Deck 9: Designing Supporting Services

Full screen (f)
exit full mode
Question
An important element to monitor on an SQL Server is the state of the ____ log.

A) transaction
C) access
B) database
D) interface
Use Space or
up arrow
down arrow
to flip the card.
Question
Before you can add DFS role services, you must add the DFS namespaces, which are part of the File Services role.
Question
DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.
Question
SCOM builds on the basic philosophy that an administrator wants to know about problems before they happen.
Question
____ can be used to copy and synchronize the content of DFS namespace folders from one DFS server to another.

A) DFS replication
C) DFS synchronization
B) DFS merging
D) DFS collaboration
Question
____ is an add-on server product that can be used to monitor servers and client computers in an enterprise.

A) Microsoft System Center Configuration Manager 2007
B) Microsoft Enterprise Operation Center 2007
C) Microsoft System Center Virtual Machine Manager 2007
D) Microsoft System Center Operations Manager 2007
Question
The ____ security element of data security is protected using standard methods such as locked doors and cipher locks.

A) secrecy
C) operational
B) physical
D) network
Question
SCOM includes the ____ Shell, which is a customized interface of Windows PowerShell.

A) Administration
C) Configuration
B) Command
D) Management
Question
____ are groups of servers that participate in DFS replication and hold copies of the data.

A) Replication units
C) Replication folders
B) Replication partners
D) Replication groups
Question
The implementation of AD FS is complex and detailed, but the result is that users in a separate forest can access the SharePoint server with SSO.
Question
A ____ namespace would be created when the Windows Server 2008 server is not in a domain.

A) domain-based
C) forest-based
B) stand-alone
D) directory-based
Question
____ gives UNIX client computers that do not support SMB communications access to files on a Windows Server 2008 server, and allows Windows Server 2008 servers to access data stored with the Network File System (NFS) on UNIX systems.

A) Services for Non-windows
C) POSIX
B) Services for UNIX
D) Services for Network File System
Question
With SCOM, administrators can use a single centralized server to monitor all servers in the organization.
Question
HTTP uses port ____ by default.

A) 10
C) 80
B) 43
D) 101
Question
A ____ is a group of folders from different servers that presents itself to clients as a single folder tree.

A) DFS sharespace
C) DFS path
B) DFS virtual folder
D) DFS namespace
Question
The ____ is the top-level folder for the DFS namespace.

A) DFS Graphics folder
C) DFS root
B) DFS forest
D) DFS Project folder
Question
The ____ mode provides full support by encrypting entire hard drives and performing a system validation check.

A) BitLocker with a TPM
B) BitLocker with TPM and a PIN
C) BitLocker with TPM and a startup key
D) BitLocker with a startup key (but without TPM)
Question
____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).

A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
Question
____ is an add-on server product that can assess, deploy, and update large numbers of client computers or servers in an enterprise.

A) Microsoft System Center Operations Manager 2007
B) Microsoft System Center Virtual Machine Manager 2007
C) Microsoft System Center Configuration Manager 2007
D) Microsoft System Center Service Manager 2007
Question
____ is a group of folders replicated to all domain controllers in the domain.

A) NTDS
C) SYSROOT
B) SYSVOL
D) DFS Root
Question
____________________ folders are folders that are replicated to all members in the replication group.
Question
AD RMS works by ____ a document and embedding the usage rights within the document
Itself.

A) sealing
C) decrypting
B) encrypting
D) copying
Question
The command-line tool ____ is used to manage the Server for NFS and Client for NFS components in a UNIX system.

A) Dfsadmin
C) Nfscfg
B) Nfsadmin
D) Nfsmgmt
Question
List and describe two events or actions that can cause a BitLocker drive to enter recovery mode.
Question
The command-line tool ____ shows statistics for calls or requests to the Server for NFS component in a UNIX system.

A) Nfsstat
C) Nfscfg
B) Nfsadmin
D) Nfslist
Question
List and describe a method of configuring DFS namespaces.
Question
____________________________________________________________ can allow Active Directory-enabled applications to store and retrieve data in Active Directory using the same resources as AD DS.
Question
Identify and describe a primary benefit that BitLocker provides.
Question
List and describe two benefits SCCM provides for an organization.
Question
Provide an overview of how SCOM is used.
Question
____________________ allows users to authenticate once and then use this authentication for all access.
Question
List two problems that loss of data can cause for a company.
Question
The command-line tool ____ removes NFS-mounted drives on UNIX systems.

A) dismount
C) unmount
B) remount
D) mount
Question
____ can be used as a digital rights management (DRM) technology to protect access to documents created in various Microsoft applications.

