1. Explain what a snap-in is.
    A snap-in is an interface for a program designed to integrate with the MMC.
  2. As an administrator, how would MMC make accomplishing your duties easier?
    It simplifies the management of the server and network.
  3. What are the two places a user account can be created?
    On a local computer or a domain controller.
  4. What is the difference between Permissions and Rights?
    Permissions control access to an object, such as a folder or file. Rights enable a user account or group to perform predefined tasks.
  5. Where is a domain user account valid?
    On any computer in the domain for which the account was created.
  6. Which snap-in to the MMC would you use to create a new user account?
    You use the AD Users and Computers snap-in to the MMC to create a domain user account.
  7. Why would you use group nesting?
    To simplify and reduce security management overhead.
  8. What scopes can apply to special identities?
    None, group scopes do not apply to special identities.
  9. What do permissions define?
    Rules by which operations can be performed on a particular resource.
  10. What is the only way to secure resources on FAT partitions?
    By sharing resources.
  11. What are the four shared folder permissions?
    Full control, Change, Read, and No Access.
  12. Which permission over rides all others?
    The No Access permission always overrides all other permissions assigned to a user or group to which the user belongs.
  13. What are the six NTFS permissions?
    Read, Write, Execute, Delete, Change permission, and Take Ownership.
  14. Why would you remove full control permission from the everyone group?
    With this permission in place, literally anyone on the network could delete or modify those resources.
  15. What features does Microsoft Exchange server share with other email systems?
    a) It transfers email messages to intended recipients in a reliable way. b) It stores the email messages in a server-based store. c) It supports various email clients. d) It provides users with information through the GAL.
  16. What does Microsoft Exchange server integrate tightly with to provide its many features?
    The TCP/IP infrastructure provided by Microsoft Windows Server 2003 and AD service.
  17. What protocols does Exchange server use to support web based mail client connectivity?
  18. What is the core data storage repository for Microsoft Exchange server?
    The Exchange Information Store Service.
  19. What information does a mailbox store about a particular mail recipient?
    a) Mail Messages. b) Calendar Data. c) Tasks. d) Personal Information.
  20. What are the two Microsoft Exchange server roles?
    Mailbox Server and Bridgehead Server.
  21. Microsoft Exchange server 2003 requires what components and services to be installed and enabled on the server?
    .NET framework, ASP.NET, IIS, WWW Publishing Service, SMTP, and NNTP.
  22. What must the account you use to install the first Exchange 2003 server in the forest be?
    The account you use to run DomainPrep must be a member of the Domain Administrators group in the local domain and a local computer administrator.
  23. What are data structures designed to do?
    To organize data to suit a specific programming purpose so you can access them later and use them in appropriate ways to produce a desired output.
  24. What is the purpose of a schema?
    The schema describes the objects that are represented in the database, and the relationships among them.
  25. Why do we define a group of ordered data items or elements as a linked list?
    Because we use pointers to connect each element together, thus specifying their order.
  26. How does a sequential list differ from a linked list?
    In contrast to the physical layout of data items in a linked list, where pointers connect each element together and specifying their order, a sequential list, or ordered list, in the order that the items are read.
  27. How are columns and rows identified in a table?
    The columns are identified by name, and the rows are identified by the values appearing in a particular column subset, which has been identified as a candidate key.
  28. How do base tables and derived tables differ?
    Base tables are self contained, meaning that all of the data in them is in that table, not from any other table. A derived table contains information that was retrieved from another table.
  29. When referring to databases, what is a view?
    A virtual or logical table composed of the result set of a query.
  30. How does a network, or plex, data structure differ from a hierarchical, or tree, data structure?
    With a network structure, though, both the relationship from child-to-parent and the relationship from parent-to-child can be a one to many.
  31. Describe a relational database.
    A collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.
  32. What three values form the basis of the three valued logic used by SQL?
    The Null value, along with True and False, is the basis of the Three Valued Logic (3VL) used by SQL.
  33. Describe the three basic types of SQL statements.
    (1) Data statements Queries and or modifies tables and columns. (2) Transaction statements Control transactions, either making changes permanent, or removing them. (3) Schema statements Maintain schema, creating or removing tables,views, & privileges.
  34. In SQL, how is logging used to ensure data integrity?
    If an action is logged, but it is not completed, the actions can be read from the log and completed. If a log entry is incomplete, then incomplete transactions can be removed. If an action was not logged, then no changes were made to the database.
  35. Describe the two types of concurrency used by Microsoft SQL server.
    a) Pessimistic concurrency which uses locks to control access to data. b) Optimistic concurrency. Each time a change is made to data in a row, a new version of that row is created and the old one is removed from the database and stored in a back up file.
Card Set