MTA 98-365 - Resources -Technet

practice test for 98-365 from measureup

MTA 98-365 study guide pdf


Windows Server 2008 System Requirements


Physical Memory Limits: Windows Server 2008

The following table specifies the limits on physical memory for Windows Server 2008. Limits greater than 4 GB for 32-bit Windows assume that PAE is enabled.


[TH="bgcolor: #EDEDED"]Version[/TH]
[TH="bgcolor: #EDEDED"]Limit on X86[/TH]
[TH="bgcolor: #EDEDED"]Limit on X64[/TH]
[TH="bgcolor: #EDEDED"]Limit on IA64[/TH]


Windows Server 2008 Datacenter
64 GB
1 TB



Windows Server 2008 Enterprise
64 GB
1 TB



Windows Server 2008 HPC Edition

128 GB



Windows Server 2008 Standard
4 GB
32 GB



Windows Server 2008 for Itanium-Based Systems


2 TB


Windows Small Business Server 2008
4 GB
32 GB



Windows Web Server 2008
4 GB
32 GB




Physical Memory Limits: Windows Server 2008 R2

The following table specifies the limits on physical memory for Windows Server 2008 R2. Windows Server 2008 R2 is available only in 64-bit editions



[TH="bgcolor: #EDEDED"]Version[/TH]
[TH="bgcolor: #EDEDED"]Limit on X64[/TH]
[TH="bgcolor: #EDEDED"]Limit on IA64[/TH]


Windows Server 2008 R2 Datacenter
2 TB



Windows Server 2008 R2 Enterprise
2 TB



Windows Server 2008 R2 for Itanium-Based Systems

2 TB


Windows Server 2008 R2 Foundation
8 GB



Windows Server 2008 R2 Standard
32 GB



Windows HPC Server 2008 R2
128 GB



Windows Web Server 2008 R2
32 GB




Types of RAM (Random Access Memory)

DRAM = Dynamic RAM = Memory that must be refresh

SRAM = static RAM = Doesn't require refresh. Used for cache memory

SDRAM = Synchronous Dynamic RAM = that is synchronized with the system bus.

DDR = Double Data Rate SDRAM = Data read on the rise and fall of the computer clock to double the bandwidth of SRAM. 184 pin, 64 bit DIMM

DDR2 = Same as DDR, however 240 pin, 64 bit DIMM- Faster than DDR.

DDR3 = Faster than DDR2 Common for Intel i5 and I7 and AMD Socket AM3 versiobs of the Phenom II.

Single-Channel DDR = Uses one DDR module in a single slot

Dual-Channel DDR= Uses two DDR modules in two slots to double bandwidth to the system bus

Triple-Channel DDR = Uses three DDR modules in three slots to triple the bandwidth of the systems bus


DIMM = Dual Inline Memory Module
SoDIMM = Small outline DIMM
MicrosDIMM= tinier than SoDIMM. used in some netbooks
RIMM = Ranbus Inline Memory Module



Install Windows Server 2008 Server Roles with Server Manager


Main Topics
Active Directory Domain Services
. Active Directory Domain Services (AD DS) stores information about users, computers, and other devices on the network. AD DS helps administrators securely manage this information and facilitates resource sharing and collaboration between users.

Windows Server 2008 Service Pack 1 for R2 New Features
Dynamic memory for Hyper-V
Remote FX

Windows Server 2008 R2 New Features
BranchCache (Requires Windows 7 client)
DirectAcess (Requires Windows 7 client)
Active Directory recycle bin
Starter group polices


Windows Server 2008 Active Directory New Features
Active Directory Certificate Services
Active Directory Application Mode (ADAM)--> ADLDS
Active Directory Federation Services
Active Directory Rights Management
Read Only Domain Controllers
Active Directory is now restartable
Granular password Policy
Active Directory database snapshots

Windows Server 2008 Non Active Directory New Features
Self healing NTFS
Parallel session creation for Terminal Services
Clean server shutdown
Server Core
Hyper-V
PowerShell



DNS Server. Domain Name System (DNS) provides a standard method for associating names with numeric Internet addresses. This makes it possible for users to refer to network computers by using easy-to-remember names instead of a long series of numbers.

DHCP Server. Dynamic Host Configuration Protocol (DHCP) allows servers to assign, or lease, IP addresses to computers and other devices that are enabled as DHCP clients. Deploying DHCP servers on the network automatically provides computers and other TCP/IP-based network devices with valid IP addresses and the additional configuration parameters these devices need.

