.

Monday, March 11, 2019

It260 Midterm Study Guide

1 Two basic types of computers that heap be on an enterprise profits are Clients and bonifaces 2 Which role take a craps a unmarried sign-on environment by implementing trust relationships that enable usancers on unitary communicate to access maskings on other networks w/o providing a indorsement-string set of logon credentials? Active Directory Federation Services (ADFS) 3 ________ enables administrators to create and enforce storage quotas, specify file types that are permitted on network volumes, and generate storage reports. File legion Resource Manager (FSRM) By using _________ raiseation option of WinSvr2008, you get a stripped-down edition of the OS that shows a single window w/ a cmd prompt. Windows Server Core 5 Windows Deployment Services requires two types of image files to perform removed client installations, a ______ image and an install image. Boot Image 6 Which role service w/n IIS enables the Web Server to forrader incoming entreats for a specif ic URL to another URL? HTTP Redirection 7 IIS7 uses a generic request pipeline that is modular in nature.The cistron that manages the request pipeline, the legions application pools, and the worker processes is called? Windows Process energizing Service (WPAS) 8 Which singularity of IIS7 enables you to publish content found on different drives or different computers on a network, w/o copying or moving the content? Virtual Directory 9 Which feature of IIS7 is used to associate to each one incoming request w/ one particular Web Site, helping the protocol listener to identify each site request? Site Bindings 10 To use FTP7, you must install it in a WinSvr 2008 computer that is already running the role.Web Server (ISS) role 11 While configuring a DNS server to perform reverse digit resolutions, you must create records for the addresses you want the server to resolve. Pointer (PTR) 12 IIS7 supports several(prenominal) authentication methods. Of these, the only method that is integrated into an IIS7 installation by inattention and used for Internet Web or FTP sites is _________. Anonymous certification 13 IIS7s Windows Authentication module supports two authentication protocols, Kerberos and _______. NTLM v2 14 NTFS permissions are realized as, which consist of two basic types of _______, Allow and Deny.ACL & brilliance 15 When a client obtains a Web servers certificate, its ability to decrypt the servers encrypted transmission using the servers, the system represented in the certificate. Public 16 Web applications use a three-tiered architecture The first tier is the client browser application, the second tier is a Web Server, and the third tier is a ____________. Database Server 17 Which protocol enables a Web Server to run an application specified in a client request and pass the request to that application for processing? CGI 8 __________ is an XML-based directory service that enables businesses to publish listings about their activities and the function they offer. UDDI 19 _________ is the standard email protocol for the Internet. SMTP 20 _________ enables developers to create energetic Web pages, Web applications, and XML Web services using a long variety of programming languages and development tools. asp. net 21 If ________ is used as the method of obtaining multimedia, content cannot begin playing until the file transfer is complete. downloading 2 Media streaming is always a trade-off b/t ___________ and augury quality. Bandwidth 23 On-demand streaming begins when the user requests it. ___________ begins at a prearranged time and is typically used for live content. Broadcast 24 Unlike Windows Media Services, ___________ is not a role it has its Sharepoint Services 25 What method will you use to enforce limitations such as who can play it, what devices they can use, and how often they can play on your multimedia content in order to ascendence access to it? Windows Media Rights Manager

No comments:

Post a Comment