1/16
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Application Server Role
On Windows Server 2016, helps with deploying and running line-of-business applications built with .NET Framework 3.0. Following features:
>Feature Description: Helps administrators choose the various role services and features required to run applications.
>Core runtime: Supports the development and management of high-performance business applications.
>.NET Framework: Provides a development environment for the execution of server-based applications.
>Web Services: Integrates new and existing applications with the server infrastructure.
Simple Mail Transfer Protocol (SMTP)
Most widely used e-mail transport protocol in the world, works on port 25.
Post Office Protocol version 3 (POP3)
Used to check e-mail on Internet-based e-mail servers. Microsoft Exchange can support, but disabled by default. Uses Port 110 as default communications port.
Internet Message Access Protocol (IMAP)
Used to check email and has more features than POP3. Does not have full support for Exchange Server either, disabled by default. Default port is 143.
Messaging Application Programming Interface (MAPI)
Primary protocol used for communications with Exchange Servers in Microsoft Outlook. Enabled by default on Exchange Server, uses dynamic ports.
SharePoint
Microsoft collaboration server, also a Content Management System (used for websites).
System Center Virtual Machine Manager (SCVMM)
Consistently used with Hyper-V to manage virtualization environment. Automatic provisioning and replenishment of virtual machines (VMs). Can move a virtual machine from one physical server to another in event of failure.
System Center Operations Manager (SCOM)
Allows for continuous server management, can monitor shared services and report back to admins when problems arise. Used to monitor Windows servers, as well as SQL Server, Exchange Server, and even Windows clients.
System Center Data Protection Manager (SCDPM)
Centralized backup solution, also considered a monitoring solution as it performs background backups. Changes to the file are copied within a few minutes after changes made, but can control frequency of backups.
Threat Management
An approach to network security that integrates a variety of threat mitigation techniques to block from entering system.
Unified Threat Management (UTM)
An end-to-end solution that has recently emerged in network security. Primary gateway security solution for many organizations. Evolution of a traditional firewall into a full-fledged security product capable of performing various security functions.
Threat Management Servers
Deployed on network to detect and prevent security attacks. Located at outlets of network, most of the time where they connect to the Internet.