Lesson 7: Popular Windows Network Services and Applications Flashcards
- What type of server serves HTML files to clients?
a) web server
b) FTP server
c) SMB server
d) application server
Answer: a) web server
Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: The World Wide Web is a system of interlinked hypertext documents known as web pages that can be viewed with a web browser such as Internet Explorer. Those pages are provided by a web server.
- By default, what port does a web server use?
a) 80
b) 8080
c) 489
d) 21
Answer: a) 80
Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: When you view web pages, you are connecting to the web server using TCP port 80.
- By default, what port does a web server use when using SSL?
a) 80
b) 8080
c) 443
d) 21
Answer: c) 443
Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: Because personal information such as credit-card numbers can be sent over the Internet, a supplemental protocol was developed called Secure Sockets Layer (SSL). This protocol uses TCP port 443, which uses a digital certificate to encrypt the packet so that it cannot be read by anyone else except the source and target. When you use SSL, the browser URL starts with https (for example, https://www.acme.com).
- What protocol is used to send mail between servers?
a) FTP
b) SMTP
c) SNMP
d) HTTP
Answer: b) SMTP
Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: For emails to travel over the Internet, email servers (or any server or client that sends email directly out) use the Simple Mail Transfer Protocol (SMTP) as an outgoing mail transport.
- By default, what port does SMTP use?
a) 80
b) 23
c) 25
d) 21
Answer: c) 25
Difficulty: Medium
Section Reference: Introducing the Web Server
Explanation: SMTP uses TCP port 25.
???Author: FYI: I shortened this explanation so that it doesn’t repeat the preceding explanation. smdOk
- What Microsoft web server is included with Windows servers?
a) Internet Information Services
b) Web Manager
c) Web Provider
d) Internet Security and Acceleration
Answer: a) Internet Information Services
Difficulty: Easy
Section Reference: Managing Websites with IIS
Explanation: Microsoft’s web server/application server is Internet Information Services (IIS). Windows Server 2008 R2 includes IIS 7.5, Windows Server 2008 includes IIS 7.0, and Windows Server 2003 includes IIS 6.0. IIS 7.0 and 7.5 support FTP, FTPS, SMTP, and HTTP/HTTPS, whereas IIS 6.0 supports FTP, SMTP, and HTTP/HTTPS.
- When IIS is running multiple websites, what do you use to isolate one site from another website?
a) applications
b) application pools
c) sites
d) virtual directories
Answer: b) application pools
Difficulty: Hard
Section Reference: Exploring Applications and Application Pools
Explanation: An application pool is a set of resources (a worker process or a set of worker processes) used by a website or application that defines the memory boundaries for the site. Forcing each application to have its own application pool ensures that one site does not interfere with another site on the same server, which ensures application performance and improved application availability. Therefore, if one application has a memory leak or crashes, it will not affect the other sites.
- Which type of IIS authentication does not provide a username and password?
a) anonymous
b) ASP.NET Impersonation
c) Basic Authentication
d) Windows Authentication
Answer: a) anonymous
Difficulty: Easy
Section Reference: Using IIS Security
Explanation: Authentication is used to confirm the identity of clients who request access to your sites and applications. Anonymous authentication allows access without providing a username and password.
- Which type of IIS authentication sends the username and password in clear text?
a) anonymous
b) ASP.NET Impersonation
c) Basic Authentication
d) Windows Authentication
Answer: c) Basic Authentication
Difficulty: Easy
Section Reference: Using IIS Security
Explanation: Basic Authentication requires that users provide a valid username and password to gain access to content. Because basic authentication transmits passwords across the network in clear text, you should use it with a digital certificate to encrypt usernames and passwords being sent over the network.
- What is used to store and distribute a public key?
a) digital certificate
b) digital signature
c) digital lock
d) digital envelope
Answer: a) digital certificate
Difficulty: Easy
Section Reference: Exploring Secure Sockets Layer and Digital Certificates
Explanation: When you use SSL to encrypt web traffic, you are using asymmetric encryption, which involves a private key and a public key. The public key is provided to anyone who wants to access the web server, and the private key is kept secret, usually by the web server that you are trying to protect. A common method to distribute a public key is to use a digital certificate.