Web Server (IIS). Web Server, or Internet Information Services (IIS), enables sharing of information on the Internet, an intranet, or an extranet. It is a unified Web platform that integrates IIS 7.0, ASP.NET, and Windows Communication Foundation. IIS 7.0 also features enhanced security, simplified diagnostics, and delegated administration.

File Services. File Services provides technologies for storage management, file replication, distributed namespace management, fast file searching, and streamlined client access to files.

Hyper-V. Hyper-V provides the services that you can use to create and manage virtual machines and their resources. Each virtual machine is a virtualized computer system that operates in an isolated execution environment. This allows you to run multiple operating systems simultaneously.

Print and Document Services. Print Services enables the management of print servers and printers. A print server reduces administrative and management workload by centralizing printer management tasks.

Application Server. Application Server provides a complete solution for hosting and managing high-performance distributed business applications. Integrated services, such as the .NET Framework, Web Server Support, Message Queuing, COM+, Windows Communication Foundation, and failover Ccusters boost productivity throughout the application life cycle.

Install Exchange Server 2010

Windows 2008 server core

join a computer to a domain = netdom join %computername% /domain: example.fun /userd: eample.fun\<username> /passwordd:* THEN REBOOT THE SERVER

Change computer name in a domain = netdom renamecomputer %computername% /NewName:<newname> /userd:eample.fun \<username> /passwordd:*

Change a computername in a workgroup = netdom renamecomputer <currentcomputername> /NewName:<newcomputername>

Install an update = wusa <update>.msu /quiet

Configure automatic updates :

To verify updates = Scregedit.wsf /AU /v
To enable updates= Scregedit.wsf /AU 4
To disable updates= Scregedit.wsf /AU 1

server core: setting up an AD server

ENTER a STATIC ADDRESS:

netsh ineterface ip4 set address name=2 source=static address=192.168.1.200 mask=255.255.255.0 gateway=192.168.1.1

SET the DNS server IP address:

netsh interface ip4 add dnsserver name =2 address 192.168.1.200
index=1

RENAME THE COMPUTER TO DCadCORE:

netdom renamecomputer %computername% /NewName:DCadCORE /reboot:0

Install DNS: start /w ocsetup DNS-Sever-Core-Role

Install DHCP (if need be) : start /w ocsetup DHCPServerCore

Enable remote management: winrm quickconfig

Setting up AD DS on server-core

dcpromo /replicaOrnewDomain:replica /replicaDomainDNSName:example.example/ConfirmGC:yes
/userdomain:example.example /UserName=administrator /Password=P@ssw0rd
/SafeModeAdminPassword:Pa$$word1

or
dcpromo /unattend:c:\answer.txt


James Conrad does a good job with all the topics for the exam in my opinion
Yes, I am still studying for the exam. I already read the book twice and I am using ucerify for practice tests.



Windows 7 VHD Boot Demonstration





UPS =
Uninterruptible power supply (APC)

it helps to provided continuous power
it protects against brown outs, SAG, and power outages (give ample time to turn off servers or power on the
generator)
it can also work as a power conditioner to fight against spike and surges

Size will vary
- Desktop for soho
- datacenter editions - APC -MGE EPS 8000

Windows Server Backup

Windows Server NT through Windows Server 2003 used ntbackup.exe

Windows server 2008 uses Windows Server Backup

You need to add or install as a Feature in Server Manager
You can't use Tape (I use an USB 2.o ext hard drive) ... it uses an entire Hard Drive source
No Network Source, No Network Target ->EXCEPT for ONE -OFF
Block-Level Backup .. it is fast, efficient and affected by defrag

it can be scheduled or a single
you can use the UI or wbadmin

Restore
Specific Files
Complete PC
DS Restore using ntdsutil w/ Auth Restore (to bring back deleted AD objects)

Auth Restore EXAMPLE

reboot server to DSrestore mode
open command prompt
wbadmin get versions
(use the Version identifier)
wbadmin start systemstaterecovery -version:05/14/2013-22:22
hit y ..

*after that .. don't reboot the pc*

open another command prompt
ntdsutil
ntdsutil: activate instance ntds
ntdsutil: auth rest
authoritative restore: restore object "cn=example., ou=example, ou=example, dc= fun, dc= times"
click on "Yes" to restore the object
then quit .. close out Command prompt


(this is a work in progress)

(this is a work in progress)

Comments

  • horusthesunhorusthesun Member Posts: 289
    Driver Rollback - is a feature of Device manager. To roll back a driver in Windows means to return to the version that was last installed for the device.

