Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Sometimes called perimeter network
|
Internet DMZ
|
|
This is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet
|
Internet Demilitarized Zone
|
|
This server role accepts connections to your Exchange 2010 server from different client
|
Client Access Server
|
|
Is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.
|
Mailbox Server
|
|
is a cross-platform data center management system for operating systems and hypervisors. It uses a single interface that shows state, health and performance information of computer systems. It also provides alerts generated according to some availability, performance, configuration or security situation being identified. It works with Microsoft Windows Server and Unix-based hosts.
|
System Center Operation Manager SCOM
|
|
A Service/Server provides the two basic services of an enterprise firewall and a Web proxy/cache server.
|
ISA Server Internet Security and Acceleration Server
|
|
also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity
|
IPS Intrusion Protection System
|
|
These are DLL files that can be used to modify and enhance the functionality provided by IIS. This filters always run on an IIS server, filtering every request until they find one they need to process. The ability to examine and modify both incoming and outgoing streams of data makes this powerful and flexible.
|
ISAPI filters
|
|
This is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
|
ISAPI (Internet Server Application Program Interface)
|
|
Is a Health And Diagnostic Feature of IIS which provides logging of Web site activity for this server. When a loggable event (usually an HTTP transaction) occurs, IIS calls the selected logging module, which then writes to one of the logs stored in the file system of the Web server. These logs are kept in addition to those provided by the operating system.
|
HTTP Logging
|
|
This Health and Diagnostic Feature of IIS provides infrastructure to diagnose and troubleshoot Web applications. By using failed request tracing, you can troubleshoot difficult to capture events like poor performance or authentication-related failures. This feature buffers trace events for a request and only flushes them to disk if the request falls into a user-configured error condition.
|
Tracing
|
|
This feature in under Security Role of IIS and works by sending a password hash to a Windows domain controller to authenticate users.
|
Digest Authentication
|
|
When you need improved security over Basic authentication, consider using Digest authentication, especially if users who must be authenticated access your Web site from behind firewalls and proxy servers.
|
TRUE
|
|
This is a grouping of content at the root level of a Web site or a grouping of content in a separate folder under the Web site's root directory.
|
An application
|
|
This is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN
|
SPN service principal name
|
|
Windows Server 2008 R2 introduces a new type of account called _______ that assists in the endpoint administration
|
managed service account
|
|
Administrators will want to use managed service accounts to enhance security while simplifying or eliminating password and SPN management.
|
TRUE
|
|
In able to release the memory used by a website every 12 hours
What should be configured in the Application Pool of a website |
Modify the 'regular time intervals (in minutes)' - Recyling Option
|
|
This is a feature of Windows Server 2008 for providing highavailability of applications. It allows Administrators to configure multiple servers to operate as a single
|
Windows Network Load Balancing (NLB)
|
|
This is a technique used in Windows Server 2008 environment to provide high availabilityof applications.
|
Failover clustering
|
|
The cluster used in failover clustering works with shared data that can be spread acrossmultiple systems. Failover clustering is managed through the Failover Cluster Management interface in Windows Server 2008. The Failover clustering feature is available only in Windows Server 2008Enterprise and Datacenter edition
|
TRUE
|
|
This is a process, used by servers within Network Load Balancing (NLB) clusters, to let otherservers know their presence. The servers are in constant communication with each other through thisprocess. Each server sends out a message each second to its counterparts within the NLB. Thesemessages are known as heartbeats.
|
Heartbeats
|
|
The heartbeats determine the health of the server in the NLB
|
TRUE
|
|
A ___________ is a type of cluster resource used to provide an alternate name for an entity that exists on a network
|
Network Name Resource
|
|
When a Network Name resource is included in the resource group with anInternet Protocol (IP) Address resource, it provides an identity to the resource group. This allows theresource group to be accessed by network clients as a virtual server
|
TRUE
|