A) AD DMS
C) AD RMD
B) AD NRS
D) AD RMS
Question
List and describe two WSS tools that can be used for collaboration.
Question
Microsoft ____________________ is a full range of supporting server products designed to enhance and automate the administration of large networks within an enterprise.
Question
Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
Question
____ is most commonly used to support single sign-on with Web-based applications.

A) AD RMS
C) AD LDS
B) AD FS
D) ADSI
Question
A(n) ______________________________ is a microchip that is usually installed on the system motherboard.It provides the security-related functions for BitLocker, including the storage and encryption of different encryption keys.
Question
List and describe two benefits AD LDS provides for Active Directory-enabled applications.
Question
List two applications through which RMS can be used to protect documents.
Question
Match between columns
Works by encrypting a document and embedding the usage rights within the document itself
SCOM
Works by encrypting a document and embedding the usage rights within the document itself
SCCM
Works by encrypting a document and embedding the usage rights within the document itself
SCDPM
Works by encrypting a document and embedding the usage rights within the document itself
SCVMM
Works by encrypting a document and embedding the usage rights within the document itself
Services for NFS
Works by encrypting a document and embedding the usage rights within the document itself
AD FS
Works by encrypting a document and embedding the usage rights within the document itself
AD DS
Works by encrypting a document and embedding the usage rights within the document itself
AD RMS
Works by encrypting a document and embedding the usage rights within the document itself
AD LDS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCOM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCCM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCDPM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCVMM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
Services for NFS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD FS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD DS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD RMS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD LDS
Provides a single sign-on capability for users in different security realms
SCOM
Provides a single sign-on capability for users in different security realms
SCCM
Provides a single sign-on capability for users in different security realms
SCDPM
Provides a single sign-on capability for users in different security realms
SCVMM
Provides a single sign-on capability for users in different security realms
Services for NFS
Provides a single sign-on capability for users in different security realms
AD FS
Provides a single sign-on capability for users in different security realms
AD DS
Provides a single sign-on capability for users in different security realms
AD RMS
Provides a single sign-on capability for users in different security realms
AD LDS
Provides a centralized backup and recovery solution
SCOM
Provides a centralized backup and recovery solution
SCCM
Provides a centralized backup and recovery solution
SCDPM
Provides a centralized backup and recovery solution
SCVMM
Provides a centralized backup and recovery solution
Services for NFS
Provides a centralized backup and recovery solution
AD FS
Provides a centralized backup and recovery solution
AD DS
Provides a centralized backup and recovery solution
AD RMS
Provides a centralized backup and recovery solution
AD LDS
Used to provide overall monitoring for a network
SCOM
Used to provide overall monitoring for a network
SCCM
Used to provide overall monitoring for a network
SCDPM
Used to provide overall monitoring for a network
SCVMM
Used to provide overall monitoring for a network
Services for NFS
Used to provide overall monitoring for a network
AD FS
Used to provide overall monitoring for a network
AD DS
Used to provide overall monitoring for a network
AD RMS
Used to provide overall monitoring for a network
AD LDS
Used for large-scale management of virtual servers using Hyper-V
SCOM
Used for large-scale management of virtual servers using Hyper-V
SCCM
Used for large-scale management of virtual servers using Hyper-V
SCDPM
Used for large-scale management of virtual servers using Hyper-V
SCVMM
Used for large-scale management of virtual servers using Hyper-V
Services for NFS
Used for large-scale management of virtual servers using Hyper-V
AD FS
Used for large-scale management of virtual servers using Hyper-V
AD DS
Used for large-scale management of virtual servers using Hyper-V
AD RMS
Used for large-scale management of virtual servers using Hyper-V
AD LDS
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCOM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCCM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCDPM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCVMM
Can be used to deploy full operating systems, applications, and updates to systems within the network
Services for NFS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD FS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD DS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD RMS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD LDS
Used to verify a user’s identity when a document is accessed
SCOM
Used to verify a user’s identity when a document is accessed
SCCM
Used to verify a user’s identity when a document is accessed
SCDPM
Used to verify a user’s identity when a document is accessed
SCVMM
Used to verify a user’s identity when a document is accessed
Services for NFS
Used to verify a user’s identity when a document is accessed
AD FS
Used to verify a user’s identity when a document is accessed
AD DS
Used to verify a user’s identity when a document is accessed
AD RMS
Used to verify a user’s identity when a document is accessed
AD LDS
An optional Active Directory service that can provide dedicated directory services for applications
SCOM
An optional Active Directory service that can provide dedicated directory services for applications
SCCM
An optional Active Directory service that can provide dedicated directory services for applications
SCDPM
An optional Active Directory service that can provide dedicated directory services for applications
SCVMM
An optional Active Directory service that can provide dedicated directory services for applications
Services for NFS
An optional Active Directory service that can provide dedicated directory services for applications
AD FS
An optional Active Directory service that can provide dedicated directory services for applications
AD DS
An optional Active Directory service that can provide dedicated directory services for applications
AD RMS
An optional Active Directory service that can provide dedicated directory services for applications
AD LDS
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Designing Supporting Services
1
An important element to monitor on an SQL Server is the state of the ____ log.

