Final Flashcards

(138 cards)

1
Q

T/F An organizational unit is a logical subgroup within Active Directory that you can
employ to locate resources used by a single workgroup, section, or department in a
company and apply policies that apply to only these resources.

A

True—An easily managed OU structure reflects some aspects of your company’s
internal organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F The main purpose of a security group is to create a distribution list for email
purposes. These groups have security information, such as unique security identifiers
(SIDs).

A

False—A distribution group is used to create a distribution list. These groups do
not possess SIDs and cannot be assigned permission to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F When you assign a single user or group full control of the entire domain, of a single
OU, or limited rights to a set of OUs, the permissions are not inheritable.

A

False—When you delegate control, the default behavior of AD DS is to make
such permissions inheritable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F Account operators, server operators, print operators, and backup operators are built-in
security groups that enable members to perform limited administrative capabilities
within the domain in which they are located.

A

True—AD DS provides several built-in security groups. You can add members to
these groups when their defined rights match the administrative capabilities you
want to confer to these users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F Some machine-local groups are similar in usage and membership to domain local
groups. These types of local groups do not exist in AD DS and grant users access to
resources on the local computer only.

A

True–For access to resources located on more than one computer in the domain,
always use domain local groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F To create an OU, you must be a member of the Account Operators group.

A

False–To create an OU, you must be a member of the Account Operators,
Domain Admins, or Enterprise Admins groups by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F There is a GUI version of the Active Directory Recycle Bin feature. By default, the
Recycle Bin is disabled, but you can enable it from within AD Administrative Center.
After the recycle bin is enabled, you cannot disable it.

A

True– When enabled, you have the ability to restore recently deleted items from
Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F You have the capability to assign a single user or group full control of the entire
domain, of a single OU, or limited rights to a set of OUs.

A

True–When you delegate control, keep in mind that the default behavior of AD
DS is to make such permissions inheritable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F If you run the Delegation of Control Wizard multiple times, permissions granted for
the OU are replaced each time with the new permissions.

A

False—Permissions are cumulative rather than having the wizard replace prior
permissions each time you run it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F In Active Directory Users and Computers to view the effective OU permissions
granted to a user or group, the Effective Permissions tab shows all granted
permissions, including inherited permissions.

A

True–This includes all permissions inherited through membership in other
Groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not one of the three types of user accounts present in an AD
DS network?

A

Enterprise user accounts
User accounts embody specific information pertinent to a user, such
as username, password, and specific logon limitations. User accounts can be
either built-in accounts or self-generated. Each user account has a comprehensive
set of configurable properties associated with it. Among these are group
memberships, logon scripts, logon hours, account expiration, user profile, and
dial-in permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Windows Server 2012 R2 group scope can be used to include users, computers,
and groups from any domain in the forest but cannot be employed to grant permissions to
any resource in the forest?

A

Domain local
Domain local groups can include users, computers, and groups from
any domain in the forest. They are most often utilized to grant permissions for
resources and can be used to provide access to any resource in the domain in
which they are located. It is thus logical for a domain local group to include
global groups that contain all users with a common need for a given resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You can organize your domain into logical subgroups called ________that enable you
to collect users, computers, and other resources for simplified local administration
according to your company’s organizational chart of departments, sections, work units,
and so on.

A

Organizational units
You can change this grouping of OUs easily if your company
reorganizes; such a task is much easier than attempting to re-create child domains
according to a new corporate structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A(n) _______ is used to collect a set of users who need to share a particular set of
permissions to a resource, such as a file, folder, or printer.

A

Group

. The available membership depends on the group scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A recommended group nesting strategy is ________________.

A

None of the above
Microsoft continues to recommend the same strategy for nesting
groups that it has supported since Windows NT 4.0. Place accounts (A) into
global groups (G). Add the global groups to domain local groups (DL). Assign
permissions (P) to the domain local groups. In short, this strategy is known as
AGDLP (Accounts to Global groups to Domain Local groups to Permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these is a built-in security group designed to enable members to perform
limited administrative tasks within the domain in which they are located?

A

Backup operators
AD DS provides several built-in security groups that enable members
to perform limited administrative capabilities within the domain in which they are
located. These include account operators, server operators, print operators, and
backup operators. You can add members to these groups when their defined rights
match the administrative capabilities you want to confer to these users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ________ group can include users and groups from any domain in the AD DS forest
and can be employed to grant permissions to any resource in the forest.

