IT260 Networking Application Services And Security

Helpfulness: 0
Set Details Share
created 7 years ago by abravo118
915 views
updated 7 years ago by abravo118
show moreless
Page to share:
Embed this setcancel
COPY
code changes based on your size selection
Size:
X
Show:
1

Can be used to make a Point-In-Time backups from files that are open, locked, or in use.

Volume Shadow Copy Service (VSS)

2

Can be used for mailbox restore operations and cannot be accessed by email clients nor can it participate in policies, replication, or clustering.

Recovery Storage Group (RSG)

3

The _____, found on the Hub role servers, contains all of the SMTP communications that occurred on the send and receive connectors of those servers.

Protocol Logs

4

Although mailbox users connect to a single public folder database by default, they will be able to see and access all of the public folders within the Exchange organization using ________.

Public Folder Referrals

5

What protocol is designed to download email from an email server to a client for viewing?

Post Office Protocol Version 3 (POP3)

6

POP3 uses TCP port 110 while IMAP uses TCP port?

143

7

What parameters should be used to perform an offline defrag with eseutil.exe?

/d

8

Mailbox database use the ______ file name extension.

.edb

9

Some viruses spread via email. When the file or file attachment that contains this type of virus is opened, the virus obtains a list of any email addresses it can find with your email client program and sends email to those receipients on your behalf along with a copy of the virus. What is this type of virus called?

email bombs

10

Unlike other Exchange servers within your Exchange Organization, servers that host the _____ role cannot communicate directly with Active Directory.

Edge

11

To relay email within your organization and across the Internet, your Hub and Edge role servers must have ____ that specify how to send and receive email.

connectors

12

Network-based firewalls can restrict traffic based on source and destination IP address, network, and _____ address.

MAC

13

What user group represents users within an organization that have both a user account in AD and mailbox on an Exchange server?

Mailbox user

14

If you create ____ groups within your organization to represent even the smallest groups of users who share the same function, location, or job role, you will have great flexibility when sending email.

mail-enabled

15

Instead of using public folders, Outlook 2007 and Entourage 2008 MAPI clients use the _____ within Exchange 2007 to obtain offline address books, schedule calendar appointments, and obatin configuration information.

Autodiscover and Availability

16

Email is typically created and sent using an email client program, such as Microsoft Outlook or Eudora, called a ___.

MUA

17

Domain names that contain the name of the host computer are called?

Fully Qualified Domain Names (FQDN)

18

____ is an improved version of the standard email protocol that provides greater support for embedded graphics and attachments in email.

ESMTP

19

Which Exchange Server role allows users to access email, voice mail, and fax messages from a MAPI client, OWA, smart phone, or telephone?

Unified Messaging (UM)

20

The two forest wide FSMO roles that must be present on a single DC in the forest are the Domain Naming Master and the?

Schema Master

21

GPOs are applied to user and computer objects based on the link in the following order: ____, Domain, Parent OUs, Child OUs.

Site

22

An Exchange server that hosts the Edge, Hub, CAS, and Mailbox server roles should have at least ___GB of RAM.

8

23

To install Exchange Server 2007 from the installation media, you can run the setup.exe for graphical mode or the setup.com for _____ mode.

unattended

24

Which administrative role grants full permission to all computers of Exchange as well as Exchange related objects and information in AD?

Exchange Organization Administrator role

25

Installing the Exchange role on multifunction servers is a ___ practice.

poor