Lesson 7: Popular Windows Network Services and Applications Flashcards Preview

My Exam Review 2014 > Lesson 7: Popular Windows Network Services and Applications > Flashcards

Flashcards in Lesson 7: Popular Windows Network Services and Applications Deck (51):
1

1. What type of server serves HTML files to clients?
a) web server
b) FTP server
c) SMB server
d) application server

Answer: a) web server

Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: The World Wide Web is a system of interlinked hypertext documents known as web pages that can be viewed with a web browser such as Internet Explorer. Those pages are provided by a web server.

2

2. By default, what port does a web server use?
a) 80
b) 8080
c) 489
d) 21

Answer: a) 80

Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: When you view web pages, you are connecting to the web server using TCP port 80.

3

3. By default, what port does a web server use when using SSL?
a) 80
b) 8080
c) 443
d) 21

Answer: c) 443

Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: Because personal information such as credit-card numbers can be sent over the Internet, a supplemental protocol was developed called Secure Sockets Layer (SSL). This protocol uses TCP port 443, which uses a digital certificate to encrypt the packet so that it cannot be read by anyone else except the source and target. When you use SSL, the browser URL starts with https (for example, https://www.acme.com).

4

4. What protocol is used to send mail between servers?
a) FTP
b) SMTP
c) SNMP
d) HTTP

Answer: b) SMTP

Difficulty: Easy
Section Reference: Introducing the Web Server
Explanation: For emails to travel over the Internet, email servers (or any server or client that sends email directly out) use the Simple Mail Transfer Protocol (SMTP) as an outgoing mail transport.

5

5. By default, what port does SMTP use?
a) 80
b) 23
c) 25
d) 21

Answer: c) 25

Difficulty: Medium
Section Reference: Introducing the Web Server
Explanation: SMTP uses TCP port 25.
???Author: FYI: I shortened this explanation so that it doesn’t repeat the preceding explanation. smdOk

6

6. What Microsoft web server is included with Windows servers?
a) Internet Information Services
b) Web Manager
c) Web Provider
d) Internet Security and Acceleration

Answer: a) Internet Information Services

Difficulty: Easy
Section Reference: Managing Websites with IIS
Explanation: Microsoft’s web server/application server is Internet Information Services (IIS). Windows Server 2008 R2 includes IIS 7.5, Windows Server 2008 includes IIS 7.0, and Windows Server 2003 includes IIS 6.0. IIS 7.0 and 7.5 support FTP, FTPS, SMTP, and HTTP/HTTPS, whereas IIS 6.0 supports FTP, SMTP, and HTTP/HTTPS.

7

7. When IIS is running multiple websites, what do you use to isolate one site from another website?
a) applications
b) application pools
c) sites
d) virtual directories

Answer: b) application pools

Difficulty: Hard
Section Reference: Exploring Applications and Application Pools
Explanation: An application pool is a set of resources (a worker process or a set of worker processes) used by a website or application that defines the memory boundaries for the site. Forcing each application to have its own application pool ensures that one site does not interfere with another site on the same server, which ensures application performance and improved application availability. Therefore, if one application has a memory leak or crashes, it will not affect the other sites.

8

8. Which type of IIS authentication does not provide a username and password?
a) anonymous
b) ASP.NET Impersonation
c) Basic Authentication
d) Windows Authentication

Answer: a) anonymous

Difficulty: Easy
Section Reference: Using IIS Security
Explanation: Authentication is used to confirm the identity of clients who request access to your sites and applications. Anonymous authentication allows access without providing a username and password.

9

9. Which type of IIS authentication sends the username and password in clear text?
a) anonymous
b) ASP.NET Impersonation
c) Basic Authentication
d) Windows Authentication

Answer: c) Basic Authentication

Difficulty: Easy
Section Reference: Using IIS Security
Explanation: Basic Authentication requires that users provide a valid username and password to gain access to content. Because basic authentication transmits passwords across the network in clear text, you should use it with a digital certificate to encrypt usernames and passwords being sent over the network.

10

10. What is used to store and distribute a public key?
a) digital certificate
b) digital signature
c) digital lock
d) digital envelope

Answer: a) digital certificate

Difficulty: Easy
Section Reference: Exploring Secure Sockets Layer and Digital Certificates
Explanation: When you use SSL to encrypt web traffic, you are using asymmetric encryption, which involves a private key and a public key. The public key is provided to anyone who wants to access the web server, and the private key is kept secret, usually by the web server that you are trying to protect. A common method to distribute a public key is to use a digital certificate.

