Term
| What is the first job of the BIOS at system startup? |
|
Definition
| Run the power-on self-test (POST). |
|
|
Term
| What does the CMOS store and what other component uses this information? |
|
Definition
| The configuration information about the computer; BIOS. |
|
|
Term
| How is main memory distinguished from secondary memory? |
|
Definition
| By the speed between the two. |
|
|
Term
| When power is removed from the computer, what happens to the stored information in ROM? |
|
Definition
| Its contents remain in memory. |
|
|
Term
| Why is RAM considered as volatile memory? |
|
Definition
| Because the contents are erased (lost) from memory. |
|
|
Term
| How are dynamic RAM and static RAM different? |
|
Definition
| DRAM chips must be refreshed constantly or they lose their contents. SRAM chips will hold their data without needing to be refreshed as long as power is supplied, thus the term static is used. |
|
|
Term
| What is cache memory and what is normally stored in it? |
|
Definition
| Temporary storage area; a collection of data duplicating original values. |
|
|
Term
| What is the main goal of buffers? |
|
Definition
| To temporarily hold data used by some type of hardware device until the device is ready to utilize the data. |
|
|
Term
| What is the purpose of the DMA controller? |
|
Definition
| To move data and to freeing up the CPU to process data. |
|
|
Term
|
Definition
| An asynchronous signal from a computer hardware device indicating the need for attention (from the CPU) or a synchronous event in a software application program indicating the need for a change in execution. |
|
|
Term
| How are interrupts commonly used? |
|
Definition
| For computer multitasking, especially in real-time computing. |
|
|
Term
| Describe data integrity in a simple manner. |
|
Definition
| The assurance that data is consistent, correct, and accessible. |
|
|
Term
|
Definition
| A method in which the computer ensures the data it processes is accurate. |
|
|
Term
| What is the difference between error correction code (ECC) memory and the parity method? |
|
Definition
| The parity method can only detect an error while ECC memory can both detect and correct errors. |
|
|
Term
| Give three examples of storage devices that can be placed in a SAN. |
|
Definition
| Disk arrays, CD/DVD towers, tape libraries. |
|
|
Term
| How can using a SAN make equipment failure easier to repair? |
|
Definition
| The data does not need to be affected; you can replace only the server. |
|
|
Term
| What are the three protocols listed that support a SAN? |
|
Definition
| Fibre Channel, ATA over Ethernet, iSCSI. |
|
|
Term
| How does a SAN and a NAS differ? |
|
Definition
| A SAN appears to the server to be physically attached; the NAS is treated as a network drive. |
|
|
Term
| Why is a hardware implementation of RAID preferred over a software version? |
|
Definition
| For one it does not require CPU time as the controller card has a processer on board that manages the array. |
|
|
Term
| What are the three concepts of RAID? |
|
Definition
| Mirroring, striping, and error correction. |
|
|
Term
| Why is RAID 5 considered to be more efficient when it comes to parity checks? |
|
Definition
| Because you do not need separate hard drives for parity checks. |
|
|
Term
| Why is RAID 5 considered to be more efficient when it comes to parity checks? |
|
Definition
| Because one array type is "nested" within another array type. |
|
|
Term
| What are some characteristics of HOLs? |
|
Definition
| They use English-like statements to increase user understanding, are nearly self-documenting, and permit the use of most scientific and mathematic notations. Programs written for one computer can usually be used on another computer with few changes. |
|
|
Term
| Name four HOLs and give a reason for using each. |
|
Definition
FORTRAN: It is a scientific language with great capacity for precise numeric equations COBOL: It is the language of choice for writing programs to produce reports or other formatted output products Ada: Designed for embedded computer applications, is a language recommended for DOD missioncritical systems Pascal: It was originally a programming language used to teach programming logic, but it quickly developed into an easy-to-use and very powerful programming language. |
|
|
Term
| What are some characteristics of assembler language? |
|
Definition
| Instead of writing English-like statements, the programmer writes mnemonics, which are converted directly to machine language by a language processor. These languages are machine specific. |
