Shrooms

Untitled

Oct 23rd, 2017
138
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.28 KB | None | 0 0
  1. Study Sheet
  2.  
  3. • WDS is a software platform and technology that allows you to perform automated network-based installations based on network-based boot and installation media.
  4. • To use WDS, it must have; AD DS, DHCP, DNS, NTFS
  5. • An image group is a folder within the image repository of WDS that shares security options and file resources.
  6. • A discover image is an image file that you can burn to a CD-ROM or other boot medium.
  7. • WDS client unattend file: Automates the WDS client procedure that begins when the client computer loads the boot image file
  8. • Operating system unattend file: For a standard operating system installation; contains responses to all prompts that display after the client computer loads the install image file
  9. • Deployment Image Servicing and Management (Dism.exe) is a command-line tool that can be used to service a Windows image or to prepare a Windows PE image.
  10. • Windows Update: The program that scans your system to determine the updates and fixes your system needs.
  11. • Patch Tuesday: The second Tuesday of each month, when Microsoft routinely releases security updates.
  12. • Out-of-band patch: A patch deemed critical or time-sensitive; released when needed.
  13. • Out-of-band update: An update released when needed.
  14. • Hotfix: A single, cumulative package that includes one or more files used to address a problem in a software product, such as a software bug.
  15. • Cumulative patch: Multiple hotfixes combined into a single package
  16. • Domain-based namespace: Configuration is stored in Active Directory, so you don’t have to rely on a single server to provide the namespace information to your clients.
  17. • Stand-alone namespace: Configuration is stored on the server and the server name becomes part of the main path to the namespace.
  18. • A referral is an ordered list of servers or targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or a DFS folder with targets.
  19. • The replication group is a collection of servers, each of which holds a target of a DFS folder
  20. • The staging folder acts as a cache for new and changed files that need to be replicated.
  21. • Using File Server Resource Manager enables you to:
  22. • Create quotas for a volume or folder tree, including generating e-mails when the quota limits are approached or exceeded.
  23. • Create file screens to control the type of files that users can save.
  24. • Send notifications when users try to save a blocked file.
  25. • Active screening: Prevents users from saving the defined unauthorized files.
  26. • Passive screening: Allows users to save a file, but allows the monitoring and notification when a user saves an unauthorized file.
  27. • Encryption Algorithms are:
  28. • Symmetric: Uses a single key to encrypt and decrypt data. You need to initially send or provide the secret key to both the sender and the receiver.
  29. • Asymmetric: Also known as public-key cryptography, uses two mathematically related keys. One key encrypts data and the second key decrypts the data.
  30. • Hash function: Is meant as one-way encryption. After the data has been encrypted, it cannot be decrypted
  31. • A data recovery agent (DRA) can recover EFS encrypted files for a domain.
  32. • BitLocker Drive Encryption (BDE) is the feature in Windows Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 that can use a computer’s Trusted Platform Module (TPM), which is a microchip that is built into a computer.
  33. • It is used to store cryptographic information, such as encryption keys.
  34. • Domain Name System (DNS) is a naming service used by TCP/IP networks and is an essential service used by the Internet.
  35. • Fully qualified domain names (FQDNs) map a host name to an IP address.
  36. • Each node or leaf in the domain name tree is a resource record (RR), which holds information associated with the domain name.
  37. • Top-level domains consist of generic top-level domains and international country codes.
  38. • Second-level domains are registered to individuals or organizations.
  39. • A host is a specific computer or other network device in a domain
  40. • Primary zone: Provides an authoritative, read-write copy of the zone.
  41. • Secondary zone: Provides an authoritative, read-only copy of the primary zone.
  42. • Forward lookup zone: Contains most of the resource records for a domain. Used primarily to resolve host names to IP addresses.
  43. • Reverse lookup zone: Used to resolve IP addresses to host names.
  44. • A stub zone is a copy of a zone that contains only necessary resource records (SOA, NS, and an A record) in the master zone and acts as a pointer to authoritative name server.
  45. • Host (A and AAAA) record: Maps a domain/host name to an IP address.
  46. • Canonical Name (CNAME) record: Sometimes referred to as an Alias, maps an alias DNS domain name to another primary or canonical name.
  47. • Pointer (PTR) record: Maps an IP address to a domain/host name.
  48. • Mail Exchanger (MX) record: Maps a DNS domain name to the name of a computer that exchanges or forwards e-mail for the domain.
  49. • Service Location (SRV) record: Maps a DNS domain name to a specified list of host computers that offer a specific type of service, such as Active Directory domain controllers.
  50. • Round robin is a DNS balancing mechanism that distributes network load among multiple servers by rotating resource records retrieved from a DNS server.
  51. • Aging in DNS is the process of using timestamps to track the age of dynamically registered resource records.
  52. • Scavenging is the mechanism to remove stale resource records.
  53. • Remote access server (RAS): A server that enables users to connect remotely to a network, even across the Internet, using various protocols and connection types.
  54. • Routing and Remote Access (RRAS): A Microsoft application programming interface that provides remote access.
  55. • Routing: The process of selecting paths in a network where data will be sent.
  56. • Routers: Operate at the OSI Reference Model Layer 3, Network layer.
  57. • Layer 2 switches: Operate at the layer 2 OSI model and are used to connect a host to a network by performing packet switching that allows traffic to be sent only to where it needs to be sent based on mapping MAC addresses of local devices.
  58. • Layer 3 switches: Can perform layer 2 switching, but also perform routing based on IP addresses within an organization. Cannot be used for directly connecting WAN connections.
  59. • Routing table: A data table stored in a router or networked computer that lists the routes of particular network distances and the associated metrics or distances associated with those routes.
  60. • Static route: A route created manually in a routing table.
  61. • Dynamic route: A route created dynamically based on the current routing topology. Created with a routing protocol such as Routing Information Protocol (RIP).
  62. • Network Policy Server (NPS): Microsoft’s RADIUS server.
  63. • Authorization: The process that determines what a user is permitted to do on a computer system or network.
  64. • RADIUS client: A server or device that forwards RADIUS requests to a RADIUS server.
  65. • Access client: A computer or device that contacts or connects to a RADIUS client, which requires authentication and authorization to connect.
  66. • ACCESS CLIENT -> RADIUS CLIENT -> RADIUS PROXY -> RADIUS SERVER -> ACTIVE DIRECTORY
Advertisement
Add Comment
Please, Sign In to add comment