Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
105 Cards in this Set
- Front
- Back
IPAM server can cover IP addresses Space Management from 4 areas what are these areas? |
1. Planning 2. Managing 3. Tracking 4. Auditing |
|
What is the drawback of IPAM? |
IPAM cannot access IP addresses from stateless ipv6 router |
|
What is the default size of the DNS socket pool? |
2500 ports |
|
Client computers will immediately stop communicating on the network if there is no functioning DHCP server, True or false |
False |
|
DHCP failover can work either of two modes what are they |
1. Standby 2. Load sharing |
|
________ enables cryptographically signing DNS records so that client computers can validate responses |
DNSSEC |
|
Branchcache can work in either of two modes, what are they? |
1. Distributed cache mode, 2. Hosted cache mode |
|
What is the difference between DFS and branchcache? |
Branchcache only caches files that users in a remote locations have accessed. DFS replicates all the contents of folders between the head office and remote location so that all files exist in both locations |
|
What is iSCSI initiator? |
A software component or host adaptor on the server that provides access to iSCSI targets |
|
List two Technologies which can make iSCSI high available |
1. MCS - multiple connections per session 2. MPIO - multiple path input-output |
|
What does FSRM stand for? |
File server resource manager |
|
What allows you to use an automated mechanism to create and assign classification properties to files? |
FCM - File classification management |
|
You can configure data deduplication only on volumes that are not system or boot volumes , true or false |
True |
|
What are the three elements when deploying DAC in an organisation? |
1. claims, 2. resource properties, 3. conditional expressions |
|
What is the term of claim? |
A claim is information that AD DS states about an object which usually is a user or a computer |
|
What is the concept of BYOD? |
A user can byod to access organisations resources |
|
You cannot implement DAC without Central access policy , true or false |
False |
|
What is DAC staging? |
Proposed policy updates before they are enforced |
|
What is an AD DS domain? |
A collection of objects including user and computers |
|
What is an AD DS Domain tree? |
A collection of domains that share contiguous namespace |
|
What is an AD DS Forest? |
A collection of AD DS trees for security |
|
What is trust relationship? |
Authentication Trust pipe between Domains |
|
Your company has purchased another company that also uses Windows server 2012 R2 and active directory both companies need to be able to access each other's Forest resources how can you achieve this goal with the least administrative effort? |
Configure Forest trust between them |
|
You can have different Domain functional levels within the forest , true or false |
True |
|
What is in each Domain controller to generate intrasite replication topology? |
KCC - knowledge consistency checker |
|
What is an each Domain controller to generate intersite replication topology |
ISTG - inter-site topology generator |
|
What is the purpose of the bridgehead server? |
It is a DC used to replicate change within the site to bridgehead servers in other sites. It is used by ISGT. |
|
List the best practices when you manage AD sites and replication |
1 Provide one or more Global service per site , 2 ensure all sites have a appropriate subnets associated, 3 do not setup long intervals without replication, 4. Avoid using SMTP as a protocol for replication |
|
Certificate Auto enrollment is an option only on Enterprise CAs, true or false |
True |
|
What are some reasons that an organisation would utilise PKI |
To improve security, ID control and digital signing of code |
|
Your company is currently acquiring another company. both companies run their own PKI. What hierarchy could you create to minimise disruption and continue to provide pki services seamlessly |
Deploy cross certification |
|
To recover private keys, you must configure ca to achieve private keys for specific templates, and you must issue a key recovery agent certificate , true or false |
True |
|
OCSP provides status for a single certificate that clients request, instead of downloading the entire CRL and delta CRLs, true or false |
True |
|
Some documents have been forwarded by email making the documents more difficult to track. You want to be able to prevent employees from forwarding certain emails. What should you Deploy? |
RMS - Rights Management Services |
|
RMS server provide three types of exclusion policies. What are they? |
1. user, 2. applications, 3. lock-box |
|
You want to block users from protecting content by using specific versions of Microsoft PowerPoint. Which exclusion policies should you create? |
Application exclusion policy |
|
You can install an SSL certificate on the AD RMS server when you are performing AD RMS configuration, the benefit is that you can protect the connection between clients and the AD RMS server with SSL, true or false |
True |
|
List best practices when deploying RMS in an organisation |
1. You must analyse organisation's business requirements before deploying active directory RMS 2. Create necessary templates and ask for feedback on types of templates 3. Strictly control membership of the super users group |
|
How can you test whether AD FS is functioning properly |
Access https://hostname/federationMetaData/2007-06/federationMetaData.xml |
|
AD FS is designed to work over the public internet with a web browser interface. True false |
True |
|
Where can you deploy Web Application Proxy server when deploying AD FS in a single organisation scenario? |