|
|
Term
|
Definition
| Instructions written or existing in a form acceptable by a computer. |
|
|
Term
| What is the distinction of an interpreted language? |
|
Definition
| No permanent object code is produced. |
|
|
Term
| What is the European Organization for Nuclear Research commonly known as? |
|
Definition
|
|
Term
| How would you best describe a URL? |
|
Definition
| The address of a file or resource accessible on the Internet. |
|
|
Term
|
Definition
| The set of markup symbols or codes inserted in a file intended for display on a Web browser page. |
|
|
Term
| What significant role will XHTML play in the future? |
|
Definition
| It is most likely to succeed HTML for Internet purposes. |
|
|
Term
|
Definition
| A standard method for a Web server to pass a Web user's request to an application program and to exchange data back to the user. |
|
|
Term
| Define secure socket layer. |
|
Definition
| A commonly used protocol for managing the security of a message transmission on the Internet. |
|
|
Term
| What is session management? |
|
Definition
| The process of keeping track of a user's activity across sessions of interaction with the computer system. |
|
|
Term
| Why is session management useful when using the internet? |
|
Definition
| Without it, you would have to re-authenticate yourself every time you clicked on a hyperlink, rendering the internet almost useless for secure communications. |
|
|
Term
| Give an example of a session management used for security? |
|
Definition
| With some Websites, for security reasons, the session is terminated after a period of time of inactivity, say ten minutes. After that, you must re-authenticate yourself to the server. |
|
|
Term
| What are the methods of optimizing your system? |
|
Definition
| Task manager, disk defragmenter, chkdsk, and disk quotas. |
|
|
Term
| What triggers can you set the task manager to launch a program on? |
|
Definition
| Daily, weekly, monthly, one time only, when the computer starts, and when you log on. |
|
|
Term
| What would happen if you tried to run CHKDSK while you were using the system? |
|
Definition
| If any files or applications are running, check disk informs you it could not gain exclusive access to the drive. It then asks if you want to schedule check disk to run the next time your computer starts. The answer would be "Yes." |
|
|
Term
| How does defragmenting improve your systems performance? |
|
Definition
| It gathers all the pieces of files and folders, reorganizes things a little and rewrites the files and folders in a continuous fashion. In other words, it puts all the pages back in order with one beginning and one ending. |
|
|
Term
| How can you best describe a radix and what does it indicate? |
|
Definition
| Also known as the base, and indicates the number of digits used in a particular numbering system. |
|
|
Term
| What is an exponent and what does it indicate? |
|
Definition
| The exponent is written as a superscript, located on the upper right side of the number. An exponent indicates how many times a number is to be multiplied by itself. The value of the exponent is known as the power. |
|
|
Term
| Explain the difference between the most and least significant digits. |
|
Definition
| The MSD is the left most nonzero digit of a numeric value. The MSD is the digit that expresses the greatest possible value. The LSD is the rightmost digit of a numeric value to include zeros. |
|
|
Term
| State the purpose of a fractional point. |
|
Definition
| Separates the whole portion of the number from the fractional portion of a number. |
|
|
Term
| State how you would convert a decimal number to a binary equivalent. |
|
Definition
| Divide the decimal value by the base value (2). The remainder then becomes the LSD. Next, divide the result again by the base, and the remainder becomes the digit to the left of the LSD. Continue this pattern until the result is zero. |
|
|
Term
| State how you would convert a binary number to a hexadecimal equivalent. |
|
Definition
| Separate the binary number into groups of four, treating each group as one hex value. To come up with the result, add the decimal value of each bit containing a one and convert the sum to a valid hexadecimal digit. Then combine the digits together to form one hexadecimal number. |
|
|
Term
| State how you would convert a decimal number to a hexadecimal equivalent. |
|
Definition
