Deck 9: Designing Supporting Services

ملء الشاشة (f)
exit full mode
سؤال
An important element to monitor on an SQL Server is the state of the ____ log.

A) transaction
C) access
B) database
D) interface
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Before you can add DFS role services, you must add the DFS namespaces, which are part of the File Services role.
سؤال
DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.
سؤال
SCOM builds on the basic philosophy that an administrator wants to know about problems before they happen.
سؤال
____ can be used to copy and synchronize the content of DFS namespace folders from one DFS server to another.

A) DFS replication
C) DFS synchronization
B) DFS merging
D) DFS collaboration
سؤال
____ is an add-on server product that can be used to monitor servers and client computers in an enterprise.

A) Microsoft System Center Configuration Manager 2007
B) Microsoft Enterprise Operation Center 2007
C) Microsoft System Center Virtual Machine Manager 2007
D) Microsoft System Center Operations Manager 2007
سؤال
The ____ security element of data security is protected using standard methods such as locked doors and cipher locks.

A) secrecy
C) operational
B) physical
D) network
سؤال
SCOM includes the ____ Shell, which is a customized interface of Windows PowerShell.

A) Administration
C) Configuration
B) Command
D) Management
سؤال
____ are groups of servers that participate in DFS replication and hold copies of the data.

A) Replication units
C) Replication folders
B) Replication partners
D) Replication groups
سؤال
The implementation of AD FS is complex and detailed, but the result is that users in a separate forest can access the SharePoint server with SSO.
سؤال
A ____ namespace would be created when the Windows Server 2008 server is not in a domain.

A) domain-based
C) forest-based
B) stand-alone
D) directory-based
سؤال
____ gives UNIX client computers that do not support SMB communications access to files on a Windows Server 2008 server, and allows Windows Server 2008 servers to access data stored with the Network File System (NFS) on UNIX systems.

A) Services for Non-windows
C) POSIX
B) Services for UNIX
D) Services for Network File System
سؤال
With SCOM, administrators can use a single centralized server to monitor all servers in the organization.
سؤال
HTTP uses port ____ by default.

A) 10
C) 80
B) 43
D) 101
سؤال
A ____ is a group of folders from different servers that presents itself to clients as a single folder tree.

A) DFS sharespace
C) DFS path
B) DFS virtual folder
D) DFS namespace
سؤال
The ____ is the top-level folder for the DFS namespace.

A) DFS Graphics folder
C) DFS root
B) DFS forest
D) DFS Project folder
سؤال
The ____ mode provides full support by encrypting entire hard drives and performing a system validation check.

A) BitLocker with a TPM
B) BitLocker with TPM and a PIN
C) BitLocker with TPM and a startup key
D) BitLocker with a startup key (but without TPM)
سؤال
____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).

A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
سؤال
____ is an add-on server product that can assess, deploy, and update large numbers of client computers or servers in an enterprise.

A) Microsoft System Center Operations Manager 2007
B) Microsoft System Center Virtual Machine Manager 2007
C) Microsoft System Center Configuration Manager 2007
D) Microsoft System Center Service Manager 2007
سؤال
____ is a group of folders replicated to all domain controllers in the domain.

A) NTDS
C) SYSROOT
B) SYSVOL
D) DFS Root
سؤال
____________________ folders are folders that are replicated to all members in the replication group.
سؤال
AD RMS works by ____ a document and embedding the usage rights within the document
Itself.

A) sealing
C) decrypting
B) encrypting
D) copying
سؤال
The command-line tool ____ is used to manage the Server for NFS and Client for NFS components in a UNIX system.

A) Dfsadmin
C) Nfscfg
B) Nfsadmin
D) Nfsmgmt
سؤال
List and describe two events or actions that can cause a BitLocker drive to enter recovery mode.
سؤال
The command-line tool ____ shows statistics for calls or requests to the Server for NFS component in a UNIX system.

A) Nfsstat
C) Nfscfg
B) Nfsadmin
D) Nfslist
سؤال
List and describe a method of configuring DFS namespaces.
سؤال
____________________________________________________________ can allow Active Directory-enabled applications to store and retrieve data in Active Directory using the same resources as AD DS.
سؤال
Identify and describe a primary benefit that BitLocker provides.
سؤال
List and describe two benefits SCCM provides for an organization.
سؤال
Provide an overview of how SCOM is used.
سؤال
____________________ allows users to authenticate once and then use this authentication for all access.
سؤال
List two problems that loss of data can cause for a company.
سؤال
The command-line tool ____ removes NFS-mounted drives on UNIX systems.

A) dismount
C) unmount
B) remount
D) mount
سؤال
____ can be used as a digital rights management (DRM) technology to protect access to documents created in various Microsoft applications.

