• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
Sometimes called perimeter network
Internet DMZ
This is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet
Internet Demilitarized Zone
This server role accepts connections to your Exchange 2010 server from different client
Client Access Server
Is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.
Mailbox Server
is a cross-platform data center management system for operating systems and hypervisors. It uses a single interface that shows state, health and performance information of computer systems. It also provides alerts generated according to some availability, performance, configuration or security situation being identified. It works with Microsoft Windows Server and Unix-based hosts.
System Center Operation Manager SCOM
A Service/Server provides the two basic services of an enterprise firewall and a Web proxy/cache server.
ISA Server Internet Security and Acceleration Server
also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity
IPS Intrusion Protection System
These are DLL files that can be used to modify and enhance the functionality provided by IIS. This filters always run on an IIS server, filtering every request until they find one they need to process. The ability to examine and modify both incoming and outgoing streams of data makes this powerful and flexible.
ISAPI filters
This is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
ISAPI (Internet Server Application Program Interface)
Is a Health And Diagnostic Feature of IIS which provides logging of Web site activity for this server. When a loggable event (usually an HTTP transaction) occurs, IIS calls the selected logging module, which then writes to one of the logs stored in the file system of the Web server. These logs are kept in addition to those provided by the operating system.
HTTP Logging
This Health and Diagnostic Feature of IIS provides infrastructure to diagnose and troubleshoot Web applications. By using failed request tracing, you can troubleshoot difficult to capture events like poor performance or authentication-related failures. This feature buffers trace events for a request and only flushes them to disk if the request falls into a user-configured error condition.
Tracing
This feature in under Security Role of IIS and works by sending a password hash to a Windows domain controller to authenticate users.
Digest Authentication
When you need improved security over Basic authentication, consider using Digest authentication, especially if users who must be authenticated access your Web site from behind firewalls and proxy servers.
TRUE
This is a grouping of content at the root level of a Web site or a grouping of content in a separate folder under the Web site's root directory.
An application
This is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each instance must have its own SPN
SPN service principal name
Windows Server 2008 R2 introduces a new type of account called _______ that assists in the endpoint administration
managed service account
Administrators will want to use managed service accounts to enhance security while simplifying or eliminating password and SPN management.
TRUE
In able to release the memory used by a website every 12 hours
What should be configured in the Application Pool of a website
Modify the 'regular time intervals (in minutes)' - Recyling Option
This is a feature of Windows Server 2008 for providing highavailability of applications. It allows Administrators to configure multiple servers to operate as a single
Windows Network Load Balancing (NLB)
This is a technique used in Windows Server 2008 environment to provide high availabilityof applications.
Failover clustering
The cluster used in failover clustering works with shared data that can be spread acrossmultiple systems. Failover clustering is managed through the Failover Cluster Management interface in Windows Server 2008. The Failover clustering feature is available only in Windows Server 2008Enterprise and Datacenter edition
TRUE
This is a process, used by servers within Network Load Balancing (NLB) clusters, to let otherservers know their presence. The servers are in constant communication with each other through thisprocess. Each server sends out a message each second to its counterparts within the NLB. Thesemessages are known as heartbeats.
Heartbeats
The heartbeats determine the health of the server in the NLB
TRUE
A ___________ is a type of cluster resource used to provide an alternate name for an entity that exists on a network
Network Name Resource
When a Network Name resource is included in the resource group with anInternet Protocol (IP) Address resource, it provides an identity to the resource group. This allows theresource group to be accessed by network clients as a virtual server
TRUE