| Divide the decimal number by the base (16). The remainder is the LSD. Then, divide the result by the base again. The remainder becomes the digit to the left of the LSD. Continue this process until the result is zero. |
|
|
Term
| From an IT contingency planning perspective, what are the two primary functions of risk management? |
|
Definition
| First, risk management should identify threats and vulnerabilities so that appropriate controls can be put into place to either prevent incidents from happening, or to limit the effects of an incident. Second, risk management should identify residual risks for which contingency plans must be put into place. |
|
|
Term
| Describe the three main classifications of threat. |
|
Definition
| Natural, Human, Environmental. |
|
|
Term
|
Definition
| Focuses on restoring an organization's (usually a headquarters element) essential functions at an alternate site and performing those functions for up to 30 days before returning to normal operations. |
|
|
Term
| What should a contingency plan spell out? |
|
Definition
| What systems are prioritized in what order for the basis of protecting those systems from disasters and contingency and for bringing those systems back online after a disaster/contingency. |
|
|
Term
| What criteria should you consider when selecting an offsite storage facility? |
|
Definition
| Geographic area, accessibility, security, environment, and cost. |
|
|
Term
| Name the five types of alternate sites. |
|
Definition
| Cold, warm, hot, mobile, and mirrored sites. |
|
|
Term
| Why should you focus most of your backup efforts on data instead of programs? |
|
Definition
| Data that is unique and software can always be re-loaded. |
|
|
Term
| What three factors is the choice of backup media based on? |
|
Definition
|
|
Term
| Name the four different types of backup you can schedule. |
|
Definition
| Full (also known as normal), differential, incremental, and daily. |
|
|
Term
| Why should you keep a copy of your backups at an alternate location? |
|
Definition
| The problem or damage effects only your primary site and not your offsite. |
|
|
Term
| Which original components were very susceptible to damage from electrostatic discharge? |
|
Definition
| Complementary metal-oxide semiconductor (CMOS). |
|
|
Term
| What is considered to be a computer's main storage? |
|
Definition
| Random access memory (RAM). |
|
|
Term
| What is considered as nonvolatile permanent memory? |
|
Definition
|
|
Term
| What is a form of firmware that contains the computer's startup instructions? |
|
Definition
| Basic input/output system (BIOS). |
|
|
Term
| What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event? |
|
Definition
|
|
Term
| Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)? |
|
Definition
|
|
Term
| Which interrupt request (IRQ) line number is normally used for the floppy disk controller? |
|
Definition
|
|
Term
| Which is a term used to describe that data is whole or complete? |
|
Definition
|
|
Term
| What is considered as a technique or method of checking data integrity? |
|
Definition
|
|
Term
| Which is a very simple example of an error detecting code? |
|
Definition
|
|
Term
| What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not? |
|
Definition
| Storage area network (SAN). |
|
|
Term
| What is an advantage of using a storage area network (SAN) architecture? |
|
Definition
| Ease of replacing server. |
|
|
Term
| What is the connection type of choice for storage area networks (SAN)? |
|
Definition
|
|
Term
| Which storage device can be easily connected to a network and appears as a network drive? |
|
Definition
| Storage area network (SAN). |
|
|
Term
| Which storage device has the means of providing data storage reliability using multiple hard drives? |
|
Definition
| Redundant array of independent disks (RAID). |
|
|
Term
| The hard drives in a redundant array of independent disks (RAID) array are presented to the server as |
|
Definition
|
|
Term
| Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained? |
|
Definition
| Small computer system interface (SCSI). |
|
|
Term
| Which is not a characteristic of high-order languages? |
|
Definition
| Source codes that are written closest to machine language. |
|
|
Term
| What best describes programming machine code? |
|
Definition
| Instructions in a form that is acceptable to the computer. |
|
|
Term
| Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page? |
|
Definition
| HyperText Markup Language (HTML). |
|
|
Term
| Which Web application is most likely to succeed Hypertext Markup Language (HTML)? |
