Block 2 Flashcards

1
Q

Explain group policy

A

Defined as a group of user and computer configuration settings, which can be linked to a container in active directory, so that the settings are applied to the users and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the two types of settings defined by GPO’s

A

GPO‘s specify user settings and computer settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the primary GPO management tool

A

The group policy management console is the primary tool used to manage group policy. The GPMC is made up of two window panes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the tool used to edit GPO settings

A

Group policy management editor in the AOC is used to edit GPO settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify the GPO setting that allows blocking of specific location

A

Block policy inheritance, JPMC feature prevents users or computers from being affected by a GPO once inheritance for an OU is blocked any computer or user placed until the OU will be unaffected by group policy that would have otherwise been inherited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Arrange the order in which GPO‘s are processed

A

GPO process in the following order local policy, site policy, domain policy, OU policy, and sub – OU policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the setting state options available to configure GPO

A

The following setting state options are enabled, disabled, not configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify the utility used to verify a GPO has been applied

A

RSOP MMC snap-in is a utility used to test settings applied to computers or users using group policy. It verifies if GPO’s apply without error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe exchange server roles

A

Exchange supports three server roles. Client access, mailbox server, and edge transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain client access server functionality

A

Functionality, the client access server, authenticates users, locates mailboxes, and then proxies the users connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify components, hosted on a mailbox server

A

The mailbox server host mailbox in public folder, databases, and provides email storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe an exchange DAG

A

An exchange DAG is a set of up to 16 exchange mailbox servers that provides automatic, database – level recovery from a database, server, or network failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain why DAGs need a file share witness

A

If there is an even number of mailbox servers, a quorum will not exist. The DAG uses an external files share witness server to act as a tiebreaker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify the method used to access the exchange admin center

A

EAC is a web-based interface. Access is a via a web browser on an admin client using the following link https://<access1_2013-HST>/exp</access1_2013-HST>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the access granted by the organization management role group membership

A

Administrators who are members of the organization management role group have administrative access to the entire exchange organization and can perform almost any task against any exchange object, with some exceptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain data, loss prevention policies

A

Data loss presentation policies are packages of existing mail flow rules that contains specific conditions, actions, and exceptions that filter messages and attachments based on their content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe what the exchange management shell provides

A

Is built on windows, power shell technology, and provides a powerful commandline interface that enables the automation of exchange administration task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the purpose of the theater, battle management database administration segment

A

Provides tools to manage space in the AODB. The application that performs this space management operation is ABP purge. TBMDBA provides the capability to purge a given ABP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identify states required to purge in a BP from the air operations database

A

ABP are purged only when the ABP state is complete or local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe the purpose of the select statement

A

Used to retreat data from tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe the purpose of update statement

A

Used to change data values in one or more existing rows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe the purpose of where clause

A

Used to restrict data retrieval results from a query or to qualify where an action is to take place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe the purpose of the commit statement

A

To save the change to the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

State the purpose of the IRIS AMHS

A

The purpose of IRIS is to distribute and manage message traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Identify the IRIS app user accounts

A

Iris has two associated app user accounts, Iris admin and Iris user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Identify the iris client application

A

Iris uses Microsoft Outlook for its client which has been extended to accommodate iris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Identify the purpose of the iris servers service

A

To control the startup and shut down of all iris related services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Describe the iris import configuration tool

A

The majority of iris configuration occurs during initial installation, using the iris configuration tool, edit, and then import the configuration. The iris configuration tool is now the only method for configuration changes to the iris system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Recall Iris message to role relationship

A

Users must be assigned to Rose in order to access Iris messages

30
Q

Identify the user alerts generated by Iris

A

User alerts generated by iris, are intended to report failures to perform certain task

31
Q

Describe the purpose of the web logic server

A

The web logic server host, web-based applications and information services for TBMCS

32
Q

Describe the location of the locked user tool

A

D:\tbmcs\wlssvr\bin

33
Q

Describe the method used to administer the web logic server

A

HTTPS://webapsvr:8302/console.

34
Q

Explain the purpose of the web logic servers config.XML file

A

Web logic saves configuration to the config.XML file. This file serves as the startup configuration file that defines all the web logic applications, connection, pools, and data sources.

35
Q

Describe the purpose of CC Webb

A

Supports command and control operational functionality within a web-based incline environment. CAOC central includes custom data retrieval, aggregation, display, posting features, access to user developed files and information, and serves as a launched pad for TBMCS web-based application.

36
Q

Identify the primary areas of the CC Webb homepage

A

The homepage is divided into three primary areas, alarm status bar, pull down menus, and special interest items.

