A disk subsystem that combines multiple physical disks into a single logical storage unit
An individual with advanced knowledge in a specific field or deeper understanding in a particular topic
Subject Matter Expert
Microsoft's virtualization product and a tool in Server Manager
Hyper-Visor
The process of dividing a large network into smaller networks
Subnetting
What is Cortana?
Cortana is a virtual assistant developed by Microsoft that uses the Bing search engine to perform tasks such as setting reminders and answering questions for the user
A bus type that is commonly used for sound cards, modems, network cards, and storage device controllers
Peripheral Component Interconnect
A problem that has been analyzed, but not yet resolved
Known Error
A centralized database that contains user account and security information used for authentication and access control
This uses a 3-way handshake to send data between two hosts; it is connection-oriented
Transmission Control Protocol
Explain HDDs and SSDs and explain the difference between the two
SSD is Solid State Drive, which is also a long term storage device, but uses flash memory instead so it is much faster
A computer bus technology used to connect host bus adapters to mass storage devices such as hard disks
BONUS
Serial Advanced Technology Attachment
DAILY JEOPARDY
1. Organizations and people
2. Value streams and processes
3. Information and technology
4. Partner and suppliers
An installation option of Windows Server that features a minimal server without a graphical user interface.
Server Core / Nano
A method and group of technologies that uses voice communications over broadband internet connection
Voice Over Internet Protocol
What is an IP?
An IP address is a logical address assigned to a device so it can communicate with other devices on a network
Name ALL RAID levels that DO NOT USE PARITY
RAID 1
RAID 2
RAID 10
This principle or group is responsible for ensuring that accurate and reliable information related to the configuration of service and configuration items are readily accessible when and where it is required.
Service Configuration Management
An isolated environment where you can run applications and make configuration changes without affecting the host Windows system
Container
The encryption standard used by the WPA2 security protocol
Advanced Encryption Standard
DAILY JEOPARDY!!!
This is the Network Layer and prominently features Internet Protocol, or IP, to allow for communication between two different networks.
The act of updating the BIOS/UEFI software stored in the BIOS chip of a motherboard.
Flash
The principle or group centered around the deployment of new and changed services and features to the organization
Release Management
These answer name resolution requests by supplying the address of the corresponding top-level DNS server
Root Hints
This allows two or more network adapters to be combined and work together to increase bandwidth or provide fault tolerance
NIC Teaming
Name all wireless security protocols and the encryption used
WEP is the wired equivalent privacy and is the weakest and provides no encryption, only the privacy of what occurs over a wired cable.
WPA is Wi-Fi Protected Access, an older form of wireless security which uses TKIP encryption
WPA2 is the most commonly available wireless security which is reasonably secure, it replaces TKIP with AES encryption
WPA3 is the most secure but is not widely available or implemented. Uses the most secure SAE encryption.