11

11. What protocol is used to transfer files to or from a server?
a) FTP
b) SNMP
c) VPN
d) SMTP

Answer: a) FTP

Difficulty: Easy
Section Reference: Managing FTP with IIS
Explanation: File Transfer Protocol (FTP) is used to transfer files to or from a server. Most FTP sites are used primarily to download files. In most of these situations, FTP uses anonymous authentication, in which username and password are not required.

12

12. What technology is used to link two computers or sites over the Internet while providing a secure connection?
a) FTP
b) SMTP
c) VPN
d) telnet

Answer: c) VPN

Difficulty: Easy
Section Reference: Understanding Remote Access
Explanation: Virtual private networks (VPNs) link two computers through a wide-area network such as the Internet. To keep the connection secure, the data sent between the two computers is encapsulated and encrypted.

13

13. What does L2TP use to encrypt data?
a) IPSec
b) PPTP
c) MPPE
d) SSTP

Answer: a) IPSec

Difficulty: Easy
Section Reference: Understanding Remote Access
Explanation: Layer 2 Tunneling Protocol (L2TP) is used with IPSec to provide security. L2TP is the industry standard when setting up secure tunnels.

14

14. Which form of authentication sends username and password in clear text?
a) PAP
b) CHAP
c) MS-CHAP
d) EAP

Answer: a) PAP

Difficulty: Medium
Section Reference: Understanding Remote Access
Explanation: Password Authentication Protocol (PAP) uses plain text (unencrypted passwords). PAP is the least secure authentication and is not recommended.

15

15. What popular application is used to access a Windows server remotely?
a) remote assistance
b) remote desktop
c) TELNET
d) SSH

Answer: b) remote desktop

Difficulty: Easy
Section Reference: Understanding Remote Access
Explanation: With early networks, users utilized dumb terminals (systems consisting of a monitor and keyboard without a processor) to connect to a mainframe. Later, computers could use TELNET to connect to a server and execute commands at a command prompt. Remote Desktop Services, formerly known as Terminal Services, is one component of Microsoft Windows that allows users to access applications and data on remote computers over a network.

16

16. What is Microsoft’s virtualization server called?
a) RRAS
b) VPN
c) Telnet
d) Hyper-V

Answer: d) Hyper-V

Difficulty: Easy
Section Reference: Understanding Server Virtualization
Explanation: Virtualization has become quite popular during the last few years. By using virtual machine technology, you can run multiple operating systems concurrently on a single machine, which allows separation of services while keeping costs to a minimum. It can also be used to create Windows test systems in a safe, self-contained environment. Microsoft Hyper-V is a hypervisor-based virtualization system for 64-bit computers starting with Windows Server 2008.

17

Fill in the Blank
17. A ___________ is a process in which you convert a physical computer to a virtual machine.

Answer: physical-to-virtual (P2V) conversion

Difficulty: Medium
Section Reference: Creating Virtual Machines
Explanation: In many organizations, you may want to consolidate several physical servers to one machine running multiple virtual servers. Microsoft System Center Virtual Machine Manager (VMM) allows you to convert existing physical computers into virtual machines through a process known as physical-to-virtual (P2V) conversion. VMM simplifies P2V by providing a task-based wizard to automate much of the conversion process.

18

Fill in the Blank
18. A ___________ is used on a website that corresponds to a physical directory elsewhere on the server, on another server, or on a website.

Answer: virtual directory

Difficulty: Medium
Section Reference: Creating Websites and Virtual Directories
Explanation: A virtual directory is used in a website that corresponds to a physical directory elsewhere on the server, on another server, or on a website. This allows you to reuse the same folder for multiple sites or to connect to content without physically moving it.

19

Short Answer
19. When you are connected to a VPN tunnel, what do you call it when you use your own Internet connection to visit the web?

Answer: split tunnel

Difficulty: Medium
Section Reference: Understanding Remote Access
Explanation: If you want to route your Internet browsing through your home Internet connection rather than go through the corporate network, you can disable the Use Default Gateway on Remote Network option. Disabling this option is called using a split tunnel.

