Network Administration Test #3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/65

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

66 Terms

1
New cards

Remote access technology

Connects to DMZ server resources from outside the organization

2
New cards

Remote access server

DMZ server that accepts requests from remote access clients

3
New cards

Remote access client

Connects to the DMZ remote access server using encryption provided by the remote access server. Authenticated by RAS first.

4
New cards

Two network interfaces a RAS requires:

āˆ’One connected to the demarc and assigned a public IP address resolved using a host record in a publicly registered DNS zone
-One connected to the DMZ

5
New cards

Three main remote access technologies used to obtain access to servers in a DMZ from across the internet that Microsoft provides:

VPNs, DirectAccess, Remote Desktop Services

6
New cards

Each remote access technology:

Provides its own protocols, supports different authentication and encryption types

7
New cards

VPNs are:

Used for remote access across the internet, In use since the 1990s, Most widely implemented remote access technology today

8
New cards

VPN tunnel

Provides encrypted channel between network systems with each end represented by interfaces configured with an IP address.

9
New cards

Requests for internet resources from remote access clients are:

Forwarded to NAT router or NGFW before being sent to the Internet

10
New cards

Remote access clients configured with split tunneling:

Access resources in their organization's DMZ across the VPN tunnel, Use their physical network interface default gateway to access internet

11
New cards

Four VPN protocols:

Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), Internet Key Exchange version 2 (IKEv2), Secure Socket Tunneling Protocol (SSTP)

12
New cards

Point-to-Point Tunneling Protocol (PPTP)

Encrypts data using Microsoft Point-to-Point Encryption (MPPE)

13
New cards

Layer Two Tunneling Protocol (L2TP)

Relies on IP Security (IPSec) for encryption

14
New cards

Secure Socket Tunneling Protocol (SSTP)

Uses Secure Sockets Layer (SSL) encryption with 128-bit keys, and Transport Layer Security (TLS) with 256-bit keys

15
New cards

PPTP port numbers

1723/TCP

16
New cards

L2TP/IKEv2 port numbers

1701/TCP, 500/UDP, 4500/UDP (if using NAT)

17
New cards

SSTP port numbers

443/TCP

18
New cards

True or False. Establishing a VPN tunnel doesn't require credentials to authenticate.

False

19
New cards

PAP

Password Authentication Protocol, not encrypted, last resort.

20
New cards

CHAP

Challenge Handshake Authentication Protocol, generates hash and validates with challenge and response mechanism, can't be used for PPTP vlans.

21
New cards

MS-CHAP v2

Microsoft Challenge Handshake Authentication Protocol version 2, Microsoft native CHAP with stronger authentication

22
New cards

EAP

Extensible Authentication Protocol, authentication system that allows for multiple authentication methods.

23
New cards

Four Microsoft VPN authentication methods:

PAP, CHAP, MS-CHAP v2, EAP

24
New cards

A RADIUS server provides:

Centralized authentication and logging, and remote access policies

25
New cards

What interface protect traffic between two networks using VPNs?

demand-dial

26
New cards

Where to configure security options and authentication methods:

Server Properties, Security Tab

27
New cards

Filesystems supported by Windows Server 2019:

NTFS, ReFS, FAT32, and exFAT

28
New cards

True or False. A read-only attribute on a folder only applies to the contents rather than the folder itself.

True

29
New cards

Four advanced attributes:

Archive, index, compress, and encrypt

30
New cards

Archive attribute:

Indicates the folder or file needs to be backed up, automatically enabled on files but not folders.

31
New cards

Index attribute:

Are put in a pre-created list used when searching by the Windows Search Service, all new files have it automatically

32
New cards

Compress attribute:

System compresses the files and then automatically decompresses when accessed

33
New cards

Encrypt attribute:

Applies encryption before data is written to filesystem

34
New cards

6 basic NTFS/ReFS folder and file permissions:

Full control, Modify, Read and execute, List folder contents, Read, and Write

35
New cards

13 advanced NTFS/ReFS folder and file permissions:

Traverse folder/execute file, List folder/read data, Read attributes, Read extended attributes, Create files/write data, Create folders/append data, Write attributes, Write extended attributes, Delete subfolders and files, Delete, Read permissions, Change permissions, and Take ownership

36
New cards

True or False. Folder or file has one owner and owner cannot change ownership to another user.

False, ownership can be changed.

37
New cards

Two DFS server roles:

DFS Namespaces and DFS Replication

38
New cards

True or False. Each DFS server role work independently of each other but are managed using the same DFS management tool.

True

39
New cards

What is used to prevent users from consuming too much space on the file server?

Quotas

40
New cards

Three NTFS features for restricting content

User quotas, folder quotas, file screens

41
New cards

Two types of quotas:

Hard and soft quotas

42
New cards

Two types of file screens:

Active and passive screening

43
New cards

True or False. Monitoring is the most time-consuming task.

True

44
New cards

Monitoring:

Examine network connectivity, view log files, and run performance utilities to identify problems and their causes

45
New cards

Proactive maintenance:

minimizes the chance of future problems

46
New cards

Reactive maintenance:

corrects problems during monitoring

47
New cards

5 steps to take when a problems occurs:

Gather information about it, Isolate the problem, Generate a list of possible causes and solutions, Implement and test possible solutions for results until problem resolved, Document the solution and take proactive maintenance measures

48
New cards

Two golden rules of any troubleshooting process:

Prioritize problems and try to solve the root of the problem

49
New cards

Task manager default display:

short list of processes started by the current user

50
New cards

Default performance tab display:

CPU hardware utilization

51
New cards

Committed memory

virtual memory from the paging file

52
New cards

Cached memory

used to speed filesystem access for processes

53
New cards

Paged pool memory

can be transferred to the paging file if necessary

54
New cards

Non-paged pool memory

cannot be transferred to the paging file

55
New cards

Rogue processes

have encountered an error forcing use of unusually large amount of processor time

56
New cards

Memory leaks

processes continually use more memory until system memory exhausted

57
New cards

Windows Server 2019 additional monitoring and troubleshooting tools:

Task manager, resource monitor, performance monitor, event viewer

58
New cards

Three components of performance information:

Performance objects, performance counters, instances

59
New cards

5 common performance objects:

Processor, Memory, PhysicalDisk, LogicalDisk, Network Interface

60
New cards

Five standard Windows event logs:

Application, Security, Setup, System, Forwarded Events

61
New cards

Six different event levels:

Information, Warning, Error, Critical, Audit Success, Audit Failure

62
New cards

Performance-Related Problems:

Occur when sstem software requires more hardware reources than currently available

63
New cards

Two different sections Group Policy settings stored in:

Computer configuration and user configuration

64
New cards

Computer configuration:

applied at boot time by computer

65
New cards

User configuration:

applied when domain users log in

66
New cards

GPOs applied in this order:

Site, Domain, Parent OU, Child OUs