    Driver Signing - is a Windows feature to help promote driver quality

    Network installation - an installation of a program from a network share (a mapped drive)

    RunAs service - allows users to run specific programs ad tools with diverse permissions that the user's current log on provides

    Server Core - A scaled down (only with the command prompt and a GUI notepad) version of server 2008, server 2008 R2 & server 2012

    Services - are applications that run continuously in the background

    Unattended installation - an automated installation technology in Microsoft Windows Server hat you can use to install or upgrade an operating system with minimal user intervention

    Application server - expanded server role of windows server 2008 that simplifies the process of deploying applications that respond to requsetes sent over the network

    FTP- File Transfer Protocol uses ports 20/21 Used to copy files across a tcp/ip network

    IIS - Internet Information Server - Web or a Hypertext Transfer Protocol server and a FTP server

    Local printer- is attached directly to the computer

    Mail server - is a program used to store and forward email messages using several protocols, SMTP, POP3. IMAP, and MAPI

    Remote Access - service that maintains several inbound requests while connecting servers or networks

    Server Virtualization - is a technology for partitioning one physical server into multiple virtual servers

    VHD - Microsoft Virtual Hard Disk file format is an integral part of the Microsoft virtualizations (
    The format was created by Connectix for Connectix Virtual PC product, which was later acquired by Microsoft in 2003, for what is now known as Microsoft Virtual PC)

    NTFS permissions allow you to control which users and groups can gain access to files and folders on an NTFS volume. The advantage of NTFS permissions is that they affect local users as well as network users.

    Explicit permissions : Permissions granted directly to a file or folder.

    Inherited permissions : Permissions that are granted to a folder (parent object or container ) that flow into child objects (subfolders or files inside the parent folder).

    Encryption is the process of converting data into a format that cannot be read by another user. Once a user has encrypted file, it automatically encrypted when stored on disk. decryption is the process of converting data from an encrypted format back to original format. Once a user has decrypted a file, the file remains decrypted when stored on disk

    Encrypting Files System (EFS) is a core file encryption technology used to store encrypted files in NTFS file system volumes. Encrypted files cannot be used unless a user has the access ti the keys required to decrypt the information.

    Network Discovery: Allows this computer to see other network computers and devices and be visible to other network computers

    File and printer sharing : allows files and printers that you have shared from this computer to be accessed by people on the network

    Public folder sharing: Allows people on the network to access to files in the public folder

    Media streaming: Allows people and devices on the network to access pictures, music, and videos on the computer. in addition, this permits the computer to find media on the network


    Password protected sharing - Allows only people who has a user account and password on the computer tot access shared files, printers attached to the computer and the public folders. To give other people axcccess, you must turn off password protected sharing.


    <again .. work in progress>
  • horusthesunhorusthesun Member Posts: 289
    lesson 1 summary


    A server is a computer that is a meant to be a dedicated service provider, and a client is a computer that requests services.

    Before selecting the hardware and software components of a server, you should identify the server roles and network services that the server will need to provide and how many people will be accessing the server at once to help determine the load the server needs to fulfill.

    The primary subsystems that make up a server are processor, memory, storage, and network.

    The computer, including servers, is built around one or more integrated chips called the processor. It is considered the brain of the computer because all of the instructions it performs are mathematical calculations and logical comparisons.

    A 64-bit processor is a processor with a default word size of 64 bits and a 64-bit external data bus, which allows you to access much more RAM than a 32-bit processor.

    The amount of RAM can be one of the largest factors in your overall computer performance.

    For the processor to communicate with the rest of the system, the processor plugs in or con- nects to a large circuit board called the motherboard or system board, or a logic board. The motherboard allows the processor to branch out and communicate with all of the other computer comments.

    Instructions that control most of the computer’s input/output functions, such as communi- cating with disks, RAM, and the monitor kept in the System ROM chips, are known as the BIOS (basic input/output system).

    The process of updating your system ROM BIOS is called flashing the BIOS.

    While a server needs to have solid performance, the server needs to be reliable.

    Virtual machines technologies enable multiple operating systems to run concurrently on a single machine.

    Windows Server 2008 R2 has organized the most common services into server roles. A server role describes the function of the server.

    Windows Server 2008 R2 Features are software programs that are not directly part of a role, or they can support or augment the functionality of one or more roles, or enhance the functionality of the entire server.


    Server Core installation provides a minimal environment with no Windows Explorer shell for running specific server roles and no Start button.