A

universal.
A universal group can include users, computers, and global groups
from any domain in the forest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Window Server 2012 R2 security group that is granted full rights to manage the
entire domain is the ________ group.

A

Domain Admins.
This group is automatically made a member of each member
server’s, member computer’s, and domain controller’s Administrators local groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Windows Server 2012 R2 security group that has full rights to manage the domain
controllers but not the entire domain is the ________group.

A

Administrators

This group is in the Built-in container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The group scope that can include users, computers, and other global groups from the
same domain is ________.

A

universal.
You can use universal groups to organize users who have similar
functions and therefore similar requirements on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Windows Server 2012 R2 includes the ________ feature, which provides guaranteed
message delivery, efficient routing, security, and priority-based messaging between
applications, including those that run on different operating systems.

A

Message Queuing.
You can install Message Queuing from the Add Roles and
Features Wizard in Server Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In determining a nesting strategy in a ________-domain forest, you do not need to use
universal groups.

A

single.

Use the AGDLP strategy only with a single-domain forest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The command-line command to add an OU to your domain would begin with
________.

A

dsadd.
In addition to the traditional tools, Windows Server 2012 R2 enables
you to perform this task from the Active Directory Administrative Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The __________ Wizard enables you to delegate administrative tasks.

A

Delegation of Control.
You access the wizard either through Active Directory
Users and Computers or Active Directory Administrative Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Domain local group
Can include users, computers, and groups from any domain in the forest but cannot be employed to grant permissions to any resource in the forest
26
Global group
Can contain users from the same domain in which the global group is located, and global groups can be added to domain local groups to control access to network resources
27
Universal group
Security group that can be used anywhere within a domain tree or forest
28
AGDLP
Recommended group nesting strategy when universal groups are not involved
29
Built-in group
Created by default when Windows or Active Directory is installed on a computer
30
AGUDLP
Nesting strategy involving universal groups
31
Nesting
Act of creating a hierarchy of groups to provide users from different containers (domains, OUs, and so on) access to the resources they require for their jobs
32
Active Directory Administrative Center
Snap-in in Windows Server 2012 R2 that enables the administration of most Active Directory functions from a single console
33
Security groups
Used to assign rights and permissions, and which have a SID
34
Distribution groups
Used for functions such as email, and which do not have SIDs
35
T/F Group Policy is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its child objects
True—Group Policy is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its child objects.
36
T/F The GPMC is installed when you install AD DS.
True—You can also install the GPMC on a member server by accessing the Add Features Wizard in Server Manager. GPMC is also included in the Remote Server Administration Tools package, which you can install on a client computer running Windows 8.1 Pro or higher.
37
T/F The Block Policy setting enables you to prevent GPOs that are linked to parent containers from being applied at the lower level.
False—The Block Inheritance setting accomplishes this. A situation in which this might be useful is where the administrator of an OU wants to control all GPOs that apply to computers or users in the OU without inheriting settings from the site or parent domain.
38
T/F All Group Policy Objects are identified by their PolicyIDs.
False—Group Policy Objects are identified by their GUIDS. A GUID is a unique 128-bit number assigned when the GPO is first created. This number is stored as an attribute of the object and is used to identify it within the AD DS.
39
T/F Group Policy Management Console is included by default with Windows Server 2012 R2 and is the sole location for managing all aspects of Group Policy.
True—You perform all Group Policy administrative activities, including creating, editing, and applying GPOs from the GPMC.
40
T/F Group Policy Templates are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information.
False—This describes Group Policy Containers, which contain subcontainers for user and computer Group Policy data. Information as to whether the GPO is enabled or disabled is also stored here. Being stored in AD DS, computers can access GPCs to locate GPTs, and domain controllers can access them to obtain version information, which verifies that they have the most recent edition of GPOs. .
41
T/F The Administrative Templates subcontainer is found under both the Computer and User Configuration Policies containers and holds most of the settings that control the appearance of the desktop environment.
True— There is an All Settings subnode that provides a comprehensive list of all policy settings that you can sort according to name, state, comment, or path, or filter according to several criteria.