- What protocol is used to transfer files to or from a server?
a) FTP
b) SNMP
c) VPN
d) SMTP
Answer: a) FTP
Difficulty: Easy
Section Reference: Managing FTP with IIS
Explanation: File Transfer Protocol (FTP) is used to transfer files to or from a server. Most FTP sites are used primarily to download files. In most of these situations, FTP uses anonymous authentication, in which username and password are not required.
- What technology is used to link two computers or sites over the Internet while providing a secure connection?
a) FTP
b) SMTP
c) VPN
d) telnet
Answer: c) VPN
Difficulty: Easy
Section Reference: Understanding Remote Access
Explanation: Virtual private networks (VPNs) link two computers through a wide-area network such as the Internet. To keep the connection secure, the data sent between the two computers is encapsulated and encrypted.
- What does L2TP use to encrypt data?
a) IPSec
b) PPTP
c) MPPE
d) SSTP
Answer: a) IPSec
Difficulty: Easy
Section Reference: Understanding Remote Access
Explanation: Layer 2 Tunneling Protocol (L2TP) is used with IPSec to provide security. L2TP is the industry standard when setting up secure tunnels.
- Which form of authentication sends username and password in clear text?
a) PAP
b) CHAP
c) MS-CHAP
d) EAP
Answer: a) PAP
Difficulty: Medium
Section Reference: Understanding Remote Access
Explanation: Password Authentication Protocol (PAP) uses plain text (unencrypted passwords). PAP is the least secure authentication and is not recommended.
- What popular application is used to access a Windows server remotely?
a) remote assistance
b) remote desktop
c) TELNET
d) SSH
Answer: b) remote desktop
Difficulty: Easy
Section Reference: Understanding Remote Access
Explanation: With early networks, users utilized dumb terminals (systems consisting of a monitor and keyboard without a processor) to connect to a mainframe. Later, computers could use TELNET to connect to a server and execute commands at a command prompt. Remote Desktop Services, formerly known as Terminal Services, is one component of Microsoft Windows that allows users to access applications and data on remote computers over a network.
- What is Microsoft’s virtualization server called?
a) RRAS
b) VPN
c) Telnet
d) Hyper-V
Answer: d) Hyper-V
Difficulty: Easy
Section Reference: Understanding Server Virtualization
Explanation: Virtualization has become quite popular during the last few years. By using virtual machine technology, you can run multiple operating systems concurrently on a single machine, which allows separation of services while keeping costs to a minimum. It can also be used to create Windows test systems in a safe, self-contained environment. Microsoft Hyper-V is a hypervisor-based virtualization system for 64-bit computers starting with Windows Server 2008.
Fill in the Blank
17. A ___________ is a process in which you convert a physical computer to a virtual machine.
Answer: physical-to-virtual (P2V) conversion
Difficulty: Medium
Section Reference: Creating Virtual Machines
Explanation: In many organizations, you may want to consolidate several physical servers to one machine running multiple virtual servers. Microsoft System Center Virtual Machine Manager (VMM) allows you to convert existing physical computers into virtual machines through a process known as physical-to-virtual (P2V) conversion. VMM simplifies P2V by providing a task-based wizard to automate much of the conversion process.
Fill in the Blank
18. A ___________ is used on a website that corresponds to a physical directory elsewhere on the server, on another server, or on a website.
Answer: virtual directory
Difficulty: Medium
Section Reference: Creating Websites and Virtual Directories
Explanation: A virtual directory is used in a website that corresponds to a physical directory elsewhere on the server, on another server, or on a website. This allows you to reuse the same folder for multiple sites or to connect to content without physically moving it.
Short Answer
19. When you are connected to a VPN tunnel, what do you call it when you use your own Internet connection to visit the web?
Answer: split tunnel
Difficulty: Medium
Section Reference: Understanding Remote Access
Explanation: If you want to route your Internet browsing through your home Internet connection rather than go through the corporate network, you can disable the Use Default Gateway on Remote Network option. Disabling this option is called using a split tunnel.
Short Answer
20. What technology is used to consolidate multiple servers onto one large physical server?
Answer: virtualization
Difficulty: Easy
Section Reference: Understanding Server Virtualization
Explanation: By using virtual machine technology, you can run multiple operating systems concurrently on a single machine, which allows separation of services while keeping costs minimal. It can also be used to create Windows test systems in a safe, self-contained environment.