    Before installing software, you should look at the system requirements as a starting point to make sure your server meets those requirements.

    A clean installation is installing the software from scratch on a new drive or on newly reformatted drive. Many people find that doing a clean install of an operating system is the best way to go because you are starting fresh.

    In some instances, you will want to take a current system and upgrade from an older version of Windows to Windows Server 2008 R2.


    One way to install Windows Server 2008 R2 is to use disk cloning software such as Norton Ghost to create an image file, which is a sector-by-sector copy stored in a large file.

    If you clone a computer, you need to run the System Preparation Tool (Sysprep), which removes the security identifiers and all other user-specific or computer-specific information from the computer before you run the disk cloning software to make the cloned disk image.

    An Answer file, which is used to automatically install Windows, is an XML file that stores the answers for a series of graphical user interface (GUI) dialog boxes.

    Windows Deployment Services (WDS) is a technology from Microsoft for network-based installation of Windows operating systems including Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008. The deployment of Windows can be fully automated and customized through the use of unattended installation scripting files.

    Microsoft product activation is an anti-piracy technology designed to verify that software products are legitimately licensed.

    After installing Windows, check to see if Microsoft has any fixes, patches, service packs, and device drivers, and apply them to the Windows system.


    Lesson 2 summary

    The Initial Configuration Tasks acts as a reminder and a method to access key options so that you can quickly get your Windows server up and running with minimal effort.


    Every computer on a network must have a unique computer name assigned to it.

    A workgroup is usually associated with a peer-to-peer network on which user accounts are decentralized and stored on each individual computer.

    A domain is a logical unit of computers that defines a security boundary and is usually associated with Microsoft’s Active Directory.

    The security of the domain is generally centralized and controlled by Windows servers acting as domain controllers.

    With Remote Assistance and Remote Desktop, you can access a computer running Windows with another computer that is connected to the same network or over the Internet just as if you were sitting in front of the server.

    Make sure that the server has the correct date and time. It is essential for logging purposes and security.

    Device drivers are programs that control a device. You can think of them as a translator between the device and the operating system and programs that use that device.

    Plug and Play (PnP) allows you to install or connect a device; the device is automatically recognized, automatically configured and the appropriate driver is installed.

    An interrupt is a signal sent by a device to get the attention of the processor when the device is ready to accept or send information. Each device must be assigned a unique IRQ number.

    A signed driver is a device driver that includes a digital signature, which is an electronic security mark that can indicate the publisher of the software and show if a driver has been altered.

    A driver that lacks a valid digital signature, or was altered after it was signed, cannot be installed on 64-bit versions of Windows.

    The Devices and Printers folder gives you a quick view of devices connected to your computer, which you can connect or disconnect from your computer through a port or network connection.

    Device Manager provides you with a graphical view of the hardware (internal and exter- nal) that is installed on your computer and gives you a way to manage and configure your devices.

    A black down arrow in Device Manager indicates a disabled device

    A black exclamation point (!) on a yellow field in Device Manager indicates the device is in a problem state.

    Administrative Tools, including Computer Management console and Server Manager console, is a folder in the Control Panel that contains tools for system administrators and advanced users.

    To install Roles and Features in Windows Server 2008, you would use the Server Manager console or the Initial Configuration Task window.

    A service is a program, routine, or process that performs a specific system function to support other programs or to provide a network service. It runs in the system background without a user interface.

    The registry is a central, secure database in which Windows stores all hardware configuration information, software configuration information, and system security policies.


    Lesson 3 summary

    • Today’s drives are either IDE drives (mostly found on consumer computers) or SCSI drives (mostly found in servers).

    • A redundant array of independent disks (RAID) uses two or more drives in combination to create a fault-tolerant system that protects against physical hard drive failure and increase hard drive performance.

    • With striping (RAID 0), all available hard drives are combined into a single large virtual file system, with the file system’s blocks arrayed so that they are spread evenly across all the drives. Unfortunately, striping offers no fault tolerance.

    • Disk mirroring (RAID 1) copies a disk or partition onto a second hard drive. Then, as informa- tion is written, it is written to both hard drives simultaneously.

    • RAID 5 is similar to striping except that one of the hard drives is used for parity (error correction) to provide fault tolerance.

    • RAID 10 is a mirrored dataset (RAID 1), which is then striped (RAID 0).

    • When a drive fails, some systems use hot spares so that the system will automatically replace the failed drive and rebuild or restore the missing data.

    • Network attached storage (NAS) is a file-level data storage device that is connected to a computer network to provide shared drives or folders, usually using SMB.