A) transaction
C) access
B) database
D) interface
A
2
Before you can add DFS role services, you must add the DFS namespaces, which are part of the File Services role.
False
3
DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.
False
4
SCOM builds on the basic philosophy that an administrator wants to know about problems before they happen.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ can be used to copy and synchronize the content of DFS namespace folders from one DFS server to another.

A) DFS replication
C) DFS synchronization
B) DFS merging
D) DFS collaboration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ is an add-on server product that can be used to monitor servers and client computers in an enterprise.

A) Microsoft System Center Configuration Manager 2007
B) Microsoft Enterprise Operation Center 2007
C) Microsoft System Center Virtual Machine Manager 2007
D) Microsoft System Center Operations Manager 2007
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ security element of data security is protected using standard methods such as locked doors and cipher locks.

A) secrecy
C) operational
B) physical
D) network
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
SCOM includes the ____ Shell, which is a customized interface of Windows PowerShell.

A) Administration
C) Configuration
B) Command
D) Management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ are groups of servers that participate in DFS replication and hold copies of the data.

A) Replication units
C) Replication folders
B) Replication partners
D) Replication groups
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The implementation of AD FS is complex and detailed, but the result is that users in a separate forest can access the SharePoint server with SSO.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ namespace would be created when the Windows Server 2008 server is not in a domain.

A) domain-based
C) forest-based
B) stand-alone
D) directory-based
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ gives UNIX client computers that do not support SMB communications access to files on a Windows Server 2008 server, and allows Windows Server 2008 servers to access data stored with the Network File System (NFS) on UNIX systems.

A) Services for Non-windows
C) POSIX
B) Services for UNIX
D) Services for Network File System
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
With SCOM, administrators can use a single centralized server to monitor all servers in the organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
HTTP uses port ____ by default.

A) 10
C) 80
B) 43
D) 101
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ is a group of folders from different servers that presents itself to clients as a single folder tree.

A) DFS sharespace
C) DFS path
B) DFS virtual folder
D) DFS namespace
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ is the top-level folder for the DFS namespace.

A) DFS Graphics folder
C) DFS root
B) DFS forest
D) DFS Project folder
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ mode provides full support by encrypting entire hard drives and performing a system validation check.

A) BitLocker with a TPM
B) BitLocker with TPM and a PIN
C) BitLocker with TPM and a startup key
D) BitLocker with a startup key (but without TPM)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).

A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is an add-on server product that can assess, deploy, and update large numbers of client computers or servers in an enterprise.

A) Microsoft System Center Operations Manager 2007
B) Microsoft System Center Virtual Machine Manager 2007
C) Microsoft System Center Configuration Manager 2007
D) Microsoft System Center Service Manager 2007
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ is a group of folders replicated to all domain controllers in the domain.

A) NTDS
C) SYSROOT
B) SYSVOL
D) DFS Root
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ folders are folders that are replicated to all members in the replication group.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
AD RMS works by ____ a document and embedding the usage rights within the document
Itself.

A) sealing
C) decrypting
B) encrypting
D) copying
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The command-line tool ____ is used to manage the Server for NFS and Client for NFS components in a UNIX system.

A) Dfsadmin
C) Nfscfg
B) Nfsadmin
D) Nfsmgmt
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
List and describe two events or actions that can cause a BitLocker drive to enter recovery mode.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The command-line tool ____ shows statistics for calls or requests to the Server for NFS component in a UNIX system.

A) Nfsstat
C) Nfscfg
B) Nfsadmin
D) Nfslist
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List and describe a method of configuring DFS namespaces.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____________________________________________________________ can allow Active Directory-enabled applications to store and retrieve data in Active Directory using the same resources as AD DS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Identify and describe a primary benefit that BitLocker provides.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
List and describe two benefits SCCM provides for an organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Provide an overview of how SCOM is used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ allows users to authenticate once and then use this authentication for all access.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
List two problems that loss of data can cause for a company.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The command-line tool ____ removes NFS-mounted drives on UNIX systems.

A) dismount
C) unmount
B) remount
D) mount
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ can be used as a digital rights management (DRM) technology to protect access to documents created in various Microsoft applications.

A) AD DMS
C) AD RMD
B) AD NRS
D) AD RMS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
List and describe two WSS tools that can be used for collaboration.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Microsoft ____________________ is a full range of supporting server products designed to enhance and automate the administration of large networks within an enterprise.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ is most commonly used to support single sign-on with Web-based applications.

