Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
170 Cards in this Set
- Front
- Back
What does the power supply converter do? |
Converts Ac to DC power |
|
The _____ allows the processor to connect to or communicate with every other device within the server. |
Motherboard |
|
______ is defined as short term memory used by the computer and is erased when the computer is shut down. |
RAM |
|
RJ-45 connectors have how many connectors |
8 |
|
Flashing the BIOS is defined as ______ |
Updating the BIOS on the system |
|
SCSIdrives offer faster performance than_________.
|
IDE drives |
|
What does UPS stand for? |
uninterruptedpower supply. It is used to protect a server in case of a black out |
|
________ is used to change the boot device order of acomputer |
BIOS (via CMOS) |
|
When a computer is turned on, _____ is Loadedfirst (It checks CMOS for customizations too) |
BIOS |
|
Complementary Metal oxide Semiconductor issuesthe ________ when a computer first boots.
|
power on self test (POST) |
|
During POST what is done? |
theamount of system RAM is inventoried/detected, the hardware is initialized andan OS is found to load
|
|
_____________is defined as what holds theinstructions that a server uses to boot and includes POST and finding a driveto complete the boot process |
Firmware |
|
______________isthe main part of windows that is responsible for various system services aswell as process and memory managementare |
NOTSKRNL.exe |
|
_________isthe first windows file loading during boot, which loads the Kernal (Server 2003only) |
NTLDR |
|
When a Server boots for 2008 what is loaded |
Winload.exe |
|
When a Server boots for 2003 what is loaded
|
ntldr.exe |
|
______________ is a firmware-independent database for theboot-time configuration data used by Windows Boot Manager. It supports both theUnified Extensible Firmware Interface (UEFI) and Legacy BIOS. |
Bootconfiguration data (BCD) |
|
WindowsServer 2008 can accept up to_________ of RAM. |
32GBof RAM (remember, 32 bit limit is always 4GB) |
|
Server 2008 R2 requires a minimum of ________ofRAM and 64-bit 1.4 GHz processor. |
512MB |
|
________________ is used to investigate apotential problem with hardware (including drivers) |
Device Manager |
|
Server 2003 uses ________ command linetool to fix a system that no longer boots |
recovery console |
|
_______________ starts windows withthe last registry and driver configurations that worked successfully |
Last known good configuration |
|
____________ loads minimum number of drivers |
Safe Mode |
|
An __________________ is used on server2003 to recover a boot.ini file |
emergency repair disk (ERD) |
|
___________ is a command-line tool used fordescribing and managing the BCD store |
BCDEdit |
|
Repair your computer is an ____ Option to show a list of systemrecovery options in server 2008 R2 |
F8 |
|
Windowsserver 2003 R2 Enterprise ________ be upgraded to 2008 R2 standard or Foundation |
cannot |
|
_________________ is minimal Win32 operation system with limited services, built on theWindows Vista Kernel |
Windows Preinstallation environment (Windows PE) 2.0 |
|
32-bit machines ___________ use 64 bit drivers |
cannot |
|
Drivers should be obtained from the __________whenever possible |
device manufacturer |
|
Storage drivers can be loaded during theinstallation phase (either by ________________________________) . |
placing them on a USB flash drive or blank CD |
|
Unassigned drivers are problematic in server2008 and newer drivers must be ________ in 64 bit systems |
signed |
|
_______________ are tested and include a digitalinterface |
Signed drivers |
|
___________ is defined as a program thatcontrols a device in windows |
Device driver |
|
________ is used to configure IRQs for adevice |
Device manager |