Perimeter network |
|
Which self issued certificate needs to be replaced by an internal ca issued certificate or public ca issued certificate so that users can access web applications from internet or the intranet? |
SSL server communication certificate |
|
What can enable SSO for claims where application access from user's own non Domain joined computers which support Windows 8.1 or newer and iOS devices? |
Workplace join |
|
NLB uses how many PowerShell commands to manage all aspects of NLB configuration in Windows 2012? |
35 |
|
An NLB cluster can include up to how many nodes? |
32 |
|
Clients used to access a service in an NLB cluster by using cluster IP address and MAC address. True or false |
True |
|
There are three NLB cluster operation modes. What are they? |
1. Unicast 2. multicast 3. internet group management protocol (IGMP) multicast |
|
All hosts for network load balancing (NLB) must be on the same subnet. True or false |
True |
|
Nodes in the NLB cluster support both static or dynamic IP addresses. True or false |
False. it doesn't support dynamic |
|
NLB cluster is suitable for both stateful and stateless application high available and high scalable. True or false |
False |
|
Nlb cluster nodes sends ______ every second between nodes in a cluster. if a node misses _____ continually this node will be removed from nlb cluster automatically |
Heartbeat, 5 |
|
Why is using a disk-only quorum configuration generally not a good idea |
Because it creates a single point of failure for the cluster |
|
What does LUN stand for |
Logical unit number |
|
Failover clustering for hyper-v in Windows server 2012 has support for up to ______ virtual machines per cluster |
8000 |
|
_______ enables administrators to automatically update cluster nodes with little or no loss in availability during the update process |
CAU - cluster aware updating |
|
The cluster migration wizard migrates roles, but not data folders. true or false |
True |
|
What is the main difference between synchronous and asynchronous replication in a multisite cluster scenario |
Synchronous guarantees the changes made. Asynchronous doesn't guarantee the changes as data may be lost |
|
Do you have to implement CSV in order to provide high availability for virtual machines in VMM in Windows Server 2012?
|
No, CSV is only a recommendation.
|
|
What is the difference between Live migration and Storage Migration?
|
In live Migration, you move the VM from one host to another (storage untouched). In storage Migration, you move VM storage and optionally the configuration files and resources.(VHD/VHDX, check point)
|
|
All hosts for network load balancing (NLB) must be on the same subnet? True or false
|
True
|
|
In Windows 2012 R2 host, you cannot use the Extended Replication feature to add a third host machine that can replicate with passive copy? True or False
|
False
|
|
_______ provides the benefits such as increasing data transfer, minimising host's resource usage while copying and migrating data.
|
ODX - Offload Data Tranasfer
|
|
What is EFS?
|
Encrypted File System |
|
What is PKI?
|
|
|
What is AD CS? |
|
|
What is CA?
|
Certificate Authority
|
|
What is SSL?
|
Secure Sockets Layer |
|
What is CRL?
|
Certificate Revocation List |
|
What is CDP?
|
Certificate Revocation List Distributed Point |
|
What is GAL?
|
Global Address List |
|
What is AIA?
|
Authority Information Access |
|
What is NDES?
|
Network Device Enrolment Service |
|
What is CES?
|
Certificate Enrolment Web-Service |
|
What is CEP?
|
Certificate Enrolment Policy |
|
What is TPM?
|
Trusted Platform Module |
|
What is CSP?
|
Cryptographic Service Software |
|
What is IIS?
|
Internet Information Service |
|
What is RMS?
|
Rights Management Services |
|
What is SDK?
|
Software Development Kit |
|
What is AD FS?
|
Active Directory Federation Service |
|
What is SSO?
|
Single Sign-On |
|
What is NLB
|
Network Load Balancing |
|
What is IGMP?
|
Internet Group Management Protocol
|
|
What is MCS
|
Multiple Connections per Session |
|
What is MPIO
|
Multiple Path Input/Output
|
|
What is CSV?
|
Cluster Shared Volume (shared storage) |
|
What is LUN?
|
Logical Unit Number |
|
What is ReFS?
|
Resilient File System
|
|
What is CAU?
|
Cluster Aware Updating
|
|
What is ODX?
|
Offloaded Data Transfer
|
|
What is VHD?
|
Virtual Hard Disk
|
|
What is DPM?
|
Data Protection Manager |
|
What is RE
|
Recovery Environment |
|
What is RPO?
|
Recovery Point Objective |
|
What is RTO
|
Recovery Time Objective |
|
What is MMC
|
Microsoft Management Concole |
|
What is DFS
|
Distributed File System |
|
What is CSR?
|
Certificate Signing Request |
|
You have recently installed Windows Server 2012 R2. You have configured a number of services and installed some applications. You decided that it would be a good time to perform a full server backup. What do you need to do first?
|
Install Windows Backup Utility
|
|
______ allows you to centralize backups, offers 15-minute snapshots of servers and clients, can store backup data on SANs and export to tape.
|
DPM - Data Protection Manager
|
|
It is best practice to work with the organization's business managers to identify the minimum recovery time for business-critical data. True or False?
|
True
|
|
Creating a connection object manually between Domain controllers within a site is not typically required or recommended because the KCC does not verify or use the manual connection object for failover. True or False?
|
True
|
|
What is a snap-in tool that implements Forest trust?
|
AD Trust Tool
|
|
What are three networks in a failover cluster? |
1. Client Access Network 2. Internode communicaiton Network 3. Storage Network |
|
IPAM accesses which servers? |
1. DNS 2. DHCP 3. DC 4. NPS |