Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
In presentation virtualisation, what does the‘presentation’ refer to?
|
The presentation layer of the OSI model. |
|
List five Terminal Services features and briefly explain them. |
TS RemoteApp: remote access just your application (not the entire desktop). TS Web Access: publish applications to a web page (to allow remote access). TS Gateway: RDP traffic is tunneled over HTTPS (port 443) to enable an encrypted session. TS Session Broker: load balancing forterminal servers. TS Easy Print: printing ina TS environment. |
|
How would you enforce policy when using an encrypted RD connection and a TS Gateway? |
Use NPS (Network Policy Server) |
|
How can you allocate terminal services sessions equally to users? |
Use WSRM (Windows System Resource Manager). |
|
Which tool would you use for deploying several versions of the same application from the same terminal server? |
Application Virtualisation. |
|
What does Remote App need, to work? |
Remote Desktop Connection. |
|
Which tool can deploy applications to desktops based on a schedule? |
SCCM (System Center Configuration Manager). |
|
What DFS feature only allows users to see files and folders ifthey have permission to access the file server they are stored in? |
Access-based enumeration. |
|
Can folder redirection be managed by GP? |
Yes |
|
What is the offline files default setting? |
Only the files and programs that users specify will be available offline. |
|
What are the five versions or editions of Server 2008? |
Standard Enterprise Datacenter Itanium Web Server |
|
Does the standard version support clustering? |
No |
|
Can you get 32 bit versions of Server 2008? |
No |
|
What should you do before migrating your systems? |
Run a Backup |
|
When is it no longer possible to rollback a Server 2003 to 2008 upgrade? |
After the first successful login to the server. |
|
What is BitLocker? |
Disk / directory encryption software. |
|
Which versions of Server 2008 support BitLocker? |
All versions |
|
What automated deployment tools are available in Server 2008? |
The Microsoft Deployment Toolkit (MDT) Windows Automated Installation Kit (WAIK) Windows Deployment Services (WDS). |
|
Whatis the ‘reference’ computer? |
The computer where the standardserver image is initially installedis the ‘reference’ computer. |
|
When using WDS, when would you need a discover image? |
When the systems being deployed do not have PXE compliant NICs. |
|
When does WDFS auto-cast transmission begin? |
Afterthe first client has connected. |
|
What do you need to create after you have installed your DHCP server role? |
DHCP scope. |
|
1. What is dynamic DNS? |
DNS linked to DHCP. |
|
What is an AAAA record? |
An IPv6 record for a computer. |
|
What three items are included in the NPAS (Network Policy and Access Services) server role? |
NPS ...........Network Policy Server HRA...........Health Registration Authority HCAP........Host Credential Authorization Protocol |
|
What can a stand-alone CA(Certificate Authority) server do? |
Issue certificates to external entities |
|
How many Hyper V virtual servers canbe created in Enterprise edition? |
4 |
|
What is Direct Access used for? |
Replacing VPN access via an Internet connection, whenaccessing a company LAN remotely |
|
Which protocol is used when accessing shares across a network? |
The SMB (Server MessageBlock) protocol |
|
Server 2008 supports quotas to which two levels? |
Disk quotas Directory quotas |
|
The File Server Resource Manager is used for… what, for example? |
The FSRM can be used to eg manage quotas. |
|
How do you change a print spooler location? |
Goto Print Management > Properties |
|
What is NFS? |
NFS (Network File System) allows Microsoftservers to file share with UNIX servers. |
|
What is DFS? |
DFS (Distributed File System) allows shares to be replicated amongst multiple file servers (used for redundancy / speed etc). |
|
Show an example of how you would use RAID to protect OS data and user data also. |
Secure your server operating system C: drive and your data drives separately by using a two disk RAID 1 mirror for the operating system C: drive and then a three disk array for RAID 5 for youruser’s data. |
|
Explain RAID 0, RAID 1, RAID 5 and RAID 10.
|
Stripping or Stripped min-2-disks Mirror min-2-disks Stripped with Parity min-3-disks Mirror With Parity min-4-disks |