top-rated free essay

Final Review Server Security NT2670

By bnibarra Nov 21, 2014 1432 Words


Final review NT2670

Terminal Services Role enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.

Server Core is a stripped down version of the Operating System, where there is no start menu, no Microsoft Management Console (MMC) console, and virtually no graphical applications.

When a client runs an application on a terminal server, which computer are the services utilizing? The Terminal Server

A virtual server is a complete installation of an operating system (one or more) that runs in a software environment emulating a physical computer.

The Server Manager is an MMC (Microsoft Management Console) that provides a selection of the most commonly used tools

The Add Roles Wizard provides roles that fall into three basic categories: Directory Services,Application Services,Infrastructure Services

Where is the root directory of the default Web site placed when IIS is installed? C:\inetpub\wwwroot

Virtual Directories : Virtual Directories enable you to use a Web site to publish files located anywhere on the network.

Which of the following correctly identifies the HTTP binding options available

IP Address, Port Number, Host Header

FTP can use SSL to encrypt its authentication traffic before transmission : Secure Socket Layer

The most secure of the traditional challenge/response authentication methods supported by IIS7 is Windows Authentication :Windows Authentication

Which Authentication protocol is integrated into an IIS7 installation by default? :Anonymous Authentication

The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication

To restrict Web site or FTP access to specific computers or companies, you can create a list of IP Addresses add Domain Names to which the server will grant or deny access : IP Addresses and Domain Names

If all of the authentication methods fail, as in an improperly configured site with no methods enabled, the client receives HTTP Error 401.2 : 401.2

Web servers use port number 80 by default and the default number for an SSL connection is 443: 80; 443

Digital certificates are issued by internal or external resources called a certification authority : A Certification Authority

Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server

The client must use the prefix https:// in its URL to connect to an IIS7 server using SSL : Https://

Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server

Two basic types of computers that can be on an enterprise network are Servers and Clients : Servers and Clients

E-mail is typically created and sent using an e-mail client program, such as Microsoft Outlook or Eudora, called a Mail User Agent (MUA) : MUA (Exchange Server 2007

Domain names that contain the name of the host computer are called Fully Qualified Domain Names: Fully Qualified Domain Names (FQDN) (Exchange Server 2007

Extended Simple Mail Transfer (ESMTP) is an improved version of the standard e-mail protocol that provides greater support for embedded graphics and attachments in an e-mail :ESMTP (Exchange Server 2007

Which Exchange Server role allows users to access e-mail, voice mail, and fax messages from a MAPI client, OWA, smart phone, or telephone? : Unified Messaging (UM) (Exchange Server 2007

Web applications use a three-tiered architecture. First tier- The client browser application Second tier – Web Server, Third Tier – Database Server : Database Server

The two forest-wide FSMO roles that must be present on a single Domain Controller (DC) in the forest are the Domain Naming Master and the Schema Master : Schema Master (Exchange Server 2007

GPOs are applied to user and computer objects based on the link in the following order: Site>Domain>Parent Ous>Child Ous : Site (Exchange Server 2007

Unlike other Exchange servers within your Exchange Organization, servers, that host the Mailbox role cannot communicate directly with Active Directory : Mailbox

To relay e-mail within your organization and across the Internet, your Hub and Edge roles servers must have Connectors that specify how to send and receive e-mail:Connectors

Which user group represents users within an organization that have both a user account in Active Directory (AD) and a mailbox on an Exchange server? : Mailbox Users

Instead of using public folders, Outlook 2007 and Entourage 2008 MAPI clients use the Autodiscover and Availability services within Exchange 2007 to obtain offline address books, schedule calendar appointments, and obtain configuration information :Autodiscover and Availability services

Although mailbox users connect to a single public folder database be default, they will be able to see and access all of the public folders within the Exchange organization using public folder referrals :Public Folder Referrals

Although mailbox users connect to a single public folder database by default, they will be able to see and access all of the public folders within the Exchange organization using public folder referrals : Public folder referrals

Network-based firewalls can restrict traffic based on source and destination IP address, network, and Media Access Control (MAC) address :Media Access Control

Which platform does Exchange Server 2007 require for a production environment? :x64

Edge role servers must use ADAM to periodically obtain AD and Exchange information using the EdgeSync protocol from a server that hosts the Hub role : EdgeSync

When assigning permissions, it is best to assign them to Groups rather than to individual users : Groups

What type of mailbox allows a user in one forest to access a mailbox in another forest across a trust relationship? : Linked Mailbox

How many hub role servers should you have? : One for each AD site

You can use the TELNET command to test connectivity to SMTP, POP3, and IMAP4 :TELNET

Outlook Anywhere uses the RPC over HTTP component to connect to your Exchange Servers from across the Internet : RPC over HTTP

Creation of C:\inetpub\wwwroot : The results of adding Web Server (IIS) Role

Index.html is the original default filename for the : Web

All applications that you add to the Default Web Site on the server use Default AppPool Default AppPool

