Podcast
Questions and Answers
Which of the following is NOT a key concept when comparing private and public clouds?
Which of the following is NOT a key concept when comparing private and public clouds?
Private clouds are typically hosted on-premises or by a third party.
Private clouds are typically hosted on-premises or by a third party.
True
What are common types of physical hardware used in bare-metal servers?
What are common types of physical hardware used in bare-metal servers?
Virtual servers run directly on physical hardware.
Virtual servers run directly on physical hardware.
Signup and view all the answers
Windows Server 2019 editions include Datacenter, Standard, Essentials, and Hyper-V Server.
Windows Server 2019 editions include Datacenter, Standard, Essentials, and Hyper-V Server.
Signup and view all the answers
What is the purpose of a paging file in a server?
What is the purpose of a paging file in a server?
Signup and view all the answers
What is the primary function of SFC (System File Checker) in Windows Server 2019?
What is the primary function of SFC (System File Checker) in Windows Server 2019?
Signup and view all the answers
What is the main use of the Device Manager in Windows?
What is the main use of the Device Manager in Windows?
Signup and view all the answers
What is the primary purpose of the Get-Help
cmdlet in PowerShell?
What is the primary purpose of the Get-Help
cmdlet in PowerShell?
Signup and view all the answers
What is the purpose of the ping
command in network connectivity testing?
What is the purpose of the ping
command in network connectivity testing?
Signup and view all the answers
Tracert (Trace Route) is a useful command for pinpointing potential bottlenecks in a network path.
Tracert (Trace Route) is a useful command for pinpointing potential bottlenecks in a network path.
Signup and view all the answers
What does WinRM (Windows Remote Management) facilitate?
What does WinRM (Windows Remote Management) facilitate?
Signup and view all the answers
PowerShell scripts utilize the .ps1
extension.
PowerShell scripts utilize the .ps1
extension.
Signup and view all the answers
The Get-ExecutionPolicy
cmdlet in PowerShell controls script execution policy.
The Get-ExecutionPolicy
cmdlet in PowerShell controls script execution policy.
Signup and view all the answers
What does Hyper-V Manager allow users to do?
What does Hyper-V Manager allow users to do?
Signup and view all the answers
What types of virtual network connections are available with the Hyper-V Extensible Virtual Switch?
What types of virtual network connections are available with the Hyper-V Extensible Virtual Switch?
Signup and view all the answers
What are the key differences between Generation 1 and Generation 2 virtual machines in Hyper-V?
What are the key differences between Generation 1 and Generation 2 virtual machines in Hyper-V?
Signup and view all the answers
What is the primary use case of a Pass-Through Disk in a virtual machine?
What is the primary use case of a Pass-Through Disk in a virtual machine?
Signup and view all the answers
What is the purpose of Production Checkpoints in virtual machines, and how do they work?
What is the purpose of Production Checkpoints in virtual machines, and how do they work?
Signup and view all the answers
What is the primary function of PXE (Preboot Execution Environment) in network booting?
What is the primary function of PXE (Preboot Execution Environment) in network booting?
Signup and view all the answers
What role does WDS (Windows Deployment Services) play in deploying operating systems over a network?
What role does WDS (Windows Deployment Services) play in deploying operating systems over a network?
Signup and view all the answers
What is the primary purpose of the Windows Deployment Services Tool (WDS)?
What is the primary purpose of the Windows Deployment Services Tool (WDS)?
Signup and view all the answers
Which of the following are key advantages of using Active Directory (AD) domain user accounts?
Which of the following are key advantages of using Active Directory (AD) domain user accounts?
Signup and view all the answers
How are local user accounts different from domain user accounts?
How are local user accounts different from domain user accounts?
Signup and view all the answers
Joining a computer to an Active Directory domain enables the computer to access shared resources on the network.
Joining a computer to an Active Directory domain enables the computer to access shared resources on the network.
Signup and view all the answers
Installing the Active Directory Domain Services (AD DS) role using PowerShell requires running the command Install-WindowsFeature AD-Domain-Services
.