    • A storage area network (SAN) is an architecture used for disk arrays, tape libraries, and optical jukeboxes to appear as locally attached drives on a server.

    • A host adapter, sometimes referred to as host bus adapter (HBA), connects a host system such as a computer to a network or storage devices.

    • Logical unit numbers (usually referred to as LUNs) allow a SAN to break its storage into manageable pieces, which are then assigned to one or more servers in the SAN.

    • Fibre Channel and iSCSI are gigabit-speed technologies primarily used for storage networking.

    • Microsoft Windows Server 2008 includes two iSCSI Initiator software interfaces (iSCSI Initiator and iSCSICLI command interface) to connect an iSCSI storage array or volume of a storage array to a server and mount the array or volume as a local volume.

    • Windows Server 2008 includes Storage Explorer and Storage Manager for SANs to manage Fibre Channel, iSCSI fabrics, and LUNs.

    • Partitioning is defining and dividing a physical or virtual disk into logical volumes called partitions. Each partition functions as if it were a separate disk drive that can be assigned a drive letter.

    • Formatting a disk prepares the disk’s file system.

    • Windows Server 2008 supports two types of disk partitioning styles: Master Boot Record (MBR) and GUID Partition Table (GPT).

    • InWindowsServer2008, a basic disk Is the same Type of disk found in earlier versions of Windows.

    • When using MBR, basic disks gave you either four primary partitions or three primary partitions and one extended partition.

    • Dynamic disks offer increased flexibility, including up to 2,000 volumes and the ability to extend or shrink a disk without requiring a reboot.

    • Dynamic disks support five types of volumes: simple volumes, spanned volumes, striped volumes, mirrored volumes, and RAID-5 volumes.

    • A file system is a method of storing and organizing computer files and the data they con- tain to make it easy to find and access this information. A file system also maintains the physical location of the files so you can find and access the files in the future.

    • Currently, NTFS is the preferred file system, in part because it supports much larger hard disks (up to 16 exabytes) and long filenames.

    • NTFS is a journaling file system that makes sure a disk transaction is written properly before it is recognized.

    • NTFS offers better security through permissions and encryption.

    • The main tool used to manage disks in Windows Server 2008 is the MMC snap-in called Disk Management, which is also part of the Computer and Management consoles.

    • When you prepare a volume in Windows, you can assign a drive letter to the new volume, or you can create a mount point to the new volume as an empty NTFS folder.


    Lesson 4 summary

    • You need to have processes in place to plan, design, implement, monitor, and retire servers, services, and applications.

    • The Information Technology Infrastructure Library (ITIL) is a set of concepts and practices for managing Information Technology (IT) services (ITSM), IT development, and
    IT operations.

    • An effective troubleshooting methodology is to reduce the amount of guesswork and random solutions so that you can troubleshoot and fix the problem in a timely manner.

    • System Information (also known as msinfo32.exe) shows details about your computer’s hardware configuration, computer components, and software, including drivers.

    • The Event Viewer is a Microsoft Management Console (MMC) snap-in that enables you to browse and manage event logs.

    • Every time you turn on a computer, the computer goes through the Power-On Self Test (POST), which initializes hardware and finds an operating system to load.
    • When you load Windows XP or Windows Server 2003, you will be loading NTLDR, NTDetect.com, NTOSKRNL.EXE, and HAL.DLL.

    • When you load Windows Vista, Windows 7, or Windows Server 2008, you will be loading BOOTMGR, WINLoad, NTOSKRNL.EXE, and Boot-class device drivers.

    • A master boot record (MBR) is the first 512-byte boot sector of a partitioned data storage device such as a hard disk. It is used to hold the disk’s primary partition table, contains the code to bootstrap an operating system, which usually passes control to the volume boot record, and uniquely identifies the disk media.

    • A volume boot record (VBR), also known as a volume boot sector or a partition boot sector, is a type of boot sector stored in a disk volume on a hard disk, floppy disk, or similar data storage device that contains code for booting an operating system such as NTLDR and BOOTMGR.

    • The Windows XP and Windows Server 2003 NTLDR will read the boot.ini file to determine which operating system to load even if your system only has one operating system.

    • Boot Configuration Data (BCD) is a firmware-independent database for boot-time con- figuration data used by Microsoft’s Windows Boot Manager found with Windows Vista, Windows 7, and Windows Server 2008.

    • When problems occur during boot up, you may need to take some extra steps to get the computer into a usable state so that you can fix the problem. Since the release of Windows XP, you can access the Advanced Boot Options to get to advanced troubleshooting modes, including safe mode and last known good configuration.

