• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/105

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

105 Cards in this Set

  • Front
  • Back

IPAM server can cover IP addresses Space Management from 4 areas what are these areas?

1. Planning


2. Managing


3. Tracking


4. Auditing

What is the drawback of IPAM?

IPAM cannot access IP addresses from stateless ipv6 router

What is the default size of the DNS socket pool?

2500 ports

Client computers will immediately stop communicating on the network if there is no functioning DHCP server, True or false

False

DHCP failover can work either of two modes what are they

1. Standby


2. Load sharing

________ enables cryptographically signing DNS records so that client computers can validate responses

DNSSEC

Branchcache can work in either of two modes, what are they?

1. Distributed cache mode,


2. Hosted cache mode

What is the difference between DFS and branchcache?

Branchcache only caches files that users in a remote locations have accessed. DFS replicates all the contents of folders between the head office and remote location so that all files exist in both locations

What is iSCSI initiator?

A software component or host adaptor on the server that provides access to iSCSI targets

List two Technologies which can make iSCSI high available

1. MCS - multiple connections per session


2. MPIO - multiple path input-output

What does FSRM stand for?

File server resource manager

What allows you to use an automated mechanism to create and assign classification properties to files?

FCM - File classification management

You can configure data deduplication only on volumes that are not system or boot volumes , true or false

True

What are the three elements when deploying DAC in an organisation?

1. claims,


2. resource properties,


3. conditional expressions

What is the term of claim?

A claim is information that AD DS states about an object which usually is a user or a computer

What is the concept of BYOD?

A user can byod to access organisations resources

You cannot implement DAC without Central access policy , true or false

False

What is DAC staging?

Proposed policy updates before they are enforced

What is an AD DS domain?

A collection of objects including user and computers

What is an AD DS Domain tree?

A collection of domains that share contiguous namespace

What is an AD DS Forest?

A collection of AD DS trees for security

What is trust relationship?

Authentication Trust pipe between Domains

Your company has purchased another company that also uses Windows server 2012 R2 and active directory both companies need to be able to access each other's Forest resources how can you achieve this goal with the least administrative effort?

Configure Forest trust between them

You can have different Domain functional levels within the forest , true or false

True


What is in each Domain controller to generate intrasite replication topology?

KCC - knowledge consistency checker

What is an each Domain controller to generate intersite replication topology

ISTG - inter-site topology generator

What is the purpose of the bridgehead server?

It is a DC used to replicate change within the site to bridgehead servers in other sites. It is used by ISGT.

List the best practices when you manage AD sites and replication

1 Provide one or more Global service per site , 2 ensure all sites have a appropriate subnets associated, 3 do not setup long intervals without replication, 4. Avoid using SMTP as a protocol for replication

Certificate Auto enrollment is an option only on Enterprise CAs, true or false

True

What are some reasons that an organisation would utilise PKI

To improve security, ID control and digital signing of code

Your company is currently acquiring another company. both companies run their own PKI. What hierarchy could you create to minimise disruption and continue to provide pki services seamlessly

Deploy cross certification

To recover private keys, you must configure ca to achieve private keys for specific templates, and you must issue a key recovery agent certificate , true or false

True

OCSP provides status for a single certificate that clients request, instead of downloading the entire CRL and delta CRLs, true or false

True

Some documents have been forwarded by email making the documents more difficult to track. You want to be able to prevent employees from forwarding certain emails. What should you Deploy?

RMS - Rights Management Services

RMS server provide three types of exclusion policies. What are they?

1. user,


2. applications,


3. lock-box

You want to block users from protecting content by using specific versions of Microsoft PowerPoint. Which exclusion policies should you create?

Application exclusion policy

You can install an SSL certificate on the AD RMS server when you are performing AD RMS configuration, the benefit is that you can protect the connection between clients and the AD RMS server with SSL, true or false

True

List best practices when deploying RMS in an organisation

1. You must analyse organisation's business requirements before deploying active directory RMS


2. Create necessary templates and ask for feedback on types of templates


3. Strictly control membership of the super users group

How can you test whether AD FS is functioning properly

Access https://hostname/federationMetaData/2007-06/federationMetaData.xml

AD FS is designed to work over the public internet with a web browser interface. True false

True

Where can you deploy Web Application Proxy server when deploying AD FS in a single organisation scenario?

Perimeter network

Which self issued certificate needs to be replaced by an internal ca issued certificate or public ca issued certificate so that users can access web applications from internet or the intranet?

SSL server communication certificate

What can enable SSO for claims where application access from user's own non Domain joined computers which support Windows 8.1 or newer and iOS devices?

