Windows Server Administration Modules 4-5

0.0(0)
studied byStudied by 11 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/83

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

84 Terms

1
New cards

Active Directory Forests

Provide for multiple domains within the same organization.

2
New cards

Network-Attached Printers

Printers that are connected via Ethernet, Wi-Fi, or Bluetooth

3
New cards

Forest Root Domain

First domain in a forest.

4
New cards

Windows Registry

made up of keys, subkeys, and entries

5
New cards

Attributes

features of a folder or file stored in metadata.

6
New cards

Read-only Attribute

Prevents saving changes to the same file name.

7
New cards

How do you delete a file with a Read-Only Attribute?

File Explorer.

8
New cards

Hidden Attribute

Prevents users from seeing the file traditionally.

9
New cards

How do you view a file with a hidden attribute?

by using commands such as dir /ah.

10
New cards

How do you set attributes in Server?

File/folder → Properties → General

11
New cards

What are the advanced attributes?

  • Archive

  • Index

  • Compress

  • Encrypt

12
New cards

How do you access advanced attributes?

file/folder → properties → General → Advanced

13
New cards

Archive Attribute

Indicates files that need to be backed up.

14
New cards

Index Attribute

Facilitates fast file searches via indexing. defaults for commonly used folders.It enables quick retrieval of files by maintaining an index of their locations and properties, improving search performance.

15
New cards

What folders are excluded from being indexed?

System Folders.

16
New cards

Compress Attribute

Reduces file size on the file system. Best for infrequently accessed files.

17
New cards

Encrypt Attribute

Encrypts sensitive data using Encrypting File System (EFS). Uses a randomly-generated key stored in metadata.

18
New cards

Discretionary Access Control List (DACL)

Lists permissions granted or denied to user and group accounts.

19
New cards

System Access Control List (SACL)

Contains information for auditing access to resources. Allows tracking of successful and failed attempts to access resources.

20
New cards

Security Principles

Contains users or groups listed within a DACL or SACL.

21
New cards

Permissions: Full Control

Can read, write, delete, execute, and modify files; can change permissions.

22
New cards

Permissions: Modify

can read, add, delete, execute, and modify files; cannot change permissions.

23
New cards

Permissions: Read and Execute

Allows listing, opening and viewing the content of the files, and running executables; cannot modify or delete files.

24
New cards

Permissions: List folder contents

can list files in the folder or switch to a subfolder, view attributes and permissions, as well as execute files; cannot view file contents. Applies to folders only.

25
New cards

Permissions: Read

can view file contents, as well as view attributes and permissions; cannot traverse folders or execute files.

26
New cards

Permissions: Write

Can create files, write data to files, append data, create folders, and modify folder and file attributes; cannot delete files.

27
New cards

Inheritance

Permissions set on folders that are carried over to subfolders and files by default.

28
New cards

What are the protocols that are supported by Shared Folders?

  • Server Message Block (SMB)

  • Network File System (NFS)

29
New cards

What is the purpose of sharing folders?

Enables centralized file access and management.

30
New cards

PnP-capable printers connect via ________

USB, Parallel, Or Serial ports.

31
New cards

Non-PnP printers or network-attached printers require ____

Manual configuration.

32
New cards

Print Device

also known as a physical printer.

33
New cards

Printer

Software representation of a print device.

34
New cards

Locally Attached Printers

Print devices connected to physical ports.

35
New cards

Shared Printers

Managed by a print server for centralized access and control.

36
New cards

Server Message Block (SMB)

Default for Windows print servers.

37
New cards

Internet Printing Protocol (IPP)

HTTP/HTTPS-based printing

38
New cards

Line Printer Daemon (LPD)

UNIX TCP/IP printing.

39
New cards

what is the connection format for SMB?

\\servername\sharedprintername

or

\\IPaddress\sharedprintername

40
New cards

what is the connection format for IPP?

http://servername/printers/sharedprintername/.printer

41
New cards

What is the connection format for LPD?

Requires LPD print service.