Installing the Active Directory Domain Services (AD DS) role using PowerShell requires running the command Install-WindowsFeature AD-Domain-Services
.
Signup and view all the answers
What are the key differences between Domain Local, Global, and Universal groups in Active Directory?
What are the key differences between Domain Local, Global, and Universal groups in Active Directory?
Signup and view all the answers
What is the primary purpose of Active Directory Sites and Services in managing replication?
What is the primary purpose of Active Directory Sites and Services in managing replication?
Signup and view all the answers
What is a Global Catalog in Active Directory, and what are its primary benefits?
What is a Global Catalog in Active Directory, and what are its primary benefits?
Signup and view all the answers
Which of the following are roles of FSMO (Flexible Single Master Operations) in Active Directory?
Which of the following are roles of FSMO (Flexible Single Master Operations) in Active Directory?
Signup and view all the answers
To install AD as an additional domain controller, the server needs to have the AD DS role installed, and sufficient permissions are required on the server.
To install AD as an additional domain controller, the server needs to have the AD DS role installed, and sufficient permissions are required on the server.
Signup and view all the answers
How can you enable the Global Catalog on a domain controller?
How can you enable the Global Catalog on a domain controller?
Signup and view all the answers
What are the main default folders found under a domain in Active Directory?
What are the main default folders found under a domain in Active Directory?
Signup and view all the answers
What is the purpose of EFS (Encrypting File System) in Windows Server?
What is the purpose of EFS (Encrypting File System) in Windows Server?
Signup and view all the answers
Describe how to compress files using PowerShell.
Describe how to compress files using PowerShell.
Signup and view all the answers
What are the key differences between NTFS, ReFS, exFAT, and FAT32 file systems?
What are the key differences between NTFS, ReFS, exFAT, and FAT32 file systems?
Signup and view all the answers
How can you grant read-only permissions to a file using PowerShell?
How can you grant read-only permissions to a file using PowerShell?
Signup and view all the answers
What are the steps involved in auditing access to files and folders in Windows Server?
What are the steps involved in auditing access to files and folders in Windows Server?
Signup and view all the answers
Audit events are a crucial component of security monitoring, tracking actions like logins, file access, and system changes.
Audit events are a crucial component of security monitoring, tracking actions like logins, file access, and system changes.
Signup and view all the answers
How do you check effective access for a user on a resource?
How do you check effective access for a user on a resource?
Signup and view all the answers
SMB (Server Message Block) is a protocol designed specifically for file and printer sharing in Windows environments.
SMB (Server Message Block) is a protocol designed specifically for file and printer sharing in Windows environments.
Signup and view all the answers
NFS (Network File System) is widely used in Unix/Linux systems for accessing files over a network.
NFS (Network File System) is widely used in Unix/Linux systems for accessing files over a network.
Signup and view all the answers
You can configure both SMB and NFS on a Windows server, enabling sharing for Windows and Unix/Linux clients.
You can configure both SMB and NFS on a Windows server, enabling sharing for Windows and Unix/Linux clients.
Signup and view all the answers
What is the primary purpose of Access-Based Enumeration (ABE) in file and folder sharing?
What is the primary purpose of Access-Based Enumeration (ABE) in file and folder sharing?
Signup and view all the answers
How can you enable ABE on a shared folder in PowerShell?
How can you enable ABE on a shared folder in PowerShell?
Signup and view all the answers
NFS shared folder permissions are typically set using Unix-style permissions similar to the chmod
command.
NFS shared folder permissions are typically set using Unix-style permissions similar to the chmod
command.
Signup and view all the answers
What is the primary function of DFS Namespaces?
What is the primary function of DFS Namespaces?
Signup and view all the answers
Domain-based DFS requires an Active Directory environment, whereas Standalone DFS relies on a stand-alone server and doesn't need Active Directory.
Domain-based DFS requires an Active Directory environment, whereas Standalone DFS relies on a stand-alone server and doesn't need Active Directory.
