• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back
Describe how the DHCP lease is obtained.
(a) IP request, (b) IP offer, (c) IP selection and (d) acknowledgement.
An individual calls and states they can’t seem to access the Internet, don’t have any access to the internal network and after being requested tells you that ipconfig shows an address as 169.254.*.* - what happened?
Windows assigns that mask when it can’t communicate with a DHCP server.
. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it - what should we look at first?
The server must be authorized first with Active Directory.
How can you force the client to give up the DHCP lease if you have access to the client PC?
ipconfig /release
What authentication options do Windows 2000 Servers have for remote clients?
PAP, SPAP, CHAP, MS-CHAP and EAP.
What is data link layer in the OSI reference model responsible for and what is this layer typically called?
Takes raw data and packs them into frames that the network layer can address
OSI Model?
Physical, Data Link, Network, Transport, Session, Presentation, Application
What is binding order?
How network protocols are prioritized for client-server communications. The most frequently used protocols should be at the top of the order.
What are the two types of IP security in common use and what is the difference?
IPSEC (all traffic) and SSL (primarily HTTP traffic)
What is LMHOSTS file?
A local file that is used to resolve fully qualified names to specific IP addresses.
What’s the difference between forward lookup and reverse lookup in DNS?
Forward lookup is name-to-address, the reverse lookup is address-to-name.
How can you recover a file encrypted using EFS?
Encrypted File System. Use the domain recovery agent.
What is the difference between EIA/TIA 568A and 568B?
twisted-pair standards? only difference between T568A and T568B is that pairs 2 and 3 (orange and green) are swapped
What do you have if one end of the cable is 568A and one end 568B
“Cross Over Cable”.
What does “ACL” stand for and what does it do?
An access control list (ACL) is a table that controls access rights to a domain resource.
What is the command to immediately restart a UNIX computer?
Shutdown -r now
What are the differences between SAN and NAS? 
SAN is an architecture to attach remote computer storage devices to servers in such a way that, to the operating system, the devices appear as locally attached. NAS uses file-based protocols such as NFS or SMB/CIFS where it is clear that the storage is remote, and computers request a portion of an abstract file rather than a disk block.
What is Active Directory?
Essentially a database and directory service for a windows based domain. It can manage and organize resources - and make these resources available to authorized users and groups.
What is Kerberos?
Kerberos is the authentication protocol used with Windows Server 2003 to verify user or host identity. Kerberos can provide authentication security over a non-secure network by requiring both the user and the server verify each other's identity.
What are lingering, or tombstoned, objects and how do you delete them?
Tombstones are markers that indicate that an object has been deleted.Lingering Object removal is the manual process by which tombstoned objects are deleted from those domain controllers that were unavailable for replication following the garbage collection process. “epadmin” provides the ability to delete lingering objects in the Active Directory.
What is LDAP?
Lightweight Directory Access Protocol, is an application protocol for querying and modifying directory services running over TCP/IP. LDAP is also often used for authentication.
What is the lowest-level Active Directory container to which you can assign Group Policy settings?
An OU.
What is a GAL?
The Global Address List (GAL) is a directory service within the Microsoft Exchange email system. The GAL contains detailed information for all mail-enabled users, distribution groups, and Exchange resources.
Explain Exchange transaction logs.
Microsoft Exchange Server uses transaction logs as a disaster recovery method that can bring an Exchange database back to a consistent state after a crash. Before anything is written to the EDB file, it is first written to a transaction log. Once the transaction has been logged, the data is written to the database when convenient.
What layer is TCP at - and what is the function of TCP?
transport layer protocol (L4)
one of the core protocols of the Internet Protocol Suite. Whereas IP handles lower-level transmissions from computer to computer as a message makes its way across the Internet, TCP operates at a higher level, concerned only with the two end systems, for example a Web browser and a Web server. In particular, TCP provides reliable, ordered delivery of a stream of bytes from one program on one computer to another program on another computer. Besides the Web, other common applications of TCP include e-mail and file transfer. Among its management tasks, TCP controls message size, the rate at which messages are exchanged, and network traffic congestion.
Provides transfer correctness, data recovery, and flow control.
What is the Global Catalog?
A global catalog server is a domain controller that, in addition to its full, writable domain directory partition replica, also stores a partial, read-only replica of all other domain directory partitions in the forest. The additional domain directory partitions are partial because only a limited set of attributes is included for each object. By including only the attributes that are most used for searching, every object in every domain in even the largest forest can be represented in the database of a single global catalog server. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.
. How do you Recover a Deleted Mailbox
A. In Exchange System Manager, locate the mailbox store that contains the disconnected mailbox.
B. Click the Mailboxes object under the mailbox store.
C. If the mailbox is not already marked as disconnected (the mailbox icon appears with a red X), right-click the Mailboxes object, and then click Cleanup Agent.
D. Right-click the disconnected mailbox, click Reconnect, and then select the appropriate user from the dialog box that appears.
E. Click OK.
What is a Distribution List, GAL, ESEUTIL?
Distribution list is a term sometimes used for a function of email clients where lists of email addresses are used to email everyone on the list at once. This can be referred to as an electronic mailshot. It differs from a mailing list, electronic mailing list or the email option found in an Internet forum as it is usually for one way traffic and not for coordinating a discussion. In effect, only members of a distribution list can send mails to the list.
GAL = Global Address Book (Address book used by users for Email addresses)
Routing Group = A group setup within Exchange to connect to another mailserver
ESEUTIL = is the utilities used to managed the information store.
What are MAPI, MIME
MAPI is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note. List the services of Exchange Server 2000?
MIME = Multipurpose Internet Mail Extension, Multimedia Internet Mail Extension, to permit video, sound and binary files to be attached to and transmitted via 7-bit e-mail without being converted to ASCII.
How do you quickly recover from an Exchange Database failure?
A. Regularly image (backup) working Exchange Server - ensure OS, Application, and Files in separate partitions
B. Boot to DOS with network support
C. Load C image saved from above backup
D. Reboot
E. Update OS and Applications
F. Recover (from backups) database files and logs
What are the prerequisites for installation of Exchange Server ?
IIS
SMTP services
WWW services
NNTP
.NET Framework
ASP.NET
Then run Forestprep
The run domainprep