A) AD DMS
C) AD RMD
B) AD NRS
D) AD RMS
سؤال
List and describe two WSS tools that can be used for collaboration.
سؤال
Microsoft ____________________ is a full range of supporting server products designed to enhance and automate the administration of large networks within an enterprise.
سؤال
Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
سؤال
____ is most commonly used to support single sign-on with Web-based applications.

A) AD RMS
C) AD LDS
B) AD FS
D) ADSI
سؤال
A(n) ______________________________ is a microchip that is usually installed on the system motherboard.It provides the security-related functions for BitLocker, including the storage and encryption of different encryption keys.
سؤال
List and describe two benefits AD LDS provides for Active Directory-enabled applications.
سؤال
List two applications through which RMS can be used to protect documents.
سؤال
Match between columns
Works by encrypting a document and embedding the usage rights within the document itself
SCOM
Works by encrypting a document and embedding the usage rights within the document itself
SCCM
Works by encrypting a document and embedding the usage rights within the document itself
SCDPM
Works by encrypting a document and embedding the usage rights within the document itself
SCVMM
Works by encrypting a document and embedding the usage rights within the document itself
Services for NFS
Works by encrypting a document and embedding the usage rights within the document itself
AD FS
Works by encrypting a document and embedding the usage rights within the document itself
AD DS
Works by encrypting a document and embedding the usage rights within the document itself
AD RMS
Works by encrypting a document and embedding the usage rights within the document itself
AD LDS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCOM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCCM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCDPM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCVMM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
Services for NFS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD FS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD DS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD RMS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD LDS
Provides a single sign-on capability for users in different security realms
SCOM
Provides a single sign-on capability for users in different security realms
SCCM
Provides a single sign-on capability for users in different security realms
SCDPM
Provides a single sign-on capability for users in different security realms
SCVMM
Provides a single sign-on capability for users in different security realms
Services for NFS
Provides a single sign-on capability for users in different security realms
AD FS
Provides a single sign-on capability for users in different security realms
AD DS
Provides a single sign-on capability for users in different security realms
AD RMS
Provides a single sign-on capability for users in different security realms
AD LDS
Provides a centralized backup and recovery solution
SCOM
Provides a centralized backup and recovery solution
SCCM
Provides a centralized backup and recovery solution
SCDPM
Provides a centralized backup and recovery solution
SCVMM
Provides a centralized backup and recovery solution
Services for NFS
Provides a centralized backup and recovery solution
AD FS
Provides a centralized backup and recovery solution
AD DS
Provides a centralized backup and recovery solution
AD RMS
Provides a centralized backup and recovery solution
AD LDS
Used to provide overall monitoring for a network
SCOM
Used to provide overall monitoring for a network
SCCM
Used to provide overall monitoring for a network
SCDPM
Used to provide overall monitoring for a network
SCVMM
Used to provide overall monitoring for a network
Services for NFS
Used to provide overall monitoring for a network
AD FS
Used to provide overall monitoring for a network
AD DS
Used to provide overall monitoring for a network
AD RMS
Used to provide overall monitoring for a network
AD LDS
Used for large-scale management of virtual servers using Hyper-V
SCOM
Used for large-scale management of virtual servers using Hyper-V
SCCM
Used for large-scale management of virtual servers using Hyper-V
SCDPM
Used for large-scale management of virtual servers using Hyper-V
SCVMM
Used for large-scale management of virtual servers using Hyper-V
Services for NFS
Used for large-scale management of virtual servers using Hyper-V
AD FS
Used for large-scale management of virtual servers using Hyper-V
AD DS
Used for large-scale management of virtual servers using Hyper-V
AD RMS
Used for large-scale management of virtual servers using Hyper-V
AD LDS
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCOM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCCM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCDPM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCVMM
Can be used to deploy full operating systems, applications, and updates to systems within the network
Services for NFS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD FS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD DS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD RMS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD LDS
Used to verify a user’s identity when a document is accessed
SCOM
Used to verify a user’s identity when a document is accessed
SCCM
Used to verify a user’s identity when a document is accessed
SCDPM
Used to verify a user’s identity when a document is accessed
SCVMM
Used to verify a user’s identity when a document is accessed
Services for NFS
Used to verify a user’s identity when a document is accessed
AD FS
Used to verify a user’s identity when a document is accessed
AD DS
Used to verify a user’s identity when a document is accessed
AD RMS
Used to verify a user’s identity when a document is accessed
AD LDS
An optional Active Directory service that can provide dedicated directory services for applications
SCOM
An optional Active Directory service that can provide dedicated directory services for applications
SCCM
An optional Active Directory service that can provide dedicated directory services for applications
SCDPM
An optional Active Directory service that can provide dedicated directory services for applications
SCVMM
An optional Active Directory service that can provide dedicated directory services for applications
Services for NFS
An optional Active Directory service that can provide dedicated directory services for applications
AD FS
An optional Active Directory service that can provide dedicated directory services for applications
AD DS
An optional Active Directory service that can provide dedicated directory services for applications
AD RMS
An optional Active Directory service that can provide dedicated directory services for applications
AD LDS
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Designing Supporting Services
1
An important element to monitor on an SQL Server is the state of the ____ log.