When IIS7 generates a 404 error, it sends a detailed error page, in response to local requests, and a custom error page for requests coming from other computers. Detailed Error pages assist with debugging

Custom Error pages simply tell the outside requester, “There is a problem.” : Detailed; custom

Web Applications use a three-tiered architecture:Client Browser application,Web Server Database Server : Database Server

All applications that you add to the Default Web Site on the server use the DefaultAppPool :DefaultAppPool

Windows Server 2008 includes a feature that implements an SMTP Server, which you can configure to handle all of the outgoing email messages sent by the system's various roles and features : SMTP Server

The Mail Exchanger (MX) DNS record is used to indicate the email server for a particular domain should be forwarded : Mail Exchanger (MX)

IMAP4
Allows you to leave a copy of your email on the serverIMAP4 uses TCP port 143 by default :IMAP4

POP3 is designed to download e-mail from an e-mail server to a client for viewing POP3 uses TCP Port 110 : POP3

The Mail Exchanger DNS record is used to indicate the email server for a particular domain should be forwarded : Mail Exchanger (MX)

POP3 Downloads and erases the email for the email sever,IMAP4Allows you to leave a copy in the server : POP3 and IMAP4

A Smart Host is an email server that receives inbound email and simply forwards it to another email server within the organization : Smart Host

The GC is a database of all object names in the forest and aids in locating objects in the Active Directory (AD) : Global Catalog

Which of the following is not a server role available in Exchange Server 2007? :Anti-spam

Which log in the Windows Event Viewer contains Exchange-related errors and warnings? :Application

What type of mailbox allows a user in one forest to access a mailbox in another forest across a trust relationship?Linked Mailbox

IIS7, to protect its own server functions, as well as those of other Web sites and Windows Server 2008 itself, can isolate Web applications in separate address spaces called Application Pools :Application Pools

How many hub role servers should you have? : One for each AD site

You can use the TELNET command to test connectivity to SMTP, POP3, and IMAP4 : TELNET

Outlook Anywhere uses the RPC over HTTP component to connect to your Exchange servers from across the Internet : RPC over HTTP

When assigning permissions, it is best to assign them to Groups rather than individual users : Groups

Cite This Document

Related Documents

  • NT2670 Unit 4 Assignment 1:SMTP Security Best Practices

    ...NT2670 Unit 4 Assignment 1 4/20/2014 1. The first Threat is Viruses have been around for years, but that doesn't make them any less dangerous or easy to eradicate. New, more destructive viruses and worms are being unleashed at an alarming rate. The Second threat is Spam. Spam is expected to increase to 80 to 90 percent of total email. ...

    Read More
  • nt2670

    ...the main cable fails, the entire network crashes. Advantages: 1. It’s easy to setup, handle and implement. 2. It’s best suited for small networks. 3. It very low in cost. Disadvantages:  1. The cable length is limited. This limits the number of networks nodes that can be connected. 2. This network topology can perform well only for a...

    Read More
  • NT2670 Midtern Questions

    ... What role enables users working at another computer on the company network, or on the internet, to establish a connection to a server and open an application or desktop session there? Terminal Services What Windows Server 2008 installation option is a stripped-down version of the operation system? Server Core When a client runs an applic...

    Read More
  • It 260 Final Exam Review

    ...diff versions of email protocols 4. Know diff Exchange server roles and what it allows you to access -=n B 5. Know the fsmo roles and which ones must be present together 6. Know the order in which GPO’s are applied 7. Know whether or not it is a good idea to install the Exchange role on multifunction servers 8. Know the amo...

    Read More
  • final private security

    ... V.I.P.E.R SECURITY L.L.C Mission Statement To provide the best security and consulting services to our clients by demonstrating responsiveness, diligence, judgment and building on our culture of excellence. Vision Statement Viper Security strives to be the highest quality security agency in the nation. We will exceed the expectations of ...

    Read More
  • Final Review

    ...Review for Test 3 MKTG 3781 Chapter 15 Buyers vs. Sellers Market: -making things convienent -Buyers market: supply is less then demand, there is more competition, more competition -Sellers: demand is less then supply, there is less competition (monopoly), manufacturers Factors affecting channel choice: -Before deciding those ans...

    Read More
  • Final Review

    ...Damoun Patterson [Instructor Name] 2010 English Dear Naomi Richards, My recent interest in the effects of divorce on children led me to find your article “The Positive Effects of Divorce on Children”. It can to my attention that we both stood on different aspects of the situation. I am a child of divorce and yes I can say that it m...

    Read More
  • Final Test Review Questions

    ...CST 232 Final Test Review Chaps. 5, 6, 7, 10, 11 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. ____ are stored as header information with each folder and file, along with other characteristics including volume label, designation as a subfolder, date of creation, and time of creation. ...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.