Network Administration Test One

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

blade servers

A single rackmount server may contain multiple smaller, modular servers. In this case, the modular servers are called:

2
New cards

Non-Volatile Memory express (NVMe)

If ____________ SSDs are used, then the number of SSDs within a rackmount server or SAN may be substantially higher due to the small physical size of NVMe devices.

3
New cards

Virtualization

the process of running more than one operating system at the same time on a single computer

4
New cards

Type 2 hypervisor

designed to run on top of an existing workstation operating system

5
New cards

VMWare Workstation, Oracle VirtualBox, and Parallels Workstation

Common Type 2 hypervisors include:

6
New cards

Type 1 hypervisor

interacts with the hardware directly

7
New cards

Type 1

Hyper-V is a ____________ hypervisor

8
New cards

nested virtualization

allows you to run other virtual machines within an existing virtual machine

9
New cards

Workgroup

logical grouping of computers on the network

10
New cards

peer-to-peer networking

Workgroups implement ___________________ as each computer (or peer) on the network maintains its own shared resources, users, groups, and security

11
New cards

domain

To coordinate resource access, users, and security on networks today, you normally configure each client and server computer to join a _____________ instead of a workgroup.

12
New cards

domain

logical grouping of computers that authenticate to a central database of users

13
New cards

domain controllers

a type of server that processes requests for authentication from users within a computer domain

14
New cards

Active directory

a database and set of services that connect users with the network resources they need to get their work done

15
New cards

Active directory Certificate Services

used to automate the configuration of deployment of encryption certificates to domain computers and users

16
New cards

Advanced Threat Protection (ATP)

a unified platform for preventative protection, post-breach detection, automated investigation, and response.

17
New cards

shielded virtual machines

help protect your virtual machines against rootkits and boot- and kernel-level malware with secure and measured boot capabilities

18
New cards

Internet Information Services (IIS)

a Microsoft web server that runs on Windows operating system and is used to exchange static and dynamic web content with internet users

19
New cards

New Technology File System (NTFS)

is the file system that the Windows OS uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs)

20
New cards

Resilient File System (ReFS)

a file system that Microsoft developed for use on a Windows OS and is designed to overcome some of the limitations in the New Technology File System (NTFS)

21
New cards

encrypting File System (eFS)

encryption for individual files and folders

22
New cards

data deduplication

saves space by allowing duplicate files on a volume to be stored once on the physical storage device

23
New cards

journaling

tracks changes to files and keeps a record of these changes in a separate log file

24
New cards

protected process

cannot be influenced by a user or other processes on the system

25
New cards

Multitasking

ability to run two or more programs at the same time

26
New cards

Multithreading

capability of programs written to run several threads at the same time

27
New cards

Clustering

ability to increase the access to server resources and provide fail-safe services by linking two or more discrete computer systems so they appear to function as one

28
New cards

Server Manager

allows you to monitor and manage the configuration of the local server it is running on AND can also be used to centrally manage multiple servers on the network

29
New cards

Microsoft Management Console (MMC)

snap-in tools that run outside of Server Manager and are specialized for a specific component or service

30
New cards

Tools

Which tab (button) on server manager to configure setting in DNS or DHCP for example

31
New cards

Manage

Which (button) on server manager to add a new role such as DNS or DHCP

32
New cards

Client Access license (CAl)

a commercial software license that allows client computers to use server software services

33
New cards

Trusted Platform Module (TPM)

required for secure boot and encryption features

34
New cards

loopback IP address

IP address 127.0.0.1 is called the ________________

35
New cards

Teredo

a Microsoft transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet

36
New cards

Forward Lookup

FQDNs to IP addresses

37
New cards

Reverse Lookup

IP addresses to FQDNs

38
New cards

Generic Volume license Key (GVLK)

codes that are used to activate Windows desktops and servers

39
New cards

Multiple Activation Key (MAK)

activates systems on a one-time basis, using Microsoft hosted activation services that require connection with a Microsoft activation server

40
New cards

Key Management Services (KMS)

used to administer the full lifecycle of cryptographic keys and protect them from loss or misuse

41
New cards

False

Servers that exist within a data center that is publicly accessible on the Internet are referred to as on-premises servers.

42
New cards

c. Processor with Intel VT or AMD-V and SLAT

Which of the following are hardware requirements for Hyper-V?

a. 64 GB of memory
b. Two network interfaces
c. Processor with Intel VT or AMD-V and SLAT
d. A 32-bit or 64-bit processor

43
New cards

Nested Virtualization

Which Hyper-V feature allows you to install a virtual machine within another virtual machine?

44
New cards

True

Containers are often used to host Web apps within cloud environments. True or False?

45
New cards

A Domain

What term is used to refer to a logical grouping of computers that participate in Active Directory single sign-on?