|
Definition
|
|
Term
| A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a |
|
Definition
| common gateway interface (CGI). |
|
|
Term
| Which protocol is commonly used for managing the security of a message transmission on the Internet? |
|
Definition
| Secure socket layer (SSL). |
|
|
Term
| Which program can be used to automatically launch programs on a preset schedule? |
|
Definition
|
|
Term
| Which error-checking tool allows you to monitor the file system for errors? |
|
Definition
|
|
Term
| Which numbering system characteristic is the leftmost non-zero digit of a numeric value |
|
Definition
| Most significant digit (MSD). |
|
|
Term
| What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters? |
|
Definition
| List of critical devices. |
|
|
Term
| Which type of backup would you use at the end of the week to save all data that you select on your systems? |
|
Definition
|
|
Term
| Which type of backup will backup all files that have been altered in the last 24 hours? |
|
Definition
|
|
Term
| What speed are main memory and disk drives measured in? |
|
Definition
| Nanoseconds and milliseconds. |
|
|
Term
| What does a device driver do? |
|
Definition
| It accepts generic commands from a program and translates them into specialized commands for devices. |
|
|
Term
| What is the act of polling? |
|
Definition
| Actively sampling the status of external devices by a client program as a synchronous activity. |
|
|
Term
| What does the term Client Server refer to? |
|
Definition
| The interaction between the user's computer and the server in which server shares its resources with the client. |
|
|
Term
| How does SAS differ from SCSI? |
|
Definition
| SAS is serial based while SCSI is parallel based. |
|
|
Term
|
Definition
| A set of syntax rules for creating semantically rich markup languages in a particular domain. |
|
|
Term
|
Definition
| A meta-language in which one can define markup languages for documents. |
|
|
Term
| What is based around a central directory database containing information about all the domain controllers in the network? |
|
Definition
|
|
Term
| What is a group of users, servers, and other resources that share a centralized database of account and security information? |
|
Definition
|
|
Term
| Where does a copy of the active directory database reside? |
|
Definition
|
|
Term
| What kind of server contains the master listing of all active directory objects in the forest? |
|
Definition
|
|
Term
| What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user? |
|
Definition
|
|
Term
| Which type of interface is friendlier for the average user to use? |
|
Definition
| Graphical User Interface. |
|
|
Term
| Which of the following is not one of the elements that most graphical user interfaces are composed of? |
|
Definition
|
|
Term
| Sitting at a computer and loading a software patch onto it is an example of what type of software patch? |
|
Definition
|
|
Term
| Which type of patch would utilize a remote installation services (RIS)? |
|
Definition
|
|
Term
| Which components of domain name service (DNS) contain a database of associated names and IP addresses? |
|
Definition
|
|
Term
| Which query is made by one name server to another name server? |
|
Definition
|
|
Term
| Which software program manages an IP address allocation for a network? |
|
Definition
|
|
Term
| The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a |
|
Definition
|
|
Term
| What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have? |
|
Definition
|
|
Term
| According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them? |
|
Definition
|
|
Term
| What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location? |
|
Definition
|
|
Term
| Which is not a component of Internet information services (IIS)? |
|
Definition
|
|
Term
| What component of windows unifies and simplifies day to day system management tasks? |
|
Definition
|
|
Term
| Which type of group manages user's rights assignments and access permissions? |
|
Definition
|
|
Term
| Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer? |
|
Definition
|
|
Term
| What defines the rules by which operations can be performed on a particular resource? |
|
Definition
|
|
Term
| A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called |
|
Definition
|
|
Term
| What permission always overrides all other permissions assigned to a user or group to which the user belongs? |
|
Definition
|
|
Term
| When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned? |
|
Definition