A) transaction
C) access
B) database
D) interface
A
2
Before you can add DFS role services, you must add the DFS namespaces, which are part of the File Services role.
False
3
DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.
False
4
SCOM builds on the basic philosophy that an administrator wants to know about problems before they happen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ can be used to copy and synchronize the content of DFS namespace folders from one DFS server to another.

A) DFS replication
C) DFS synchronization
B) DFS merging
D) DFS collaboration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ is an add-on server product that can be used to monitor servers and client computers in an enterprise.

A) Microsoft System Center Configuration Manager 2007
B) Microsoft Enterprise Operation Center 2007
C) Microsoft System Center Virtual Machine Manager 2007
D) Microsoft System Center Operations Manager 2007
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ security element of data security is protected using standard methods such as locked doors and cipher locks.

A) secrecy
C) operational
B) physical
D) network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
SCOM includes the ____ Shell, which is a customized interface of Windows PowerShell.

A) Administration
C) Configuration
B) Command
D) Management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ are groups of servers that participate in DFS replication and hold copies of the data.

A) Replication units
C) Replication folders
B) Replication partners
D) Replication groups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The implementation of AD FS is complex and detailed, but the result is that users in a separate forest can access the SharePoint server with SSO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A ____ namespace would be created when the Windows Server 2008 server is not in a domain.

A) domain-based
C) forest-based
B) stand-alone
D) directory-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ gives UNIX client computers that do not support SMB communications access to files on a Windows Server 2008 server, and allows Windows Server 2008 servers to access data stored with the Network File System (NFS) on UNIX systems.

A) Services for Non-windows
C) POSIX
B) Services for UNIX
D) Services for Network File System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
With SCOM, administrators can use a single centralized server to monitor all servers in the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
HTTP uses port ____ by default.

A) 10
C) 80
B) 43
D) 101
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
A ____ is a group of folders from different servers that presents itself to clients as a single folder tree.

A) DFS sharespace
C) DFS path
B) DFS virtual folder
D) DFS namespace
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
The ____ is the top-level folder for the DFS namespace.

A) DFS Graphics folder
C) DFS root
B) DFS forest
D) DFS Project folder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ____ mode provides full support by encrypting entire hard drives and performing a system validation check.

A) BitLocker with a TPM
B) BitLocker with TPM and a PIN
C) BitLocker with TPM and a startup key
D) BitLocker with a startup key (but without TPM)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).

A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ is an add-on server product that can assess, deploy, and update large numbers of client computers or servers in an enterprise.

A) Microsoft System Center Operations Manager 2007
B) Microsoft System Center Virtual Machine Manager 2007
C) Microsoft System Center Configuration Manager 2007
D) Microsoft System Center Service Manager 2007
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ is a group of folders replicated to all domain controllers in the domain.

A) NTDS
C) SYSROOT
B) SYSVOL
D) DFS Root
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
____________________ folders are folders that are replicated to all members in the replication group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
AD RMS works by ____ a document and embedding the usage rights within the document
Itself.

A) sealing
C) decrypting
B) encrypting
D) copying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
The command-line tool ____ is used to manage the Server for NFS and Client for NFS components in a UNIX system.

A) Dfsadmin
C) Nfscfg
B) Nfsadmin
D) Nfsmgmt
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
List and describe two events or actions that can cause a BitLocker drive to enter recovery mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
The command-line tool ____ shows statistics for calls or requests to the Server for NFS component in a UNIX system.

A) Nfsstat
C) Nfscfg
B) Nfsadmin
D) Nfslist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
List and describe a method of configuring DFS namespaces.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
____________________________________________________________ can allow Active Directory-enabled applications to store and retrieve data in Active Directory using the same resources as AD DS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Identify and describe a primary benefit that BitLocker provides.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
List and describe two benefits SCCM provides for an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Provide an overview of how SCOM is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____________________ allows users to authenticate once and then use this authentication for all access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
List two problems that loss of data can cause for a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The command-line tool ____ removes NFS-mounted drives on UNIX systems.

A) dismount
C) unmount
B) remount
D) mount
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ can be used as a digital rights management (DRM) technology to protect access to documents created in various Microsoft applications.

A) AD DMS
C) AD RMD
B) AD NRS
D) AD RMS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
List and describe two WSS tools that can be used for collaboration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
Microsoft ____________________ is a full range of supporting server products designed to enhance and automate the administration of large networks within an enterprise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
____ is most commonly used to support single sign-on with Web-based applications.

