Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CIT233 Win Server Ent Services - Terms Chapters 3 - 5

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
Delegation Signer (DS)   A DNSSEC record that holds the name of a delegated zone and is used to verify delegated child zones. See also Domain Name System Security (DNSSEC).  
🗑
DHCP failover   A new feature in Windows Server 2012 that allows two DHCP servers to share the pool of addresses in a scope, giving both servers access to all addresses in the pool.  
🗑
DHCP name protection   A feature in DHCP that prevents name squatting by non-Windows computers by using a DHCP resource record called Dynamic Host Configuration Identifier (DHCID). See also name squatting.  
🗑
DHCP Unique Identifier (DUID)   A hexadecimal number, usually derived from the MAC address of the network interface used by DHCPv6 to identify clients for address leases and to create reservations.  
🗑
DNS cache locking   A DNS security feature that allows you to control whether data in the DNS cache can be overwritten.  
🗑
DNS cache poisoning   An attack on DNS servers in which false data is introduced into the DNS server cache, causing the server to return incorrect IP addresses.  
🗑
DNS socket pool   A pool of port numbers used by a DNS server for DNS queries to protect against DNS cache poisoning. See also DNS cache poisoning.  
🗑
DNSKEY   The public key for the zone that DNS resolvers use to verify the digital signature contained in Resource Record Signature (RRSIG)  
🗑
Domain Name System Security Extension (DNSSEC)   A suite of features and protocols for validating DNS server responses.  
🗑
Dynamic Host Configuration Protocol (DHCP)   A component of the TCP/IP protocol suite used to assign an IP address to a host automatically from a defined pool of addresses.  
🗑
GlobalNames zone (GNZ)   A DNS feature that gives IT administrators a way to add single-label names to DNS, thereby allowing client computers to resolve these names without including a DNS suffix in the query.  
🗑
hot standby mode   A DHCP failover mode in which one server is assigned as the active server to provide DHCP services to clients, and the other server is placed in standby mode. See also DHCP failover.  
🗑
iterative query   A DNS query in which the server responds with the best information it currently has in its local database to satisfy the query.  
🗑
key-signing key (KSK)   A DNSSEC key that has a private and public key associated with it. The private key is used to sign all DNSKEY records, and the public key is used as a trust anchor for validating DNS responses. See also Domain Name System Security Extension (DNSSEC).  
🗑
load balancing mode   The default DHCP failover mode in which both DHCP servers participate in address leasing at the same time from a shared pool of addresses. See also DHCP failover.  
🗑
multicast scope   A type of DHCP scope that allows assigning multicast addresses dynamically to multicast servers and clients by using Multicast Address Dynamic Client Allocation Protocol (MADCAP).  
🗑
name squatting   A DNS problem that occurs when a non-Windows computer registers its name with a DNS server, but the name has already been registered by a Windows computer.  
🗑
netmask ordering   A DNS feature that causes the DNS server to order the list of addresses so that the ones with a closer address match to the client making the query are returned at the top of the list.  
🗑
Next Secure (NSEC)   A DNSSEC record that is returned when the requested resource record does not exist. See also Domain Name System Security Extension (DNSSEC).  
🗑
Next Secure 3 (NSEC3)   An alternative to NSEC records. They can prevent zone-walking, which is a technique of repeating NSEC queries to get all the names in a zone. See also Next Secure (NSEC).  
🗑
Next Secure 3 (NSEC3)   Parameter DNSSEC records used to determine which NSEC3 records should be included in responses to queries for nonexistent records. See also Next Secure 3 (NSEC3).  
🗑
preference   A value used to indicate priority when there are multiple DHCPv6 servers.  
🗑
prefix   The part of the IPv6 address that’s the network identifier.  
🗑
recursive query   A DNS query in which the server is instructed to process the query until it responds with an address that satisfies the query or with an “I don’t know” message.  
🗑
Resource Record Signature (RRSIG)   A key containing the signature for a single resource record, such as an A or MX record.  
🗑
scope   A pool of IP addresses and other IP configuration parameters that a DHCP server uses to lease addresses to DHCP clients.  
🗑
split scope   A fault-tolerant DHCP configuration in which two DHCP servers share the same scope information, allowing both servers to offer DHCP services to clients.  
🗑
stateful autoconfiguration   A method of IPv6 autoconfiguration in which the node uses an autoconfiguration protocol, such as DHCPv6, to obtain its IPv6 address and other configuration information.  
🗑
stateless autoconfiguration   A method of IPv6 autoconfiguration in which the node listens for router advertisement messages from a local router.  
🗑
superscope   A special type of scope consisting of one or more member scopes that allows a DHCP server to service multiple IPv4 subnets on a single physical network.  
🗑
trust anchor   In public key cryptography, it’s usually the DNSKEY record for a zone.  
🗑
zone level statistics   A new feature in Windows Server 2012 R2 that provides detailed statistics for each zone to show how a DNS server is used.  
🗑
zone signing   A DNSSEC feature that uses digital signatures contained in DNSSEC-related resource records to verify DNS responses. See also Domain Name System Security Extension (DNSSEC).  
🗑
zone-signing key (ZSK)   A public and private key combination stored in a certificate used to sign the zone.  
🗑
block-level storage   Storage seen by the storage client as a local drive.  
🗑
BranchCache   A file-sharing technology that allows computers at a branch office to cache files retrieved from a central server across a WAN link.  
🗑
classification property   A file attribute containing a value that’s used to categorize the data in a file or an aspect of the file, such as its location or creation time.  