20

Short Answer
20. What technology is used to consolidate multiple servers onto one large physical server?

Answer: virtualization

Difficulty: Easy
Section Reference: Understanding Server Virtualization
Explanation: By using virtual machine technology, you can run multiple operating systems concurrently on a single machine, which allows separation of services while keeping costs minimal. It can also be used to create Windows test systems in a safe, self-contained environment.

21

Short Answer
21. What two ports does FTP use?

Answer: TCP ports 20 and 21.

Difficulty: Medium
Section Reference: Managing FTP with IIS
Explanation: FTP uses TCP ports 20 and 21. Port 20 is used for control, while port 21 is used for data transfer.

22

Short Answer
22. What port does Remote Desktop and Remote Assistance use?

Answer: TCP port 1389

Difficulty: Medium
Section Reference: Introducing Remote Administration
Explanation: To access a computer running Remote Desktop Services, you use Remote Desktop Connections to access a computer’s graphical user interface, including the desktop, start menu, and programs, just as if you were sitting in front of the computer. Two technologies that allow you to remotely access a computer’s desktop are Remote Desktop and Remote Assistance over TCP port 1389.

23

1. The ______ is a system of interlinked hypertext documents known as web pages that are browsed with a web browser.

World Wide Web

24

2. The predominant markup language for web pages is ______.

HyperText Markup Lagnuage

25

3. Microsoft’s web server is known as ______.

Internet Information Server (IIS)

26

4. In IIS, a ______ is a directory used in a Web site that corresponds to a physical directory elsewhere on the server, on another server, or on a Web site.

Virtual directory

27

5. HTTPS uses port ______.

443

28

6. ______ is the most widely used digital certificate.

X.509

29

7. Microsoft’s newest virtual machine technology is ______.

Hyper-V

30

8. A ______ is a point in time image of a virtual machine that you can return to.

Snapshot

31

9. You typically use ______ to remotely connect and manage a server, which allows you to run programs directly on the desktop.

Remote desktop

32

10. ______ is a special mode of Remote Desktop Services that allows you to run an application in its own window.

RemoteApp

33

1. Which protocol is used to transfer files between computers?
a. DNS
b. HTTP
c. FTP
d. Telnet
c. HTTP
d. SMTP

c. FTP

34

2. Which port does SMTP use?
a. 21
b. 25
c. 80
d. 443

b. 25

35

3. Which port does HTTP use?
a. 21
b. 25
c. 80
d. 443

c. 80

36

4. A(n) ___________ defines a set of resources used by a Web site orapplication that defines the memory boundaries of a Web site.
a. Virtual directory
b. Root directory
c. Application pool
d. Port forwarder

c. Application pool

37

5. Which authentication sends username and password that is not encrypted?
a. Anonymous
b. Basic authentication
c. Digest authentication
d. Windows authentication

b. Basic authentication

38

6. When configuring VPN, L2TP uses ______ for encryption.
a. SSTP
b. PPTP
c. MPE
d. IPSec

d. IPSec

39

7. Which authentication method used with VPN clients can be used with retinal scan and fingerprint identifications?
a. PAP
b. CHAP
c. MS-CHAPv2
d. EAP-MS-CHAPv2

d. EAP-MS-CHAPv2 Microsoft Challenge-Handshake Authentication Protocol version 2

40

8. By using _____________ technology, you can run multiple operating systems concurrently on one machine.
a. Virtual machine
b. Virtual directory
c. Terminal server
d. Remote access

a. Virtual machine

41

9. After you create a virtual server in Hyper-V and install the operating system, you then need to install _____________ so that the virtual server can run more efficiently.
a. VMWare client tools
b. Remote Desktop tools
c. Integration Services Setup
d. P2V Disk tools

c. Integration Services Setup

42

10. Which protocol is used to send out email?
a. POP2
b. IMAP
c. HTTP
d. SMTP

d. SMTP

43

True / False
1. When typing in a URL that does not specify a directory, your browser will always return a 404 error.

FALSE

The Web server returns the "HTTP 404 - File not found" error message when it cannot retrieve the page that was requested.

The following are some common causes of this error message:
The requested file has been renamed.
The requested file has been moved to another location and/or deleted.
The requested file is temporarily unavailable due to maintenance, upgrades, or other unknown causes.
The requested file does not exist.
IIS 6.0: The appropriate Web service extension or MIME type is not enabled.
A virtual directory is mapped to the root of a drive on another server.