| Inherited permissions of the folder it's contained in. |
|
|
Term
| Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down? |
|
Definition
|
|
Term
| In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information? |
|
Definition
|
|
Term
| Which type of lists uses pointers to connect each element together? |
|
Definition
|
|
Term
| A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a |
|
Definition
|
|
Term
| What is the most common type of operation in sequential query language (SQL)? |
|
Definition
|
|
Term
| What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent? |
|
Definition
|
|
Term
| Which is the most commonly used sequential query language (SQL) data statement? |
|
Definition
|
|
Term
| Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity? |
|
Definition
|
|
Term
| What is the key to understanding AD? |
|
Definition
|
|
Term
| What may be contained within objects? |
|
Definition
| Network users, computers, printers, groups, data files, applications and the attributes of those objects (i.e. name, IP address, etc) |
|
|
Term
| Why is the global catalog server a critical component in a domain? |
|
Definition
| They have a "master list" of all AD objects from all domains in the forest. |
|
|
Term
| What are the five FSMO roles responsible for? |
|
Definition
Schema Master - DC responsible for updating directory schema Domain Naming Master - DC responsible for making changes to the forest-wide domain name space RID Master - DC responsible for for processing relative ID pool requests; PDC Emulator - DC that is the authority for the W32Time (windows time) service. The timekeeper for the network; Infrastructure Master - DC responsible for updating an objects SID and distinguished name for cross domain referencing. |
|
|
Term
| What are GPOs applied against? |
|
Definition
| "Leaf objects", such as users and computers, but not security or distribution groups. |
|
|
Term
| Which command do you use to launch the AD Installation Wizard to promote a server to a domain controller? |
|
Definition
|
|
Term
| When can a command line interface be better than a GUI? |
|
Definition
| It uses less RAM and less power from the microprocessor than any other interface. |
|
|
Term
| What is the biggest advantage of a GUI? |
|
Definition
| It is the most user friendly of all interfaces |
|
|
Term
| What are the four elements most GUIs are composed of? |
|
Definition
| Windows, Icons, Menus, and Pointing devices. |
|
|
Term
| What are the two methods of installing Windows Server 2003? |
|
Definition
|
|
Term
| What is the difference between a hot fix and a service pack? |
|
Definition
| A hot fix is usually a program created by Microsoft to quickly fix a specific problem with one of their products. The Service Pack provides a collection of fixes in the following areas: security, application compatibility, OS reliability, and setup. |
|
|
Term
| How do the three components of DNS work together? |
|
Definition
| A resolver needs to look-up domain name information. It sends the request to the name server, which reviews its records to find the information, and then it passes the required information back to the resolver. |
|
|
Term
| How are a forward lookup and a reverse lookup different? |
|
Definition
| Unlike forward lookups, where you provide a domain name and request an I/P address, a reverse lookup allows you to specify an IP address, and the DNS server returns the hostname defined for it. |
|
|
Term
| How do recursive queries and non-recursive queries differ? |
|
Definition
| Where recursive queries are made by client applications, non-recursive queries are made by name servers to other name servers. |
|
|
Term
| Explain the importance, in DNS, of the "root." |
|
Definition
| In DNS, the root consists of 13 name server clusters located world-wide. These servers form the upper most layer of the DNS namespace. |
|
|
Term
| What three things must Air Force DNS servers do? |
|
Definition
| Provide reverse lookup capability, i.e. reside on the in-addr.arpa domain, allow zone transfers only between the primary and secondary name servers, and run only the DNS service. All unnecessary services (such as http, ftp, telnet, NetBIOS, etc.) will be turned off on the name servers. |
|
|
Term
| What does a DHCP server do? |
|
Definition
| Manages a pool of IP addresses (known as a scope) available for lease by authorized clients for a specific period of time. |
|
|
Term
| What must you be aware of when using more than one DHCP server on a network? |
|
Definition
