It260 Midterm Study Guide
1 – Two basic types of computers that can be on an enterprise network are: Clients and Servers 2 – Which role creates a single sign-on environment by implementing trust relationships that enable users on one network to access applications on other networks w/o providing a secondary set of logon credentials? Active Directory Federation Services (ADFS) 3 – ________ enables administrators to create and enforce storage quotas, specify file types that are permitted on network volumes, and generate storage reports. File Server Resource Manager (FSRM) – By using _________ installation option of WinSvr2008, you get a stripped-down version of the OS that shows a single window w/ a cmd prompt. Windows Server Core 5 – Windows Deployment Services requires two types of image files to perform remote client installations, a ______ image and an install image. Boot Image 6 – Which role service w/n IIS enables the Web Server to forward incoming requests for a specific URL to another URL? HTTP Redirection 7 – IIS7 uses a generic request pipeline that is modular in nature.
The component that manages the request pipeline, the server’s application pools, and the worker processes is called? Windows Process Activation Service (WPAS) 8 – Which feature of IIS7 enables you to publish content found on different drives or different computers on a network, w/o copying or moving the content? Virtual Directory 9 – Which feature of IIS7 is used to associate each incoming request w/ one particular Web Site, helping the protocol listener to identify each site request? Site Bindings 10 – To use FTP7, you must install it in a WinSvr 2008 computer that is already running the role.
Web Server (ISS) Role 11 – While configuring a DNS server to perform reverse name resolutions, you must create records for the addresses you want the server to resolve. Pointer (PTR) 12 – IIS7 supports several authentication methods. Of these, the only method that is integrated into an IIS7 installation by default and used for Internet Web or FTP sites is _________. Anonymous Authentication 13 – IIS7’s Windows Authentication module supports two authentication protocols, Kerberos and _______. NTLM v2 14 – NTFS permissions are realized as, which consist of two basic types of _______, Allow and Deny.
ACL & ACE 15 – When a client obtains a Web server’s certificate, its ability to decrypt the server’s encrypted transmission using the server’s, the system represented in the certificate. Public 16 – Web applications use a three-tiered architecture: The first tier is the client browser application, the second tier is a Web Server, and the third tier is a ____________. Database Server 17 – Which protocol enables a Web Server to run an application specified in a client request and pass the request to that application for processing? CGI 8 – __________ is an XML-based directory service that enables businesses to publish listings about their activities and the services they offer. UDDI 19 – _________ is the standard email protocol for the Internet. SMTP 20 – _________ enables developers to create dynamic Web pages, Web applications, and XML Web services using a wide variety of programming languages and development tools. asp. net 21 – If ________ is used as the method of obtaining multimedia, content cannot begin playing until the file transfer is complete. downloading 2 – Media streaming is always a trade-off b/t ___________ and signal quality. Bandwidth 23 – On-demand streaming begins when the user requests it. ___________ begins at a prearranged time and is typically used for live content. Broadcast 24 – Unlike Windows Media Services, ___________ is not a role; it has its Sharepoint Services 25 – What method will you use to impose limitations – such as who can play it, what devices they can use, and how often they can play – on your multimedia content in order to control access to it? Windows Media Rights Manager