• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/44

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

44 Cards in this Set

  • Front
  • Back

Active Directory Certificate Services

To issue and manage public key infrastructure(PKI) certificates which can be used in software security systems that employ public key technologies.

Hyper-V

To consolidate servers by creating and managing a virtualized computing environment by using virtualization technology that is built into windows server 2012 R2

Bitlocker

To encrypt the hard drives

BranchCache

Allows data from files and web servers an WAN to be cached on computers at a local branch office . It is included with windows server 2012 R2 and windows 8

IPAM

IP address Management . To customize and monitor the IP address infrastructure on a corporate network.

Kerberos Authentication

Installed as a security support provider and can be accessed through security support provider Interface.

Windows Deployment Services

To install windows remotely

AD DS

Active Directory Domain Services . To provide support for directory-enabled applications such as Microsoft exchange server.

AD FS

Active Directory Federation Services . Provides internet based clients with a secure identity access solution that works for all the operating system platforms . It gives the users the ability to do a single sign-on and access applications on other networks without needing a secondary password.

AD LDS

Active Directory Lightweight Directory Services. LDAP directory service that provides flexible support for directory enabled applications without the dependencies and domain related restrictions if AD DS.

LDAP

Lightweight Directory Access Protocol

Name the 4 versions of Windows Server 2012 R2

Datacenter : full windows server functionality with unlimited virtual instances



Standard : full windows server functionality with 2 virtual instances.



Essentials : for upto 25 users and 50 devices. Has a simpler interface and preconfigured connectivity to cloud based services but no virtualization rights



Foundation : upto 15 users . A general purpose server with basic functionality but no virtualization rights.

LBFO

Load Balancing and Failover , also known as NIC teaming to group multiple network adapters on a system .A maximum of 32 network adapters can be setup in a NIC team . It is a very common practice when setting up virtualization and is one way that you can have load balancing with Hyper-V .



It allows a virtual machine to use virtual network adapters in Hyper -V

PXE network devices

Preboot Execution Environment. These are network interface cards that can talk to a network without the need for an operating system . These have a set of preboot commands within the boot firmware. Most of the machines for which you are using WDS do not have an operating system on the computer. For the same reason , you must set up DHCP to accept PXE machines.

Name 2 types of Partition styles which are used to initialize disks.

Master Boot Record( MBR) and GUID partition table (GPT)

MBR

MBR has a partition table that indicates where the partitions are located on the disk drive and with this partition style , only volumes upto 2 TB are supported.



An MBR drive can have upto 4 primary partitions or can have 3 primary partitions and one extended partition that can be divided into unlimited logical drives.

GPT

Can support volumes upto 18 EB (18,874,368 million terabytes ) and 128 partitions

What is the difference between basic disk and dynamic disk ?

Basic disks are divided into partitions and can be used with previous versions of windows. Dynamic disks are divided into volumes and can be used with Windows 2000 server and newer releases.



When a disk is initialized , it is automatically created as a basic disk , but when a new fault-tolerant (RAID) volume set is created, the disks in the set are converted to dynamic disks. Fault tolerance features and the ability to modify disks without having to reboot the server are what distinguish dynamic disks from basic disks.



A basic disk can simply be converted to a dynamic disk without loss of data. When a basic disk is converted , the partitions are automatically changed to the appropriate volumes. However , converting a dynamic disk back to a basic disk is not as simple. All the data in the dynamic disk must be backed up or moved . Then, all the volumes on the dynamic disk have to be deleted . The dynamic disk can then be converted to a basic disk. Partitions and logical drives can be created, and the data can be restored.

How a volume set is created ?

A volume set is created from volumes that span multiple drives by using the free space from those drives to construct what will appear to be a single drive.

What is the difference between simple volume and spanned volume ?

Simple volume uses only one disk or a portion of disk whereas spanned volume is a simple volume that spans multiple disks , with a maximum of 32.

What is the difference between simple volume and spanned volume ?

Simple volume uses only one disk or a portion of disk whereas spanned volume is a simple volume that spans multiple disks , with a maximum of 32.

Striped volume

Stores data in stripes across two or more disks. A striped volume gives you fast access to data but is not tolerant nor can it be extended or mirrored. If one disk in the striped set fails , the entire volume fails .

What is the difference between simple volume and spanned volume ?

Simple volume uses only one disk or a portion of disk whereas spanned volume is a simple volume that spans multiple disks , with a maximum of 32.

Striped volume

Stores data in stripes across two or more disks. A striped volume gives you fast access to data but is not tolerant nor can it be extended or mirrored. If one disk in the striped set fails , the entire volume fails .

Mirrored volume

Duplicates data across 2 disks. This type of volume is fault tolerant.

RAID 5

It stores data in stripes across three or more disks. This type of volume is fault- tolerant because if a drive fails , the data can be re-created from the parity off of the remaining disk drives . Operating system files and boot files cannot reside on the RAID-5 disks.

Storage spaces

Windows server 2012 R2 allows an administrator to virtualize storage by grouping disks into storage pools which can then be turned into virtual disks called storage spaces . Storage spaces allows an administrator to take free space from storage pools and create virtual disks which themselves are called storage spaces .

Name three types of storage space resiliency

Mirror , parity and simple(no resiliency )

Raid 0

Disk striping

Raid 0

Disk striping

Raid 1

Disk Mirroring

MPIO

Multipath I/O , allows redundant physical paths connected to a storage device . It also load balances the data traffic across both paths to the storage device , virtually eliminating bandwidth bottlenecks to the computer.

Microsoft DSM

Microsoft Device Specific Module, is a driver that communicates with the storage devices to provide MPIO and also provides the chosen load-balancing policies.

Failover

No load balancing

Failback

has a secondary backup path

Dynamic Least Queue Depth

I/O will route to the path with the least number of outstanding requests

Weighted path

Paths are assigned a numbered weight. I/O requests will use the path with the least weight - the higher the number, the lower the priority.

iSCSI

Internet Small Computer System Interface, an interconnect protocol used to establish and manage a connection between a computer(initiator) and a storage device(target) . Each initiator is identified by its iSCSI Qualified Name (iqn) and is used to establish its connection to an iSCSI target. It was developed to allow block-level access to a storage device over a network

Which port does iSCSI use to establish the connection between initiator and target ?

TCP port 3260

NAS

Network Attached Storage , connects through the use of Common Internet FIle System (CIFS) or Network File System (NFS)

Name 2 applications that requires block-level access (direct access) to storage

Microsoft Exchange and Microsoft SQL

What advantage does iSCSI has over Fibre Channel ?

it can provide security for the storage devices. iSCSI use CHAP or MS - CHAP for authentication and Internet protocol security (IPsec) for encryption

Do we need any additional software to install iSCSI in windows Server 2012 R2 ?

No its plug and play as Microsoft iSCSI initiator is built into the operating system.

iSNS

Internet Storage Name Service , allows for central registration of an iSCSI environment because it automatically discovers available targets on the network. The Microsoft iSCSI initiator includes an iSNS client that is used to register with the iSNS




The iSNS feature maintains a database of clients that it has registered either through DHCP discovery or through manual registration.