Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Study Sheet
- • WDS is a software platform and technology that allows you to perform automated network-based installations based on network-based boot and installation media.
- • To use WDS, it must have; AD DS, DHCP, DNS, NTFS
- • An image group is a folder within the image repository of WDS that shares security options and file resources.
- • A discover image is an image file that you can burn to a CD-ROM or other boot medium.
- • WDS client unattend file: Automates the WDS client procedure that begins when the client computer loads the boot image file
- • Operating system unattend file: For a standard operating system installation; contains responses to all prompts that display after the client computer loads the install image file
- • Deployment Image Servicing and Management (Dism.exe) is a command-line tool that can be used to service a Windows image or to prepare a Windows PE image.
- • Windows Update: The program that scans your system to determine the updates and fixes your system needs.
- • Patch Tuesday: The second Tuesday of each month, when Microsoft routinely releases security updates.
- • Out-of-band patch: A patch deemed critical or time-sensitive; released when needed.
- • Out-of-band update: An update released when needed.
- • Hotfix: A single, cumulative package that includes one or more files used to address a problem in a software product, such as a software bug.
- • Cumulative patch: Multiple hotfixes combined into a single package
- • Domain-based namespace: Configuration is stored in Active Directory, so you don’t have to rely on a single server to provide the namespace information to your clients.
- • Stand-alone namespace: Configuration is stored on the server and the server name becomes part of the main path to the namespace.
- • A referral is an ordered list of servers or targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or a DFS folder with targets.
- • The replication group is a collection of servers, each of which holds a target of a DFS folder
- • The staging folder acts as a cache for new and changed files that need to be replicated.
- • Using File Server Resource Manager enables you to:
- • Create quotas for a volume or folder tree, including generating e-mails when the quota limits are approached or exceeded.
- • Create file screens to control the type of files that users can save.
- • Send notifications when users try to save a blocked file.
- • Active screening: Prevents users from saving the defined unauthorized files.
- • Passive screening: Allows users to save a file, but allows the monitoring and notification when a user saves an unauthorized file.
- • Encryption Algorithms are:
- • Symmetric: Uses a single key to encrypt and decrypt data. You need to initially send or provide the secret key to both the sender and the receiver.
- • Asymmetric: Also known as public-key cryptography, uses two mathematically related keys. One key encrypts data and the second key decrypts the data.
- • Hash function: Is meant as one-way encryption. After the data has been encrypted, it cannot be decrypted
- • A data recovery agent (DRA) can recover EFS encrypted files for a domain.
- • BitLocker Drive Encryption (BDE) is the feature in Windows Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 that can use a computer’s Trusted Platform Module (TPM), which is a microchip that is built into a computer.
- • It is used to store cryptographic information, such as encryption keys.
- • Domain Name System (DNS) is a naming service used by TCP/IP networks and is an essential service used by the Internet.
- • Fully qualified domain names (FQDNs) map a host name to an IP address.
- • Each node or leaf in the domain name tree is a resource record (RR), which holds information associated with the domain name.
- • Top-level domains consist of generic top-level domains and international country codes.
- • Second-level domains are registered to individuals or organizations.
- • A host is a specific computer or other network device in a domain
- • Primary zone: Provides an authoritative, read-write copy of the zone.
- • Secondary zone: Provides an authoritative, read-only copy of the primary zone.
- • Forward lookup zone: Contains most of the resource records for a domain. Used primarily to resolve host names to IP addresses.
- • Reverse lookup zone: Used to resolve IP addresses to host names.
- • A stub zone is a copy of a zone that contains only necessary resource records (SOA, NS, and an A record) in the master zone and acts as a pointer to authoritative name server.
- • Host (A and AAAA) record: Maps a domain/host name to an IP address.
- • Canonical Name (CNAME) record: Sometimes referred to as an Alias, maps an alias DNS domain name to another primary or canonical name.
- • Pointer (PTR) record: Maps an IP address to a domain/host name.
- • Mail Exchanger (MX) record: Maps a DNS domain name to the name of a computer that exchanges or forwards e-mail for the domain.
- • Service Location (SRV) record: Maps a DNS domain name to a specified list of host computers that offer a specific type of service, such as Active Directory domain controllers.
- • Round robin is a DNS balancing mechanism that distributes network load among multiple servers by rotating resource records retrieved from a DNS server.
- • Aging in DNS is the process of using timestamps to track the age of dynamically registered resource records.
- • Scavenging is the mechanism to remove stale resource records.
- • Remote access server (RAS): A server that enables users to connect remotely to a network, even across the Internet, using various protocols and connection types.
- • Routing and Remote Access (RRAS): A Microsoft application programming interface that provides remote access.
- • Routing: The process of selecting paths in a network where data will be sent.
- • Routers: Operate at the OSI Reference Model Layer 3, Network layer.
- • Layer 2 switches: Operate at the layer 2 OSI model and are used to connect a host to a network by performing packet switching that allows traffic to be sent only to where it needs to be sent based on mapping MAC addresses of local devices.
- • Layer 3 switches: Can perform layer 2 switching, but also perform routing based on IP addresses within an organization. Cannot be used for directly connecting WAN connections.
- • Routing table: A data table stored in a router or networked computer that lists the routes of particular network distances and the associated metrics or distances associated with those routes.
- • Static route: A route created manually in a routing table.
- • Dynamic route: A route created dynamically based on the current routing topology. Created with a routing protocol such as Routing Information Protocol (RIP).
- • Network Policy Server (NPS): Microsoft’s RADIUS server.
- • Authorization: The process that determines what a user is permitted to do on a computer system or network.
- • RADIUS client: A server or device that forwards RADIUS requests to a RADIUS server.
- • Access client: A computer or device that contacts or connects to a RADIUS client, which requires authentication and authorization to connect.
- • ACCESS CLIENT -> RADIUS CLIENT -> RADIUS PROXY -> RADIUS SERVER -> ACTIVE DIRECTORY
Advertisement
Add Comment
Please, Sign In to add comment