midterms Flashcards

1
Q

What is Network Attached Storage? (NAS)

A

Storage that is attached to the local network and clients are able to accessed shared storage through LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Storage Area Network? (SAN)

A

Specialized high speed network of storage devices that allows clients to access shared storage as if a local device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Direct Access Storage? (DAS)

A

Storage that is directly attached to the computer that is using it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three enterprise storage solutions?

A

NAS, SAN, and DAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a hypervisor?

A

Software that creates and manages VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the difference between type 1 VMs and type 2 VMs?

A

type 1 VMs (aka bare metal) run directly off the host machine’s hardware and is generally used in production.

type 2 VMS (aka OS on OS) run on top of the host OS and translates everything virtually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between standard, essential, and datacentre versions of windows server?

A

essential is the bare version of windows server

standard allows for two vms + 1 hyper-v

datacentre allows for unlimited vms and 1 hyper-v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the difference between NTFS vs Fat32?

A

NTFS allows for Compression, disk quotas, and permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an SID?

A

It is used to uniquely identify a security principal (ie computer) or security group and can be assigned permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the components of a SID?

A
  1. String identifying SID (S)
  2. SID revision version
  3. identifier authority value
  4. domain identifier
  5. relative identifier
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ADDS?

A

A special database that contains information about objects (ie user and devices) and gives authority/authentication to access these resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is NTDS.dit?

A

It is the main database file for ADDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a domain controller?

A

a server that responds to authentication requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the physical parts of ADDS?

A
  1. Database
  2. Network authentication protocol
  3. DNS
  4. LDAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the partitions of the database?

A
  1. Domain - contains objects
  2. Schema - contains classes (aka blueprints) and attributes (describes objects)
  3. applications - third party apps
  4. configuration (network infrastructure/domain architecture)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Network authentication protocol?

A

kerberos verifies identities of users on a network (port 88)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the role of the DNS in a ADDS?

A

Locates domain on the network via SRV records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Forward lookup zone

A

domain name to ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

reverse lookup zone

A

Ip address to domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is LDAP?

A

It is a communication protocol that ADDS uses to manage and store information in the NTDS.dit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the logical components of ADDS?

A
  1. Forest - atleast 1 tree
  2. Tree - a domain
  3. Site - group of domain controllers (for replication purposes)
  4. OU - custom organizational groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do domains maintain the same database/security rules between them?

A

domains replicate and share the database/permissions with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why do we want multiple domains?

A
  1. Fault tolerance
  2. load balancing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are domain controllers?

A

Microsoft with servers that have AD DS server roles installed and contain copies of information from AD

25
Q

Member servers

A

Servers on a network managed by active directory but are not domain controllers

26
Q

domain

A

container that holds information about all network resources grouped within it

27
Q

What are the five FMSO roles?

A
  1. Schema Master
  2. Domain naming master
  3. PDC emulator
  4. RID ppool master
  5. Infrastructure master
28
Q

Schema master (and what level)

A

It is forest level, this role is used to modify the schema for all domains in the forest

29
Q

Domain naming master

A

forest level role that manages the addition of new domains and that names don’t conflict, manage cross references, and adding new domains

30
Q

PDC emulator

A

domain level role that is the authoritative reference for the current time and synchronizes it with the rest of the servers. modified account passwords in domain controllers are replicated to the PDC emulator. Also needed for group policy

31
Q

RID pool master

A

Domain level role that assigns a new SID to an object when a DC creates a new security principal object

32
Q

Infrastructure master

A

Domain level role that is responsible for cross referencing objects in other domains and synchronizing it with the global catalog

33
Q

Functional levels

A

Determine the capability of the ADDS in order to provide backward capability with older domain controllers. Cannot be lowered

34
Q

Sites

A

Groups of domain controllers connected to each other on a new network and reflects the physical arrangement of the network. Clients can access closer DCs and replication can be made simpler without needing to replicate with all DCs at once.

35
Q

Organizational units

A

Containers in domains that allow you to organize and group resources for easier administration ie giving privileges

36
Q

What is the purpose of Install from media?

A

It allows you to replicate a domain controller to remote sites by downloading it using ntdsutil.exe so that replication is not needed

37
Q

Global catalog

A

domain that hosts a partial attribute set for other domains in the forest, supports queries for objects throughout the forest

38
Q

Read only domain controller (RODC)

A

Full copy of database but is read only, good for places that need it but security cannot be guaranteed. (faster to have local dc)

39
Q

Groups

A

objects that contain users that require a similar permission set or access to an another object/task. members of group gain the same permissions assigned to the group

40
Q

Group types

A

Distribution groups - only used for email applications and cannot take permissions
security groups - has SID and can be given permissions

41
Q

what can contained in domain local groups?

A
  1. objects
  2. domain local (from the same domain)
  3. universal group
  4. glboal group

can be be given specific permissions for resources only in that domain

42
Q

what can be in the global groups

A
  1. objects
  2. other global (from the same domain) groups
43
Q

what can be in the universal group

A
  1. objects (has enterprise domain admin)
  2. global groups
  3. universal groups
44
Q

what does IGDLA stand for?

A

Identity: users/computers
Global group
Domain Local
Access

  1. users should be placed in global groups
  2. global groups should be placed in domain local groups
  3. permission should be granted to those domain local groups
45
Q

What is a checkpoint?

A

Checkpoint is a feature of hyper-v that allows the user to save the state of a virtual machine

46
Q

What are the two types of checkpoints?

A

Standard checkpoint
production checkpoint

47
Q

Standard checkpoint

A

A snapshot of the virtual machine and virtual memory state at the time a checkpoint is initiated

48
Q

Production checkpoint

A

VCC (volume shadow copy service) is used to create a data-consistent backup of the virtual machine but is not a snapshot of the virtual machine

49
Q

External switch

A

Allows the VM to connect to the Host’s network adaptor allowing it to communicate with external networks and the internet

50
Q

Internal Switch

A

VM is able to communicate with other VMs on the same network and the Host itself

51
Q

Private Switch

A

VMs can only communicate between each other

52
Q

RAID 0

A

striped disc

53
Q

RAID 1

A

mirrored disc

54
Q

RAID 5

A

Parity with striping, requires 6 discs

55
Q

RAID 6

A

dual parity with striping, requires 7 discs

56
Q

What’s the difference between file level and block level?

A

File storage stores data in a hierarchical file and folder structure. block level storage is data stored in fix sized boxes without a predefined file structure ie databases

57
Q

What is iSCI

A

iSCI is a protocol that allows servers to access SCSI based storage over TCP/IP networks

58
Q

What are the components of a iSCI?

A
  1. IP network
  2. iSCI targets: servers that run on the storage device
  3. iSCI initiators: software or host adapter that provide access to targets
  4. IQN: identifier used to address initiators and targets