Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Midterm

yeetis deletus

QuestionAnswer
Windows Deployment Services is a software platform and technology that allows you to preform which function? Automated network-based installations based on network-based boot and installation media
What role does pre-boot execution environment (PXE) play in WDS? It's used to boot to a WDS server to insall a pre-installation environment .
How do you mount a Windows image using dsim.exe so that you can update it? Offline
Windows PE 4.0 is based on which operating system? Windows 8
the initial configuration of WDS includes setup of what other server? DHCP
Where do you place a discover image to ensure proper deployment? On bootable media
Which of the following is the most efficient method of using WDS on a very large network? Unattended installation using PXE boot
Which of the following describes the WDS boot.wim image file? It loads Windows PE 4.0 on the client computer
What is the default port number for WSUS synchronization? 8530
WSUS allows you to automatically approve every update, but you shouldn't necessarily do that. What should you do before approving updates to be installed? Test the updates on your own systems before approving for rollout.
If Windows Update fails to retrieve updates, what should you check first? Internet Explorer proxy settings
Other than the default computer group, how many other groups may a computer be assigned to in WSUS? one
Which of the following best describes a critical update? It is high priority but not security related.
Which of the following is the best example of when you need to restart the Windows Update service? after you make a configuration change
Microsoft classifies its updates into general categories. What is the definition of important updates? They offer significant benefits, such as improved security, privacy, and reliability.
Microsoft classifies its updates into general categories. What is the definition of optional updates? They include updates, drivers, or new software from Microsoft to enhance your computing experience
When you set a service to start automatically with delayed start, how long is the delay? Two minutes
If you install SQL Server and a third-party backup service on the same system, what rule should you follow when creating service accounts? Use separate accounts for both services.
Microsoft's new Event Viewer allows you to collect events from remote computers and store them locally. By what name is this collection of events known? event subscription
The Reliability Monitor provides a range of numbers to help you evaluate the reliability of a computer. What is the name of this range of numbers? Stability Index
To examine performance correctly, you must establish a performance baseline. When do you perform this task? during normal usage
Task Manager is not a definitive performance tool because it gives you what kind of look at computer performance? quick glance
Which tool allows you to best monitor resource usage on a virtual machine host and its individual virtual machines? Hyper-V Resource Metering
When reading events in the Event Viewer, you need to recognize the designated levels or classifications. What is the definition for the Warning level? An issue has occurred that can impact service or result in a more serious problem if action is not taken.
When reading events in the Event Viewer, you need to recognize the designated levels or classifications. What is the definition for the Critical level? A failure has occurred from which the application or component that triggered the event cannot automatically recover.
What are DFS Namespace shared folders referred to in relation to the virtual folders? Targets
The default namespace mode is Windows Server 2008, which supports up to 50,000 folders. How many folders does using non-Windows Server 2008 provide? 5,000
DFS Replication does not replace the need for backups because of what feature of replication? It replicates deleted, changed, and corrupted files.
Which replication topology is more efficient than the default replication topology and allows you to set bandwidth, timing, and directionality to your configuration? hub/spoke
What type of resolution model does DFS Replication use to resolve simultaneous-write conflicts? last-writer wins
What type of special cache folder does each replication folder use to hold files ready to be replicated? staging folder
Which of the following is an advantage of disabling automatic auto-recovery for DFS databases when the DFSR service stops abnormally? You have the opportunity to fix any underlying problems and to back up the existing replicated folders before recovery begins
When DFS Replication and DFS Namespace are combined into a single service offering, the pair creates what type of file sharing service? fault tolerant
When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "First among targets of equal cost" option specify? Users should be referred to this target before other targets of equal cost (which usually means other targets in the same site).
When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "First among all targets" option specify? Users should always be referred to this target if the target is available.
