• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
What are the 4 editions of Windows Server 2003 (from least capable to most capable)
Web Edition
Standard Edition
Enterprise Edition
Data Center Edition
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Web Edition
2 GB RAM
2 Processors
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Standard Edition
4 GB RAM
4 Processors
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Enterprise Edition
32 GB RAM
8 Processors
What is the maximum RAM and SMP (symmetric multiprocessing) Support Configuration for the Windows Server 2003 Data Center Edition
64 GB RAM
32 Processors
How many different MMC consoles are there.
4
What are the three different User MMC console modes.
Full Access
Limited Access with Multiple Windows
Limited Access with Single Window
What is the Definition of a Domain
A domain provides administrative and security boundaries and allows resources to be grouped logically
What are the two types of MMC Snap-ins
Standalone - Listed under the Console root (ADUC)
Extension - provides additional functionality to specific standalone snap ins
Members of the Local Administrators Group are by default given access to what, and how are more users given access to this feature.
Members are automatically granted remote access permissions, and users that need this access must be added to the Remote Desktop Users list under the Remote Users tab of the system properties
What are the 3 primary logs under the event viewer.
Application Log
Security Log
System Log
What information can you find in the Application Log
The application log shows information for computer programs
What information can you find in the Security Log
The security log contains events having to do with security of the system (failed login attempts, attempts to access protected resources)
What information can you find in the System Log
The system log reports events pertaining to system components, such as services and device drivers.
What are the 5 types of Backups?
Full(Normal)
Incremental
Differential
Copy
Daily
What is a Full (Normal) Back up
All files are backed up and archive bit is reset.
What is a Copy
All files are backed up and the archive bit is NOT reset
What is an Incremental back up
Only files that have been modified since the last normal or incremental back up are backed up, and the archive bit is reset.
What is a Differential Back up
Only files that have been modified since the last normal or incremental back up are backed up, and the archive bit is NOT reset
What is a Daily
Only files that have been modified or created based of the current date are backed up, and the archive bit is NOT reset.
What is an Archive Bit
An Archive Bit is a marker that marks a file, when it has been created or modified, to be archived by the next back up performed.
When the back up is finished the archive bit is turned off or left alone, depending on the type of back up.
What is a typical Back up scheme.
the Grandfather, Father, Son Scheme.
In the Grandfather, Father, Son Back up Scheme, what does each term represent
The Son represents the set of tapes used for daily back ups that are reused on a weekly basis.
The Father represents the set of tapes used for weekly back ups that are reused on a monthly basis.
The Grandfather represents the set of tapes used for monthly back ups that are reused on a yearly basis.
What is Volume Shadowing
It is a library of multiple versions of various selected files.
How is Volume Shadowing used
Volume Shadowing must be enabled for a particular volume on the server. Under the volume tab on the Disk Properties window, you select the volume you want shadowed. It will only shadow files that are STORED IN SHARED FOLDERS, and the volume must be NTFS FORMAT.
Which is faster type of compression. Hardware or Software.
Hardware
Under Group Properties window, which tab will allow you to change the scope of the group.
The General Tab
Give an example of a scope for a Security Group or Distribution Group.
Domain Local
Global
Universal
Can Group Policies be assigned to groups.
No
What are the four Domain Functional Levels, and what Operating Systems are compatible with them.
Windows 2000 mixed (2000, 20003, and NT)
Windows 2000 native (2000 and 2003 only)
Windows Server 2003 Interim (2003 and NT only)
Windows Server 2003 (2003 only)
If you raise your Domain Function Level, can you return to a previous lower level
No
Which Domain Functional Level as access to the Universal Group Feature
Windows Server 2003
Windows 2000 native
(NT does not support Universal)
Which Domain Functional Level grants the ability to perform a conversion of the Group Scope
Windows Server 2003
Windows 2000 native
(NT does not support Conversion)
If a group is created to grant users the ability to print, and then later the group is deleted, do the users retain the ability to print.
No
What is a SID (security identifier)
It is a unique value assigned to every active directory object.
What are the default share permissions associated with a newly created share folder
Administrator group has full control permission
Everyone has read only permission
Who is the default owner of a created file.
The creator is the owner by default, except where the Operating system is the creator, which case the Administrator is the owner
Why would using the MMC to look at shared folders be more effective than other ways.
The MMC will show all shared folders on the network including any remote shares
Where can you find errors with printers
The Event Viewer - System Log
To create a Printer Pool, and Redirect print jobs, where do you go.
Access the ports tab of the printer properties window on the selected device.
What are the 3 driver signing options.
Ignore - will allow all drivers to be installed whether they have a signature or not
Warn - displays a warning of an attempt to install a driver without a Microsoft signature
Block - will prevent the system from installing the device.
What is the last resort in the event that you have driver issues
Recovery console
In the Device Manager, there is an exclamation mark over a device, what does this mean.
This notation means that the device cannot be started, is not configured right, or does not have a driver installed.
What does Plug n Play do
It detects new hardware added to the system
If the appropriate driver is present, it will install it
Determine what resources are required for the new hardware
Scan for those resources
Select the appropriate resources
Then configure the device and device driver to the resources
Where will you find problems associated with the hard drive.
Event Viewer - System Log
What are the maximum partitions you can have per disk.
4 primary partitions or 3 primary and 1 extended
What are the RAID types.
RAID 0 (striped)
RAID 1 (mirrored)
RAID 5 (striped with parity)
If you have two hard drives each with 200GB of space in a RAID 0 environment, how much total space do you have.
400GB
In a dynamic storage environment what is the maximum amount of partitions per drive.
1
What is a spanned volume
It is where the system writes data across all hard drives, a max of 32.