Exam 4 chapter 12 Flashcards

1
Q

User accounts have two main functions

A

Provide a method for users to authenticate themselves to the network
Provide detailed information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

are used to organize users so that assignment of resource permissions and rights can be managed more easily than working with dozens or hundreds of individual user accounts

A

Group accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a large network, a scheme for naming user and group accounts as well as network devices is crucial. Consider the following:

A

Is there a minimum and maximum number of characters user account names should have?
Should the username be based on the user’s real name or if security is important, should names be more cryptic?
Some OSs distinguish between uppercase and lowercase letters. Should usernames contain both as well as special characters?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Considerations for password naming conventions:

A

Minimum length
Complexity requirements – use of uppercase and lowercase along with special characters
User or administrator created
Password change frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Group account names should reflect

A

the group membership or the resource to which the group is assigned permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When Windows is first installed, two users are created

A

Administrator and Guest (usually disabled)

The Administrator account has full access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows domain users are created in

A

Active Directory Users and Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can create folders for organizing users and groups (called

A

organization units or OUs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Group scope has three options:

A

Domain local, Global,Universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can be used to assign permissions to resources only in the domain in which the group is created

A

Domain local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The default option and contains users from the domain in which they are created but can be assigned permissions to resources in other domains

A

Global

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used in multidomain networks; users from any domain can be members and be assigned permission to resources in any domain

A

Universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Group type has two options:

A

Security (default)

Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Group scope has three options:

A

Domain local
Global
Universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a collection of user’s personal files and settings that define their working environment
Created when a user logs on for the first time

A

User profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user profile stored on the same system where the user logs on is called a

A

local profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

follows the user no matter which computer he or she logs on to

A

a roaming profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Stored on a network share
Any changes the user makes to the profile are replicated from the locally “cached copy” to the profile on the network share when the user logs off
Roaming profiles are rarely used in workgroup networks but is a feature Active Directory administrators use frequently

A

roaming profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

discard a user’s profile changes at log off so the profile is always the same

A

Mandatory profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

User and group accounts in Linux are used for the same purpose as Windows:

A

User authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Linux also has a default user who has full control over the system – named

A

root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Use the command to create groups

A

groupadd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network administrators need to

A

Make sure enough storage space is available to store files needed
Manage who has access to file storage
Prevent users from storing inappropriate types of data on company servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a device, such as a hard disk, that is connected to a storage controller on the server

A

Locally attached storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is part or all of the space on one or more disks that contains (or is ready to contain) a file system
In Windows, volumes are assigned a drive letter

A

A volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is sometimes used interchangeably with volume but don’t always describe the same thing
In Windows, a basic disk can be divided into one to four partitions

A

partion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

can be formatted with a file system and assigned a drive letter (considered a volume)

A

primary partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is divided into one or more logical drives that can be formatted and assigned a drive letter (considered a volume)

A

Extended partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Only a primary partition can be the

A

active partition (partition that can hold boot files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The active primary partition storing the Windows boot loader is referred to as the

A

system partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The partition or logical drive holding the Windows OS files is called the

A

boot partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

can be divided into one or more volumes; the term partition is not used in this context
Linux systems refer to disks by using their device driver name plus a letter, starting with “a”
Example: /dev/sda

A

dynamic disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The File Allocation Table (FAT) file system has two variations:

A

FAT16 is usually referred to as FAT and has been around since the mid-1980s
Supported by most OSs
FAT32 was released with Windows 95 OSR2 in 1996

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

is limited to 2 GB partitions in most cases

A

FAT16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

allows partitions up to 2 TB but in Windows 2000 and later, Microsoft limits them to 32 GB because the file system becomes noticeable slower with larger partition sizes

A

FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

limit amount of data users’ files can occupy

A

Disk quotas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

No need for a drive letter to access

A

Volume mount points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

allows users to restore older file versions or files that were accidentally deleted

A

Shadow copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

files can be compressed

A

File compression

40
Q

makes encrypted files

A

Encrypting File System

41
Q

Two modes for accessing files on a networked computer:

A

Network (sometimes called remote)

Interactive (sometimes called local)

42
Q

Whether file access is attempted interactively or remotely through a share

A

NTFS permissions always apply

43
Q

NTFS standard permissions for folders and files:

A
Read
Read & execute
List folder contents
Write
Modify
Full control
44
Q

Linux supports many files systems

A

Ext3, Ext4, ReiserFS, and XFS

Ext3 and Ext4 are the default file system for most Linux distributions

45
Q

There are only three permissions

A

read, write, and execute

46
Q

There are only three user types that can be assigned one or more permissions:

A

owner – owner of the file or folder
group – The primary group to which the owner belongs
other – All other users

47
Q

The dominant file-sharing protocol is

A

Server Message Block (SMB)

48
Q

The native Windows file-sharing protocol but is supported by Linux and MAC OS

A

SMB

49
Q

is the native Linux file-sharing protocol and Windows can support NFS with the right software installed

A

Network File System (NFS)

50
Q

Printer sharing also uses SMB

A

The native Linux printer-sharing protocol is line printer daemon/line printer remote (LPD/LPR)

51
Q

Share permissions are somewhat simpler than NTFS permissions with only 3 options:

A

Read
Change
Full Control

52
Q

To most advanced method for creating shares

A

File and Storage Services

53
Q

a compone

A

Shared Folder snap-in

54
Q

print device

A

Two basic types of print device:
Local print device: Connected to an I/O port on a computer
Network print device: A printer attached to and shared by another computer

55
Q

The icon in the Printers folder that represents print devices

A

printer

56
Q

A Windows computer sharing a printer

A

print server

57
Q

Storage for print jobs awaiting printing

A

print queue

58
Q

Benefits of using a shared printer:

A
Access control
Printer pooling 
Printer priority
Print job management
Availability control
59
Q

Windows Server includes tools to manage and monitor server operation and resources:

A

Task Manager
Event Viewer
Performance Monitor

60
Q

event viewer

A

Allows administrators to view event log entries

61
Q

Allows administrators to view event log entries, categorized by these levels:

A

Information,Warning,Error

62
Q

indicate normal operations, such as service stops and starts

A

information

63
Q

Provide information about events that should be brought to the administrator’s attention

A

Warning

64
Q

often generated when a process or service is unable to perform a task or stops unexpectedly

A

Error

65
Q

contains the Performance Monitor tool

A

Monitoring tools

66
Q

contains user- and system-defined templates with sets of data points called data collectors

A

Data collector sets

67
Q

contains system- and user-defined performance and diagnostic reports

A

Reports

68
Q

uses counters to track the performance of a variety of objects
A counter is a value representing some aspect of an object’s performance

A

perfomance monitor

69
Q

In order to track an object’s performance you need to create a

A

baseline

70
Q

is a record of performance data gathered when a system is performing well under normal operating conditions

A

performance baseline

71
Q

To create a baseline of performance data, you create a

A

data collector set that specifies the performance counters you want to collect, how often to collect them, and the time period

72
Q

Factors that can cause poor performance:

A

Poor or inadequate network design
Poor network traffic management
Network errors
Denial-of-service attacks

73
Q

Network performance monitoring:

A
Simple Network Management Protocol (SNMP)
Remote Monitoring (RMON)
74
Q

To use SNMP:

A

SNMP software agents are loaded on network devices you want to manage and monitor
Agents monitor network traffic and device status
Stores information in a management information base (MIB)
Management station communicates with software agents and collects data stored in the MIBs
You can set thresholds for sending alert messages to administrators when thresholds are exceeded

75
Q

is an advanced network-monitoring protocol

A

RMON

76
Q

Extends SNMP’s capabilities

Comes in two versions:

A

RMON

77
Q

defines “RMON groups” to collect data and communicate with a management station and captures statistics at the Data Link and Physical layers

A

RMON1

78
Q

can collect and analyze traffic at the Network and higher layers

A

RMON2

79
Q

a copy of an entire disk is created that can be restored without reinstalling the OS

A

image backup

80
Q

can’t restore separate files

A

so ___ backups are usually done along with traditional file backup

81
Q

provides methods for a system to continue running after a system failure has occurred

A

fault tolerance

82
Q

Windows Server Backup comes with Windows Server 2016 and has the following features:

A

Backups can be run manually or scheduled to run automatically
You can create a system recovery backup that automatically includes all volumes containing critical system data
Manual backups can be stored on network drives, fixed and removable basic disk volumes and CD or DVD

83
Q

Backups can be stored on

A

a hard disk dedicated for backups, a non-dedicated volume, or a shared network folder

84
Q

Volume Shadow Copy Service (VSS)

A

backup, which means even open files can be backed up

85
Q

Windows Server Backup is configured but you can also back up files remotely

A

to back up the local computer,

86
Q

offers advanced disaster recovery solutions

A

An enterprise-class backup program, such as Symantec NetBackup and CommVault Galaxy Backup and Recovery,

87
Q

Three forms of fault tolerance that are common on networks and servers:

A

Redundant power supply and uninterruptible power supply
Redundant disk systems
Server clustering

88
Q

is a second power supply unit in the computer case, so if one power supply fails, the other unit takes on the full load

A

A redundant power supply

89
Q

is a device with a built-in battery, power conditioning, and surge protection

A

An uninterruptible power supply (UPS)

90
Q

cleans” the power, removing noise caused by other devices on the circuit

A

Power conditioning

91
Q

protects the computer from voltage spikes or surges

A

Surge protection

92
Q

requires two disks

A

Disk striping with parity

93
Q

When data is written to one disk, it’s also written to the second disk
If either disk fails, the system can continue operating because both disks have the same data

A

Disk Mirroring(RAID 1)

94
Q

requires minimum of three disks but is more space efficient than RAID 1

A

Disk Striping with Parity (RAID 5)

95
Q

Works by spreading data across multiple disks and using one disk in each write operation to store parity information
Parity info is generated by a calculation on data being written, so if one of the disks fails, it can be used to re-create lost data from the failed disk

A

Raid 5

96
Q

is made up of two or more servers that are interconnected and appear as a single unit
Two common types of clustering:

A

Server cluster

97
Q

A failover cluster involves two or more servers sharing a high-speed link used to synchronize data One server is the primary and others are standby. In the event the primary fails, a standby server takes its place
A load-balancing cluster consists of two or more servers that appear as a single unit to users. All servers in the cluster operate and share the load

A

Server cluster