• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/54

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

54 Cards in this Set

  • Front
  • Back
What is the port used by ISA Server?
TCP Port 8080
What is the port for Remote Web Workplace?
TCP Port 4125
What are the ports for HTTP and HTTPS respectively?
TCP Ports 80 and 443
What is the port used by VPN?
TCP Port 1723
What is the port used by Terminal Services
TCP Port 3389
What is the port used by Telnet?
TCP Port 23
What are the ports used by SMTP and POP3, respectively?
TCP Port 25, and TCP Port 110
What are the ports used by FTP?
TCP Ports 20 and 21
What does MS-CHAP stand for?
Microsoft Challenge Handshake Authentication Protocol
Which Remote Access services or protocols require digital certificates?
L2TP (layer 2 tunneling protocol) and 802.1x wireless services
What does IAS stand for?
Internet Authentication Service
What is a shared secret
It is a password used between an IAS server and any and all wireless access points. The shared secret is embedded in the software.
Name and define 2 Wireless 802.1x Authentication Protocols
PEAP and EAP-TLS
PEAP is Protected Extensible Authentication Protocol.
EAP-TLS is Extensible Authentication Protocol-Transport Layer Security. Only EAP-TLS requires client and computer authentication via certificates
What is the difference between WEP and WPA and what do they stand for?
WEP is Wireless Equivalent Privacy. It can use 128bit encryption but can be hacked.
WPA is Wi-Fi Protected Access. WPA is newer and more secure.
What is a RADIUS client?
(Remote Authentication Dial-In User Service) The de facto standard protocol for authentication servers (AAA servers). Developed by Livingston Enterprises (later acquired by Lucent), RADIUS uses a challenge/response method for authentication. See authentication server and challenge/response.
What is the definition of Wi-Fi networks?
802.11x networks are wi-fi networks. Wi-Fi (also WiFi, Wi-fi, Wifi, or wifi) is a brand licensed by the Wi-Fi Alliance to products which pass testing demonstrating that they implement a set of product compatibility standards for wireless local area networks (WLAN) based on the IEEE 802.11 specifications. New standards beyond the 802.11 specifications, such as 802.16 (WiMAX), are currently in the works and offer many enhancements, anywhere from longer range to greater transfer speeds.

