1/83
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Active Directory Forests
Provide for multiple domains within the same organization.
Network-Attached Printers
Printers that are connected via Ethernet, Wi-Fi, or Bluetooth
Forest Root Domain
First domain in a forest.
Windows Registry
made up of keys, subkeys, and entries
Attributes
features of a folder or file stored in metadata.
Read-only Attribute
Prevents saving changes to the same file name.
How do you delete a file with a Read-Only Attribute?
File Explorer.
Hidden Attribute
Prevents users from seeing the file traditionally.
How do you view a file with a hidden attribute?
by using commands such as dir /ah.
How do you set attributes in Server?
File/folder → Properties → General
What are the advanced attributes?
Archive
Index
Compress
Encrypt
How do you access advanced attributes?
file/folder → properties → General → Advanced
Archive Attribute
Indicates files that need to be backed up.
Index Attribute
Facilitates fast file searches via indexing. defaults for commonly used folders.It enables quick retrieval of files by maintaining an index of their locations and properties, improving search performance.
What folders are excluded from being indexed?
System Folders.
Compress Attribute
Reduces file size on the file system. Best for infrequently accessed files.
Encrypt Attribute
Encrypts sensitive data using Encrypting File System (EFS). Uses a randomly-generated key stored in metadata.
Discretionary Access Control List (DACL)
Lists permissions granted or denied to user and group accounts.
System Access Control List (SACL)
Contains information for auditing access to resources. Allows tracking of successful and failed attempts to access resources.
Security Principles
Contains users or groups listed within a DACL or SACL.
Permissions: Full Control
Can read, write, delete, execute, and modify files; can change permissions.
Permissions: Modify
can read, add, delete, execute, and modify files; cannot change permissions.
Permissions: Read and Execute
Allows listing, opening and viewing the content of the files, and running executables; cannot modify or delete files.
Permissions: List folder contents
can list files in the folder or switch to a subfolder, view attributes and permissions, as well as execute files; cannot view file contents. Applies to folders only.
Permissions: Read
can view file contents, as well as view attributes and permissions; cannot traverse folders or execute files.
Permissions: Write
Can create files, write data to files, append data, create folders, and modify folder and file attributes; cannot delete files.
Inheritance
Permissions set on folders that are carried over to subfolders and files by default.
What are the protocols that are supported by Shared Folders?
Server Message Block (SMB)
Network File System (NFS)
What is the purpose of sharing folders?
Enables centralized file access and management.
PnP-capable printers connect via ________
USB, Parallel, Or Serial ports.
Non-PnP printers or network-attached printers require ____
Manual configuration.
Print Device
also known as a physical printer.
Printer
Software representation of a print device.
Locally Attached Printers
Print devices connected to physical ports.
Shared Printers
Managed by a print server for centralized access and control.
Server Message Block (SMB)
Default for Windows print servers.
Internet Printing Protocol (IPP)
HTTP/HTTPS-based printing
Line Printer Daemon (LPD)
UNIX TCP/IP printing.
what is the connection format for SMB?
\\servername\sharedprintername
or
\\IPaddress\sharedprintername
what is the connection format for IPP?
http://servername/printers/sharedprintername/.printer
What is the connection format for LPD?
Requires LPD print service.
Virtualization
allows multiple guest operating systems to run simultaneously on a server, improving hardware efficiency.
What are the benefits of virtualization?
Reduces cost and cooling costs.
Lower energy and carbon footprint.
What is the role of Hyper-V?
To manage virtual machines and emulate hardware for virtual environments.
What are the tools to manage Hyper-V?
PowerShell
Hyper-V Manager (GUI)
External Virtual Switch
Connects virtual machines to a physical network.
Internal Virtual Switch
connects virtual machines and the host OS.
Private Virtual Switch
Connects only virtual machines, no host OS.
Public Cloud
Servers hosted by third-party providers such as AWS, Google Cloud, and Azure.
Private Cloud
Servers hosted by the organization itself.
Hybrid cloud
Combination of both Public and Private clouds for specific purposes.
Infrastructure as a Service (IaaS)
Virtual machine management, including OS and apps.
Platform as a Service (PaaS)
Run web app containers in the cloud.
Software as a Service (SaaS)
Cloud provider manages hardware, OS, and network; only the app is executed.
Containers
A subset of an OS composed of Web apps and necessary supporting files.
Sandboxing
Containers execute Web apps in isolation from other containers and the host OS.
Docker
The most common container software used today.
What docker version is required for Windows Server 2019?
Docker Enterprise Edition.
What is required for a GPO to function?
It must be linked to a site, domain, or OU object that contains the user or computer accounts that it applies to.
Computer configuration
Applied at boot and every 90 minutes.
User configuration
Applied at user login.
What is the Hierarchy of Application?
Site
Domain
Parent OU
Child OU
Default Domain Policy
Applies to all users and computers, linked to the domain.
Default Domain Controllers Policy
Linked to the Domain Controllers OU. Applies to domain controller accounts.
What are the steps to create a GPO?
Use Group Policy Management in Server Manager
Right Click ‘Group Policy Objects’ → New → Provide a Name
Link the GPO to site, domain, or OU Objects.
Starter GPOs
Templates containing preconfigured Administrative Templates.
Blocking Inheritance
Prevent child objects from inheriting GPOs from parent objects.
Enforcing GPOs
Overrides block inheritance.
Ensures critical GPOs are always applied last.
What are the GPO Subfolders?
Name Resolution Policy
Scripts
Deployed Printers
Security Settings
Folder Redirection
Name Resolution Policy
Configure DNS Settings
Scripts (Startup/Shutdown)
Assign PowerShell scripts for boot/shutdown
Deployed Printers
Automatically Configure Shared Printers
Security Settings
Manage password policies, Kerberos, Firewalls, and more.
Folder Redirection
Centralize user folder storage for backup.
Enforce Password Settings
Sets the number of passwords (between 0 and 24) that have to be unique before a user can reuse an old password.
Minimum Password Length
Sets the minimum amount of characters required in a password (from 0 to 14).
Control Panel
Manage access and settings.
Desktop Settings
Configure wallpapers and restrictions.
Customization: Start Menu & Taskbar
Customize or limit features relating to the taskbar.
System
Manage power, shutdown, and storage access.
Virus & Threat Protection
Real-time malware defense.
Firewall & Network Protection
Configure Firewalls for domain, public, and private networks.
App & Browser Control
Set restrictions for internet apps and exploits.
Device Security
Enable secure boot and memory integrity.