 2003 Interim (2003 and NT only) Windows Server 2003 (2003 only) |
|
If you raise your Domain Function Level, can you return to a previous lower level
|
No
|
|
Which Domain Functional Level as access to the Universal Group Feature
|
Windows Server 2003
Windows 2000 native (NT does not support Universal) |
|
Which Domain Functional Level grants the ability to perform a conversion of the Group Scope
|
Windows Server 2003
Windows 2000 native (NT does not support Conversion) |
|
If a group is created to grant users the ability to print, and then later the group is deleted, do the users retain the ability to print.
|
No
|
|
What is a SID (security identifier)
|
It is a unique value assigned to every active directory object.
|
|
What are the default share permissions associated with a newly created share folder
|
Administrator group has full control permission
Everyone has read only permission |
|
Who is the default owner of a created file.
|
The creator is the owner by default, except where the Operating system is the creator, which case the Administrator is the owner
|
|
Why would using the MMC to look at shared folders be more effective than other ways.
|
The MMC will show all shared folders on the network including any remote shares
|
|
Where can you find errors with printers
|
The Event Viewer - System Log
|
|
To create a Printer Pool, and Redirect print jobs, where do you go.
|
Access the ports tab of the printer properties window on the selected device.
|
|
What are the 3 driver signing options.
|
Ignore - will allow all drivers to be installed whether they have a signature or not
Warn - displays a warning of an attempt to install a driver without a Microsoft signature Block - will prevent the system from installing the device. |
|
What is the last resort in the event that you have driver issues
|
Recovery console
|
|
In the Device Manager, there is an exclamation mark over a device, what does this mean.
|
This notation means that the device cannot be started, is not configured right, or does not have a driver installed.
|
|
What does Plug n Play do
|
It detects new hardware added to the system
If the appropriate driver is present, it will install it Determine what resources are required for the new hardware Scan for those resources Select the appropriate resources Then configure the device and device driver to the resources |
|
Where will you find problems associated with the hard drive.
|
Event Viewer - System Log
|
|
What are the maximum partitions you can have per disk.
|
4 primary partitions or 3 primary and 1 extended
|
|
What are the RAID types.
|
RAID 0 (striped)
RAID 1 (mirrored) RAID 5 (striped with parity) |
|
If you have two hard drives each with 200GB of space in a RAID 0 environment, how much total space do you have.
|
400GB
|
|
In a dynamic storage environment what is the maximum amount of partitions per drive.
|
1
|
|
What is a spanned volume
|
It is where the system writes data across all hard drives, a max of 32.
|