A) AD RMS
C) AD LDS
B) AD FS
D) ADSI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n) ______________________________ is a microchip that is usually installed on the system motherboard.It provides the security-related functions for BitLocker, including the storage and encryption of different encryption keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
List and describe two benefits AD LDS provides for Active Directory-enabled applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
List two applications through which RMS can be used to protect documents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
Works by encrypting a document and embedding the usage rights within the document itself
SCOM
Works by encrypting a document and embedding the usage rights within the document itself
SCCM
Works by encrypting a document and embedding the usage rights within the document itself
SCDPM
Works by encrypting a document and embedding the usage rights within the document itself
SCVMM
Works by encrypting a document and embedding the usage rights within the document itself
Services for NFS
Works by encrypting a document and embedding the usage rights within the document itself
AD FS
Works by encrypting a document and embedding the usage rights within the document itself
AD DS
Works by encrypting a document and embedding the usage rights within the document itself
AD RMS
Works by encrypting a document and embedding the usage rights within the document itself
AD LDS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCOM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCCM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCDPM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
SCVMM
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
Services for NFS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD FS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD DS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD RMS
Gives UNIX client computers that do not support SMB communications access to fi les on a Windows Server 2008 server
AD LDS
Provides a single sign-on capability for users in different security realms
SCOM
Provides a single sign-on capability for users in different security realms
SCCM
Provides a single sign-on capability for users in different security realms
SCDPM
Provides a single sign-on capability for users in different security realms
SCVMM
Provides a single sign-on capability for users in different security realms
Services for NFS
Provides a single sign-on capability for users in different security realms
AD FS
Provides a single sign-on capability for users in different security realms
AD DS
Provides a single sign-on capability for users in different security realms
AD RMS
Provides a single sign-on capability for users in different security realms
AD LDS
Provides a centralized backup and recovery solution
SCOM
Provides a centralized backup and recovery solution
SCCM
Provides a centralized backup and recovery solution
SCDPM
Provides a centralized backup and recovery solution
SCVMM
Provides a centralized backup and recovery solution
Services for NFS
Provides a centralized backup and recovery solution
AD FS
Provides a centralized backup and recovery solution
AD DS
Provides a centralized backup and recovery solution
AD RMS
Provides a centralized backup and recovery solution
AD LDS
Used to provide overall monitoring for a network
SCOM
Used to provide overall monitoring for a network
SCCM
Used to provide overall monitoring for a network
SCDPM
Used to provide overall monitoring for a network
SCVMM
Used to provide overall monitoring for a network
Services for NFS
Used to provide overall monitoring for a network
AD FS
Used to provide overall monitoring for a network
AD DS
Used to provide overall monitoring for a network
AD RMS
Used to provide overall monitoring for a network
AD LDS
Used for large-scale management of virtual servers using Hyper-V
SCOM
Used for large-scale management of virtual servers using Hyper-V
SCCM
Used for large-scale management of virtual servers using Hyper-V
SCDPM
Used for large-scale management of virtual servers using Hyper-V
SCVMM
Used for large-scale management of virtual servers using Hyper-V
Services for NFS
Used for large-scale management of virtual servers using Hyper-V
AD FS
Used for large-scale management of virtual servers using Hyper-V
AD DS
Used for large-scale management of virtual servers using Hyper-V
AD RMS
Used for large-scale management of virtual servers using Hyper-V
AD LDS
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCOM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCCM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCDPM
Can be used to deploy full operating systems, applications, and updates to systems within the network
SCVMM
Can be used to deploy full operating systems, applications, and updates to systems within the network
Services for NFS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD FS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD DS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD RMS
Can be used to deploy full operating systems, applications, and updates to systems within the network
AD LDS
Used to verify a user’s identity when a document is accessed
SCOM
Used to verify a user’s identity when a document is accessed
SCCM
Used to verify a user’s identity when a document is accessed
SCDPM
Used to verify a user’s identity when a document is accessed
SCVMM
Used to verify a user’s identity when a document is accessed
Services for NFS
Used to verify a user’s identity when a document is accessed
AD FS
Used to verify a user’s identity when a document is accessed
AD DS
Used to verify a user’s identity when a document is accessed
AD RMS
Used to verify a user’s identity when a document is accessed
AD LDS
An optional Active Directory service that can provide dedicated directory services for applications
SCOM
An optional Active Directory service that can provide dedicated directory services for applications
SCCM
An optional Active Directory service that can provide dedicated directory services for applications
SCDPM
An optional Active Directory service that can provide dedicated directory services for applications
SCVMM
An optional Active Directory service that can provide dedicated directory services for applications
Services for NFS
An optional Active Directory service that can provide dedicated directory services for applications
AD FS
An optional Active Directory service that can provide dedicated directory services for applications
AD DS
An optional Active Directory service that can provide dedicated directory services for applications
AD RMS
An optional Active Directory service that can provide dedicated directory services for applications
AD LDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.