Signup and view all the answers
What are the primary steps for configuring DFS Namespaces?
What are the primary steps for configuring DFS Namespaces?
Signup and view all the answers
What are the key differences between soft and hard quotas in storage management?
What are the key differences between soft and hard quotas in storage management?
Signup and view all the answers
The fsutil quota
command in PowerShell can be used to manage storage quotas on a file server.
The fsutil quota
command in PowerShell can be used to manage storage quotas on a file server.
Signup and view all the answers
Sharing printers over a network using SMB involves sharing the printer via the Devices and Printers interface, managing permissions, and optionally using PowerShell commands for finer control.
Sharing printers over a network using SMB involves sharing the printer via the Devices and Printers interface, managing permissions, and optionally using PowerShell commands for finer control.
Signup and view all the answers
What is the primary function of the Print Spooler?
What is the primary function of the Print Spooler?
Signup and view all the answers
You can use PowerShell to start or stop the Print Spooler service (Start-Service
and Stop-Service
) and view print jobs (Get-PrintJob
).
You can use PowerShell to start or stop the Print Spooler service (Start-Service
and Stop-Service
) and view print jobs (Get-PrintJob
).
Signup and view all the answers
What are some common causes of blank pages when printing?
What are some common causes of blank pages when printing?
Signup and view all the answers
How can PowerShell be used to troubleshoot garbled print output?
How can PowerShell be used to troubleshoot garbled print output?
Signup and view all the answers
What are the key benefits of using RAID 0 in terms of performance and data redundancy?
What are the key benefits of using RAID 0 in terms of performance and data redundancy?
Signup and view all the answers
What are the benefits and trade-offs of using RAID 1 for data redundancy?
What are the benefits and trade-offs of using RAID 1 for data redundancy?
Signup and view all the answers
What are the benefits and trade-offs of using RAID 5?
What are the benefits and trade-offs of using RAID 5?
Signup and view all the answers
What is the primary function of the chkdsk
command in Windows Server?
What is the primary function of the chkdsk
command in Windows Server?
Signup and view all the answers
What is the purpose of the gpupdate
command?
What is the purpose of the gpupdate
command?
Signup and view all the answers
What is the purpose of the ipconfig
command?
What is the purpose of the ipconfig
command?
Signup and view all the answers
What is the primary purpose of DNS caching in Windows Server?
What is the primary purpose of DNS caching in Windows Server?
Signup and view all the answers
How can you view and clear the DNS cache using PowerShell?
How can you view and clear the DNS cache using PowerShell?
Signup and view all the answers
What are the main differences between primary and secondary DNS servers?
What are the main differences between primary and secondary DNS servers?
Signup and view all the answers
What are root hints in DNS, and what is their purpose?
What are root hints in DNS, and what is their purpose?
Signup and view all the answers
Study Notes
Difference Between Private Cloud and Public Cloud
- Private Cloud infrastructure is used exclusively by one organization. It offers high control, customization, and security, and can be hosted on-premises or by a third party.
- Public Cloud infrastructure is shared by multiple organizations and managed by third-party providers like AWS, Azure, or GCP. It's scalable and cost-effective, but offers less control over data.
Hardware Requirements for Bare-Metal and Virtual Server
- Bare-Metal Server: Directly runs on physical hardware. Key requirements include a high-performance CPU, large RAM, RAID-enabled storage, and reliable network interface cards (NICs). There is no virtualization layer.
- Virtual Server: Runs on a hypervisor. Key requirements include a powerful CPU with virtualization support, ample RAM for multiple virtual machines (VMs), high-speed storage (e.g., solid state drives or NVMe drives), and virtual network interface cards (vNICs).
Pre and Post-Deployment Requirements for Windows Server 2019
- Pre-Deployment: Verify hardware compatibility and plan IP addressing, domain configuration, and storage setup prior to deploying the server. Backups of existing data are also recommended.
- Post-Deployment: Install updates, configure roles (e.g., Active Directory Domain Services (AD DS), Domain Name System (DNS)), enable monitoring, and back up the configuration and system state.
Windows Server 2019 Editions
- Datacenter edition supports unlimited virtualization and advanced features like Storage Spaces Direct.
- Standard edition offers limited virtualization (2 virtual machines) and core features.
- Essentials edition is designed for small businesses, does not require CALs, and supports up to 25 users.
- Hyper-V Server is a free, bare-minimum Hyper-V role.
Managing Server Core Editions
- Server Core installation is minimal and does not include a graphical user interface (GUI).
- Key management tools include sconfig (simple configuration tool), PowerShell (scripting and automation), Remote Server Administration Tools (RSAT), and WinRM/WS-Management (remote management).
Paging
- Paging is a memory management scheme that retrieves data from secondary storage (paging file) when RAM is full to prevent system crashes.
- It optimizes paging file size and ensures disk performance.
Repairing System Files in Server 2019
- SFC (System File Checker) is a tool for repairing corrupted system files.
Device Manager in Windows
- Used for managing and troubleshooting hardware devices. Users can view driver status, update or roll back drivers, disable/enable devices, and scan for hardware changes.
Getting Help in PowerShell
- Get-Help provides documentation on cmdlets.
- Update-Help downloads the latest help files.
- Examples are provided for specific cmdlets.
Testing Network Connectivity
- Key tools for testing network connectivity include ping, Test-NetConnection, and tracert.
How to Use WinRM (Windows Remote Management)
- A Microsoft protocol for remote management and access to servers. Key steps include enabling WinRM, configuring trusted hosts, and using PowerShell for remote commands.
Managing Scripting in PowerShell
- Scripts use a .ps1 file extension.
- Notepad or PowerShell ISE can be used for script editing.
- Execution policy controls script execution, and PowerShell cmdlets like
Get-ExecutionPolicy
andSet-ExecutionPolicy
can be used to check and modify this policy. - Modules extend functionality.
- Automation can be achieved using the Task Scheduler or PowerShell cmdlets like Register-ScheduledTask.
Setting Up a Virtual Machine Using Hyper-V Manager
- Step-by-step instructions for creating and configuring a new virtual machine using Hyper-V Manager. Crucial steps in settings configuration include choosing hardware specifications, specifying the names, virtual disk, operating system installation, and starting up the virtual machine.
Hyper-V Extensible Virtual Switch Protocol
- Hyper-V provides network connectivity to VMs through an extensible virtual switch protocol.
- The protocol has several different types: External, Internal, Private, and Extensible.
Difference Between Generation 1 and Generation 2 Virtual Machines
- Generation 1 VMs support older operating systems.
- Generation 2 VMs support more modern systems (e.g., Windows 8.1, Server 2012 R2).
- Generation 2 VMs offer faster boot times, security features, and support for newer storage types.
Use of Pass-Through Disk in a VM
- Provides direct access to a physical disk on the host to improve performance for larger datasets or specialized hardware.
- The physical disk should be offline on the host prior to setting up access in the VM settings for this operation.
Production Checkpoints in Virtual Machines
- Using VSS (Volume Shadow Copy Service) to create consistent snapshots for backing up VMs. This method aids in rollback capabilities, ensuring minimal data loss.
PXE (Preboot Execution Environment) and WDS (Windows Deployment Services)
- PXE enables network booting to install an OS without physical media.
- WDS is a Windows Server role for deploying OS images. Key features include PXE boot support, multicast deployments (for faster updates and deployment), image management, and OS deployment. This functionality allows for quicker deployment and updates without needing to install media.
Windows Deployment Services Tool (WDS)
- Streamlines OS deployment via networks. The tool handles aspects of image management, installation, imaging, and deployment.
How Domain Controllers Handle Local and Domain User Accounts
- Domain user accounts are stored in Active Directory (AD).
- AD provides centralized authentication for networked systems.
- Local user accounts are stored on individual computers.
Using Active Directory Sites and Services for Replication
- Used to control replication between domain controllers/servers.
- Steps to access and configure replication intervals are involved in site links and schedules setup.
Global Catalog in Active Directory
- A distributed data repository containing searchable, partial replicas of every object in the Active Directory (AD) database.
- This feature speeds up object lookups and authentication across domains.
FSMO (Flexible Single Master Operations)
- Roles in AD that maintain the consistency and integrity of the directory database across the forest. These vital components include schema master, domain naming master, rid master, pdc emulator, and infrastructure master. These roles handle aspects like schema management, object naming, assigning unique identifiers, maintaining time synchronization, and cross-domain reference management.
Requirements for Installing AD as an Additional Domain Controller
- Pre-requisites prior to installation include ensuring the server has the AD DS (Active Directory Domain Services) to ensure the server can function correctly and facilitate compatibility for installation. The server should also have network connectivity to the existing domain controller and sufficient permissions to allow promoting the server to new roles and functions within the Active Directory forest. Steps for installation include using the Install-ADDSDomainController PowerShell cmdlet or the ADDS Wizard.
Adding a Global Catalog to a Domain Controller
- Steps to execute the Global Catalog addition include Opening Active Directory Sites and Services, expanding the site and servers within the interface, and right-clicking the target server to access the NTDS (Netlogon Domain) settings in the interface's menu. Enabling the Global Catalog under these settings completes the addition process.
Default Folders Under a Domain in Active Directory
- Key folders like Users, Computers, Domain Controllers, and Built-in (Predefined groups, e.g., Administrators and Users) are essential directories in the Active Directory configuration.
EFS (Encrypting File System)
- Provides file-level encryption to protect data on NTFS volumes.
- Enables encryption using commands like
Cipher /E /S
to secure folder paths.
Compressing Files Using CLI/PowerShell
- Commands for compressing and uncompressing files using both command-line tools and PowerShell, including specific examples.
NTFS, ReFS, exFAT, FAT32
- Key differences in file systems include file compression, permissions, support for large file sizes, resilience to corruption, and security.
Granting Read-Only Permissions on a File Within a Folder
- Steps to grant read-only permissions to a file within a folder include right-clicking the file, selecting Properties, navigating to the Security tab, and executing the Edit command to add users or groups to specific permissions/privileges. (e.g. using PowerShell
icacls FilePath /grant UserName:(R)
).
Auditing Access to Files and Folders
- Steps to audit access and implement access auditing. This includes opening Group Policy Management Editor, configuring object access auditing, and adding users for these audits.
Effective Access
- The actual permissions a user has on a resource. Includes explicit permissions, group memberships, and inherited permissions.
SMB/NFS Protocols
- SMB (Server Message Block) is used for file and printer sharing in Windows.
- NFS (Network File System) is commonly used in UNIX/Linux for network file sharing. Servers can be installed and configured for both if necessary. Both share files across networks for easier access.
Access-Based Enumeration (ABE)
- Users only see files and folders they have permission to access. Server managers and PowerShell can be used for setup.
NFS Shared Folder Permissions
- Key concepts relating to NFS shared folder permissions.
DFS Namespaces (Distributed File System)
- Provides a unified namespace for shared folders across servers.
- Two types (Domain-based, Standalone DFS) and steps to configure the feature in Server Manager and DFS Management are covered.
Soft and Hard Quotas
- Soft quotas enforce storage limits but allow exceeding those limits.
- Hard quotas enforce strict limits to prevent users exceeding storage allocations.
- Quota management tools like File Server Resource Manager (FSRM) on Windows Server can be used for configuration.
SMB Shared Printer Management
- Steps involved in sharing a network printer via SMB protocol and handling user permissions for shared printers, and PowerShell commands involved in these scenarios.
Print Spooler Functions and Management Using PowerShell
- PowerShell tools handle print jobs in a queue, and commands for starting and stopping the service, viewing jobs, and managing the print spooler.
Major Print Device Issues
- Diagnosis techniques for several common print device issues (e.g., blank pages).
RAID Volume Types
- RAID levels are discussed and explained, explaining their purpose, properties (e.g., redundancy), and uses (e.g., improved performance, storage efficiency). Specific RAID levels (RAID 0, RAID 1, RAID 5, RAID 10) and their applications in data storage are included.
Key CLI Commands
- PowerShell tools like
sconfig
,chkdsk
,gpupdate
,gpresult
, andipconfig
allow for initial setup, disk error checks and repair, immediate policy updates, display/management of Group Policy settings, and displaying/managing of IP configuration.
DNS Cache Management
- Explanation of techniques used for managing DNS (Domain Name System) caches and how this component of the server helps to speed up requests.
Authoritative DNS Server Types
- Understanding the differences between primary and secondary DNS servers. Primary hosts have the original and read-write copy of the data, and secondary hosts provide a back-up and read-only copy of data to ensure redundancy.
Root Hints
- Explanation of how Root Hints influence DNS resolution in cases where DNS servers don't have a local answer to a request.
DNS Resource Records
- Definition and use cases of various DNS record types (A, AAAA, CNAME, MX, PTR, NS, SRV).
DNS Zone Types
- Explain the different types of DNS zones (Stub, Conditional Forwarder, Primary, Secondary).
Using nslookup for DNS Troubleshooting
- Detailed explanation on how to use the
nslookup
command to troubleshoot DNS issues by querying DNS records. Common commands are outlined for various use cases.
DORA Process in DHCP
- Explanation of the Discover, Offer, Request, Acknowledge (DORA) process in dynamic host configuration protocol. This component is vital for assigning network addresses to devices.
Fault Tolerance for DHCP in DMZ
- Fault tolerance strategies involve configuring two servers (
Split Scope
) for load balancing or redundancy, and regularly backing up the DHCP database.
Network Topologies
- Key network topologies, their use cases, and characteristics are included in the notes, including Demark Point, DMZ (Demilitarized Zone), and Edge Network.
SaaS, PaaS, laaS, XaaS
- Definitions and examples of the different cloud computing service types, categorized by their level of service (accessing software, a platform, or infrastructure).
Docker Containers
- Purpose, key features, and use of Docker containers for running applications in isolated environments using lightweight virtualization. Common commands (
docker run
,docker ps
,docker build
) are included to support configuration.
Group Policy Application and Use
- Purpose of applying and utilizing group policy features within an Active Directory domain.
Default GPOs in an AD Domain
- Default Domain policy and Domain Controllers Policy are defined. Their use cases and applications to organizational security and configuration are outlined.
Applying a GPO to Allow Users to Install a Package
- Steps involved for applying a Group Policy Object (GPO) in an Active Directory domain to manage user access to installing specific software.
AD RMS and ACLS
- Discusses the functioning of Active Directory Rights Management Services (RMS) in protecting digital objects and providing detailed definitions for Active Directory rights management systems (ACLs) to regulate granular permissions/access control to various objects (folders, files, etc.).
Blacklisting vs. Whitelisting
- Definitions and explanations for blacklisting and whitelisting, comparing/contrasting their applications and use cases. This is helpful in secure environments.
Software Restriction Policies vs. Application Control Policies
- Definitions and differences between Software Restriction Policies (SRP) and Application Control Policies (e.g., AppLocker), used for allowing/blocking application installations via Group Policy Object (GPO) configuration.
Common Ports and Their Uses
- Explains common network port numbers and functionalities. This section details common protocols used for these network ports.
Actions to Solve Performance Problems
- Actions for tackling and solving performance issues. This section provides helpful guidance in resolving computer and server performance issues.
Server Maintenance Cycle
- Key tasks and crucial steps involved in properly maintaining server hardware to prevent issues and ensure operational efficiency.
Monitoring
- Techniques for continuously monitoring server performance and logs to identify and resolve issues promptly.
Security Checks
- Steps involved for regularly performing vulnerability scans and updating antivirus software.
Hardware Checks
- Practical steps for regularly inspecting components and replacing any defective/worn-out parts.
Documentation
- Procedures for documenting server maintenance and change activities to ensure accurate records.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.