A) AD RMS
C) AD LDS
B) AD FS
D) ADSI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) ______________________________ is a microchip that is usually installed on the system motherboard.It provides the security-related functions for BitLocker, including the storage and encryption of different encryption keys.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
List and describe two benefits AD LDS provides for Active Directory-enabled applications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List two applications through which RMS can be used to protect documents.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Works by encrypting a document and embedding the usage rights within the document itself
SCOM
Works by encrypting a document and embedding the usage rights within the document itself
SCCM
Works by encrypting a document and embedding the usage rights within the document itself
SCDPM
Works by encrypting a document and embedding the usage rights within the document itself
SCVMM
Works by encrypting a document and embedding the usage rights within the document itself
Services for NFS
Works by encrypting a document and embedding the usage rights within the document itself
AD FS
Works by encrypting a document and embedding the usage rights within the document itself
AD DS
Works by encrypting a document and embedding the usage rights within the document itself
AD RMS
Works by encrypting a document and embedding the usage rights within the document itself
AD LDS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCOM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCCM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCDPM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCVMM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
Services for NFS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD FS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD DS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD RMS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD LDS
Provides a single sign-on capability for users in different security realms
SCOM
Provides a single sign-on capability for users in different security realms
SCCM
Provides a single sign-on capability for users in different security realms
SCDPM
Provides a single sign-on capability for users in different security realms
SCVMM
Provides a single sign-on capability for users in different security realms
Services for NFS
Provides a single sign-on capability for users in different security realms
AD FS
Provides a single sign-on capability for users in different security realms
AD DS
Provides a single sign-on capability for users in different security realms
AD RMS
Provides a single sign-on capability for users in different security realms
AD LDS
Provides a centralized backup and recovery solution
SCOM
Provides a centralized backup and recovery solution
SCCM
Provides a centralized backup and recovery solution
SCDPM
Provides a centralized backup and recovery solution
SCVMM
Provides a centralized backup and recovery solution
Services for NFS
Provides a centralized backup and recovery solution
AD FS
Provides a centralized backup and recovery solution
AD DS
Provides a centralized backup and recovery solution
AD RMS
Provides a centralized backup and recovery solution
AD LDS
Used to provide overall monitoring for a network
SCOM
Used to provide overall monitoring for a network
SCCM
Used to provide overall monitoring for a network
SCDPM
Used to provide overall monitoring for a network
SCVMM
Used to provide overall monitoring for a network
Services for NFS
Used to provide overall monitoring for a network
AD FS
Used to provide overall monitoring for a network
AD DS
Used to provide overall monitoring for a network
AD RMS
Used to provide overall monitoring for a network
AD LDS
Used for large-scale management of virtual servers using Hyper-V
SCOM
Used for large-scale management of virtual servers using Hyper-V
SCCM
Used for large-scale management of virtual servers using Hyper-V
SCDPM
Used for large-scale management of virtual servers using Hyper-V
SCVMM
Used for large-scale management of virtual servers using Hyper-V
Services for NFS
Used for large-scale management of virtual servers using Hyper-V
AD FS
Used for large-scale management of virtual servers using Hyper-V
AD DS
Used for large-scale management of virtual servers using Hyper-V
AD RMS
Used for large-scale management of virtual servers using Hyper-V
AD LDS
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCOM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCCM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCDPM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCVMM
Can be used to deploy full operating systems, applications, and updates to systems within the network
Services for NFS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD FS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD DS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD RMS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD LDS
Used to verify a user’s identity when a document is accessed
SCOM
Used to verify a user’s identity when a document is accessed
SCCM
Used to verify a user’s identity when a document is accessed
SCDPM
Used to verify a user’s identity when a document is accessed
SCVMM
Used to verify a user’s identity when a document is accessed
Services for NFS
Used to verify a user’s identity when a document is accessed
AD FS
Used to verify a user’s identity when a document is accessed
AD DS
Used to verify a user’s identity when a document is accessed
AD RMS
Used to verify a user’s identity when a document is accessed
AD LDS
An optional Active Directory service that can provide dedicated directory services for applications
SCOM
An optional Active Directory service that can provide dedicated directory services for applications
SCCM
An optional Active Directory service that can provide dedicated directory services for applications
SCDPM
An optional Active Directory service that can provide dedicated directory services for applications
SCVMM
An optional Active Directory service that can provide dedicated directory services for applications
Services for NFS
An optional Active Directory service that can provide dedicated directory services for applications
AD FS
An optional Active Directory service that can provide dedicated directory services for applications
AD DS
An optional Active Directory service that can provide dedicated directory services for applications
AD RMS
An optional Active Directory service that can provide dedicated directory services for applications
AD LDS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.