What type of service is the Windows File Server Resource Manager? role
What technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers? File Screening
Some exemptions might be required for certain groups to store otherwise restricted file types. What type of exemption can you set up on folders? file screen exception
What FSRM feature can you use to show the state of file server volumes, quotas, and disallowed files? Storage Reports
When using File System Resource Manager which group must you be a member of to enable SMTP Administrators
You can generate several different reports from FSRM. One of them gives you a list of Least Recently Accessed Files. What would be the purpose of that report? To allow you to archive unused files
What is the purpose of setting soft quotes? To notify users that they have reached the quota limit
If you were asked to set up a shared file area for users that prevented them from saving video files or images of any kind, what would you set up on that shared folder? Active file screen with included and excluded file groups
You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren't allowed. What does a Least Recently Accessed Files storage report show? a list of files that have not been accessed for a specified number of days
You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren't allowed. What does a Quota Usage storage report show? a list of quotas that exceed a specified percentage of the storage limit
An encrypted file can be converted back to its original format by a process known as what? decryption
Public-key cryptography uses how many keys? two
What is one purpose of using hash function encryption? to store passwords in a non-readable format
EFS encryption is what type of feature that can be enabled or disabled at will, similar in effect to read-only, compression, or hidden? attribute
If you're a command-line user, what command will encrypt files and folders? cipher.exe
On what type of computer is BitLocker not commonly used? servers
Where is the most secure location to store secure key recovery information? in Active Directory
BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM only BitLocker mode with its correct description. The system stores the BitLocker volume encryption key on the TPM chip and accesses it automatically when the chip has determined that the boot environment is unmodified. This unlocks the protected volume and the computer continues to boot.
Authentication is used for what purpose? to verify a user's identity
Auditing is used for what purpose? recording user's actions
Why should you avoid using basic audit policy settings and advanced audit policy settings together? Audit policies might cause conflicts or erratic behavior
Where can you view audit events? in Security logs in Event Viewer
By using what type of policy can you track, limit, or deny a user's ability to use removable storage devices such as USB drives in Windows Server 2012? Removable Storage Access
When resetting audit settings back to basic mode, what file must you remove as part of the process? audit.csv
Why are success audits as important as failure audits? Successes allow you to track activity such as new account creation
The powerful auditpol.exe command-line utility is widely used in automated scripting solutions. Select the correct action for the auditpol.exe /remove /allusers command. Remove the per-user audit policy for all users
The powerful auditpol.exe command-line utility is widely used in automated scripting solutions. Select the correct action for the auditpol.exe /clear command. Delete the per-user audit policy for all users, reset or disable the system audit policy for all subcategories, and then set the audit policies settings to disable
The Domain Name System (DNS) works much like a phone book to associate URLs (names) with what kinds of numbers? IP addresses
What type of structure does DNS have? hierarchical distributed
Which of the following is an example of a second-level domain? blah.com
What is another term for DNS client? DNS Resolver
By using the Active Directory-integrated zone, DNS follows what kind of model? multi-master
What is one advantage of subdomains? They allow you to break up larger domains into smaller, more manageable ones
What is the first and most important step in installing and deploying DNS in your network? planning the infrastructure and service requirements
By default, zone transfers are disabled. You can choose one of three different zone transfer methods. Which of the following describes the Only to servers listed on the Name Servers tab method? restricts zone transfers to secondary DNS servers as defined with NS resource records
By default, zone transfers are disabled. You can choose one of three different zone transfer methods. Which of the following describes the Only to the following servers method? restricts zone transfers to those servers specified in the accompanied list
What is another designation for an Alias? canonical name or CNAME
If you have a server named server1.blah.com, want to use it as your web server, and have requests point to www.blah.com, what kind of DNS record would you create? a CNAME record
Which command do you use to verify local DNS settings? ipconfig /all
Which DNS record contains the serial number for the zone? SOA record
You can use the dnscmd command to create zones. What other tasks can you perform with it? delete resource records
Which one of the following is correct for querying a PTR record? nslookup 192.168.1.50
If you issue the command nslookup 192.168.1.50 and get no response, but then issue nslookup server1 and receive 192.168.1.50 as a response, what do you know is wrong? The PTR record doesn't exist.
DNS servers contain several different types of resource records with which you need to become familiar. Select the correct definition for Host (A and AAAA) records. maps a domain/host name to an IP address
DNS servers contain several different types of resource records with which you need to become familiar. Select the correct definition for Canonical Name (CNAME) records. identifies an alias for a host name
Created by: TheGoldenCPU
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards