Network Admin Test 3 (Final Exam)

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/152

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

153 Terms

1
New cards

Last Mile Technologies

Connects Internet to organizations; includes DSL, cable, GPON.

2
New cards

Remote Access Technology

Enables connection to DMZ server resources externally.

3
New cards

Remote Access Server

DMZ server accepting requests from remote clients.

4
New cards

Remote Access Client

Connects to DMZ server using encryption.

5
New cards

Demarc

Point where ISP's network meets organization's network.

6
New cards

Network Interfaces

Remote access server requires two for connectivity.

7
New cards

Public IP Address

Assigned to the interface connected to the demarc.

8
New cards

Firewall

Security software protecting the remote access server.

9
New cards

Port Forwarding

Forwards requests to internal servers in the DMZ.

10
New cards

Virtual Private Networks (VPNs)

Most widely used remote access technology since 1990s.

11
New cards

VPN Tunnel

Encrypted channel between client and server.

12
New cards

Split Tunneling

Accesses DMZ resources while using local Internet.

13
New cards

Point-to-Point Tunneling Protocol (PPTP)

Uses Microsoft MPPE for data encryption.

14
New cards

Layer Two Tunneling Protocol (L2TP)

Relies on IPSec for encryption.

15
New cards

Internet Key Exchange version 2 (IKEv2)

Protocol for establishing secure VPN connections.

16
New cards

Secure Socket Tunneling Protocol (SSTP)

Uses SSL and TLS for encryption.

17
New cards

RADIUS

Provides centralized VPN authentication and logging.

18
New cards

DHCP Relay Agent

Locates and obtains IP addresses for clients.

19
New cards

Read-Only Attribute

Prevents saving changes to a file.

20
New cards

Hidden Attribute

Prevents listing folder and file names.

21
New cards

Archive Attribute

Indicates files need to be backed up.

22
New cards

Index Attribute

Pre-creates a list for faster searching.

23
New cards

Compress Attribute

Automatically compresses files on the filesystem.

24
New cards

Encrypt Attribute

Applies encryption to protect data on disk.

25
New cards

Advanced Permissions

Provides specific types of access to files.

26
New cards

File Ownership

Each file has a single owner, typically creator.

27
New cards

Access Denied Message

Indicates insufficient permissions for user access.

28
New cards

Advanced Security Settings

Window for configuring permissions and ownership.

29
New cards

Effective Access

User's actual permissions on a folder.

30
New cards

Shared Folder

Folder accessible over a network by users.

31
New cards

DFS

Distributed File System for file server management.

32
New cards

DFS Namespaces

Organizes shared folders into a virtual tree structure.

33
New cards

DFS Replication

Synchronizes files across multiple servers.

34
New cards

UNC

Universal Naming Convention for network resources.

35
New cards

User Quotas

Limits disk space for individual users.

36
New cards

Folder Quotas

Limits disk space for specific folders.

37
New cards

Hard Quotas

Strict limits on disk space usage.

38
New cards

Soft Quotas

Warning limits on disk space usage.

39
New cards

File Screens

Prevents specific file types from being saved.

40
New cards

Active Screening

Immediate blocking of unwanted file types.

41
New cards

Passive Screening

Alerts users about unwanted file types.

42
New cards

Monitoring

Ongoing observation of system performance.

43
New cards

Proactive Maintenance

Preventive actions to minimize future issues.

44
New cards

Reactive Maintenance

Corrective actions taken after issues arise.

45
New cards

Troubleshooting Procedure

Systematic approach to resolving problems.

46
New cards

Server Manager

Tool for monitoring system events and performance.

47
New cards

Task Manager

Manages processes and monitors system performance.

48
New cards

Performance Monitor

Tracks real-time system resource usage.

49
New cards

Event Viewer

Tool for viewing system event logs.

50
New cards

Memory Leaks

Processes that continuously consume memory.

51
New cards

Rogue Processes

Erroneous processes using excessive CPU time.

52
New cards

Event Logs

Records of system events for troubleshooting.

53
New cards

Performance Objects

Components tracked by Performance Monitor.