|
__________________ are used to send asignal from a device to get the attention of the CPU |
Interrupt request (IRQ) |
|
A downward black arrow in device managerindicates that a device is __________ |
disabled |
|
A black exclamation point inside a yellow fieldindicates a device is __________________________ |
down and having problems |
|
______________ is a tool that can be used to helpisolate a program that is creating problems during the boot process |
Msconfig.exe |
|
_______________ helps preventunauthorized changes to windows |
User account controls (UAC) |
|
_________ is the primary program toconfigure the windows environment |
Control panel |
|
The local administrator account ______ be renamed |
can |
|
The local administrator account on a server ______________ be deleted |
CANNOT |
|
The local administrator account on a server ________ be disabled |
CANNOT |
|
A ______________ is defined as a program, routine or aprocess that performs a specific system function to support otherprograms/network service |
service |
|
___________ is required to be running on a server so that it can provide file sharing |
SERVER SERVICE |
|
To secure a server without disrupting thework of employees, simply _________ ratherthan shutdown |
log off |
|
Security patches should be maintained through ________________________. |
WSUS and windows update |
|
Microsoft recommends ________ your server via WUafter a new installation |
updating |
|
________ can be used torestart a server |
Shutdown /r or shutdown /r/t 0 |
|
Disk management MMC is found in _____________. |
Server Manager |
|
___________ is an automatic deviceconfiguration system |
Plug and play |
|
Logon options for services __________ limit access to resources |
can |
|
Services that are required to enable anotherservice to run are known as ______. |
dependencies |
|
Windows Server Operating Systems Require an _______ volumeagment |
NTFS |
|
An ______ volume or partition is required tocreate a volume mount point |
NTFS |
|
To convert a disk from dynamic back to basic,the dynamic volume must first be _________ |
deleted |
|
Internal storage disk types include _____________ |
PATA, SATA and SCSI agment |
|
iSCSI _________ require a private network tocommunicate with host machines |
does not |
|
_____________ storage does not require Ethernetto communicate with host machines (it can use a variety of connection types) |
Fibre channel |
|
Direct attached storage solutions connect with a __________ connections |
USB and eSATA |
|
Creating a __________ volume on a new drive willadd that space to an existing partition, rather than creating a new driveletter |
spanned |
|
In order to create a partition that supportscompression, it must be formatted as ________ |
NTFS |
|
___________ Tape back up systems support large dataamounts, are reasonable priced, andreasonably fast |
SCSI |
|
Fibre-channelstorage supports speeds up to ___________ |
16 Gbps |
|
Fibre-channeluses __________ as its simplest topology for two devices connected back to back |
PC-P2P |
|
___________ is a file-level data storage device accessiblevia the network and often uses SMB/CIFS |
NAS |
|
_______ is an architectureused for disk arrays, tape libraries, etc to appear as locally attached driveson a server. It typically uses RAID arrays |
Storage Area Network (SAN) |
|
____________________ Partitioning style supports 4 primarypartition for a maximum size of 4TB |
MBR |
|
__________ partitioning style supports up to 18 Exabyteand 128 partitions |
GPT |
|
________ is preferred. It supports up to 16EB perfile, is more fault tolerant that fat systems. It uses journaling to ensuretransactions are written properly. Permissions/Encryption are also a benefit ofit. |