42
T/F The folder hierarchy composed of the Group Policy Containers folder at the top and subfolders under it holds all the information for a given GPO.
False—This describes the Group Policy Templates folder.
43
T/F Group Policy Containers are sets of Group Policies.
False—A Group Policy Object is a set of Group Policies.
44
T/F Computer policies are computer-specific and are applied when the computer starts up, and user policies are user-specific and are applied when the user logs on to the computer.
True— Group Policy can be applied to server and client computers running Windows 2000 and up and includes both computer and user settings.
45
Group policy is a group of policies that are applied together. It is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its ______________.
Child objects The policies are contained in sets known as Group Policy objects (GPOs). In turn, the content of GPOs is stored in two different locations: Group Policy containers (GPCs), which are Directory Services objects that include subcontainers for machine and user Group Policy information, and Group Policy templates (GPTs), which are folder structures including a GPT folder and its subfolders that together contain all the Group Policy information including the actual policy settings for any particular GPO.
46
All GPOs are identified by their ________.
Globally Unique Identifier (GUID) A GUID is a unique 128-bit number assigned when the GPO is first created. This number is stored as an attribute of the object and is used to identify it within the AD DS.
47
Group Policy __________are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information.
Containers Group Policy Containers contain subcontainers for user and computer Group Policy data. Information as to whether the GPO is enabled or disabled is also stored here. Being stored in AD DS, computers can access GPCs to locate GPTs, and domain controllers can access them to obtain version information, which verifies that they have the most recent edition of GPOs.
48
The folder hierarchy is composed of the Group Policy __________ folder at the top and subfolders under it. This structure holds all the information for a given GPO.
Templates Every domain has associated with it a folder hierarchy found in the domain controllers at the shared folder %systemroot%\SYSVOL\sysvol\\Policies.
49
________ is the sole location for managing all aspects of Group Policy.
Group Policy Management Console You perform all Group Policy administrative activities, including creating, editing, and applying GPOs from the GPMC.
50
The subcontainer found under both the Computer and User Configuration Policies containers that holds most of the settings that control the appearance of the desktop environment is called ___________.
Administrative templates There is an All Settings subnode that provides a comprehensive list of all policy settings that you can sort according to name, state, comment, or path, or filter according to several criteria.
51
The subcontainer found under both the subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called _________.
Windows Settings The Windows Settings subcontainer contains other policy settings that affect the behavior of the Windows environment.
52
When you create a new GPO or edit an existing one, and if you have configured new settings in the Computer Configuration node, users affected by the GPO must _______.
Reboot their computers If you have configured new settings in the Computer Configuration node, users must reboot their computers to receive the new settings
53
When you create a new GPO or edit an existing one, users affected by the GPO must _______.
Log off and log back on again Users need only log off and log on for new settings to apply. If you have configured new settings in the Computer Configuration node, users must reboot their computers to receive the new settings.
54
By default, only members of the Domain Admins and Group Policy Creator Owners groups have permissions to ________.
Create GPOs You can delegate control of Group Policy objects to users and groups to enable partial administrative control and ease the overall burden of administration.
55
It is possible to edit a GPO from any writable domain controller, or even to connect to a writable domain controller from a client computer running ________.
Both Windows 8.1 Pro and Windows 8.1 Enterprise When you connect, you might want to specify which domain controller you are working against.
56
By default, which GPO is applied first?
Local Because all computer-specific settings are applied before user logon and user-specific settings are applied after logon, any user-specific setting, even a local one, would override a conflicting computer-specific setting applied at any level.
57
If you can create a nested hierarchy of OUs, when more than one level of OU is present, policies linked to the parent OU are applied first, followed by a. Sites, Domains, and Child OUs in order b. Domains, Sites, and Child OUs in order c. Child OUs in order d. None of the above
None of the above Consequently, the lowest-level OU policy becomes the determining factor should conflicts in the various GPOs arise.
58
The Block _________ setting enables you to prevent GPOs that are linked to parent containers from being applied at the lower level.
Inheritance A situation in which this might be useful is where the administrator of an OU wants to control all GPOs that apply to computers or users in the OU without inheriting settings from the site or parent domain.
59
The section of Group Policy from which administrators can configure settings that are applied to users’ desktops, specify programs that users can run, and so on is called ________.
Administrative Templates | They apply changes to client computer Registry settings.
60
Administrative templates
The principal means of administering the user environment and controlling the end user interface
61
Block Inheritance
Setting that enables you to prevent GPOs that are linked to parent containers from being applied at the lower level
62
Globally Unique Identifier (GUID)
Used to identify GPOs
63
Group Policy Containers
Objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information
64
Local, Site, Domain, OU
Order in which Group Policy is applied
65
Windows Settings
Subcontainer found under both the subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings
66
Group Policy Management Console
The sole location for managing all aspects of Group Policy
67
Group Policy Templates
The top of the folder hierarchy with subfolders under it. This structure holds all the information for a given GPO
68
Root Container
Defines the focus of the Group Policy Management Editor by showing the GPO being edited plus the fully qualified domain name (FQDN) of the domain controller from which you are working
69
Group Policy Object
Collection of policies that apply to a specific target, such as the domain itself (Default Domain Policy) or an OU
70
T/F The File and Storage Services role is installed by default in Windows Server 2012 and Windows Server 2012 R2.
True—The role is installed and cannot be removed.
71
``` T/F The Distributed File System (DFS) feature enables file sharing among servers running Windows and UNIX. Added in Windows Server 2012 R2 is an NFS module for Windows PowerShell with several new cmdlets specific to NFS. ```
False—This describes Services for Network File System (NFS).
72
T/F To share files with other users across the network, you must manually do so for each folder containing the files that you want to share.
True—Shared folders are folders on the local hard drive that other users on a network can connect to.
73
T/F You should always grant the most restrictive permissions necessary for a network user to conduct work on those files.
True—Granting just enough permission without being too lenient requires careful consideration. If you are too stringent, users can’t get their jobs done. If you are too lenient, the data is at risk.
74
T/F Share permissions are more granular than Security permissions.
False—There is a greater range of Security permissions.
75
T/F Offline files are stored on the local computer in a special area of the hard drive called a cache.
True—Specifically, the cache is located at %systemroot%\CSC, where CSC stands for client-side caching.
76
T/F Whoever creates a file or folder automatically becomes the owner and, by default, has Full Control permissions on that file or folder.
True-- If that person is a member of the Administrators group, the Administrators group becomes the owner.
77
T/F All NTFS permissions are inherited, that is, they pass down through the folder hierarchy from parent to child.
True— Permissions assigned to a parent folder are inherited by all the files in that folder and by the subfolders contained in the parent folder as well.
78
T/F If the user is accessing a shared folder on the computer where it exists, shared folder permissions apply.
False—Shared folder permissions apply only remotely, not locally.
79
T/F If a file is copied from an NTFS partition to a FAT partition, the file loses its NTFS permissions completely.
True—NTFS permissions cannot apply anywhere else but on an NTFS partition.
80
. __________ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used
File Server Resource Manager (FSRM) Updates to FSRM in Windows Server 2012 R2 include improvements in file classification and management, customized Access Denied messages for Windows 8/8.1 clients, and Dynamic Access Control.
81
Share permissions can be assigned to ____________.
Both users and groups When a directory (folder) is shared, you can grant each user and each group one of the three types of permissions for the share and all its subdirectories and files or choose to specifically deny them those permissions.
82
Share permissions apply __________.
Over the network only . Share permissions apply only over the network (remotely). Security permissions apply both locally and remotely.
83
The NTFS ________ permission enables the user to delete a folder as well as grant a user the Read permission and the List Folder Contents permission.
Modify Modify permission also enables a user to modify a file’s contents and delete the file as well as perform all actions allowed by Write permission and Read and Execute permission.
84
If you copy a file or folder that is configured with NTFS permissions within the same partition __________.
The copy inherits the NTFS permissions of the destination folder If you copy a file or folder from one NTFS partition to another NTFS partition, the copy loses its NTFS permissions completely.
85
The __________ feature of File and Storage Services in Windows Server 2012 and Windows Server 2012 R2 enables users to store and access work data on personal computers, tablets, smartphones, and other devices.
Work Folders. | Users can then access this data in a consistent manner.
86
The Advanced sharing setting that enables the computer to locate other computers and devices on the network and enables these computers to locate your computer is ____________.
Network discovery . It is expected that you would never turn this option off on a server.
87
Associating a shared folder on another computer with an available drive letter on your computer is called ________ a drive.
mapping. | You may use any available letter to map the resource.
88
The concept of _________ enables client computers to temporarily cache files obtained across a slow WAN link more aggressively, thereby reducing the number of times the client might have to retrieve the file across the slow link
transparent file caching. Use of transparent caching also serves to reduce bandwidth consumption across the WAN link.
89
The owner of a file or folder may deny Administrators access to a resource. But an administrator can exercise the optional right to take ________of any resource to gain access to it.
ownership. By taking ownership, the Administrator may then apply or change permissions on a folder or file.
90
Your _________NTFS permissions are a combination of all permissions configured for your user account and for the groups of which you are a member.
effective. In other words, the effective permission is the least restrictive of all permissions that you have.
91
If a user is accessing a shared folder over the network and it has both shared folder and NTFS permissions applied to it, the ________restrictive permission is the effective permission.
most . For example, if a user has Full Control NTFS permission on a folder but accesses it across the network where he has Read shared folder permission, his effective permission is Read.
92
When you move a file or folder from one NTFS partition to another NTFS partition, the file or folder _________ the NTFS permissions of the destination folder
inherits. This is the same behavior as if you copied a file from one NTFS partition to another
93
You can enable disk and volume quotas from File Explorer or from the FSRM console. Enabling quotas from __________ permits you to set different quotas for different users
File Explorer. The quotas apply to all folders within the specified volume. Enabling quotas from FSRM permits you to set quotas that apply to given folders (such as shares) on the server; however, you cannot specify different quota levels for different users when using FSRM.
94
Volume Shadow Copy Services (VSS) creates point-in-time copies, known as snapshots, of user files located on server shares. With just a few clicks, users can roll back to previous versions of the files.
snapshots. Shadow copies are created based on configurable intervals. The amount of copies stored on the server depends on available storage and the rate of file change.
95
Always offline mode
A new Offline Files mode in Windows Server 2012 R2 that enables faster access to cached files and redirected folders in an AD DS environment
96
File and Storage Services role
A server role that provides utilities that enable you to manage files, folders, and other shared resources. It’s installed by default when you install Windows Server 2012 R2.
97
Network File System (NFS)
Technology that enables UNIX to share files and applications across the network
98
New Technology File System (NTFS)
The file system originally provided with Windows NT and present in modern server versions that supports volume mounting, compression, encryption, and security
99
Offline files
Enables you to cache locally stored copies of shared files and folders, so that you can work with them while offline and resynchronize your changes when you go back online
100
Server Message Block (SMB)
A network file sharing protocol that enables applications to read and write data and request information from programs on network servers
101
Volume Shadow Services (VSS)
The infrastructure required to create copies of files on your server for the purpose of quick restores of previous versions
102
Work folders
Role service in the Windows Server 2012 R2 File and Storage Services server role that enables users to access data on a file server from any remote location without the need for a VPN connection
103
Shared folders
Folders that are made available for access by users who are working at another computer on the network
104
Snapshot
The concept of creating a point-in-time copy of a file or virtual machine
105
T/F A print driver is the program that converts graphics commands into instructions a given type of print device can understand.
True—New in Windows Server 2012 is the V4 print driver model, which includes changes to printer sharing called Enhanced Point and Print.
106
T/F A printer is the physical (hardware) device that produces the printed output.
False—A printer is the software (logical) interface between the operating system and the print device. In other words, a printer is part of the software, and a print device is hardware.
107
T/F By itself, Windows Server 2012 R2 cannot act as a print server.
False—Windows Server 2012 R2 is a capable print server that provides a large range of capabilities for working with printers and documents, much like the capabilities that were included with previous Windows Server versions.
108
T/F You can install a printer on your Windows Server 2012 R2 computer from Control Panel even without installing the Print and Document Services server role.
True--If you’ve installed this role, you can also install a printer from the Print Management snap-in.
109
T/F You can configure printer sharing at any time.
True—You can also share a printer at the time you install it.
110
T/F Branch Office Direct Printing is a new technology included in Windows Server 2012 and updated in Windows Server 2012 R2.
True--It was designed to help reduce bandwidth costs by reducing the amount of printing traffic that would traverse WAN links.
111
T/F Branch Office Direct Printing is supported only by Windows 8/8.1 and Windows Server 2012/R2 clients.
True-- Any clients prior can still use the print server but not take advantage of the Client Side Rendering functionality.
112
T/F You can configure only Easy Print Driver settings using Group Policy, not local policy.
False—You can use local or Group Policy, and when dealing with multiple servers, Group Policy is a more suitable approach.
113
T/F You can assign permissions to printers, but not audit their usage.
False—Like any other shared resources, you can assign permissions, and audit their usage.
114
T/F A printer pool is a group of print devices that are connected to a single printer through multiple ports on the print server.
True--These print devices should be the same make and model so that they use the same printer driver.
115
The software interface (such as LPT1) between the computer and the print device is the _________.
Distributed Scan Server The Print Server role service is included by default. You can select any of the listed role services.
116
Group Policy enables you to deploy printers in an AD DS domain environment, automatically making printer connections available to users and computers in the domain or organizational unit (OU).
Assigning | You would add a printer to a Group Policy Object (GPO).
117
The V_ printing model eliminated many of the previous struggles with printer drivers.
4 . Printing challenges became a bit easier with the release of Windows Server 2008 and the V4 printing model.
118
A ________ is a printer that is equipped with its own network adapter card and connected to the network.
Network When you try to add a Bluetooth, wireless, or network discoverable printer, Windows searches for network.
119
The waiting area where print jobs are stored and sequenced as they await the print device is the print ________.
queue. Jobs are sequenced according to the order in which they are received as well as priority settings.
120
Print ________ is the act of writing the contents of a print job to disk before sending it on to the print device.
spooling. This can improve performance by eliminating the print device as a bottleneck that ties up the operating system or an application until the entire print job is output by the print device.
121
The Print Server role service that enables UNIX clients to use the LPR utility to print documents to Windows-based printers on the network is ________
LPD Service . Other role services are Distributed Scan Server and Internet Printing.
122
If the printer produces a series of unintelligible characters rather than the expected output, the problem lies in the printer ________.
driver. | Unreadable output indicates incorrect printer drivers.
123
If your print server is part of an Active Directory Domain Services (AD DS) domain, you can ________ the printer to facilitate the task of users locating printers installed on the server.
publish | You can do this in the Print Management snap-in
124
Similar to the concept of the enhanced Point and Print driver, the ________ is used with Remote Desktop Services, formerly known as Terminal Services. As client computers connect, their local printers can be redirected into the Remote Desktop session.
Easy Print Driver. This means that printers configured on the client computer are automatically carried into the remote desktop or Terminal Server session.
125
To client computers, the printer ________appears as though it were a single printer.
pool. When users submit print jobs to the printer pool, the jobs are printed on any available print device.
126
The ________ printer permission enables users to connect to the printer to print documents and control settings for their own documents only.
print. | Users can pause, delete, and restart their own jobs only.
127
Introduced in Windows Server 2008 R2 and continued in Windows Server 2012 and Windows Server 2012 R2 is the concept of location-________default printer settings. Users with mobile computers running Windows 7 Professional, Enterprise, or Ultimate; Windows 8 or 8.1 Pro; or Enterprise can configure a different default printer according to the network to which they are connected.
aware. For example, a user can specify a default printer when in the office and a different default printer set for home
128
You might notice that no print jobs are coming out and the hard drive on the print server appears to be thrashing. If this happens, you need to stop and ________ the spooler service.
restart. | Sometimes print jobs get stuck in the spooler
129
Branch Office Direct Printing
A printer setting that is designed to conserve bandwidth and allow client printing if a print server failure occurs
130
Easy Printer Driver
A universal cross-platform-compatible used to simplify driver management when using Remote Desktop Services
131
Print device
The hardware device that produces the printed output
132
Print driver
The program that converts graphics commands into instructions that a type of print device can understand
133
Print pooling
The act of setting up two or more physical printers (print devices), each associated with a single printer
134
Print spooler
An area on a computer’s hard drive where documents to be printed are stored while awaiting printing
135
Printer priority
A number from 1 to 99 that determines which document is printed first
136
Local printer
A printer that is connected directly to a computer
137
Location-aware printing
A printer setting that enables a user with a portable computer to print to a printer physically located close to her computer
138
Printer
The software interface between the operating system and the print device that determines various aspects of the printing process