| Each scope is unique so you do not cause the creation of duplicate IP addresses. |
|
|
Term
| What does Air Force Policy say about using DHCP? |
|
Definition
| Manage all base IP address space through utilization of Dynamic Host Configuration Protocol (DHCP). DHCP |
|
|
Term
| According to Air Force policy, how long should noncritical workstations' IP addresses be leased for? |
|
Definition
|
|
Term
| On what servers can you install RIS? |
|
Definition
| Any server that meets the Windows Server 2003 minimum requirements. |
|
|
Term
| What directory does the RIS service default to? |
|
Definition
|
|
Term
| When deciding on a default directory for RIS, what are the two rules you must follow? |
|
Definition
| The directory has to be on a partition other than the partition that holds the Windows Server 2003 operating |
|
|
Term
| What are the services that IIS can provide? |
|
Definition
| World Wide Web publishing services, File Transfer Protocol (FTP) services, Simple Mail Transport Protocol (SMTP) services, and Network News Transfer Protocol (NNTP) services. |
|
|
Term
| Why is IIS 6.0 not activated automatically? |
|
Definition
| The reason for this is that hackers have learned to look for IIS services running with their default setup, which allowed them a method of access. By locking IIS down by default, it greatly reduces the number of access points for hackers. |
|
|
Term
| What are IIS's components? |
|
Definition
| World Wide Web Server, Simple Mail Transfer Protocol, Network News Transfer Protocol (NNTP), File Transfer Protocol (FTP) Server, Internet Information Services Snap-in, Internet Services Manager. |
|
|
Term
| What is usually the sole purpose of installing IIS on an Air Force server? |
|
Definition
| To facilitate the installation of Microsoft Exchange Server. |
|
|
Term
| Explain what a snap-in is. |
|
Definition
| It is an interface for a program designed to integrate with the MMC. |
|
|
Term
| As an administrator, how would MMC make accomplishing your duties easier? |
|
Definition
| It simplifies the management of the server and network. |
|
|
Term
| What are the two places a user account can be created? |
|
Definition
| On a local computer or a domain controller. |
|
|
Term
| What is the difference between Permissions and Rights? |
|
Definition
| Permissions control access to an object, such as a folder or file. Rights enable a user account or group to perform predefined tasks. |
|
|
Term
| Where is a domain user account valid? |
|
Definition
| On any computer in the domain for which the account was created. |
|
|
Term
| Which snap-in to the MMC would you use to create a new user account? |
|
Definition
|
|
Term
| Why would you use group nesting? |
|
Definition
| To simplify and reduce security management overhead. |
|
|
Term
| What scopes can apply to special identities? |
|
Definition
|
|
Term
| What do permissions define? |
|
Definition
| Rules by which operations can be performed on a particular resource, read, write, delete. |
|
|
Term
| Rules by which operations can be performed on a particular resource. |
|
Definition
|
|
Term
| What are the four shared folder permissions? |
|
Definition
| Full control, Change, Read, and No Access. |
|
|
Term
| Which permission over rides all others? |
|
Definition
|
|
Term
| What are the six NTFS permissions? |
|
Definition
| Read, Write, Execute, Delete, Change permission, and Take Ownership. |
|
|
Term
| Why would you remove full control permission from the everyone group? |
|
Definition
| With this permission in place, literally anyone on the network could delete or modify those resources. |
|
|
Term
| What features does Microsoft Exchange server share with other email systems? |
|
Definition
It transfers email messages to intended recipients in a reliable way, whether the recipients reside on the local server, another server in the same Exchange Server 2003 organization, or another server in an external messaging environment that is connected to the organization It stores the email messages in a server-based store It supports various email clients that are used to access or download messages It provides users with information about recipients in the organization through an address book or global address list. |
|
|
Term
| What does Microsoft Exchange server integrate tightly with to provide its many features? |
|
Definition
| The TCP/IP infrastructure provided by Microsoft Windows Server 2003 and AD service. |
|
|
Term
| What protocols does Exchange server use to support web based mail client connectivity? |
