• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Active Directory Certificate Services (AD CS)
provides a customizable set of services that allows you to issue and manage public key infrastructure (PKI) certificates. These certificates can be used in software security systems that employ public key technologies.
Active Directory Domain Services (AD DS)
includes new features that make deploying domain controllers simpler and let’s you implement them faster. This also makes the domain controllers more flexible, both to audit and to authorize for access to files. Moreover, it has been designed to make performing administrative tasks easier through consistent graphical and scripted management experiences.
Active Directory Rights Management Services (AD RMS)
provides management and development tools that let you work with industry security technologies, including encryption, certificates, and authentication. Using these technologies allows organizations to create reliable information protection solutions.
BitLocker
is a tool that allows you to encrypt the hard drives of your computer. By encrypting the hard drives, you can provide enhanced protection against data theft or unauthorized exposure of your computers or removable drives that are lost or stolen.
BranchCache
allows data from files and web servers on a wide area network (WAN) to be cached on computers at a local branch office. By using this, you can improve application response times while also reducing WAN traffic. Cached data can be either distributed across peer client computers (distributed cache mode) or centrally hosted on a server (hosted cache mode). Is included with Windows Server 2012 and Windows 8.
Dynamic Host Configuration Protocol (DHCP)
is an Internet standard that allows organizations to reduce the administration overhead of configuring hosts on a TCP/IP-based network. Some of the new features are _____ failover, policy-based assignment, and the ability to use Windows PowerShell for _____ Server.
Domain Name System (DNS)
services are used in TCP/IP networks. ____ will convert a computer name or fully qualified domain name (FQDN) to an IP address. ____ also has the ability to do a reverse lookup and convert an IP address to a computer name. ____ allows you to locate computers and services through user-friendly names.
Failover Clustering
allows an organization to have the ability to provide high availability and scalability to networked servers. ______ ______ can include file share storage for server applications, such as Hyper-V and Microsoft SQL Server, and server applications that run on physical servers or virtual machines.
File Server Resource Manager
is a set of tools that allows administrators to manage and control the amount and type of data stored on the organization’s servers. By using this, administrators have the ability to set up file management tasks, use quota management, get detailed reports, set up a file classification infrastructure, and configure file-screening management.
Hyper-V
is one of the most changed features in Windows Server 2012. Microsoft’s new slogan is “Windows Server 2012, built from the cloud up,” and this has a lot to do with ________. It allows an organization to consolidate servers by creating and managing a virtualized computing environment. It does this by using virtualization technology that is built into Windows Server 2012.
Hyper-V
allows you to run multiple operating systems simultaneously on one physical computer. Each virtual operating system runs in its own virtual machine environment.
IP Address Management (IPAM)
is one of the brand-new features introduced with Windows Server 2012. ____ allows an administrator to customize and monitor the IP address infrastructure on a corporate network.
Kerberos Authentication
Windows Server 2012 uses the _________ authentication (version 5) protocol and extensions for password-based and public-key authentication. The ________ client is installed as a security support provider (SSP) and can be accessed through the Security Support Provider Interface (SSPI).
managed service accounts
originally created for Windows Server 2008 R2 and Windows 7, are configured domain accounts that allow automatic password management and service principal names (SPNs) management, including the ability to delegate management to other administrators.
Networking
There are many __________ technologies and features in Windows Server 2012, including BranchCache, Data Center Bridging (DCB), NIC Teaming, and many more.
Remote Desktop Services
Before Windows Server 2008, we use to refer to this as Terminal Services. ______________ allows users to connect to virtual desktops, RemoteApp programs, and session-based desktops. Using ______________ allows users to access remote connections from within a corporate network or from the Internet.
Security auditing
gives an organization the ability to help maintain the security of an enterprise. By using ____________, you can verify authorized or unauthorized access to machines, resources, applications, and services. One of the best advantages of this is to verify regulatory compliance.
smart cards
Using ______ ____, referred to as two-factor authentication, and their associated personal identification numbers (PINs) is a popular, reliable, and cost-effective way to provide authentication. When using smart cards, the user must not only have the physical card but also must know the PIN to be able to gain access to network resources. This is very effective because even if the smart card is stolen, thieves can’t access the network unless they know the PIN.
TLS/SSL (Schannel SSP)
_________ is a security support provider (SSP) that uses the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols together. The Security Support Provider Interface (SSPI) is an API used by Windows systems to allow security-related functionality, including authentication.
Windows Deployment Services
allows an administrator to install Windows operating systems remotely. Administrators can use this service to set up new computers by using a network-based installation.