Preview

It260 Midterm Study Guide

Good Essays
Open Document
Open Document
629 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It260 Midterm Study Guide
1 – Two basic types of computers that can be on an enterprise network are:
Clients and Servers
2 – Which role creates a single sign-on environment by implementing trust relationships that enable users on one network to access applications on other networks w/o providing a secondary set of logon credentials?
Active Directory Federation Services (ADFS)
3 - ________ enables administrators to create and enforce storage quotas, specify file types that are permitted on network volumes, and generate storage reports.
File Server Resource Manager (FSRM)
4 – By using _________ installation option of WinSvr2008, you get a stripped-down version of the OS that shows a single window w/ a cmd prompt.
Windows Server Core
5 – Windows Deployment Services requires two types of image files to perform remote client installations, a ______ image and an install image.
Boot Image
6 – Which role service w/n IIS enables the Web Server to forward incoming requests for a specific URL to another URL?
HTTP Redirection
7 – IIS7 uses a generic request pipeline that is modular in nature. The component that manages the request pipeline, the server’s application pools, and the worker processes is called?
Windows Process Activation Service (WPAS)

8 – Which feature of IIS7 enables you to publish content found on different drives or different computers on a network, w/o copying or moving the content?
Virtual Directory
9 – Which feature of IIS7 is used to associate each incoming request w/ one particular Web Site, helping the protocol listener to identify each site request?
Site Bindings
10 – To use FTP7, you must install it in a WinSvr 2008 computer that is already running the role.
Web Server (ISS) Role
11 – While configuring a DNS server to perform reverse name resolutions, you must create records for the addresses you want the server to resolve.
Pointer (PTR)
12 – IIS7 supports several authentication methods. Of these, the only method that is integrated into an IIS7

You May Also Find These Documents Helpful

  • Powerful Essays

    2. Which of the following can an Active Directory domain controller use to verify a user's identity?…

    • 778 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    nt 2640 studyguide

    • 720 Words
    • 3 Pages

    What process is used by a DNS server to add a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what?…

    • 720 Words
    • 3 Pages
    Good Essays
  • Best Essays

    This new system will allow them to save files and documents onto a new server, creating a centralized file system storage system, where only approved representatives are permitted. Having a centralized storage/retrieval system, also helps to secure the information being shared across the network. This also creates efficiency as only the server needs to be backed up, as opposed to having to secure many individual and independent workstations. In addition to…

    • 2802 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7 – Middleware is the software that sits between the application software on the client and the application software on the server.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Study Guide

    • 846 Words
    • 4 Pages

    4. Using Vista, what type of command prompt window is needed to run the Chkdsk command?…

    • 846 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Ittnt2670 Lesson 1

    • 489 Words
    • 2 Pages

    The only server roles discussed in this lesson that are not included with the Windows Server 2008 product are _________ and _________.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Quiz

    • 2246 Words
    • 9 Pages

    9) Which of the following is a content sharing technique in which the sender does not have any control or record of changes made to the shared content?…

    • 2246 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Server Review CH 1

    • 874 Words
    • 4 Pages

    ing, and up to 256 GB of RAM. You need to run several network applications that you…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.…

    • 3619 Words
    • 15 Pages
    Satisfactory Essays
  • Good Essays

    It provides flexible user authentication by allowing identity providers to choose their preferred way of authentication such as username/password, hardware tokens, biometrics, etc. It provides built-in user provisioning by defining a UserInfo HTTPS endpoint for authorized client applications to retrieve consented information about the logged in user. The Open ID Connect server provides client applications with two key tokens-…

    • 417 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2670 Lab 3

    • 275 Words
    • 2 Pages

    13. The error 401.2 – Unauthorized is displayed. This is because the authorization was set for the user IUSR05 account which was disabled..…

    • 275 Words
    • 2 Pages
    Satisfactory Essays