37
Q

Explain the purpose of ORDBEX

A

To provide a procedural method of transferring data between sites within in AODB

38
Q

Describe the primary functions of ORDBEX

A

ORDBEX has two primary functions data extraction and two data insertion

39
Q

Explained the purpose of the DMDSVC

A

DMDSVC is an automated hands off data transfer to used in TBMCS to automatically transfer updates of mission status and base and runway status from subordinate sites to the AOC and provide a generic file transfer service for the ORDBEX application

40
Q

Identify the application that utilizes the DMDSVC generic file transfer service

A

ORDBEX is the only application which uses the DMDSVC generic file transfer client

41
Q

Describe the purpose of JADOCS

A

JADOCS is joint mission management application used to gain dominant, situational awareness, and improve capabilities to plan, coordinate, and conduct fires and precision engagements against deep and time sensitive targets

42
Q

Identify the JADOCS servers share drive

A

J-Drive

43
Q

Explain the method used to configure JADOCS

A

The JADOCS configuration application is used to open the JADOCS.OCFG file for configuration

44
Q

Identify the variable, which must be configured for external JADOCS client connect connectivity

A

The station variable must be configured for external and internal client connectivity

45
Q

Describe the purpose of power shell

A

Shell is defined as a task automation solution made up of commandline shell and scripting language used for administrative purposes

46
Q

Explain the powershell command naming convention

A

Administrators can easily determine power shell cmdlets, purpose, because cmdlets are named, following an easy to understand name and convention of a verb followed by now

47
Q

Define cmdlet

A

Commands for power shell are referred to as CMDLETS in addition to CMDLETS power shell supports most legacy command lines commands.

48
Q

Explain the purpose of get command

A

Get command that returns all installed cmdlets

49
Q

Describe the purpose of the Get-PSDrive cmdlet

A

Returns all drives accessible as file systems

50
Q

Describe the purpose of the get-itemproperty cmdlet

A

Returns the properties of the specified items

51
Q

Describe the safety feature that controls the conditions under which powershell run scripts

A

Powershells execution policy is a safety feature that controls the conditions under which power shell loads, configuration files and run scripts

52
Q

Describe the basic unit of memory power shell uses to store values

A

Valuables store values that are used in power shell

53
Q

Identify the power shell command used to initiate a remote interactive session

A

Enter-PSSession starts an interactive session with a single remote computer

54
Q

Identify the command that returns information about windows server roles

A

Get-WindowsFeature returns a list of windows features and roles that are installed or available for installation on the server

55
Q

Describe a module

A

Hey module is a package that contains power shell cmdlets

56
Q

Identify the number of bits and octets in an IP address

A

IP addresses contain 32 bits structured into four sections called octets

57
Q

Identify the minimum and maximum value for an IP octet

A

The minimum possible value of an octet is zero in the maximum possible value is 255

58
Q

Explain the structure and function of IP classes

A

(Five classes A-E ) The value of the first octet determines the class. The system of IP address classes was developed for the purpose of IP address assignment based on number of networks and number of host

59
Q

Identify the number of host supported by a class C network

A

By default class C networks support no more than 254 host per network

60
Q

Explain the purpose of a subnet mask

A

The net together with the IP address defines the network to which the computer belongs

61
Q

Explain subnetting

A

A subnet is a logical subdivision of an IP network. The practice of breaking a larger network into smaller network is referred to as subnetting.

62
Q

State the definition of a network address

A

A network ID is an IP address in which all host bits are set to zero

63
Q

Explain the purpose of broadcast address

A

The broadcast address is used for addressing all the host on the network at the same time and is always the last address in the network

64
Q

Explain the purpose of a network switch

A

Local area network switch are key building blocks for any network. They connect multiple devices computers, servers, printers, etc.. on the same network.

65
Q

Explain the purpose of a router

A

A router connects LANS together and routes data based on their destination IP

66
Q

Explain the purpose of the ipconfig /all command

A

Displays the full TCP/IP configuration for all adapters on a windows based computer system

67
Q

Explain the purpose of nslookup

A

This command displays information that is used to diagnose DNS. Nslookup queries DNS to verify entries within DNS look up zones.

68
Q

Describe the communication backbone for the UCS flex pod

A

“Cisco UCS 6248 UP 48-port fabric interconnect” the one rack unit (IRU) is the backbone of the Cisco UCS, providing both network connectivity and management capabilities

69
Q

Identify the device that provides blade server connectivity

A

The fabric extenders ask as input/output modules for the chassis often referred to as IOMs in the Cisco documentation

70
Q

Identify the number of fabric extender to fabric interconnect links

A

Cabling consist of one, two, or four cables per side in both sides must match

71
Q

Describe the ports which handle traffic between the fabric interconnect and the blades

A

Server ports are physically cabled to the FEX in each server port usually handles traffic to/from at least two blades