|
Definition
| HTTP, SMTP, POP3, IMAP4, NNTP. |
|
|
Term
| What is the core data storage repository for Microsoft Exchange server? |
|
Definition
| The Exchange Information Store Service. |
|
|
Term
| What information does a mailbox store about a particular mail recipient? |
|
Definition
| Mail Messages, Calendar Data, Tasks, Personal Information. |
|
|
Term
| What are the two Microsoft Exchange server roles? |
|
Definition
| Mailbox Server and Bridgehead Server. |
|
|
Term
| Microsoft Exchange server 2003 requires what components and services to be installed and enabled on the server? |
|
Definition
| .NET framework, ASP.NET, IIS, WWW Publishing Service, SMTP, and NNTP. |
|
|
Term
| What must the account you use to install the first Exchange 2003 server in the forest be? |
|
Definition
| The account you use to run DomainPrep must be a member of the Domain Administrators group in the local domain and a local computer administrator. |
|
|
Term
| What are data structures designed to do? |
|
Definition
| To organize data to suit a specific programming purpose so you can access them later and use them in appropriate ways to produce a desired output. |
|
|
Term
| What is the purpose of a schema? |
|
Definition
| It describes the objects that are represented in the database, and the relationships among them. |
|
|
Term
| Why do we define a group of ordered data items or elements as a linked list? |
|
Definition
| Because we use pointers to connect each element together, thus specifying their order. |
|
|
Term
| How does a sequential list differ from a linked list? |
|
Definition
| In contrast to the physical layout of data items in a linked list, where pointers connect each element together and specifying their order, a sequential list, or ordered list, is configured in the order that the items are read. |
|
|
Term
| How are columns and rows identified in a table? |
|
Definition
| The columns are identified by name, and the rows are identified by the values appearing in a particular column subset, which has been identified as a candidate key. |
|
|
Term
| How do base tables and derived tables differ? |
|
Definition
| Base tables are self-contained, meaning that all of the data in them is in that table, not from any other table. A derived table contains information that was retrieved from another table. |
|
|
Term
| When referring to databases, what is a view? |
|
Definition
| A virtual or logical table composed of the result set of a query |
|
|
Term
| How does a network, or plex, data structure differ from a hierarchical, or tree, data structure? |
|
Definition
| With a network structure, both the relationship from child-to-parent and the relationship from parent to child can be a one to many. |
|
|
Term
| Describe a relational database. |
|
Definition
| A collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. |
|
|
Term
| What three values form the basis of the three valued logic used by SQL? |
|
Definition
|
|
Term
| Describe the three basic types of SQL statements. |
|
Definition
Data statements - queries and or modifies tables and columns
Transaction statements - these statements control transactions, either making changes permanent, or removing them;
Schema statements - statements that maintain schema, creating or removing tables and views and granting privileges. |
|
|
Term
| In SQL, how is logging used to ensure data integrity? |
|
Definition
| If an action is logged, but it is not completed before the system failed, the actions can be read from the log and completed. |
|
|
Term
| Describe the two types of concurrency used by Microsoft SQL server. |
|
Definition
| Pessimistic concurrency which uses locks to control access to data while Optimistic concurrency is where Each time a change is made to data in a row, a new version of that row is created and the old one is removed from the database and stored in a back up file, so that any changes can be undone later if need be. |
|
|
Term
| What is the first job of the BIOS at startup? |
|
Definition
|
|
Term
| What is a memory chip that stores configuration information about the computer used by the BIOS every time the system is booted up? |
|
Definition
|
|
Term
| What are the two types of PROM? |
|
Definition
|
|
Term
| What are the two types of DRAM chips? |
|
Definition
|
|
Term
| Why are DDR SDRAM chips faster than SDRAM? |
|
Definition
| They transfer data twice for each clock cycle. |
|
|
Term
| What are the three types of RAM? |
|
Definition
| DRAM, SRAM and cache memory. |
|