    • To access the Advanced Boot Options screen turn your computer on and press F8 before the Windows logo appears.

    • Safe mode starts Windows with a minimal set of drivers and services. If you make a change to the system and Windows no longer boots, you can try safe mode.

    • Last known good configuration starts Windows with the last registry and driver configuration that worked successfully, usually marked as the last successful login.
    • System Configuration (msconfig.exe) is a tool that can help identify problems that might prevent Windows from starting correctly by disabling programs and services that start automatically when Windows starts.

    • Performance is the overall effectiveness of how data moves through the system

    • If your computer lacks the RAM needed to run a program or perform an operation, Windows uses virtual memory to compensate.

    • When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM so your computer can complete its work.

    • Task Manager gives you a quick glance at performance and provides information about programs and processes running on your computer.

    • Windows Performance Monitor is a Microsoft Management Console (MMC) snap-in that provides tools for analyzing system performance.

    • Windows Resource Monitor is a system tool that allows you to view information about the use of hardware (CPU, memory, disk, and network) and software resources (file handlers and modules) in real time.

    • As a server administrator, you need to minimize downtime by identifying potential failures and taking steps to avoid those failures and to reduce the effect of those failures.

    • NIC teaming is the process of grouping together two or more physical NICs into one single logical NIC, which can be used for network fault tolerance and increased bandwidth through load balancing.

    • A computer cluster is a group of linked computers that work together as one computer. Based on the technology used, clusters can provide fault tolerance (often referred to as availability), load balancing, or both.

    • A failover cluster is a set of independent computers that work together to increase the availability of services and applications. The clustered servers (called nodes) are connected by physical cables and by software.

    • In an active-passive cluster, both servers are configured to work as one, but only one at a time.

    • Network load balancing (NLB) is when multiple computers are configured as one virtual server to share the workload among multiple computers.

    • A common use of clusters would include a failover cluster for the back end servers such as a database (like SQL Server) or mail server (such as Exchange Server) and a load balancing cluster for the front end that provides the web interface to the back end servers.

    • An uninterruptible power supply or UPS is an electrical device consisting of one or more batteries to provide backup power when a power outage occurs.

    • A backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data-loss event.

    • The best method for data recovery is back up, back up, back up.

    • The Windows system state is a collection of system components that are not contained in a simple file that can be backed up easily. It includes boot files and the registry.

    • Full backups back up all designated files and data.

    • Full backups with incremental backups start with a full backup followed by several incre- mental backups. When you do a restore, you restore the last full backup and then restore each incremental backup from oldest to newest. Full backups with incremental backups offers the fastest way to back up data.

    • Full backup with differential backup starts with a full backup followed by several differential backups. When you do a restore, you restore the last full backup and the last differential backup.

    • Shadow copies, when configured, automatically create backup copies of the data stored in shared folders on specific NTFS drive volumes at scheduled times



    Lesson 5summary

    • Besides becoming the standard for the Internet, DNS, short for Domain Name System, is a hierarchical client/server-based distributed database management system that translates domain/hosts names to IP addresses.

    • A fully qualified domain name (FQDN) describes the exact position of a host within a DNS hierarchy.

    • The legacy naming service is Windows Internet Name Service or WINS, which translates from NetBIOS (computer name) to specify a network resource.

    • When you share a directory, drive, or printer on a PC running Microsoft Windows or on a Linux machine running Samba, you can access the resource by using the Universal Naming Convention (UNC), also known as Uniform Naming Convention, to specify the location of the resource.

    • Dynamic Host Configuration Protocol (DHCP) services automatically assign IP addresses and related parameters (including subnet mask and default gateway and length of the lease) so that a host can immediately communicate on an IP network when it starts.

    • The Lightweight Directory Access Protocol, or LDAP, is an application protocol for querying and modifying data using directory services running over TCP/IP.


    • Active Directory domains, trees, and forests are logical representations of network organization, which allow you to organize them in the best way to manage them.

    • Sites and domain controllers represent the physical structure of a network.

    • A site is one or more IP subnets that are connected by a high-speed link, typically defined by a geographical location.

    • A domain controller is a Windows server that stores a replica of the account and security information for the domain and defines the domain boundaries.

    • A server that is not running as a domain controller is known as a member server.

    • To minimize traffic across a WAN link, bridgehead servers perform directory replication between two sites, whereas only two designated domain controllers talk to each other.