44

True / False
2. If you are using Basic Authentication, you should use digital certificates to encrypt.

TRUE

Basic Authentication: Requires that users provide a valid username and password to gain access to content. Since basic authentication transmits passwords across the network in clear text, you should use it with a digital certificate to encrypt usernames and passwords being sent over the network.

45

True / False
3. To copy a digital certificate that includes the public and private key pair, use CSR.

FALSE

certificate signing request CSR

46

True / False
4. Today, PTTP is the recommended VPN tunneling protocol.

FALSE

Unsecured
Layer 2 Tunneling Protocol (L2TP): Used with IPSec to provide security. L2TP is the industry standard when setting up secure tunnels.

47

True / False
5. The .vhd file holds the virtual machine configuration information.

FALSE

In Hyper-V, each virtual machine uses the following files:
• A virtual machine configuration (.vmc) file in XML format that contains the virtual machine configuration information, including all settings for the virtual machine.

• One or more virtual hard disk (.vhd) files to store the guest operating system, applications, and data for the virtual machine. So if you create a 12-GB partition for the virtual machine’s hard drive, the virtual hard disk file will be 12 GB.

In addition, a virtual machine may also use a saved-state (.vsv) file, if the machine has been placed into a saved state.

48

Competency AssessmentScenario 7-1: Allowing Work from HomeYou just started working as a system administrator for the Acme Corporation. Your company decides that as a benefit to its employees, some employees can work from home one day a week. Explain what can you do to help make this happen, what key technology you would use, and how would you configure it.

The primary technology you will need to use is to VPN. Therefore, you will need to install a remote access server on a computer running Windows Server 2008. You should configure L2TP with IPSec for the best security. You will then have to configure the client computers to access the remote access server. In addition, depending on the applications that the user needs to access, he will use the applications on his laptop computer or he will have to use remote desktop to access servers or client computers within the organization.

49

NOTE

Three types of tunneling protocols used with a VPN/RAS on W2K8 server include:

• Point-to-Point Tunneling Protocol (PPTP):

• Layer 2 Tunneling Protocol (L2TP):

• Secure Socket Tunneling Protocol (SSTP):

• (PPTP): A VPN protocol based on the legacy Point-to-Point protocol used with modems. Unfortunately, PPTP is easy to set up but is considered to use weak encryption technology.

• (L2TP): Used with IPSec to provide security. L2TP is the industry standard when setting up secure tunnels.

• (SSTP): Introduced with Windows Server 2008, which users the HTTPS protocol over TCP port 443 to pass traffic through firewalls and web proxies that might block PPTP and L2TP/IPSec.

49

Competency AssessmentScenario 7-2: Isolating Server ApplicationsYou have two network applications—a network accounting application and a network HR application—that are not processor hungry. Both of these applications must be kept totally isolated, and both will access a centralized database server. What do you recommend?

Some advantages of using virtual servers include isolating server applications and utilizing computer resource more efficiently. Therefore, you should use create two virtual servers on a single physical server. Although the applications will access a centralized database server, the applications themselves will run on the individual servers, keeping them totally isolated.

50

NOTE
W2k8-VPNs support the following forms of authentication on W2K8 server:

• Password Authentication Protocol (PAP):

• Challenge Handshake Authentication Protocol (CHAP):

• Microsoft CHAP version 2 (MS-CHAP v2):

• Extensible Authentication Protocol (EAP-MS-CHAPv2):

W2k8-VPNs support the following forms of authentication:
• Password Authentication Protocol (PAP):
Uses plain text (unencrypted passwords).
PAP is the least secure authentication and is not recommended.

• Challenge Handshake Authentication Protocol (CHAP):
A challenge-response authentication that uses the industry standard md5
hashing scheme to encrypt the response.

• Microsoft CHAP version 2 (MS-CHAP v2):
Provides two-way authentication (mutual authentication).
MS-CHAP v2 provides stronger security than CHAP.

• Extensible Authentication Protocol (EAP-MS-CHAPv2):
A universal authentication framework for custom authentication;
retinal scans, voice recognition, fingerprint identifications, smart cards,
Kerberos, and digital certificates.
Provides a mutual authentication method that supports password-based user
or computer authentication.