|
Term
| Which is more reliable - SRAM or DRAM? Why? |
|
Definition
| SRAM because they hold their data without needing to be refreshed. |
|
|
Term
|
Definition
| DRAM chips need to be refreshed constantly or they lose their contents. |
|
|
Term
| What are the three forms of data integrity? |
|
Definition
| Parity, nonparity and ECC memory. |
|
|
Term
| What type of client shares an application between two users and normally resides on the hard drive? |
|
Definition
|
|
Term
| For which type of service does it appear as though the user running the program may as well be at the datacenter typing in commands to the terminal there? |
|
Definition
|
|
Term
| What are the three connection methods from SANs? |
|
Definition
| AoE over Ethernet, iSCSI, and Fibre Channel. |
|
|
Term
| What are the most prominent RAID controller cards today? |
|
Definition
|
|
Term
| Describe striping as it pertains to the RAID concept. |
|
Definition
| Splitting data amongst more than one disk, so that it can be retreived more quickly than if all the data had to be read from one disk. |
|
|
Term
| What are four common High Order Languages? |
|
Definition
| FORTRAN, COBOL, Pascal and Ada. |
|
|
Term
| What is the HOL, Ada, created for? |
|
Definition
| The DoD contracted to have it developed so that it could be used by virtually everybody. It is designed for embedded computer applications and was recommended for DoD mission-critical systems. |
|
|
Term
| What are the two main components of Microsoft .NET Framework? |
|
Definition
|
|
Term
| How does SSL achieve authentication? |
|
Definition
| By using public-key cryptographic algorithms such as RSA or DSS. |
|
|
Term
| How does SSL achieve integrity? |
|
Definition
| By using cryptographic functions such as MD5 or SHA1. |
|
|
Term
| What is the purpose of SOA? |
|
Definition
| To build applications out of software services. |
|
|
Term
| What are the three types of session management? |
|
Definition
| Desktop, browser, and web server. |
|
|
Term
| What are the four types of contingency plans? |
|
Definition
| COOP, Cyber Incident Responce Plan, DRP, and EAP. |
|
|
Term
|
Definition
| The response to procedures for occupants fo a facility in the event of a situation posing a potential threat to the health and safety of personnel, the environment, or property. |
|
|
Term
| What does the DRP apply to? |
|
Definition
| Major, usually catostrophic events that deny access to the normal facility for an extended period. |
|
|
Term
| What does the COOP focus on? |
|
Definition
| Restoring an organization's essential functions at an alternate site and performing those functions for up to 30 days before returning to normal operations. |
|
|
Term
| What are the main AD components? |
|
Definition
| Domain controllers, global catalog servers, member servers, group policy objects, and flexible single master operation role holders. |
|
|
Term
| What are the two types of domain groups? |
|
Definition
| Distribution and security. |
|
|
Term
| What are the five main messaging protocols used by Microsoft Exchange Server? |
|
Definition
| HTTP, SMTP, POP3, IMAP4, and NNTP. |
|
|
Term
| Describe a bridgehead server? |
|
Definition
| A connection point that performs message transfer to external messaging systems. |
|
|
Term
| What is the purpose of predicates in SQL? |
|
Definition
| To specify the conditions that can be evaluated and are used to limit the effects of statements and queries. |
|
|
Term
| Which type of statements create and remove tables and views? |
|
Definition
|
|
Term
| What are the five characteristics of UNIX? |
|
Definition
| Multi-user, multitasking, simplicity, flexibility, and portability. |
|
|
Term
| What component of UNIX allows the user to choose from many different commands that allow them to use the system to its maximum potential? |
|
Definition
|
|
Term
| Memory management, system access, file system management, error handling, input and output, and resource allocation are features of what UNIX component? |
|
Definition
|
|
Term
| What does the w following the c in "cWtxdysz" represent? |
|
Definition
|
|
Term
| What does the x following the t in "cwtXdysz" represent? |
|
Definition
|
|
Term
| What does the y following the d in "cwtxdYsz" represent? |
|
Definition
|
|
Term
| What does the z following the s in "cwtxdysZ" represent? |
|
Definition
|
|
Term
| What are the eight types of UNIX files? |
|
Definition
| Ordinary, directory, hard link, symbolic link, sockets, named pipes, character pipes, and block devices. |
|
|