Workplace join

NLB uses how many PowerShell commands to manage all aspects of NLB configuration in Windows 2012?

35

An NLB cluster can include up to how many nodes?

32

Clients used to access a service in an NLB cluster by using cluster IP address and MAC address. True or false

True

There are three NLB cluster operation modes. What are they?

1. Unicast


2. multicast


3. internet group management protocol (IGMP) multicast

All hosts for network load balancing (NLB) must be on the same subnet. True or false

True

Nodes in the NLB cluster support both static or dynamic IP addresses. True or false

False. it doesn't support dynamic

NLB cluster is suitable for both stateful and stateless application high available and high scalable. True or false

False

Nlb cluster nodes sends ______ every second between nodes in a cluster. if a node misses _____ continually this node will be removed from nlb cluster automatically

Heartbeat, 5

Why is using a disk-only quorum configuration generally not a good idea

Because it creates a single point of failure for the cluster

What does LUN stand for

Logical unit number

Failover clustering for hyper-v in Windows server 2012 has support for up to ______ virtual machines per cluster

8000

_______ enables administrators to automatically update cluster nodes with little or no loss in availability during the update process

CAU - cluster aware updating

The cluster migration wizard migrates roles, but not data folders. true or false

True

What is the main difference between synchronous and asynchronous replication in a multisite cluster scenario

Synchronous guarantees the changes made. Asynchronous doesn't guarantee the changes as data may be lost

Do you have to implement CSV in order to provide high availability for virtual machines in VMM in Windows Server 2012?
No, CSV is only a recommendation.
What is the difference between Live migration and Storage Migration?
In live Migration, you move the VM from one host to another (storage untouched). In storage Migration, you move VM storage and optionally the configuration files and resources.(VHD/VHDX, check point)
All hosts for network load balancing (NLB) must be on the same subnet? True or false
True
In Windows 2012 R2 host, you cannot use the Extended Replication feature to add a third host machine that can replicate with passive copy? True or False
False
_______ provides the benefits such as increasing data transfer, minimising host's resource usage while copying and migrating data.
ODX - Offload Data Tranasfer
What is EFS?

Encrypted File System
What is PKI?


Public Key Infrastructure

What is AD CS?


Active Directory Certificate Service

What is CA?
Certificate Authority
What is SSL?

Secure Sockets Layer
What is CRL?

Certificate Revocation List
What is CDP?

Certificate Revocation List Distributed Point
What is GAL?

Global Address List
What is AIA?

Authority Information Access
What is NDES?

Network Device Enrolment Service
What is CES?

Certificate Enrolment Web-Service
What is CEP?

Certificate Enrolment Policy
What is TPM?

Trusted Platform Module
What is CSP?

Cryptographic Service Software
What is IIS?

Internet Information Service
What is RMS?

Rights Management Services
What is SDK?

Software Development Kit
What is AD FS?

Active Directory Federation Service
What is SSO?

Single Sign-On
What is NLB

Network Load Balancing
What is IGMP?
Internet Group Management Protocol
What is MCS

Multiple Connections per Session

What is MPIO
Multiple Path Input/Output
What is CSV?

Cluster Shared Volume (shared storage)
What is LUN?

Logical Unit Number
What is ReFS?
Resilient File System
What is CAU?
Cluster Aware Updating
What is ODX?
Offloaded Data Transfer

What is VHD?
Virtual Hard Disk

What is DPM?

Data Protection Manager
What is RE

Recovery Environment
What is RPO?

Recovery Point Objective
What is RTO

Recovery Time Objective
What is MMC

Microsoft Management Concole
What is DFS

Distributed File System
What is CSR?

Certificate Signing Request
You have recently installed Windows Server 2012 R2. You have configured a number of services and installed some applications. You decided that it would be a good time to perform a full server backup. What do you need to do first?
Install Windows Backup Utility
______ allows you to centralize backups, offers 15-minute snapshots of servers and clients, can store backup data on SANs and export to tape.
DPM - Data Protection Manager
It is best practice to work with the organization's business managers to identify the minimum recovery time for business-critical data. True or False?
True
Creating a connection object manually between Domain controllers within a site is not typically required or recommended because the KCC does not verify or use the manual connection object for failover. True or False?
True
What is a snap-in tool that implements Forest trust?
AD Trust Tool

What are three networks in a failover cluster?

1. Client Access Network


2. Internode communicaiton Network


3. Storage Network

IPAM accesses which servers?

1. DNS


2. DHCP


3. DC


4. NPS