🗑
content information   A message transferred from a BranchCache server to a client that indicates to the client where the file can be retrieved from the cache in the branch office. See also BranchCache.  
🗑
distributed cache mode   A BranchCache mode of operation in which cached data is distributed among client computers in the branch office. See also BranchCache.  
🗑
feature file store   A network share containing the files required to install roles, role services, and features on Windows Server 2012/R2 servers.  
🗑
Features on Demand   A feature in Windows Server 2012/R2 that enables you to remove Unneeded installation files and free up the disk space they normally consume.  
🗑
File Classification Infrastructure (FCI)   A feature of File Server Resource Manager that allows classifying files by assigning new properties to them. The properties can then be used to create rules for searching or perform tasks on files meeting the criteria of the assigned properties.  
🗑
file-level storage   Storage that the client has access to only as files and folders.  
🗑
global object access auditing policy   A group policy setting that affects the auditing status of an entire file system or Registry on computers in the scope of the GPO where the policy is defined.  
🗑
hosted cache mode   A BranchCache mode of operation in which cached data is stored on one or more file servers in the branch office. See also BranchCache.  
🗑
Internet Storage Name Service (iSNS)   An IP-based protocol used to communicate between iSNS clients and servers for the purpose of allowing iSCSI devices to discover and monitor one another.  
🗑
iSCSI initiator   An iSCSI client that sends iSCSI commands to an iSCSI target. See also iSCSI target.  
🗑
iSCSI logical unit number (LUN)   A reference ID to a logical drive the iSCSI initiator uses when accessing storage on the iSCSI target server.  
🗑
iSCSI qualified name (IQN)   An identifier for iSCSI targets and initiators used to identify the iSCSI device in an iSCSI connection.  
🗑
iSCSI target   A logical storage space made available to iSCSI clients by a server running the iSCSI Target Server role service.  
🗑
Network File System (NFS)   A file-sharing protocol that allows users to access files and folders on other computers across a network; it’s the native file-sharing protocol of Linux and UNIX systems.  
🗑
NFS data store   An NFS share on a Windows failover cluster that provides a highly available storage solution for applications using NFS. See also Network File System (NFS).  
🗑
storage area network (SAN)   A storage system that uses high-speed networking technologies to give servers fast access to large amounts of shared disk storage.  
🗑
system access control list (SACL)   An attribute of a file system object that defines whether and how a file system object is to be audited.  
🗑
thin provisioning   The use of dynamically expanding virtual disks so that they occupy only the amount of space on the physical disk that’s currently in use on the virtual disk.  
🗑
tiered storage   A feature of Storage Spaces that combines the speed of solid state drives with the low cost and high capacity of hard disk drives.  
🗑
trim   A feature that allows a thinly provisioned disk to shrink automatically when data has been deleted from the disk. See also thin provisioning.  
🗑
access-denied assistance   A feature in Windows Server 2012/R2 that gives file users, file owners, and administrators methods to remediate access-denied messages when users requesting shared files should be allowed access.  
🗑
central access policies   A component of DAC consisting of one or more central access rules; used to target resources on servers and set DAC permissions with group policies. See also Dynamic Access Control (DAC).  
🗑
central access rules   A DAC component for setting permissions on targeted resources; deployed through central access policies. See also Dynamic Access Control (DAC).  
🗑
centralized topology   An IPAM deployment option that has a single IPAM server for the entire enterprise. See also IP Address Management (IPAM).  
🗑
claim   An assertion an entity (user or computer)  
🗑
distributed topology   An IPAM deployment option that places an IPAM server at every site in a network. See also IP Address Management (IPAM).  
🗑
Dynamic Access Control (DAC)   A feature in Windows Server 2012/R2 that gives administrators another method for securing access to files that’s more powerful than file and folder permissions based on group memberships.  
🗑
Group Policy provisioning   A method of provisioning IPAM that uses the Group Policy tool to perform tasks such as creating security groups, setting firewall rules, and creating shares for each IPAM-managed server. See also IP Address Management (IPAM).  
🗑
hybrid topology   An IPAM deployment option that has a single IPAM server collecting information from all managed servers in the enterprise and IPAM servers at key branch locations. See also IP Address Management (IPAM).  
🗑
IP address block   The largest unit for referring to an IP address space; consists of a contiguous range of IP addresses with a corresponding subnet mask.  
🗑
IP Address Management (IPAM)   A new feature in Windows Server 2012 that enables an administrator to manage the IP address space with monitoring, auditing, and reporting functions to help manage DHCP and DNS.  
🗑
IP address range   A pool of continuous addresses in an IP address block; usually corresponds to a DHCP scope.  
🗑
IP address range group   One or more IP address ranges that are logically grouped by some criteria.  
🗑
IPAM client   A Windows computer with the IPAM management console installed; typically used for remote management. See also IP Address Management (IPAM).  
🗑
IPAM server   A Windows Server 2012/R2 member server with the IPAM Server feature installed. See also IP Address Management (IPAM).  
🗑
managed server   An IPAM component that’s a Windows server running one or more of these Microsoft services: DHCP, DNS, Active Directory, and NPS. See also IP Address Management (IPAM).  
🗑
manual provisioning   A method of provisioning IPAM that requires configuring each IPAM server task and managed server manually. See also IP Address Management (IPAM).  
🗑
resource property   An attribute that can be applied to a resource, such as a file or folder, and is used to classify resources.  
🗑
resource property list   A DAC component of containing a list of resource properties that are downloaded by servers.  
🗑
unmapped address space   An IP address or address range that hasn’t been assigned to an IP address block.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Leisac
Popular Computers sets