Term
| ____________ contain active Directory resources that are connected by reliable high-bandwidth net work links – a min of ___ megabits. |
|
Definition
|
|
Term
| What provides universal group information for the user account that is attempting to log on to the network? |
|
Definition
|
|
Term
| How many different operations master roles are there? |
|
Definition
|
|
Term
| Of the different Operations Masters roles which one acts as a windows NT primary domain controller? |
|
Definition
|
|
Term
| Which one is responsible for maintaining all interdomain object references? |
|
Definition
|
|
Term
| When is the Infrastructure Master not needed? |
|
Definition
| When all the domain controllers are global catalog servers as well |
|
|
Term
| In Exchange, SMTP supports two services, what are they? |
|
Definition
- Realtime Blackhole Lists (RBLs) - Improved Antivirus Support |
|
|
Term
| What protocol provides users access to newgroups either internally or over the internet? |
|
Definition
| Network News Transfer Protocol (NNTP) |
|
|
Term
What are the Minimum Hardware Requirements for Exchange Server 2003 Installation? |
|
Definition
Processor Pentium 133. Operating system Windows 2000 Server SP3. Memory 256 megabytes (MB). Disk space 200 MB on system drive, 500 MB on partition where Exchange Server 2003 is installed. Drive CD-ROM drive. Display VGA or better. File system All partitions involving Exchange Server 2003 must be NTFS. |
|
|
Term
What are the Recommended Hardware Requirements for Exchange Server 2003 Installation? |
|
Definition
Processor Pentium III 500 (Exchange Server 2003, Standard Edition). Pentium III 733 (Exchange Server 2003, Enterprise Edition). Operating system Windows Server 2003. Memory 512 MB. Disk space 200 MB on system drive, 500 MB on partition Where Exchange Server 2003 is installed; separate Physical disks for the Exchange binaries, database files, and transaction logs. Drive CD-ROM drive. Display SVGA or better. File system All partitions involving Exchange must be NTFS. |
|
|
Term
| For setup to complete successfully, you must have the following services installed and enabled on your sever: |
|
Definition
- Microsoft .NET framework - Microsoft ASP.NET - WWW service - SMTP service - NNTP service |
|
|
Term
| Before you install Exchange you have to prepare Active Directory for the installation. Preparing AD involves running _______________ and ______________. |
|
Definition
| ForestPrep and DomainPrep |
|
|
Term
| If you run ForestPrep in a domain that does not contain your ___________ it will end prematurely. |
|
Definition
|
|
Term
| Run ForestPrep from _______________________. |
|
Definition
| d:\setup\j386\setup.exe/forestprep |
|
|
Term
| What are the minimum required permissions to run forest prep for the first time? |
|
Definition
| Schema and Enterprise admin |
|
|
Term
| ____________ is available in 2003 but has to be manually enabled and installed. ________ framework is built into operating system. |
|
Definition
|
|
Term
| What is the setup switch that extends the Active Directory schema to include Exchange Server 2003–specific classes and attributes? |
|
Definition
|
|
Term
| DomainPrep prepares the domain partition, and must be run in each of the following domains: |
|
Definition
- The forest root domain - All domains that will contain Exchange Server 2003 - All domains that will contain Exchange mailbox-enabled objects (users and groups), even if the domain does not have its own Exchange Server 2003 server |
|
|
Term
| How many ways are there to remove an Exchange Server and what are they? |
|
Definition
- Using the Microsoft Exchange Installation Wizard - Forcibly Removing Exchange Server 2003 |
|
|
Term
| What prerequisites must be met to remove the Exchange server using the Wizard? |
|
Definition
- You must move all mailboxes to another Exchange server in the organization or remove them from each user account. - The server must not be a bridgehead server or routing group master. If it is, the role must first be transferred to another Exchange server in the routing group. - The server must not be a part of any connection agreements. - The server must not have any connectors installed and in use. - The server must not have any special roles. For example, if it holds the offline address book for an administrative group, you must copy this to another server. |
|
|
Term
| When you are doing a forceable removal you have to remove several registry keys where? |
|
Definition
| Delete several registry keys in the HKEY_LOCAL_MACHINE hive |
|
|
Term
| __________________ model is used in small to medium sized networks. |
|
Definition
|
|
Term
| ______________ is used in larger networks. |
|
Definition
|
|
Term
| _______________ are dependent upon physical layout |
|
Definition
|
|
Term
| You can only move servers between routing groups with the __________________________. |
|
Definition
| same administrative group |
|
|
Term
| In ________________, you can move servers between groups that are in different admin groups. |
|
Definition
|
|
Term
