Shared Flashcard Set

Details

CIS 4358 Exam 3
N/A
65
Other
Undergraduate 4
07/29/2012

Additional Other Flashcards

 


 

Cards

Term
4.1 How does the Remote Desktop Protocol (RDP) work to show the contents of a remote desktop?
Definition
• RDP sends the info from desktop on server to RDP client. Mouse & Keyboard actions are forwarded to server. Resulting changes are returned to client
Term
4.1 Which role service enables access through the Internet past most firewalls?
Definition
·         RD Web Access
Term
4.1 What is the difference between a per-user license and a per-device license? When would a per-device license be a better choice?
Definition
• Per user –grants licenses to users to connect to a session hosts regardless of computer used for logon
Per device – grants licenses to computers to connect to a session host regardless of user who is logged on
Term
4.1 What client requirements are required to connect to a session host through a Web browser?
Definition
·         RD CAL is required
Term
4.1 What ports are used by RD Web Access?
Definition
• Port 80 & Port 443
Term
4.1 You want to enable RD Web Access on three session hosts. On which servers should you install the RD Web Access role service?
Definition
• Enterprise or Datacenter versions of Windows Server 2008
Term
4.1 What is the difference between the equal per user profile and the equal per session profile? How can a user overcome the restrictions enforced by the equal per session profile?
Definition
• Per user –allocates resources evenly between users
Per session –allocates resources evenly between sessions.
A user could consume more system resources by opening multiple sessions
Term
4.2 How does a user access applications through RemoteApp?
Definition
• Start Menu, Shortcut on desktop, Web access interface
Term
4.2 How does RemoteApp improve security of session host servers?
Definition
• Administrators can make application available to a user without making entire session host desktop available
Term
4.2 How many sessions are used if a user launches three applications on the same session host using RemoteApp?
Definition
One
Term
4.2 How do you add RemoteApp support to a session host?
Definition
• Use Remote Desktop Connection Manager
Term
4.2 What are the four ways you can make applications visible to remote desktop clients? Which method requires no configuration on the client computer?
Definition
• .rdp Shortcut File
.msi Installer Package
RD Web Access Application List
RemoteApp & Desktop Connection
Term
4.3 What advantage does using RD Connection Broker have over using network load balancing?
Definition
Review
Term
4.3 Why might you still use network load balancing when implementing the RD Connection Broker?
Definition
Review
Term
4.3 How can you unevenly distribute client sessions in a Remote Desktop server farm?
Definition
Review
Term
4.3 Which version of Remote Desktop Connection is required on the clients?
Definition
Review
Term
4.4 Which ports must be opened in the outer firewall to allow connections to the RD Gateway server?
Definition
Port 443
Term
4.4 Which servers can you allow access to using RD Gateway?
Definition
Servers running Windows Server 2008 R2
Term
4.4 What is the difference between a RD CAP and a RD RAP? Which restricts access to specific computers?
Definition
• RD CAP identifies users who are allowed to establish a connection through the RD.
RD RAP identifies internal resources that users are allowed to access.
RD RAP restricts access
Term
4.4 Why would you use a RADIUS server with RD Gateway?
Definition
To centralize RD CAP & RD RAP
Term
4.4 How does RD Gateway integrate with NAP?
Definition
You can configure RD Gateway to enforce health policies defined by NAP
Term
5.1 Which role service enables remote invocation of applications that are built on and hosted in COM+ and Enterprise Services components?
Definition
COM+ and Network Access
Term
5.1 When might you use the TCP port sharing feature?
Definition
When firewall configurations and network restrictions allow only a limited number of open ports
Term
5.1 What are the four methods you can use to start and stop applications remotely when you add the Windows Process Activation Service Support role service?
Definition
HTTP Activation; Messaging Queing Activation; TCP Activation; Name Pipes Activation
Term
5.1 Which IIS role services are server-side scripting technologies? Which role services execute applications on the IIS server?
Definition
ASP - Scripting . ASP.NET, NET Extensibility, CGI - Execute
Term
5.1 What is the difference between ISAPI extensions and ISAPI filters? When would you use each?
Definition
• Extensions –identifies a complied program that runs on the web server when a document with a specific file extension is requested.
Filters –program that continually runs on the server. Filters every request looking for request it needs to process
Term
5.1 Which file extensions are associated with a server-side include?
Definition
• .shtml
.shtm
Term
5.2 How is server virtualization different than network virtualization?
Definition
• Server Virtualization –runs multiple instances of a server o/s on single CPU
Network Virtualization –allows multiple virtual servers to communication using network protocols as if they were attached to a physical network
Term
5.2 How many parent partitions can you have on a server running Hyper-V?
Definition
ONE
Term
5.2 Which operating system versions and architecture types support Hyper-V? What are the hardware requirements for installing Hyper-V?
Definition

Hyper-V can be installed on 64-bit versions of Microsoft Windows Server 2008 or 2008 R2 running Enterprise, Standard, and Datacenter editions 

 

   Hyper-V can only be installed on 64-bit CPUs that support: hardware Assisted Virtualization and Data Execution Prevention. 