    • Active Directory uses multimaster replication, which means that there is no master domain controller.

    • Because there are certain functions that can only be handled by one domain controller at a time, Active Directory uses Flexible Single Master Operations (FSMO) roles.

    • A global catalog holds replicate information of every object in a tree and forest.

    • The functional level of a domain or forest controls which advanced features are available in the domain or forest.

    To help organize objects within a domain and minimize the number of domains, you can use organizational units, commonly known as OUs.

    • You can delegate administrative control to any level of a domain tree by creating organizational units within a domain and delegating administrative control for specific organizational units to particular users or groups.

    • A user account enables a user to log on to a computer and domain. As a result, it can used to prove the identity of a user, and this information can then be used to determine what a user can access and what kind of access he or she will have (authorization).

    • Windows computer accounts provide a means for authenticating and auditing a computer’s access to a Windows network and to domain resources.

    • A group is a collection of user accounts or computer accounts.

    • Group Policy provides the centralized management and configuration of operating systems, applications, and user settings in an Active Directory environment.

    • A right authorizes a user to perform certain actions on a computer.

    • A permission defines the type of access that is granted to an object (an object can be identified with a security identifier) or object attribute.


    Lesson 6summary

    • NTFS permissions allow you to control which users and groups can gain access to files and folders on an NTFS volume.

    • Each of the standard permissions consists of a logical group of special permissions.

    • Explicit permissions are permissions granted directly to the file or folder.

    • Inherited permissions are permissions that are granted to a folder (parent object or container) and that flow into child objects (subfolders or files inside the parent folder).

    • The Deny permission always overrides the permissions that have been granted, including when a user or group has been given the full control permission.

    • Effective permissions are the actual permissions when logging in and accessing a file or folder. They consist of explicit permissions plus any inherited permissions as a user or from any groups that user is a member of.

    • If a file or folder is copied, the new file or folder automatically acquires the permissions of the drive or folder to which it is being copied.

    • If a file or folder is moved within the same volume, the file or folder retains the same permissions that were already assigned to it.

    • If a file or folder is moved from one volume to another volume, it automatically acquires the permissions of the drive or folder to which it is being copied.


    • The owner of the object controls how permissions are set on the object and to whom permissions are granted.

    • If, for some reason, you have been denied access to a file or folder, you need to reset the permissions by taking ownership of a file or folder and modifying the permissions.

    • Encryption is the process of converting data into a format that cannot be read by another user.

    • Encrypting File System (EFS) is a core file encryption technology used to store encrypted files on NTFS file system volumes.

    • Most users are not going to log on to a server directly to access their data files. Instead, a drive or folder will be shared (known as a shared folder), and they will access the data files over the network.

    • Like NTFS, you can allow or deny each share permission.

    • To simplify managing share and NTFS permissions, Microsoft recommends giving everyone full control, and then controlling access using NTFS permissions.

    • An administrative share is a shared folder typically used for administrative purposes.

    • Microsoft refers to the printer itself as a print device.

    • A printer in Windows is a logical printer, which will provide a software interface between the print device and applications.

    • A printer pools to act as a single virtual printer with a single print queue, but it contains two or more physical printers.

    • Since printers are considered objects, you can assign permissions to a printer. You can specify who can use the printer, who can manage the printer, and who can manage the print jobs.

    • By default, the Print permission is assigned to the everyone group.

    • The print queue shows information about a document such as print status, owner, and number of pages to be printed.

    • When you use Internet Printing, you can print or manage documents from a web browser using the Internet Print Protocol (IPP), which is encapsulated in the Hypertext Transfer Protocol (HTTP).

    • Auditing provides a record of the users that have logged in and what the user accessed or tried to access.

    • Auditing is not enabled by default. To enable auditing, you specify what types of system events to audit using group policies or the local security policy.

    • To audit NTFS files, NTFS folders, and printers is a two-step process. You must first enable Object Access using group policies. Then you must specify which objects you want to audit.

    Lesson 7 summary


    • When you view web pages, you are connecting to the web server using TCP port 80.

    • SSL, short for Secure Sockets Layer, uses TCP port 443, which uses a digital certificate to encrypt data sent to and from a Web site so that it cannot be read by anyone except the source and target. When you are using SSL, the browser URL will start with https.

    • File Transfer Protocol (FTP) is a standard network protocol used to transfer a file from one host to another over a TCP/IP-based network.

    • Microsoft’s web server/application server is Internet Information Services (IIS).