| The number of connectors is given by the formula _______________. |
|
Definition
|
|
Term
| You can not operate _______________ in Native Mode |
|
Definition
|
|
Term
| 2003 works in ______________ mode by default. |
|
Definition
|
|
Term
| Which manages the Microsoft exchange information store, including mailbox stores and public folder stores? |
|
Definition
| Microsoft Exchange Information Store |
|
|
Term
| What are the system requirements for running Microsoft Exchange System Management tools? |
|
Definition
|
|
Term
| Native mode provides the following advantages: |
|
Definition
- Greater flexibility for defining routing groups and administrative groups. - The ability to move mailboxes between servers in different administrative groups. - The ability to move servers between routing groups. - Query-based distribution groups (QDGs). QDGs allow membership of distribution groups to be dynamic rather than static. - If routing bridgehead pairs are upgraded to Exchange Server 2003 in a native-mode organization, they will use 8BITMIME data transfers instead of converting down to 7-bit. This results in considerably less traffic over WAN connections. |
|
|
Term
| Recipient objects can be categorized into the following four types: |
|
Definition
- User - Contact - Group - Public Folder |
|
|
Term
| A ________________________ is a user account that has mailbox in the Exchange organization and can send and receive e-mail through the Exchange Server 2003 infrastrucsture. |
|
Definition
|
|
Term
| __________ users are similar to mailbox-enabled users in that have domain user accounts in the AD domain. However, a _____________ user does not have a mailbox in the Exchange organization, only an e-mail address. |
|
Definition
|
|
Term
| A _________________ has an e-mail address but is not part of the exchange server and it is not apart of the AD domain. |
|
Definition
|
|
Term
| ___________________ resemble mail-enabled user in that they have e-mail addresses that are part of Exchange but they do not have mail-boxes that store e-mail. |
|
Definition
|
|
Term
| _______________ allows you to delete the mailbox without deleting the user account. |
|
Definition
|
|
Term
| Query-Based Distribution Groups can only be created in ___________________. |
|
Definition
|
|
Term
| What are Two types of Group recipients? |
|
Definition
| Security groups and Distribution groups |
|
|
Term
| _________________ groups cannot be assigned permissions |
|
Definition
|
|
Term
| What type of email address has two names associated with it? |
|
Definition
|
|
Term
| What type of group that changes frequently would be easy to maintain? |
|
Definition
| Query Based Distribution Group |
|
|
Term
| Users can use either _______________ or _____________________ to create their own public folders inside top-level folders to which they have been granted permission. |
|
Definition
| Outlook or the Exchange Server 2003 version of Microsoft Outlook Web Access |
|
|
Term
| What are the default items for a new public folder? |
|
Definition
|
|
Term
| __________________ are not visible or accessible to Outlook or OWA user, and only NNTP clients such as Microsoft Outlook Express and HTTp clients such as Microsoft Internet Explorer can access them. |
|
Definition
| General purpose public folder trees |
|
|
Term
| Why would you add an alias to a public folder? Where would you do that? |
|
Definition
If the folder name is too long.
In the Exchange General Tab |
|
|
Term
| How many ways are there to configure storage limits? |
|
Definition
Three
You can set storage limits on an entire public store or on individual public folders. You also can create a public store policy and apply the policy to as many public stores as necessary. When you set limits on the public store, all folders in the store inherit those settings. |
|
|
Term
| What does an age limit do? |
|
Definition
| An age limit determines the amount of time a folder retains items before automatically deleting them. |
|
|
Term
| What do directory rights do? |
|
Definition
Directory rights control which users and groups have permission to change e-mail-related attributes of a mail-enabled public folder. |
|
|
Term
| T/F : Circular logging is typically disabled for Mailbox stores? |
|
Definition
|
|
Term
| Why do you enable Circular logging? |
|
Definition
| - To limit the number of transaction log files and filling the available disk space |
|
|
Term
| What are the other items for a public folder? |
|
Definition
- Calendar Items - Contact Items - Journal Items - Note Items - Task Items |
|
|
Term
| What program do you use to create a general purpose public folder? |
|
Definition
|
|
Term
| What does the user need to do in order to access the general purpose public folder? |
|
Definition
| - They have to use a specific URL for the virtual directory |
|
|
Term
| What determines the amount of time a folder retains items before automatically deleting them? |
|
Definition
|
|
Term
| What requires that all messages be approved before being posted to a public folder? |
|
Definition
|