Term
5.2 What is disk pass-through? What does this allow you to do when configuring virtual machines?
Definition
A virtual machine that has exclusive use of a physical storage device that is attached to the physical computer.
Term
5.2 Which virtual disk type offers the best performance? Which type minimizes disk space use?
Definition
• Best Performance == Fixed Disk
Minimized disk space use == Dynamically Expanding
Term
5.2 What is the difference between an internal virtual network and a private virtual network?
Definition
• Internal –virtual machines can communicate with management o/s
Private –virtual machines cannot communicate with management o/s
Term
5.2 When would you need to use a legacy virtual network adapter?
Definition
• If integration services cannot be added
Term
5.2 How many virtual machines can you run on each Windows Server 2008 version without additional server licensing?
Definition
• Standard (1) Enterprise (4) Datacenter (Unlimited)
Term
6.1 What is the difference between Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS)? How are they similar?
Definition
• AD DS –creates and manages public key certificates used in software security
AD LDS –creates a directory store for use by directory enabled applications
Both are implemented by a Domain Controller
Term
6.1 Which role would you implement to safeguard digital information from unauthorized use?
Definition
AD RMS
Term
6.1 Which Active Directory role is required when implementing IPsec and EFS in a domain-wide environment?
Definition
AD CS
Term
6.1 Which server versions support Active Directory Federation Services (AD FS)?
Definition
Enterprise or Datacenter
Term
6.2 What is the purpose of administrator role separation?
Definition
• Provide a secure mechanism for granting non-administrative domain users right to log on to a domain controller without jeopardizing security of AD DS
Allows domain user to perform local administrative tasks
Term
6.2 How does unidirectional replication protect your network?
Definition
Performs inbound replication
Term
6.2 What are the steps within the RODC authentication process?
Definition
• Workstation sends logon request to RODC
RODC forwards request to writable domain controller
RODC sends results to workstation
RODC asks writable domain controller to replicate user credentials
Writable domain controller checks password replication policy
RODC stores user credentials in the appropriate attributes of the user account in the Active Directory database
Term
6.2 How does BitLocker increase the security of an RODC?
Definition
BitLocker encrypts all user and system files on a entire volume including the swap and hibernation files
Term
6.3 What are the advantages of using an enterprise CA over a standalone CA?
Definition
• Enterprise can issue certificates to users and computers in AD automatically
Enterprise uses certificate templates to simplify requesting and issuing certificates
Term
6.3 How does Web enrollment differ from autoenrollment?
Definition
• Web enrollment allows users to connect to CA via Web Browser while Autoenrollment automatically downloads and manages certificates from AD
Term
6.3 Which role service lets you centralize certificate revocation requests? What advantages does this service provide over clients using CRLs?
Definition
• Online Responder. Allows clients to check the status of a single certificate
Term
6.3 What does the registration authority do when using NDES?
Definition
RA submits certificate request to CA
Term
6.3 What is the advantage of taking the root CA offline?
Definition
Minimize attack exposure of root CA
Term
6.3 Why shouldn't you take an enterprise CA offline? How can you use an offline root CA but still use enterprise CAs?
Definition
• Enterprise CA Requires AD.
Using atleast two CA’s the root CA is offline and one or more enterprise subordinate CA’s are configured to support certificate templates & autoenrollment
Term
6.4 How does inheritance affect Group Policy settings?
Definition
• Through Group Policy inheritance, settings in a GPO are applied to all objects below the container where the GPO is linked
Term
6.4 How is the Block Inheritance setting affected by the No Override setting?
Definition
• No override takes precedence over block inheritance because it is enforced and will overwrite any conflicting settings
Term
6.4 How can you apply Group Policy settings to specific users or groups?
Definition
• Remove the authenticated users group from the ACL then add specific objects and grant the allow read and apply group policy
Term
6.4 How can you apply Group Policy settings to specific computers?
Definition
• REVIEW
Term
6.4 How does loopback processing affect computer settings?
Definition
• Computer settings are reapplied after user log in
Term
6.4 What is the difference between deleting a GPO and deleting a GPO link?
Definition
• Deleting a GPO removes GPO and removes all links
Deleting a GPO link removes GPO from linked object but does not delete GPO
Term
6.4 What is the Administrative Template central store? What advantages do you gain by enabling the central store?
Definition
• A special location starter GPO’s are saved to
Review
Term
6.4 What is the difference between using a starter GPO and copying an existing GPO?
Definition
• Starter GPO can be backed up and restored.
Copying an existing GPO you can back up and import GPO settings into a new GPO.
Term
6.4 How can you copy a GPO from one domain to another? How can you copy starter GPOs?
Definition
• Export the starter GPO as a .cab file then import it in the other domain using the Group Policy Management Console
Term
6.4 What is the difference between restore and import when working with GPO backups?
Definition
• Starter GPO can be backed up and restored
You can back up and import GPO settings into a new GPO when target domain does not have trust relationship with source domain
Term
6.5 What is the difference between assigned and published software?
Definition
• Assigned –is installed automatically when user tries to run a program or when a document associated with the software is opened
Published –made available for installation by adding it to add/remove programs
Term
6.5 Why should you use the UNC path to an installer package rather than the local path?
Definition

If update is needed you can just slipstream to repackage?

 

Review

Term
6.5 Which distribution method supports installing software during logon? Which option prevents software from being uninstalled by the user?
Definition

Review

Install Automatically at log on/ Add-Remove Programs

Term
6.6 What happens when you configure Account Policies settings in a GPO linked to an OU?
Definition
• Only the settings configured in a GPO linked to the domain take effect
Term
6.6 How can you configure different account policy settings for different users? Which tool would you use to do so?
Definition
• You can assign an exceptional PSO directly to particular user(s)

Fine Grained password policies
Term
6.6 Which object types can you associate with a granular password policy? Which object type should you use in most cases?
Definition
• Password Settings Container (PSC); Password Settings Object (PSO)
PSO used in most cases
Supporting users have an ad free experience!