Shared Flashcard Set

Details

CIS 4358 Exam 1
N/A
64
Other
Undergraduate 4
07/13/2012

Additional Other Flashcards

 


 

Cards

Term
1.1 What server roles require the Enterprise or Datacenter editions of Windows Server 2008?
Definition
Active Directory Federation Services (AD FS), Failover Clustering for up to 16 nodes, The NDES and Online Responder Service with ADCS, Unlimited # of remote access and VPN connections
Term
1.1 What are the main differences between the Enterprise and Datacenter editions?
Definition
Enterprise: Hyper V licenses allows host and up to 4 virtual instances, supports up to 8 processors. Datacenter: Hyper V licensings allows unlimited # of instances and supports up to 64 processors
Term
1.1 How many virtual instances are allowed on each Windows Server 2008 edition?
Definition
Standard (1) Enterprise (4) Datacenter (Unlimited) Itanium(Unlimited with 3rd party virtualization technologies)
Term
1.1 What server roles can run on a Web server edition of Windows Server 2008?
Definition
Web Services and Domain Name System (DNS)
Term
1.1 What is the difference between a full installation of Windows Server 2008 and a Server Core installation?
Definition
Server Core is a stripped down version of WS 2008. It provides you with minimal installation of WS 2008 that supports installing only certain server roles. (no desktop or windows shell) Full Installation option for WS 2008 supports all available server roles
Term
1.1 When can you upgrade from a Server Core installation?
Definition
Never. You can only perform a clean installation of server core. You cannot upgrade to or from server core
Term
1.2 What are the differences between Multiple Activation Key (MAK) and Key Management Services (KMS)?
Definition
MAK is used in small environments, allows use of predefined pool of activations, eliminates the need for the local server or management structure for licensing. KMS is uses in larger environments, allows local licensing server in local environments, requires local server constantly running with the available pools of activations
Term
1.2 What benefits come from using a response file during installation?
Definition
Allows us to install WS 2008 without needing to enter the data throught the different prompts during the installation process (no intervention on our behalf)
Term
1.2 What is the default file name for the unattended answer file?
Definition
Autoattend.xml (notes) / Autounattend.xml (video)
Term
1.2 Which Windows Server 2003 editions can be upgraded to Windows Server 2008 Enterprise edition?
Definition
WS 2003 standard edition can be upgraded to WS 2008 standard or enterprise edition
Term
1.2 Which Windows editions cannot be upgraded?
Definition
you can't upgrade WS 2003 standard to a versio lower than itself which is Windows Web Server 2008
Term
1.2 How can you move from a 32-bit installation to a 64-bit installation?
Definition
You cannot upgrade a 32 bit installation to a 64 bit installation
Term
1.2 What should you do if an upgrade fails without completing?
Definition
rollback to an exisiting WS installation
Term
1.3 When would you use a discover boot image?
Definition
when the computer does not support PXE environment
Term
1.3 How many install images do you need to deploy Windows Server 2008 to computers that will install the Standard, Enterprise, and Datacenter editions?
Definition
1. Each install image can have different editions of the windows o/s within it
Term
1.3 How many images would you need if you were deploying both 32-bit and 64-bit 1.3 operating systems?
Definition
since install image is architecture specific you must install the proper image for the 32 or 64 bit
Term
1.3 What type of boot image can you use to deploy a 64-bit install image?
Definition
a x64 computer can only use a x64 or x86 boot image
Term
1.3 What is the difference between static and dynamic discovery with a boot image?
Definition
Static Discovery you can manually identify the WDS server that will be used. Dynamic Discovery the client uses PXE emulated request to locate a WDS server on the network
Term
1.3 What are the advantages of pre-staging computer accounts when using WDS?
Definition
allows you to pre-create the computer accounts in Active Directory with the proper names
Term
1.3 How does multicasting differ from unicasting?
Definition
Mutlicast -sends the data once with multiple clients as it is requested. Unicast -sends requested image directly to the client as it is requested
Term
1.3 How does auto-cast differ from scheduled-casting?
Definition
Auto-cast transmission -starts as one client requests it. Client joins the transmission that has already started. Scheduled-cast transmission -starts based on the number of clients waiting and/or on the specific day and time.
Term
2.1 In which situation should you use different internal and external domain names?
Definition
1) use .local or .private namespaces so they are not available on the internet. 2) when you don't want records to be readable from the outside
Term
2.1 Which DNS zone has a read-only copy of the zone database?
Definition
secondary zone
Term
2.1 What are the differences between a forwarder and conditional forwarder?
Definition
Forwarder -resolves queries for records that cannot be resolved through cache Conditional Forwarding -is a forwarder that is used for a specific domain
Term
2.1 What is the name of a root zone?
Definition
. (dot)
Term
2.1 When should you use the HOSTS file for DNS name resolution?
Definition
1) to provide a single name resolution. 2) to map a hostname to an IP address that's different from what is provided by the DNS server. 3) to provide a name resolution outside of local subnet when DNS server is unavailable
Term
2.1 Which protocol allows computers to resolve names without the use of a DNS server or broadcasts?
Definition
Link Local Multicast Name Resolution (LLMNR)
Term
2.2 What is the difference between placing a DHCP server on each subnet and using a multihomed server?
Definition
DHCP on each subnet leases addresses to hosts on the subnet. Multihomed configures a single DHCP server to service multiple subnets
Term
2.2 What is the disadvantage of BOOTP forwarding?
Definition
Forwarding across multiple networks increases traffic and might negatively impact performance
Term
2.2 How many DHCP relay agents should be placed on a single subnet?
Definition
one
Term
2.2 When should you use a superscope?
Definition
