Sunday, May 26, 2019

It260 Midterm Study Guide

1 Two basic types of computers that stooge be on an enterprise network are Clients and innkeepers 2 Which role creates a single sign-on environment by implementing trust relationships that enable users on one network to access applications on other networks w/o providing a secondary set of logon credentials? Active Directory Federation Services (ADFS) 3 ________ enables administrators to create and enforce storage quotas, specify file types that are permitted on network volumes, and generate storage reports. File Server Resource Manager (FSRM) By using _________ installation option of WinSvr2008, you get a stripped-down meter reading of the OS that shows a single window w/ a cmd prompt. Windows Server Core 5 Windows Deployment Services requires two types of image files to perform remote node installations, a ______ image and an install image. Boot Image 6 Which role service w/n IIS enables the Web Server to forward incoming orisons for a specific URL to another URL? HTTP R edirection 7 IIS7 uses a generic request pipeline that is modular in nature.The component that manages the request pipeline, the hosts application pools, and the worker processes is called? Windows Process Activation Service (WPAS) 8 Which feature of IIS7 enables you to publish content found on different drives or different computers on a network, w/o copying or moving the content? Virtual Directory 9 Which feature of IIS7 is utilise to associate each incoming request w/ one particular Web Site, helping the protocol listener to identify each site request? Site Bindings 10 To use FTP7, you must install it in a WinSvr 2008 computer that is already running the role.Web Server (ISS) Role 11 While configuring a DNS server to perform reverse pee resolutions, you must create records for the addresses you want the server to resolve. Pointer (PTR) 12 IIS7 supports several authentication methods. Of these, the only method that is integrated into an IIS7 installation by default and u sed for Internet Web or FTP sites is _________. Anonymous Authentication 13 IIS7s Windows Authentication module supports two authentication protocols, Kerberos and _______. NTLM v2 14 NTFS permissions are agnize as, which consist of two basic types of _______, Allow and Deny.ACL & ACE 15 When a client obtains a Web servers certificate, its ability to decrypt the servers encrypted transmission using the servers, the system represented in the certificate. Public 16 Web applications use a three- horizontal surfaceed architecture The first tier is the client browser application, the second tier is a Web Server, and the third tier is a ____________. Database Server 17 Which protocol enables a Web Server to run an application specified in a client request and pass the request to that application for processing? CGI 8 __________ is an XML-based directory service that enables businesses to publish listings about(predicate) their activities and the services they offer. UDDI 19 _____ ____ is the standard email protocol for the Internet. SMTP 20 _________ enables developers to create dynamic Web pages, Web applications, and XML Web services using a dewy-eyed variety of programming languages and development tools. asp. net 21 If ________ is used as the method of obtaining multimedia, content cannot begin playing until the file transfer is complete. downloading 2 Media cyclosis is always a trade-off b/t ___________ and signal quality. Bandwidth 23 On-demand streaming begins when the user requests it. ___________ begins at a prearranged time and is typically used for have a go at it content. Broadcast 24 Unlike Windows Media Services, ___________ is not a role it has its Sharepoint Services 25 What method will you use to impose limitations such as who can play it, what devices they can use, and how often they can play on your multimedia content in order to control access to it? Windows Media Rights Manager

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.