1/44
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
blade servers
A single rackmount server may contain multiple smaller, modular servers. In this case, the modular servers are called:
Non-Volatile Memory express (NVMe)
If ____________ SSDs are used, then the number of SSDs within a rackmount server or SAN may be substantially higher due to the small physical size of NVMe devices.
Virtualization
the process of running more than one operating system at the same time on a single computer
Type 2 hypervisor
designed to run on top of an existing workstation operating system
VMWare Workstation, Oracle VirtualBox, and Parallels Workstation
Common Type 2 hypervisors include:
Type 1 hypervisor
interacts with the hardware directly
Type 1
Hyper-V is a ____________ hypervisor
nested virtualization
allows you to run other virtual machines within an existing virtual machine
Workgroup
logical grouping of computers on the network
peer-to-peer networking
Workgroups implement ___________________ as each computer (or peer) on the network maintains its own shared resources, users, groups, and security
domain
To coordinate resource access, users, and security on networks today, you normally configure each client and server computer to join a _____________ instead of a workgroup.
domain
logical grouping of computers that authenticate to a central database of users
domain controllers
a type of server that processes requests for authentication from users within a computer domain
Active directory
a database and set of services that connect users with the network resources they need to get their work done
Active directory Certificate Services
used to automate the configuration of deployment of encryption certificates to domain computers and users
Advanced Threat Protection (ATP)
a unified platform for preventative protection, post-breach detection, automated investigation, and response.
shielded virtual machines
help protect your virtual machines against rootkits and boot- and kernel-level malware with secure and measured boot capabilities
Internet Information Services (IIS)
a Microsoft web server that runs on Windows operating system and is used to exchange static and dynamic web content with internet users
New Technology File System (NTFS)
is the file system that the Windows OS uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs)
Resilient File System (ReFS)
a file system that Microsoft developed for use on a Windows OS and is designed to overcome some of the limitations in the New Technology File System (NTFS)
encrypting File System (eFS)
encryption for individual files and folders
data deduplication
saves space by allowing duplicate files on a volume to be stored once on the physical storage device
journaling
tracks changes to files and keeps a record of these changes in a separate log file
protected process
cannot be influenced by a user or other processes on the system
Multitasking
ability to run two or more programs at the same time
Multithreading
capability of programs written to run several threads at the same time
Clustering
ability to increase the access to server resources and provide fail-safe services by linking two or more discrete computer systems so they appear to function as one
Server Manager
allows you to monitor and manage the configuration of the local server it is running on AND can also be used to centrally manage multiple servers on the network
Microsoft Management Console (MMC)
snap-in tools that run outside of Server Manager and are specialized for a specific component or service
Tools
Which tab (button) on server manager to configure setting in DNS or DHCP for example
Manage
Which (button) on server manager to add a new role such as DNS or DHCP
Client Access license (CAl)
a commercial software license that allows client computers to use server software services
Trusted Platform Module (TPM)
required for secure boot and encryption features
loopback IP address
IP address 127.0.0.1 is called the ________________
Teredo
a Microsoft transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet
Forward Lookup
FQDNs to IP addresses
Reverse Lookup
IP addresses to FQDNs
Generic Volume license Key (GVLK)
codes that are used to activate Windows desktops and servers
Multiple Activation Key (MAK)
activates systems on a one-time basis, using Microsoft hosted activation services that require connection with a Microsoft activation server
Key Management Services (KMS)
used to administer the full lifecycle of cryptographic keys and protect them from loss or misuse
False
Servers that exist within a data center that is publicly accessible on the Internet are referred to as on-premises servers.
c. Processor with Intel VT or AMD-V and SLAT
Which of the following are hardware requirements for Hyper-V?
a. 64 GB of memory
b. Two network interfaces
c. Processor with Intel VT or AMD-V and SLAT
d. A 32-bit or 64-bit processor
Nested Virtualization
Which Hyper-V feature allows you to install a virtual machine within another virtual machine?
True
Containers are often used to host Web apps within cloud environments. True or False?
A Domain
What term is used to refer to a logical grouping of computers that participate in Active Directory single sign-on?