Print Options

Card layout: ?

← Back to notecard set|Easy Notecards home page

Instructions for Side by Side Printing
  1. Print the notecards
  2. Fold each page in half along the solid vertical line
  3. Cut out the notecards by cutting along each horizontal dotted line
  4. Optional: Glue, tape or staple the ends of each notecard together
  1. Verify Front of pages is selected for Viewing and print the front of the notecards
  2. Select Back of pages for Viewing and print the back of the notecards
    NOTE: Since the back of the pages are printed in reverse order (last page is printed first), keep the pages in the same order as they were after Step 1. Also, be sure to feed the pages in the same direction as you did in Step 1.
  3. Cut out the notecards by cutting along each horizontal and vertical dotted line
To print: Ctrl+PPrint as a list

25 notecards = 7 pages (4 cards per page)

Viewing:

IT260 Networking Application Services And Security

front 1

Can be used to make a Point-In-Time backups from files that are open, locked, or in use.

back 1

Volume Shadow Copy Service (VSS)

front 2

Can be used for mailbox restore operations and cannot be accessed by email clients nor can it participate in policies, replication, or clustering.

back 2

Recovery Storage Group (RSG)

front 3

The _____, found on the Hub role servers, contains all of the SMTP communications that occurred on the send and receive connectors of those servers.

back 3

Protocol Logs

front 4

Although mailbox users connect to a single public folder database by default, they will be able to see and access all of the public folders within the Exchange organization using ________.

back 4

Public Folder Referrals

front 5

What protocol is designed to download email from an email server to a client for viewing?

back 5

Post Office Protocol Version 3 (POP3)

front 6

POP3 uses TCP port 110 while IMAP uses TCP port?

back 6

143

front 7

What parameters should be used to perform an offline defrag with eseutil.exe?

back 7

/d

front 8

Mailbox database use the ______ file name extension.

back 8

.edb

front 9

Some viruses spread via email. When the file or file attachment that contains this type of virus is opened, the virus obtains a list of any email addresses it can find with your email client program and sends email to those receipients on your behalf along with a copy of the virus. What is this type of virus called?

back 9

email bombs

front 10

Unlike other Exchange servers within your Exchange Organization, servers that host the _____ role cannot communicate directly with Active Directory.

back 10

Edge

front 11

To relay email within your organization and across the Internet, your Hub and Edge role servers must have ____ that specify how to send and receive email.

back 11

connectors

front 12

Network-based firewalls can restrict traffic based on source and destination IP address, network, and _____ address.

back 12

MAC

front 13

What user group represents users within an organization that have both a user account in AD and mailbox on an Exchange server?

back 13

Mailbox user

front 14

If you create ____ groups within your organization to represent even the smallest groups of users who share the same function, location, or job role, you will have great flexibility when sending email.

back 14

mail-enabled

front 15

Instead of using public folders, Outlook 2007 and Entourage 2008 MAPI clients use the _____ within Exchange 2007 to obtain offline address books, schedule calendar appointments, and obatin configuration information.

back 15

Autodiscover and Availability

front 16

Email is typically created and sent using an email client program, such as Microsoft Outlook or Eudora, called a ___.

back 16

MUA

front 17

Domain names that contain the name of the host computer are called?

back 17

Fully Qualified Domain Names (FQDN)

front 18

____ is an improved version of the standard email protocol that provides greater support for embedded graphics and attachments in email.

back 18

ESMTP

front 19

Which Exchange Server role allows users to access email, voice mail, and fax messages from a MAPI client, OWA, smart phone, or telephone?

back 19

Unified Messaging (UM)

front 20

The two forest wide FSMO roles that must be present on a single DC in the forest are the Domain Naming Master and the?

back 20

Schema Master

front 21

GPOs are applied to user and computer objects based on the link in the following order: ____, Domain, Parent OUs, Child OUs.

back 21

Site

front 22

An Exchange server that hosts the Edge, Hub, CAS, and Mailbox server roles should have at least ___GB of RAM.

back 22

8

front 23

To install Exchange Server 2007 from the installation media, you can run the setup.exe for graphical mode or the setup.com for _____ mode.

back 23

unattended

front 24

Which administrative role grants full permission to all computers of Exchange as well as Exchange related objects and information in AD?

back 24

Exchange Organization Administrator role

front 25

Installing the Exchange role on multifunction servers is a ___ practice.

back 25

poor