|
Term
| What controls which users and groups have permission to change e-mail-related attributes of a mail-enabled public folder? |
|
Definition
|
|
Term
| What is the System Attendant? |
|
Definition
| Controls the creation and deletion of all resources in the virtual server. |
|
|
Term
| _________________ is the default method of accessing a virtual server. |
|
Definition
|
|
Term
| Which type of authentication is the most secure method? |
|
Definition
| Integrated Windows Authentication is the most secure. |
|
|
Term
| When do you use encryption? |
|
Definition
| You only use encryption when you are using basic authentication. |
|
|
Term
| What are the requirements for an exchange virtual server? |
|
Definition
- A static IP address - A network name - One or more dedicated physical disks for shared storage - An Exchange 2003 Server System Attendant resource (this installs other Exchange resources) |
|
|
Term
| When Exchange Server 2003 is installed, it automatically installs, configures, and enables a ____________________________. |
|
Definition
| default SMTP virtual server |
|
|
Term
| What are the three diagnostic logging levels? |
|
Definition
- Minimum - High-level events—that is, a single entry for each major task performed by the service - Medium - Maximum |
|
|
Term
| ESMTP uses the standard SMTP commands (with the exception of _____________) and some additional commands mostly to support encryption and authentication. |
|
Definition
|
|
Term
| SMTP commands work over Port ____________ |
|
Definition
|
|
Term
| What command can be used to test connectivity between your Exchange Server 2003 server and a remote SMTP host? |
|
Definition
|
|
Term
| If the remote host responds with a 250 reply, then it supports ______________ commands. If the reply code is 500 then it does not support ____________. |
|
Definition
|
|
Term
| What are the 3 SMTP service folders? |
|
Definition
- Pickup - Queue - Bad Mail |
|
|
Term
| Why do you use a smart host? |
|
Definition
| - In the case of a non-persistant connection |
|
|
Term
| If you have one server configured as the smart host, should you enable the other server as well? |
|
Definition
|
|
Term
| What helps prevent IP spoofing? |
|
Definition
|
|
Term
| However, a few IMAP4 clients cannot interpret HTML. To provide _______________ for those clients, you configure their IMAP4 options on a ____________. |
|
Definition
plain text messages
per-user basis |
|
|
Term
| Therefore, many organizations implement two firewalls: an external firewall between their front-end servers (and other computers such as Web servers) and the Internet or other external networks, and an internal firewall that prevents external users accessing the company intranets. The front-end servers are then said to be in a perimeter network, sometimes referred to as a _____________________________. |
|
Definition
|
|
Term
A -----> B A Signs with A’s Private Key B Verifies with A’s Public Key |
|
Definition
|
|
Term
A -----> B A encrypts with B’s Public Key B will decrypt with B’s Private Key |
|
Definition
|
|
Term
| Digital and Encryption are part of the ________________ process. |
|
Definition
|
|
Term
| If, for example, you send zipped files as self-extracting executable (.exe) packages, most filters block them. What do you do to fix that problem? |
|
Definition
| Have them resend it as a non-self extracting file. |
|
|
Term
| A ______________ protects your network from unauthorized access and also can provide virus protection. |
|
Definition
|
|
Term
| Security systems need to protect against __________________________________________. |
|
Definition
| the malicious or careless insider as much as an external attack. |
|
|
Term
| What are the security utilities? |
|
Definition
- Microsoft Baseline Security Analyzer (MBSA) - Checks for missing patches, blank or weak passwords, and vulnerabilities on servers running Microsoft Windows 2000 or later, IIS, Microsoft SQL Server, and Microsoft Internet Explorer 5.01 or later - Microsoft Software Update Services (SUS) - Helps keep Windows-based computers and servers up to date with the latest critical updates - Microsoft Systems Management Server (SMS) - Automates the distribution and installation of the recommended security fixes for large companies with multiple locations |
|
|
Term
| SCL values range from ________________—the lower the value, the higher the probability that the message is junk mail. |
|
Definition
|
|
Term
| What does the Certificate Template do? |
|
Definition
| Defines the content and purpose of a certificate. |
|
|
Term
| The following services are required to provide compatibility with earlier versions of Exchange: |
|
Definition
- Microsoft Exchange Event Service - Microsoft Exchange Site Replication Service - Exchange MTA Stacks (Exchange Server 5.5 compatibility only) |
|
|
Term
| The default log file format for SMTP is ______________________. |
|
Definition
| W3C Extended Log File Format |
|
|
Term
| The default log file format for NNTP is.... |
|
Definition
| Microsoft IIS Log File Format |
|
|