Term
| Routing and Remote Access Services (RRAS) |
|
Definition
| is a role service to configure and manage network routing in Windows Server 2008. |
|
|
Term
| Routing and Remote Access Services (RRAS) |
|
Definition
| provides Dynamic Host Configuration Protocol (DHCP) relay agent functionality for networks. |
|
|
Term
|
Definition
| are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| route traffic based on information they discover about remote networks from other routers. |
|
|
Term
|
Definition
| RIPv2 uses ____ in determining routes it can use for forwarding packets of data. |
|
|
Term
|
Definition
| A(n) ____ forwards DHCPDiscover messages for subnets that do not have a DHCP server and that are not connected to a router that supports passing DHCP broadcast messages. |
|
|
Term
|
Definition
| The ____ component of RRAS provides support for multicast network traffic by routing multicast traffice to networks that host these services. |
|
|
Term
| Routing and Remote Access Services (RRAS) |
|
Definition
| In situations where you do not have a RFC 1542-complaint router, you can create a DHCP relay agent using ____. |
|
|
Term
|
Definition
| ____ supports securing VPNs using 128-bit RC4 encryption. |
|
|
Term
| Layer 2 Tunneling Protocol (L2TP) |
|
Definition
| ____ works by encapsulating PPP frames before they are transmitted across a network. |
|
|
Term
| Secure Socket Tunneling Protocol (SSTP) |
|
Definition
| ____ uses PPP to encapsulate traffic for transmission across network using a secure socket layer (SSL). |
|
|
Term
|
Definition
| The ____ is a role service that provides you with a framework for creating and enforcing network access policies for client health, along with policies for authentication and authorization of connection requests. |
|
|
Term
|
Definition
| The _____ is the central utility for managing RADIUS clients and remote RADIUS servers, network health and access policies, NAP settings for NAP scenarios, and logging settings. |
|
|
Term
|
Definition
| _____ is an industry-standard protocol that provides centralized authentication, authorization, and accounting for network access devices such as wireless access points and remote access servers. |
|
|
Term
|
Definition
| A _____ is any device such as a remote access server, wireless access point or VPN concentrator, that accepts remote connections from remote access clients. |
|
|
Term
|
Definition
| A _____ is responsible for providing network access to remote access clients such as users needing VPN or dial-in network access. |
|
|
Term
|
Definition
| A(n)____ is a setting used to route RADIUS messages between the access client and the appropriate RADIUS server. |
|
|
Term
|
Definition
| ____ are used on networks to perform authentication, authorization, and accounting for RADIUS clients, or convey authentication requests to other centralized authenticating systems. |
|
|
Term
|
Definition
| A(n)____ is the database used by a RADIUS server to authenticate users. |
|
|
Term
|
Definition
| _____ is the first component of the RADIUS process in which the identity of a user connecting to a resource is verified. |
|
|
Term
|
Definition
| A(n)_____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port. |
|
|
Term
|
Definition
| Clients us a (n)____ to determine to what type of network they are connected. |
|
|
Term
|
Definition
| ____ uses a single key and is faster and more efficient than public key encryption, especially for very large files. |
|
|
Term
| New Technology File System (NTFS) |
|
Definition
| Along with providing file security through Access Control Lists,_____ allows users to perform file-based encryption through the Encrypting Files Service(EFS). |
|
|
Term
|
Definition
| With ____, each user has a public key that is available to everyone and a private key that is known only to the user. |
|
|
Term
|
Definition
| _____is a command-line utility that allows you to manage EFS through scripts or the command prompt. |
|
|
Term
|
Definition
| _____provides hard drive-based encryption of servers and Windows Vista computers. |
|
|
Term
| Trusted Protection Module |
|
Definition
| A_____is a microchip that performs basic security tasks with encryption keys. |
|
|
Term
|
Definition
| Using BitLocker with a TPM and a PIN or a USB flash drive is called _____. |
|
|
Term
|
Definition
| _____ attacks are performed by flooding a host or a network router with more traffic than it can handle. |
|
|
Term
|
Definition
| A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers. |
