back-end servers, 3-28 to 3-32. See also front-end servers
authentication on, 9-45 to 9-47
benefits of, 3-28 to 3-29
clustering, 6-30 to 6-31
configuring for virtual servers, 9-23 to 9-24
key terms, 6-37
optional services, 11-51
questions and answers, 3-31, 3-41 to 3-42, 6-33, 6-40 to 6-41
required services, 11-50
standard topology, 3-29 to 3-30
troubleshooting authentication problems, 14-29 to 14-30
unexpected timeouts during large downloads, 9-24
backup log, 12-24
Backup Or Restore Wizard, 12-23, 12-39, 12-42
backups, 12-16 to 12-27
case scenario exercise, 12-45 to 12-47
copy, 12-18, 12-21
copy plus incremental, 12-18
data size and types of, 12-19
dynamic data, 12-16 to 12-17
exchange cluster, 12-21 to 12-22
full, 12-17, 12-21
full plus differential, 12-18
full plus incremental, 12-17 to 12-18
historical baselines for system restores, 11-17
key terms, 12-50
offline, 12-19 to 12-20
online, 12-19
overview, 12-1, 12-16
practice exercises, 12-22 to 12-26
questions and answers, 12-26 to 12-27, 12-52
recovery storage group, 14-64
repairing indexes, 12-22
static data, 12-16 to 12-17
summary points, 12-27, 12-49 to 12-50
system state data, 12-36, 12-40 to 12-41
troubleshooting, 14-20 to 14-21
verifying, 12-22
Volume Shadow Copy Service (VSS), 12-20 to 12-21
Badmail folder, 10-8, 13-27
basic authentication, 9-41, 10-23
BinHex format, 9-40
bridgehead server, 3-16
browsing public folder trees, 8-10 to 8-11