NTFS |
|
_______________ is a manageable pieceof a disk array or SAN that is mapped to a server.
|
Logical Unit Number (LUN) |
|
_________ stands for a Redundant Array of InexpensiveDisks |
RAID |
|
___________ is defined as a faulttolerant system built using two or more drives |
RAID (Except RAID0) |
|
____________ is not fault tolerant. It stripes data across all drives. There is no parity control or fault tolerance |
RAID 0 |
|
__________ is defined as writing data acrossmultiple disks |
Disk striping |
|
___________ is known as disk mirroring. It mirrorsthe data on disk1 to disk2. Data is written to both drives simultaneously |
RAID 1 |
|
_________is a combination of RAID 1 and RAID 0.It mirrors a set of disks and then stripes across the disks |
RAID 10 |
|
____________ uses parity information to recover datafrom a failed disk |
RAID 5 |
|
RAID 5 uses between __________ disks |
3-32 |
|
Windows-based ________ uses system processingresources |
RAID |
|
________ is defined as error correction. To increase performance, the error-correctionfunction is spread across all hard drives in the array to avoid having onedrive do all the work |
Parity |
|
A _________ is an extra drive that can be usedwhen a RAID drive fails |
Hot Spare |
|
An _____________ are required toconfigure a TCP/IP network |
IP address and subnet mask |
|
Windows server clusters can be either _______________________. |
Failover or Network Load Balancing clusters |
|
SMTPis used to send mail between servers. It uses port _________ by default |
25 |
|
FTP uses ports ____________ |
20 and 21 |
|
________________ uses digitalcertificates for secure connections |
Secure socket layers (SSL) |
|
The default port for https is __________ |
443 |
|
_________ command shows active TCP connections and portsthat the computer is listening to |
Netstat |
|
_________ is a command used to set the ip addressesand gateway information. Useful for server core installations |
Netsh |
|
_________ displays all active networkconfigurations for that device |
Ipconfig |
|
__________ determines the path taken to a destinationby sending an ICMP echo request |
Tracert |
|
_________ verifies IP connectivity with anotherdevice by sending an ICMP echo request |
Ping |
|
IPv4 configuration can be found in the _______________________ . |
network and sharing Center (on the left change adapter settings) |
|
Servers often have ________ IP addresses so thatclients can be pointed to them permanently |
static |
|
To hide a share, put a ___________ at the end of the sharename |
$ |
|
___________ translates domain names to IP addresses |
DNS |
|
A ______ translates the host names to IPaddress |
host file |
|
DNS ____________ records translate host names to IP address |
A |
|
DNS ___________ records translate IP addresses to hostnames |
PTR |
|
DNS _________ records are used to locate a domaincontroller |
SRV |
|
_________ assigns IP addresses automatically |
DHCP |
|
___________________ are authentication protocols.They are used by iSCSI and other technologies to securely connect from a remotesite |
CHAP and IPSec |
|
___________ is the primary authentication protocolused in Active Directory |
Kerberos |
|
Layer 2 Tunneling Protocol (L2TP) uses ________ toencrypt data |
IPSec |
|
____________________ usesplain text passwords (unencrypted) |
Password authentication protocol (PAP) |
|
_________________________ is defined as a hiddenshares with a $ at the end of the name |
Administrative share |
|
______________________ may be needed for a communicationto leave a secure intranet |
Proxy settings |
|
___________ allow employees to work remotely but stillhave access to internal network resources |
DirectAccess and VPN |
|
_______________ is defined as a technology used to link twocomputers or sites over the internet while providing a secure connection |
VPN |
|
______________ allow remote connection to an application |
Remote Desktop Services Client Access Licenses |
|
Remote Desktop and Remote assistance use port _____________. |
1389 |
|
Servers can be remotely managed via a __________________. |
VPN server or remote desktop |
|
___________________ allows for server control from aworkstation using server manager |
Remote server Administration Tools (RSAT) |
|
____________ Grants access to the LocalAdministration group by default |
Remote Desktop |
|
_____________ is designed for supportpersonnel to connect to an active logon session to assist |
Remote assistance |
|
___________ is used to connect to a computerremotely. It supports two connections simultaneously |
Remote Desktop |
|
Remote desktop Can be enabled in the ______. |
control panel |
|
__________________ is used to permit a user to reconnect existing sessions, is a load-balanced RD Session Host Server Farm |
RD Connection broker |
|
_______________ enables a user to evenlydistribute the session load among RD Session Host Server in a load-balanced RDSession Host Server Farm |
RD Connection Broker |
|
___________ is defined as an environment whereeach computer keeps its own security database |
Workgroup |
|
_________ is defined as a computer meant to be adedicated service provider |
Server |
|
____________ is a logical unit of computers andnetwork resources that define a security boundary |
A domain |
|
A ____________ is a logical structure used fordelegating authority over a collection of objects |