|
|
Term
|
Definition
| _____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong. |
|
|
Term
|
Definition
| _____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network. |
|
|
Term
|
Definition
| IPSec's _____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN) solutions for remote access. |
|
|
Term
|
Definition
| IPSec's ____ provides secure communications between two networks through a single node. |
|
|
Term
|
Definition
| For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions. |
|
|
Term
|
Definition
| The term _____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications. |
|
|
Term
| Encapsulating Security Payload |
|
Definition
| _____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303. |
|
|
Term
|
Definition
| _____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported. |
|
|
Term
| challenge-response protocol |
|
Definition
| All forms of NTLM use the _____. |
|
|
Term
|
Definition
| The _____ is responsible for managing the network health and connectivity policies on a network. |
|
|
Term
|
Definition
| _____ provides a command-line utility so that you can perform automated installations or removals of roles, role services, and features. |
|
|
Term
| Windows Server Update Services (WSUS) |
|
Definition
| _____ centralizes the updating tasks for client and server computers and allows you to relocate them from the WAN onto the local network. |
|
|
Term
| Windows Server Update Services (WSUS) |
|
Definition
| _____ provides a central administrative console for downloading the list of the latest updates from Microsoft Update servers, approving updates to be deployed to network clients, and viewing reports on the status of your network clients. |
|
|
Term
| WSUS Administrative console |
|
Definition
| The _____ allows you to generate reports, manage updates, and monitor the computer through the console. |
|
|
Term
| Microsoft Baseline Security Analyzer |
|
Definition
| _____ provides security recommendations from Microsoft and guidance for improving a computer's security posture. |
|
|
Term
| Reliability and Performance |
|
Definition
| The _____ console provides a suite of utilities for monitoring and capturing performance data for local and remote systems. |
|
|
Term
|
Definition
| _____ are central repositories for gathering information for Reliability and Performance Monitor. |
|
|
Term
|
Definition
| _____ data is collected from trace providers, which are components of the operating system or of individual applications that report actions or events. |
|
|
Term
|
Definition
| The _____ can display real-time or historical data of local or remote computers. |
|
|
Term
|
Definition
| New in Windows Server 2008, the _____ snap-in provides an overview of system stability by listing details about event that have affected reliability. |
|
|
Term
|
Definition
| The _____ acts as a central repository for gathering information for Reliability and Performance Monitor. |
|
|
Term
|
Definition
| The _____ organizes data collection points into a single component that you can use to review or log performance in many ways. |
|
|
Term
|
Definition
| _____ is a built-in utility for capturing and viewing network traffic as it arrives or leaves a server. |
|
|
Term
|
Definition
| _____ helps to determine whether traffic is reaching a destination and lets you view encrypted ESP packets to verify that IPSec policies are being properly applied. |
|
|
Term
|
Definition
| ______ displays a process name if one exists for traffic so that you can easily track data back to its source. |
|
|
Term
|
Definition
| _____ allows you to track disk usage by users and enforce disk space limits on disk volumes. |
|
|
Term
|
Definition
| The Volume Shadow Copy service (VSS) is a feature of Windows Server 2008 that allows you to set up manual or automatic backup copies, known as _____, of files or folders on a specific volume at a specific point in time. |
|
|
Term
|
Definition
| _____ provides backup and recovery of your files, folders, volumes, and application data on Windows Server 2008. |
|
|
Term
|
Definition
| _____ increases the amount of time necessary for performing your backup but does not affect the overall performance of your server or performance when restoring files. |
|
|
Term
|
Definition
| _____ backs up only the blocks that have changed since the last backup was performed. |
|
|
Term
|
Definition
| A(n)_____ is a process where a server can be restored to a clean machine(no installed) in a single step. |
|
|