    • To support multiple Web sites, you can assign additional IP addresses and assign a site to each IP address by using different ports for each site or host headers.

    • To configure the IP address, port, and name a Web site will respond to, you must configure the site binding.

    • A virtual directory is a directory used in a Web site that corresponds to a physical directory elsewhere on the server, on another server, or on a Website.

    • An application is a grouping of content on a Web site that is defined at the root level or in a separate folder that has specific properties, such as the application pool in which the application runs and the permissions that are granted on the folder.

    • An application pool is a set of resources (a worker process or a set of worker pro- cesses) used by a Web site or application that defines the memory boundaries for the Web site.

    • The Default Documents feature allows you to configure the list of default documents that will automatically be presented to a browser if a document is not specified.

    • A virtual private network (VPN) links two computers through a wide-area network such as the Internet. To keep the connection secure, the data sent between the two computers is encapsulated and encrypted.

    • To access a computer running Remote Desktop Services, you use Remote Desktop Connections to access a computer’s graphical user interface including the desktop, start menu, and programs just as if you were sitting in front of the computer.

    • Remote assistance is similar to remote desktop except it is used to connect to another user’s session so that you can see what the user is seeing and interact with that session.

    • By using virtual machine technology, you can run multiple operating systems concur- rently on a single machine, which allows separation of services while keeping cost to a minimum.

    • The hypervisor is installed between the hardware and the operating system and is the main component that manages virtual computers.

    • Some of the Windows built-in drivers do not run efficiently under a virtual environ- ment. Therefore, you need to install Integration Services, which includes some basic drivers.

    • Microsoft System Center Virtual Machine Manager (VMM) allows you to convert existing physical computers into virtual machines through a process known as physical-to-virtual (P2V) conversion.

    • A snapshot is a point in time image of a virtual machine that you can return to.
  • horusthesunhorusthesun Member Posts: 289
    iSCSICLI is a command line tool for scripting Microsoft iSCSICI initiator service.

    iSCSICLI AddTarget: Creates a connection to a volume or device
    iSCSICLI AddPersistentDevices: Makes an iSCSI device persistent
    iSCSICLI RemovePersistentDevices: Prevents the reconnection to a specified volume
    iSCSICLI ClearPersistentDevice: Remove all volumes and devices from the list of persistent devices.
  • NotHackingYouNotHackingYou Member Posts: 1,460 ■■■■■■■■□□
    I passed this today with a 95%. As usual the MS press book had way more detail than was needed for the exam
    When you go the extra mile, there's no traffic.
  • horusthesunhorusthesun Member Posts: 289
    CarlSaiyed wrote: »
    I passed this today with a 95%. As usual the MS press book had way more detail than was needed for the exam

    Congrats .. I took the C)VA - Certified Vulnerability Assessor from mile2
    Whats next?

    I am still studying 70-687

  • rajrajhansrajrajhans Member Posts: 16 ■□□□□□□□□□
    Thank you so much, horusthesun !!!' I was literally hunting for resources for MTA 98-365. And, I found your post. I'm planning to take the exam next week. Thanks once again. icon_thumright.gif
  • PJ_SneakersPJ_Sneakers Member Posts: 884 ■■■■■■□□□□
    Great post. You put a lot of work into that. Thanks for sharing!
  • techno-kidtechno-kid Member Posts: 13 ■□□□□□□□□□
    This is really a treasure..........................
  • techno-kidtechno-kid Member Posts: 13 ■□□□□□□□□□
    Hello.

    1. You explained about types of RAMs . But, that is listed nowhere in the exam objectives. So, is there any need to learn that?

    2. Do we have to learn the big-big commands? instead we can supply the /? and get further details.

    3. The information provided on technet is far more deep than it is expected for this exam........................

    Anybody??
  • horusthesunhorusthesun Member Posts: 289
    Try to learn everything you can

    it is better to be over prepared than under-pared .. if this is actually word ... i don't know ... or is under-prepared
  • systemstechsystemstech Member Posts: 120
    Brother, thank you so much. I'm going to be using your resources for sure. I have my test the 26th, so my plan is to continue video training, then use these resources my last week before the test.
  • Fulcrum45Fulcrum45 Member Posts: 621 ■■■■■□□□□□
    I've decided to take the exam on the 28th- very last second. Hoping all goes well if I study my butt off. Thanks for the notes- these are great!
  • Fulcrum45Fulcrum45 Member Posts: 621 ■■■■■□□□□□
    Should anyone care- I passed the exam! Thanks for those notes, they were invaluable.
Sign In or Register to comment.