42
New cards

Virtualization

allows multiple guest operating systems to run simultaneously on a server, improving hardware efficiency.

43
New cards

What are the benefits of virtualization?

  • Reduces cost and cooling costs.

  • Lower energy and carbon footprint.

44
New cards

What is the role of Hyper-V?

To manage virtual machines and emulate hardware for virtual environments.

45
New cards

What are the tools to manage Hyper-V?

  • PowerShell

  • Hyper-V Manager (GUI)

46
New cards

External Virtual Switch

Connects virtual machines to a physical network.

47
New cards

Internal Virtual Switch

connects virtual machines and the host OS.

48
New cards

Private Virtual Switch

Connects only virtual machines, no host OS.

49
New cards

Public Cloud

Servers hosted by third-party providers such as AWS, Google Cloud, and Azure.

50
New cards

Private Cloud

Servers hosted by the organization itself.

51
New cards

Hybrid cloud

Combination of both Public and Private clouds for specific purposes.

52
New cards

Infrastructure as a Service (IaaS)

Virtual machine management, including OS and apps.

53
New cards

Platform as a Service (PaaS)

Run web app containers in the cloud.

54
New cards

Software as a Service (SaaS)

Cloud provider manages hardware, OS, and network; only the app is executed.

55
New cards

Containers

A subset of an OS composed of Web apps and necessary supporting files.

56
New cards

Sandboxing

Containers execute Web apps in isolation from other containers and the host OS.

57
New cards

Docker

The most common container software used today.

58
New cards

What docker version is required for Windows Server 2019?

Docker Enterprise Edition.

59
New cards

What is required for a GPO to function?

It must be linked to a site, domain, or OU object that contains the user or computer accounts that it applies to.

60
New cards

Computer configuration

Applied at boot and every 90 minutes.

61
New cards

User configuration

Applied at user login.

62
New cards

What is the Hierarchy of Application?

  1. Site

  2. Domain

  3. Parent OU

  4. Child OU

63
New cards

Default Domain Policy

Applies to all users and computers, linked to the domain.

64
New cards

Default Domain Controllers Policy

Linked to the Domain Controllers OU. Applies to domain controller accounts.

65
New cards

What are the steps to create a GPO?

  1. Use Group Policy Management in Server Manager

  2. Right Click ‘Group Policy Objects’ → New → Provide a Name

  3. Link the GPO to site, domain, or OU Objects.

66
New cards

Starter GPOs

Templates containing preconfigured Administrative Templates.

67
New cards

Blocking Inheritance

Prevent child objects from inheriting GPOs from parent objects.

68
New cards

Enforcing GPOs

  • Overrides block inheritance.

  • Ensures critical GPOs are always applied last.

69
New cards

What are the GPO Subfolders?

  • Name Resolution Policy

  • Scripts

  • Deployed Printers

  • Security Settings

  • Folder Redirection

70
New cards

Name Resolution Policy

Configure DNS Settings

71
New cards

Scripts (Startup/Shutdown)

Assign PowerShell scripts for boot/shutdown

72
New cards

Deployed Printers

Automatically Configure Shared Printers

73
New cards

Security Settings

Manage password policies, Kerberos, Firewalls, and more.

74
New cards

Folder Redirection

Centralize user folder storage for backup.

75
New cards

Enforce Password Settings

Sets the number of passwords (between 0 and 24) that have to be unique before a user can reuse an old password.

76
New cards

Minimum Password Length

Sets the minimum amount of characters required in a password (from 0 to 14).

77
New cards

Control Panel

Manage access and settings.

78
New cards

Desktop Settings

Configure wallpapers and restrictions.

79
New cards

Customization: Start Menu & Taskbar

Customize or limit features relating to the taskbar.

80
New cards

System

Manage power, shutdown, and storage access.

81
New cards

Virus & Threat Protection

Real-time malware defense.

82
New cards

Firewall & Network Protection

Configure Firewalls for domain, public, and private networks.

83
New cards

App & Browser Control

Set restrictions for internet apps and exploits.

84
New cards

Device Security

Enable secure boot and memory integrity.