Wi-Fi was intended to be used for mobile devices and LANs, but is now often used for Internet access. It enables a person with a wireless-enabled computer or personal digital assistant (PDA) to connect to the Internet when in proximity of an access point. The geographical region covered by one or several access points is called a hotspot.
What does 802.1x require in the way of protocols?
Either PEAP Protected Extensible Authentication Protocol or EAP-TLS Extensible Authentication Protocol- Transport Layer Security
Why would one prefer EAS-TLS protocols rather than PEAP protocols?
EAS-TLS requires certificates of the server, computer and user, while PEAP only requires the server to have a certificate. This means that the PEAP situated computer cannot be governed by group policy.
True or False: Being logged onto the domain does not necessarily allow network access.
True. When a computer is logged onto a domain, it may be allowed, but unless the user is authenticated, network access would be denied.
What is the easiest way to configure clients to keep them updated with patches from SUS (Software Update Services)?
Use Group Policy Computer Configuration
What is IKE
Internet Key Exchange.
What is OMA?
Outlook Mobile Access
In the Premium Version of SBS2003, name the programs included
FrontPage 2003
Exchange Server2003
ISA Server 2000
SQL Server 2000
IIS 6.0
In the Standard Versino of SBS 2003, name the programs included
Exchange Server 2003
IIS 6.0
Name the Secure Website Services offered in SBS2003 that allow users to access resources from remote sites
Remote Web Workplace RWW
Outlook Mobile Access OMA
Outlook Web Access OWA
Windows Sharepoint Services WSS
In DNS, where is the A record located, and where is the pointer record?
The A record is in the forward lookup zone and the ptr record is in the reverse lookup zone.
Name the 4 strongest reasons for someone to buy SBS2003?
Remote Web Workplace
Security
Sharepoint Services
Shadow-Copy Restore
What is RPC over HTTP and what is it's advantage? What is it used for?
Remote Procedure Call over Hyper Text Transport Protocol is a protocol used by Small Business Server 2003 in place of VPN to make secure connections to a network from the Internet. The best example is OWA Outlook Web Access.
ETRN
ETRN (Extended Turn) is an extension to the SMTP e-mail protocol. ETRN is defined in RFC 1985. It enables a mail server to request a second mail server to forward it outstanding mail messages. The second mail server should initiate a new SMTP connection back to the first server. Some level of security is provided by DNS-based authentication of the initiating server. The ETRN operation is useful for intermittently connected mail servers. See also ODMR.
ETRN requires a static IP address
TURN after Authentication
Requires user name and password - Requires your Exchange server to authenticate to your ISP's SMTP server before the SMTP server accepts a TURN command from it. TURN is useful for dynamic IP addresses.
What is netdiag.exe and where did it come from?
It is a network tcp/ip diagnostic tool loaded from the support tools on CD 2 of SBS2003 installation disks.
What is dcdiag.exe and where does it come from?
It is a domain controller diagnostic tool loaded from teh support tools on CD 2 of SBS2003 installation disks.
How do you use Remote Web Workplace broadcast from your SBS2003 box if you have your website hosted by a web host?
You use a static I.P. address that is not linked to the Domain Naming System (DNS). Your server either has a static IP or it has a Dynamic DNS following it around.
How do you set up VPN on a Remote client that hasn't joined the Domain Before?
You use the Connection Manager that is broadcast by the SBS2003 box when you attempt to log on.
List the minimum requirements for loading SBS2003 Standard edition
300mhz processor, 256megs RAM, 4 gigs hd space, possibly a Class 1 fax modem
List the minimum requirements for loading SBS2003 Premium edition
300mhz processor, 256megs RAM, 5 gigs hd space, possibly a Class 1 fax modem
Domain-based Distributed File System (dfs)
A DFS is a file system whose clients, servers, and storage devices are dispersed among the machines of a distributed system or intranet. Accordingly, service activity has to be carried out across the network, and instead of a single centralized data repository, the system has multiple and independent storage devices. The concrete configuration and implementation of a DFS may vary - in some configurations, servers run on dedicated machines while in others a machine can be both a server and a client. A DFS can be implemented as part of a distributed operating system, or alternatively, by a software layer whose task is to manage the communication between conventional operating systems and file systems. The distinctive features of a DFS are the multiplicity and autonomy of clients and servers in the system.
SharePoint is included with SBS2003 using the MSDE. What is the MSDE?
Microsoft SQL Desktop Engine
What does ADMT stand for in the phrase: Be aware that the ADMT has a differential treatment depending on the OS.
Active Directory Migration Tool.
Why would you not scan the M:\ drive when upgrading Exchange?
The Exchange Database should not be scanned for viruses.
Why would you disable the external NIC when upgrading to ISA Server 2000 or beyond?
Because the firewall software probably requires it as terms for installation. I think you would re-enable it later but I could be wrong.
Why would you not run dcpromo on a member server of a SBS2003 domain and add it as a child domain?
Because SBS2003 domains cannot have child domains.
What is near-term backup?
Volume shadow copy. The volume shadow copies are snapshots of recent files stored in a database or repository.
What is the purpose of security groups?
To manage permissions.
What is the difference between read, change, and full control permissions?
Read means a user can access data, view folders and subfolders and allows running programs.
Change means a user can read, change data and delete data. It also means a user can create documents and subfolders.
Full Control means that a user can create and change permissions on folders
What is the difference between sharing and security?
Sharing has to do with allowing folders and their subfolders to be shared across the network as a resource. Security has to do which groups have what specific folder and file permissions, assigned through an ACL.
Share permissions apply across the network, Security permissions apply locally as well as across the network.
What is an ACL?
It is the access control list used for setting permissions on files and folders.
What are some general rules of thumb about ACLs and Permissions?
You can always read except if you only have write permissions.
Modify will allow you to delete a file but not subfolders and their files. Modify does not give you the right to modify permissions.
Copy = change
Move = retain
This has to do with permissions
What is a LAT?
A LAT is the local address table of all the address ranges inside the firewall supplied by ISA Server 2000.
What is NAT and how is it configured in SBS2003?
Network Address Translation. It is configured using the Routing and Remote Access Service and requires 2 network cards to work.
Name the ports used by these services:
vpn
ISA Server 2000
Terminal Services
Remote Web Workplace
VPN is 1723
ISA Server 2000 is 8080
Terminal Services is 3389
Remote Web Workplace is 4125
What is the MBSA?
The Microsoft Baseline Security Analyzer.
Microsoft Baseline Security Analyzer (MBSA) 2.0 is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS) and Microsoft Operations Manager (MOM).
What port is used by Outlook Web Access and Outlook Mobile Access?
443