54
New cards

Performance Counters

Metrics for measuring performance objects.

55
New cards

Replication Group

Set of servers sharing replicated folders.

56
New cards

Quota Entries

Specific user limits overriding default settings.

57
New cards

File Server Resource Manager

Tool for managing quotas and file screens.

58
New cards

Bandwidth

Data transfer capacity of a network connection.

59
New cards

Bus Mastering

Devices perform processing tasks, reducing CPU load.

60
New cards

Physical Memory

Increases working space, reduces paging file usage.

61
New cards

SSD

Faster storage option than traditional hard drives.

62
New cards

IP Configuration

Settings that define network interface's IP address.

63
New cards

ipconfig /all

Command to display detailed network configuration.

64
New cards

DHCP Server

Assigns IP addresses dynamically to devices.

65
New cards

Ping Command

Tests connectivity to a specified IP address.

66
New cards

Test-NetConnection

PowerShell command for testing network connectivity.

67
New cards

Default Gateway

Router IP for accessing external networks.

68
New cards

tracert Command

Tracks the route packets take to a destination.

69
New cards

FQDN

Fully Qualified Domain Name for network resources.

70
New cards

DNS Server

Translates domain names into IP addresses.

71
New cards

Group Policy Objects (GPOs)

Settings applied to users and computers in Active Directory.

72
New cards

Computer Configuration

Settings applied at boot time by the computer.

73
New cards

User Configuration

Settings applied when users log into the domain.

74
New cards

Block Inheritance

Prevents GPO settings from being applied to an OU.

75
New cards

Default Domain Policy

Provides default security configuration for domain computers.

76
New cards

Software Deployment

Distributes software packages via Group Policy.

77
New cards

Windows Installer File

Package format for deploying Windows applications.

78
New cards

Account Lockout Policy

Locks accounts after a set number of failed logins.

79
New cards

gpupdate /force

Forces a refresh of Group Policy settings.

80
New cards

gpresult /r

Displays the Resultant Set of Policy for a user.

81
New cards

RADIUS Server

Generates encryption keys for wireless clients.

82
New cards

WSUS Server

Manages Microsoft product update distribution.

83
New cards

Event Log

Records system events for troubleshooting purposes.

84
New cards

Network Service

Service running on a server for client access.

85
New cards

Netstat Command

Displays active connections and listening ports.

86
New cards

UNC Path

Universal Naming Convention path for network resources.

87
New cards

Administrative Templates

Settings for managing user and computer configurations.

88
New cards

Remote access technology

Connects to DMZ server resources from outside the organization

89
New cards

Remote access server

DMZ server that accepts requests from remote access clients

90
New cards

Remote access client

Connects to the DMZ remote access server using encryption provided by the remote access server. Authenticated by RAS first.

91
New cards

Two network interfaces a RAS requires:

−One connected to the demarc and assigned a public IP address resolved using a host record in a publicly registered DNS zone
-One connected to the DMZ

92
New cards

Three main remote access technologies used to obtain access to servers in a DMZ from across the internet that Microsoft provides:

VPNs, DirectAccess, Remote Desktop Services

93
New cards

Each remote access technology:

Provides its own protocols, supports different authentication and encryption types

94
New cards

VPNs are:

Used for remote access across the internet, In use since the 1990s, Most widely implemented remote access technology today

95
New cards

VPN tunnel

Provides encrypted channel between network systems with each end represented by interfaces configured with an IP address.

96
New cards

Requests for internet resources from remote access clients are:

Forwarded to NAT router or NGFW before being sent to the Internet

97
New cards

Remote access clients configured with split tunneling:

Access resources in their organization's DMZ across the VPN tunnel, Use their physical network interface default gateway to access internet

98
New cards

Four VPN protocols:

Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), Internet Key Exchange version 2 (IKEv2), Secure Socket Tunneling Protocol (SSTP)

99
New cards

Point-to-Point Tunneling Protocol (PPTP)

Encrypts data using Microsoft Point-to-Point Encryption (MPPE)

100
New cards

Layer Two Tunneling Protocol (L2TP)

Relies on IP Security (IPSec) for encryption