1) to combine multiple scopes into a single logical scope. 2) to add more IP addresses to an exisiting scope. 3) to migrate clients from one scope to another over a period of time
Term
2.2 How is the preferred DHCP server selected?
Definition
because the client computer accepts the first DHCP lease offer it receives you cannot control which DHCP server will be used. Only way to control is to configure a 4 second or longer delay to give the preferred server time to respond before the backup server
Term
2.3 When would you use the GlobalNames zone?
Definition
1) to allow clients to use simple host names. 2) to allow DNS clients to contact NET-BIOS only hosts. 3) to allow IPv6 only hosts to contact NET-BIOS hosts
Term
2.3 What type of records do you create in the GlobalNames zone?
Definition
CNAME records
Term
2.3 How can you extend the GlobalNames zone across multiple forests?
Definition
use the SRV resource to publish the location of the global name zone
Term
2.3 Which strategies can you use to provide single-label name resolution for IPv6 hosts?
Definition
1) GlobalNames 2) Local Link Multicast Name Resolution (LLMNR)
Term
2.3 What is the disadvantage of using the HOSTS file in large networks?
Definition
file must be configured on each host
Term
2.3 When will a Windows client use LLMNR? What are the limitations of relying on LLMNR?
Definition
Client will use LLMNR to create ad-hoc networks or to find hosts on the local subnet without use of a DNS server. LLMNR replaces the NET-BIOS broadcast capabilities but requires LLMNR capable hosts.
Term
2.4 Which role service must you add to allow remote clients to access the private network, and not just the resources on the remote access server?
Definition
WS 2008 routing and remote access server role
Term
2.4 What are the ways that you can configure a remote access client to get an address for the remote access connection?
Definition
1) configure the remote access server to use DHCP to obtain addresses for remote clients. 2) configure a static pool of addresses on the RAS. 3) configure a static address on the client
Term
2.4 Which role service do you add to configure network policies on a server?
Definition
network policy server role
Term
2.4 What role do network policies play when you configure the remote access server?
Definition
a firewall like role because they identify a single client connection
Term
2.4 How do network policy constraints differ from conditions?
Definition
Conditions identify which network policies apply to incoming connections. Constraints specify additional connection characteristics that must be matched before the connection is granted
Term
2.4 What advantages does using SSTP have over using either PPTP or L2TP for a VPN connection?
Definition
Uses HTTP over SSL to establish the VPN connection. Uses port 443
Term
2.4 What ports must you open in a firewall to allow SSTP?
Definition
port 443
Term
2.5 When using a RADIUS solution, where are network access policies configured?
Definition
on the RADIUS server
Term
2.5 What is the difference between a RADIUS client and a remote access client?
Definition
RADIUS client forwards authenication requests to a RADIUS server. Remote Access Client connect to the access server and log in credentials are then forwarded to RADIUS server for authentication
Term
2.5 Why would you implement a RADIUS proxy?
Definition
to route connection requests and accounting data between RADIUS clients
Term
2.5 What is the difference between a RADIUS client and a RADIUS proxy?
Definition
RADIUS client forwards authentication requests to a RADIUS server. RADIUS proxy forwards connection requests between RADIUS clients
Term
2.5 What is the difference between a connection request policy and a network access policy?
Definition
Network Policy is configured on the RADIUS server to identify users who can connect to the network. Connection Policy is configured on the RADIUS proxy and determine if authentication request is forwarded to the RADIUS server or processed locally
Term
2.5 How does the RADIUS proxy use the remote RADIUS server group when processing authentication requests?
Definition
Authentication requests are received by the proxy are forwarded to the server(s) defined in one of the remote server groups
Term
2.5 What are the three types of RADIUS accounting events, and which event records actual logon requests by remote users?
Definition
1) Accounting Requests. 2) Authentication Requests. 3)Periodic Status Information.
Term
2.5 How many types of logging can be enabled at the same time on a RADIUS server?
Definition
All 3 types can be enabled at the same time. (Event logging, local file logging, SQL server logging)
Term
2.6 What functions are performed by the System Health Validator (SHV)?
Definition
Specify which benchmarks the client must meet to be granted access
Term
2.6 What does the enforcement server do with State of Health information?
Definition
Enforcement server forwards the state of health information to the NAP server and returns the corresponding state of health response
Term
2.6 How do remediation servers and auto-remediation help clients become compliant?
Definition
they provide a set of resources that a non-compliant computer can access on the limined access network
Term
2.6 What server role service do you add to configure a server as an enforcement point for NAP?
Definition
DHCP
Term
2.6 Which enforcement method uses a Health Registration Authority (HRA)?
Definition
Ipsec enforcement
Term
2.6 What type of communication occurs in the boundary network when using IPsec enforcement?
Definition
Ipsec is requested but not required to communicate between hosts in the restricted network and hosts in the boundary network
Term
2.7 By default, which type of traffic is allowed through the firewall?
Definition
all outbound traffic
Term
2.7 How can a policy help you maintain security integrity in your network?
Definition
Policy can allow you to isolate certain network resources from untrusted computers. You can apply policies to multiple computers.
Term
2.7 What is the benefit of using connection security rules?
Definition
it requires both communicating computers to have matching connection security rules or an Ipsec policy
Term
2.7 Which profile is applied on a server running Windows Server 2008 R2?
Definition
In WS 2008 R2 each network adapter applies the firewall profile best suited for the connection network
Term
What is a virtual machine?
Definition
is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine
Supporting users have an ad free experience!