Chapter 1 Flashcards

1
Q

A logical grouping of computers on a network that implement peer-to-peer networking

A

workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

peer-to-peer networking

A

peer-to-peer networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of proving your identity to a computer (often with a user name and password).

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A logical grouping of computers on a network that provides centralized management and single sign-on.

A

domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A server within a domain that authenticates other computers and provides for centralized management.

A

domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process whereby users authenticate once to a domain controller to prove their identity to other computers within the same domain.

A

single sign on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Microsoft components and software that are used to provide single sign-on and centralized management of computers on a network.

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A component of Active Directory that provides centralized management of Windows computers within a domain.

A

Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A component of Active Directory that provides centralized management of encryption certificates within a domain.

A

Active Directory Certificate Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Active Directory services provided by Microsoft’s Azure cloud.

A

Azure Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An optional component of Microsoft Defender that can be used to provide cloud-based inspection for malware and network traffic.

A

Advanced Threat Protection (ATP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The suite of cloud services that are provided by Microsoft.

A

Microsoft Azure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Hyper-V feature that allows virtual machine hard disk files to be encrypted.

A

shielded virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Web server software included in Windows Server.

A

Internet Information Services (IIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The traditional file system used on Windows Server systems.

A

New Technology File Systems (NTFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A new file system used on Windows Server systems that has additional reliability features and support for Storage Spaces.

A

Resilient File System (ReFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A filesystem feature that ensures that duplicate files are only stored once on the physical storage device.

A

data deduplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A filesystem feature that allows for quick file recovery following a power failure.

A

journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A Windows Server feature that allows you to create and manage volumes from multiple storage devices.

A

Storage Spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Windows Server feature that allows you to replicate data between different Windows Server systems.

A

Storage Replicas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A Windows Server feature that allows you to move data between servers and the cloud.

A

Storage Migration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A mode that is given the highest priority on a system.

A

privileged mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A process that is isolated from other processes on a system.

A

protected processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ability to run multiple processes simultaneously on a system.

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A type of multitasking in which each process is isolated from the other processes on the system.

A

preemptive multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A software-defined logical processor within a virtual machine.

A

virtual processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A process whereby several different servers can respond to client requests as a single entity.

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The process whereby a server within a cluster assumes the role of another server within the cluster that has failed.

A

failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A Windows Server feature that allows the combined storage within a cluster to be made available as a single volume to users on the network.

A

Storage Spaces Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A graphical management tool included within Windows Server.

A

Server Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A graphical management console that provides a series of snap-ins that can be used to manage components of Windows.

A

Microsoft Management Console (MMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

a command line interface

A

shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A set of specifications and frameworks that can be used to view and manage Windows operating system settings.

A

Windows Management Instrumentation (WMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A Web-based graphical management tool available for Windows Server.

A

Windows Admin Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A minimal operating system installation.

A

small footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The sum total of all avenues that attackers can potentially use to obtain access to a system.

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A small footprint Windows Server installation option that does not provide a graphical desktop.

A

Server Core

38
Q

A management tool included within Server Core that can be used to manage server settings.

A

Windows Server Configuration Wizard (sconfig.cmd)

39
Q

An optional package that can be installed on Server Core to provide additional frameworks required for certain applications.

A

Server Core App Compatibility Feature on Demand (FOD)

40
Q

A small footprint Windows Server installation option that provides a bare minimum set of services for running Web apps and a small number of server services.

A

Nano Server

41
Q

An environment that integrates services that run on-premises to services within the cloud.

A

hybrid cloud

42
Q

A service that allows you to integrate on-premises servers with servers and services hosted within Microsoft’s Azure cloud.

A

Windows Server Azure Network Adapter

43
Q

A feature that allows you to back up on-premises data to Microsoft’s Azure cloud.

A

Azure Backup

44
Q

A feature that allows you to provide services within Microsoft’s Azure cloud in the event of an on-premises server failure.

A

Azure Site Recovery

45
Q

A set of software components that can be used to centrally manage containers within a cloud or on-premises environment.

A

Kubernetes

46
Q

A component of Windows 10 and Windows Server 2019 that allows you to run Linux applications on the Windows kernel.

A

Windows Subsystem for Linux (WSL)

47
Q

A Windows feature that allows you to configure computers based on a template.

A

Desired State Configuration

48
Q

A feature that allows an operating system to store more frequently accessed data on faster storage devices within a volume that spans multiple storage devices.