Domain |
|
Domain user accounts are managed through _______________. |
AD users and computers |
|
The default location for a new user account inAD is the ___________ |
Users container |
|
__________ is usedto manage users, groups, computers, domains, Domain Controllers and OU’s |
Active Directory Administrative center |
|
___________ allows you to changethe name of a computer or add the computer to a domain |
System Control Panel Applet |
|
__________ provides centralized managementof users and computers |
Active directory |
|
When creating a new Domain, _____________________ objects are available by default |
User and Computer |
|
Active directory infrastructure dictatesthat you may only have one forest unless _________ are created
|
Trusts |
|
_________ is a complete instance of ActiveDirectoryme |
Forest |
|
Forest is defined as one or more _________ withdisjointed namespace |
trees |
|
___________________ is defined as representing a geographic location hosting networks, morespecifically a collection of well-connected IP subnets |
Site |
|
_______________ is defined as a primary duty that aserver provides |
Server role |
|
Storage drives can be loaded during theinstallation phase either by ___________________ |
placing them on a USB flash drive or blank CD |
|
_______________ are defined as non-DomainController Servers in a Domain
|
Member servers |
|
_____________ is defined as enabling additionalusers to handle administrative tasks for a particular object
|
Delegation |
|
____________ wizard can be used todelegate administration to appropriate users and groups |
Delegate of Authority |
|
___________________ is defined as a Windows Serverthat stores the Active Directory database
|
Domain controller |
|
____________ replicates frequentlyused attributes used in search operations (user/computer name) of every objectin a tree and forest so that you can quickly finds the objects
|
Global Catalog service |
|
A server that has an operations master role mustalso be a _______________
|
Domain Controller |
|
________________ |
operations master role |
|
ADomain Controller that is designated to perform a set of specialized DomainController tasks is known as an _________________ |
Operations Master (FSMO) |
|
Some ______________ are only assignedto the forest, not a Domain Controller |
operations master roles |
|
Flexible Single Master Operations (FSMO) Rolesare the following: _____________________________________________________________________________________________________________________________
|
Schema Master, Domain Naming Master, Relative ID (RID) Master, PDC Emulator |
|
___________________ is used forsynchronizing cross-domain group membership
|
Infrastructure Master Role |
|
______________ role is used forcontrolling and handling updates and modifications to the Active DirectorySchema
|
Domain Naming Master |
|
__________ role is used for allocating pools ofunique identifiers to Domain Controllers for use when creating objects |
RID Master |
|
_____________ are used to assign permissionsto access resources and specific folders |
Security groups |
|
_____ can be used to assign permissions on ashared folder on a member server in the AD
|
Groups |
|
The Read Permission is assigned to ___________whena new share is created |
Everyone |
|
When accessing data created by a formeremployee, ______________ of the file will grant access |
taking ownership |
|
_____________ are assigned to security groups |
Rights and Permissions |
|
____________ authenticate a user to perform acertain actions on a computer, such as logging on to a systeminteractively or backing up files anddirectories on a system
|
User rights |
|
User rights = ____________________ |
Authentication |
|
User/Group Permissions = __________________
|
authorizations |
|
Permissions are used to grant access to objectssuch as ______________________________ |
NTFS files or Active Directory user accounts |
|
___________ is the minimum permission needed to changethe attributes of a file (NTFS Permissions) |
Write |
|
___________ is the minimum permission needed tomodify files and their attributes (Share permissions) |
Change |
|
Access Control Lists are used to store ______________ assigned to a file or folder |
NTFS Permissions |
|
Explicit Permissions are defined as _________________________________________ |
permissions assigned directly to a file or folder |
|
Explicit Deny permissions ______________________ over all other permissions
|
override (take precedence) |
|
________________ permission is the first step to accessing files that you do not havepermissions to and need to access immediately. All admins have this right |
Take ownership |
|
____________________ allows you to seewhat permissions are actually applied to a user or computer |
Effective Permissions tool |
|
Permissions for Shares (Share permissions) or Folders (NTFS Permissions) allow the most _______________ permissions |
permissive |
|
Permissions for shares (Share permissions) andFolders (NTFS permissions) allow the most ______________ permissions |
restrictive |
|
____________ are defined as permissionsactually granted to a user when they access a particular file (explicitpermissions + inherited permissions) |
Effective permissions |
|
Files moved from one folder to another on thesame volume _______ their original permissions |
retain |