Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
44 Cards in this Set
- Front
- Back
Active Directory Certificate Services |
To issue and manage public key infrastructure(PKI) certificates which can be used in software security systems that employ public key technologies. |
|
Hyper-V |
To consolidate servers by creating and managing a virtualized computing environment by using virtualization technology that is built into windows server 2012 R2 |
|
Bitlocker |
To encrypt the hard drives |
|
BranchCache |
Allows data from files and web servers an WAN to be cached on computers at a local branch office . It is included with windows server 2012 R2 and windows 8 |
|
IPAM |
IP address Management . To customize and monitor the IP address infrastructure on a corporate network. |
|
Kerberos Authentication |
Installed as a security support provider and can be accessed through security support provider Interface. |
|
Windows Deployment Services |
To install windows remotely |
|
AD DS |
Active Directory Domain Services . To provide support for directory-enabled applications such as Microsoft exchange server. |
|
AD FS |
Active Directory Federation Services . Provides internet based clients with a secure identity access solution that works for all the operating system platforms . It gives the users the ability to do a single sign-on and access applications on other networks without needing a secondary password. |
|
AD LDS |
Active Directory Lightweight Directory Services. LDAP directory service that provides flexible support for directory enabled applications without the dependencies and domain related restrictions if AD DS. |
|
LDAP |
Lightweight Directory Access Protocol |
|
Name the 4 versions of Windows Server 2012 R2 |
Datacenter : full windows server functionality with unlimited virtual instances
Standard : full windows server functionality with 2 virtual instances.
Essentials : for upto 25 users and 50 devices. Has a simpler interface and preconfigured connectivity to cloud based services but no virtualization rights
Foundation : upto 15 users . A general purpose server with basic functionality but no virtualization rights. |
|
LBFO |
Load Balancing and Failover , also known as NIC teaming to group multiple network adapters on a system .A maximum of 32 network adapters can be setup in a NIC team . It is a very common practice when setting up virtualization and is one way that you can have load balancing with Hyper-V .
It allows a virtual machine to use virtual network adapters in Hyper -V |
|
PXE network devices |
Preboot Execution Environment. These are network interface cards that can talk to a network without the need for an operating system . These have a set of preboot commands within the boot firmware. Most of the machines for which you are using WDS do not have an operating system on the computer. For the same reason , you must set up DHCP to accept PXE machines. |
|
Name 2 types of Partition styles which are used to initialize disks. |
Master Boot Record( MBR) and GUID partition table (GPT) |
|
MBR |
MBR has a partition table that indicates where the partitions are located on the disk drive and with this partition style , only volumes upto 2 TB are supported.
An MBR drive can have upto 4 primary partitions or can have 3 primary partitions and one extended partition that can be divided into unlimited logical drives. |
|
GPT |
Can support volumes upto 18 EB (18,874,368 million terabytes ) and 128 partitions |
|
What is the difference between basic disk and dynamic disk ? |
Basic disks are divided into partitions and can be used with previous versions of windows. Dynamic disks are divided into volumes and can be used with Windows 2000 server and newer releases.
When a disk is initialized , it is automatically created as a basic disk , but when a new fault-tolerant (RAID) volume set is created, the disks in the set are converted to dynamic disks. Fault tolerance features and the ability to modify disks without having to reboot the server are what distinguish dynamic disks from basic disks.
A basic disk can simply be converted to a dynamic disk without loss of data. When a basic disk is converted , the partitions are automatically changed to the appropriate volumes. However , converting a dynamic disk back to a basic disk is not as simple. All the data in the dynamic disk must be backed up or moved . Then, all the volumes on the dynamic disk have to be deleted . The dynamic disk can then be converted to a basic disk. Partitions and logical drives can be created, and the data can be restored. |
|
How a volume set is created ? |
A volume set is created from volumes that span multiple drives by using the free space from those drives to construct what will appear to be a single drive. |
|
What is the difference between simple volume and spanned volume ? |
Simple volume uses only one disk or a portion of disk whereas spanned volume is a simple volume that spans multiple disks , with a maximum of 32. |
|
What is the difference between simple volume and spanned volume ? |
Simple volume uses only one disk or a portion of disk whereas spanned volume is a simple volume that spans multiple disks , with a maximum of 32. |
|
Striped volume |
Stores data in stripes across two or more disks. A striped volume gives you fast access to data but is not tolerant nor can it be extended or mirrored. If one disk in the striped set fails , the entire volume fails . |
|
What is the difference between simple volume and spanned volume ? |
Simple volume uses only one disk or a portion of disk whereas spanned volume is a simple volume that spans multiple disks , with a maximum of 32. |
|
Striped volume |
Stores data in stripes across two or more disks. A striped volume gives you fast access to data but is not tolerant nor can it be extended or mirrored. If one disk in the striped set fails , the entire volume fails . |
|
Mirrored volume |
Duplicates data across 2 disks. This type of volume is fault tolerant. |
|
RAID 5 |
It stores data in stripes across three or more disks. This type of volume is fault- tolerant because if a drive fails , the data can be re-created from the parity off of the remaining disk drives . Operating system files and boot files cannot reside on the RAID-5 disks. |
|
Storage spaces |
Windows server 2012 R2 allows an administrator to virtualize storage by grouping disks into storage pools which can then be turned into virtual disks called storage spaces . Storage spaces allows an administrator to take free space from storage pools and create virtual disks which themselves are called storage spaces . |
|
Name three types of storage space resiliency |
Mirror , parity and simple(no resiliency ) |
|
Raid 0 |
Disk striping |
|
Raid 0 |
Disk striping |
|
Raid 1 |
Disk Mirroring |
|
MPIO |
Multipath I/O , allows redundant physical paths connected to a storage device . It also load balances the data traffic across both paths to the storage device , virtually eliminating bandwidth bottlenecks to the computer. |
|
Microsoft DSM |
Microsoft Device Specific Module, is a driver that communicates with the storage devices to provide MPIO and also provides the chosen load-balancing policies. |
|
Failover |
No load balancing |
|
Failback |
has a secondary backup path |
|
Dynamic Least Queue Depth |
I/O will route to the path with the least number of outstanding requests |
|
Weighted path |
Paths are assigned a numbered weight. I/O requests will use the path with the least weight - the higher the number, the lower the priority. |
|
iSCSI |
Internet Small Computer System Interface, an interconnect protocol used to establish and manage a connection between a computer(initiator) and a storage device(target) . Each initiator is identified by its iSCSI Qualified Name (iqn) and is used to establish its connection to an iSCSI target. It was developed to allow block-level access to a storage device over a network |
|
Which port does iSCSI use to establish the connection between initiator and target ? |
TCP port 3260 |
|
NAS |
Network Attached Storage , connects through the use of Common Internet FIle System (CIFS) or Network File System (NFS) |
|
Name 2 applications that requires block-level access (direct access) to storage |
Microsoft Exchange and Microsoft SQL |
|
What advantage does iSCSI has over Fibre Channel ? |
it can provide security for the storage devices. iSCSI use CHAP or MS - CHAP for authentication and Internet protocol security (IPsec) for encryption |
|
Do we need any additional software to install iSCSI in windows Server 2012 R2 ? |
No its plug and play as Microsoft iSCSI initiator is built into the operating system. |
|
iSNS |
Internet Storage Name Service , allows for central registration of an iSCSI environment because it automatically discovers available targets on the network. The Microsoft iSCSI initiator includes an iSNS client that is used to register with the iSNS The iSNS feature maintains a database of clients that it has registered either through DHCP discovery or through manual registration. |