A

storage tiers

49
Q

A feature that allows you to specify the physical location of different types of data within a volume that spans multiple storage devices

A

storage pinning

50
Q

A license for a network connection to a server.

A

Client Access License (CAL)

51
Q

A term that refers to the software components and frameworks that provides network functionality for virtual machines and containers.

A

Software Defined Networking (SDN)

52
Q

The process used to determine hardware and software requirements based on the current and future needs of users within an organization.

A

capacity planning

53
Q

A file that stores a virtual filesystem that can be written to a removable media device such as a DVD or USB flash drive

A

ISO image file

54
Q

A free software program that can be used to write the contents of an ISO image to a DVD.

55
Q

free software program that can be used to write the contents of an ISO image to a bootable USB flash drive.

56
Q

A network in which the computers are all in close physical proximity.
.

A

Local Area Networks (LANS)

57
Q

A set of rules of communication used between computers on a network.

58
Q

A package of data formatted by a network protocol.

59
Q

The most common network protocol used on the Internet. It provides for reliable communication.

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

60
Q

A less-reliable, but faster version of the TCP/IP protocol.

A

User Datagram Protocol/Internet Protocol (UDP/IP)

61
Q

A protocol used on the Internet to provide error messages and network-related information.

A

Internet Control Message Protocol (ICMP)

62
Q

A series of four 8-bit numbers that determine the network and host portions of an IP address

A

subnet mask

63
Q

The IP address of the router on the network used to send packets to remote networks

A

default gateway

64
Q

IP communication that is destined for a single computer.

65
Q

The portion of an IP address that denotes the network.

A

network ID

66
Q

The portion of an IP address that denotes the host.

67
Q

An IP address that refers to the local computer only

A

loopback IP adress

68
Q

The process by which binary bits are compared to calculate the network and host IDs from an IP address and subnet mask.

69
Q

A notation that is often used to represent an IP address and its subnet mask.

A

(CIDR) notation

70
Q

A TCP/IP communication destined for all computers on a network

71
Q

A unique 48-bit hexadecimal number that manufacturers add to each physical network interface they manufacture.

A

Media Access Control (MAC) address

72
Q

A term that refers to the worldwide collection of small Internet-connected devices.

A

Internet of Things (IOT)

73
Q

A protocol used to encapsulate IPv6 packets within an IPv4 network

74
Q

A network server that accepts Internet requests from other computers on the same LAN and obtains the desired resource on their behalf.

A

proxy servers

75
Q

A technology that allows a router to obtain Internet resources on behalf of computers on the network.

A

Network Address Translation (NAT)

76
Q

A protocol that is used to automatically obtain IP configuration from a server on the network.

A

Dynamic Host Configuration Protocol (DHCP)

77
Q

A legacy protocol that is used to automatically obtain IP configuration from a server on the network.

A

Boot Protocol (BOOTP)

78
Q

A hierarchical namespace used for host names.

A

Domain Named Space (DNS)

79
Q

A host name that follows the DNS naming convention

A

Fully Qualified Domain Names (FQDNs)

80
Q

A feature that automatically configures a network interface using an IPv4 address on the 169.254.0.0 network, or an IPv6 address on the FE80 network.

A

Automatic Private IP Addressing (APIPA)

81
Q

A protocol used by computers to obtain an IPv6 configuration from a router on the network.

A

Internet Control Message Protocol version 6 (ICMPv6)

82
Q

A network that uses network-based firewalls to protect access to the servers that are contained within.

A

perimeter network

83
Q

A network that uses network-based firewalls to protect access to the servers that are contained within.

A

demilitarized zone (DMZ)

84
Q

A name that you specify on a Windows computer that is used to generate the computer’s host name and NetBIOS name.

A

computer name

85
Q

A unique name for a Windows computer that is broadcast to other computers on the LAN.

A

NetBIOS name

86
Q

A feature on Windows Server that prevents the Internet Explorer Web browser from connecting to websites that are not within its trusted sites list.

A

Internet Explorer Enhanced Security Configuration (IE ESC)

87
Q

A service that runs on a Windows Server computer that allows for activation of other computers on an organization’s network.

A

Key Management Services (KMS)

88
Q

A role that can be installed on a domain controller to provide automatic activation for computers that are joined to the same Active Directory domain.

A

Active Directory-based Activation role

89
Q

A license key that is purchased for use within an organization and often embedded into the installation media.

A

Generic Volume License Key (GVLK)

90
Q

A license key that can be activated on the Internet for a set number of Windows computers.

A

Multiple Activation Key (MAK)