Term
| What two basic types of computers can be on an enterprise network? |
|
Definition
|
|
Term
| This creates a single sign on environment by implementing trust relationships that enable users on one network to access applications on other networks without providing a secondary set of logon credentials. |
|
Definition
| Active Directory Federation Services (ADFS) |
|
|
Term
| Distributed File System consists of what 2 role services? |
|
Definition
DFS Namespace DFS Replication |
|
|
Term
| Enables admins to create a virtual directory tree consisting of folders stored on different servers |
|
Definition
| DFS Namespace role service |
|
|
Term
| Maintains duplicate copies of the DFS Namespace in remote locations |
|
Definition
| DFS Replication role service |
|
|
Term
| This enables admins to create and enforce storage quotas, specify file types that are permitted on network volumes, and generate storage reports. |
|
Definition
| File Server Resource Manager (FSRM) |
|
|
Term
| This allows a UNIX clients to access files stored on a Windows Server by implementing NSF on a windows server 2008 computer. |
|
Definition
| Services for Network File System |
|
|
Term
| This is not separate product but is an installation option included with the Windows Server 2008 Standard, Enterprise, and Datacenter editions. |
|
Definition
|
|
Term
| Windows NT Server first appeared with gripes about the GUI wasting the systems resources and eventually led to... |
|
Definition
| Server displays being character based and based on remote admin tools like telnet and ultimately led to the development of Server Core, which is a bare bones installation with roles and services that can be added |
|
|
Term
| What two images does Windows Deployment Services require to perform remote client installations? |
|
Definition
Install Image and Boot image The boot image is boot.wim and located in the \sources folder which loads windows PE 2.1 on the client computer. |
|
|
Term
|
Definition
-Enables the web server to forward incoming requests for a specific URL to another URL (when a site changes domain names) -Useful when you move a web site to a new domain due to product name change, merger etc. to forward user traffic to a new URL |
|
|
Term
| CGI (Common Gateway Interface) |
|
Definition
| Provides a scripting interface that enables a web server to pass incoming information to another program |
|
|
Term
| (WPAS) Windows Process Activation Service |
|
Definition
| The component that manages the request pipeline, the servers application pools and worker processes running them |
|
|
Term
| An alias that points to a folder in another physical location, aka a shortcut that enables you to publish content found on different drives or different computers without copying or moving it. |
|
Definition
|
|
Term
| What are the 3 HTTP Binding options for IIS7? |
|
Definition
Ip address Port number (80) Host Header |
|
|
Term
|
Definition
| the binding for each site determines how the listener will identify its requests |
|
|
Term
| To use this, you must install it in a Windows Server 2008 computer that is already running the Web Server (IIS) Role |
|
Definition
|
|
Term
| You must configure a DNS server to perform _______________ by creating a ______________ and creating a ________ record for the addresses you want the server to resolve. |
|
Definition
Reverse name resolution reverse look up zone PTR (pointer) |
|
|
Term
| Only ___________ _______________ is integrated into an IIS7 installation by default. All of the other authentication methods require the selection of additional role services. |
|
Definition
|
|
Term
| What are the 2 authentication protocols supported by IIS7 Windows authentication module? |
|
Definition
|
|
Term
|
Definition
| A challenge/response authentication protocol used by windows computers that are NOT members of an Active Directory domain. |
|
|
Term
|
Definition
| A ticket based authentication protocol used by Windows computers that ARE members of an Active Directory domain. |
|
|
Term
| Participants are issued two keys, one public and one private. The private key is kept a secret, while the public key is freely available in the digital certificate. Data on the private key can only be decrypted using the public key and vice versa. Any data that the client encrypts using the severs public key can only be decrypted and read by the server. What is this called? |
|
Definition
| Public Key Infrastructure |
|
|
Term
| NTFS permissions are realized as access control lists (ACL's). Which consist of two basic types of access control entries (ACES's). What are the two ACE's? |
|
Definition
|
|
Term
| Web Applications use a three-tiered architecture. What are the tiers? |
|
Definition
Client Web Server Database Server |
|
|
Term
| A protocol that enables a web server to run an application specified in a client request and pass the request to that application for processing. (like a trigger) |
|
Definition
| Common Gateway Interface (CGI) |
|
|
Term
|
Definition
| Simple Mail Transfer Protocol- Standard email protocol for the internet. |
|
|
Term
| As you increase the quality and/or ___________ of a video image you also increase the amount of ___________ the stream consumes. |
|
Definition
|
|
Term
| Differences between downloading and Streaming |
|
Definition
Downloading is where the content cannot be played until the downloaded file is complete. Streaming is where the multimedia content can begin playing soon after the file starts streaming |
|
|
Term
|
Definition
Streaming begins when the user requests it Typically used for pre-recorded content |
|
|
Term
|
Definition
Streaming begins at a pre-arranged time Typically used for live content |
|
|
Term
| This is NOT a role and has its own installation program and requires you to install its dependent features manually. |
|
Definition
|
|