Microsoft Server 2019 ch 2

Ace your homework & exams now with Quizwiz!

Customizing Windows PowerShell sessions

- Change PowerShell session's look or how it is executed - Provide specific options to the PowerShell command You can also create a customized Windows PowerShell session by creating a PowerShell console file that has a .psc1 extension

How to navigate to DEP

- In Control Panel, navigate to System and Security, and select System - Select Advanced system settings, click Settings in the Performance section - Highlight Advanced tab or Data Execution Prevention tab

Configurable elements of the operating system

- Performance options - Environment variables - Startup and recovery options -Power options

Powershell tasks

- Post-installation tasks - View, install, and remove roles and features - Configure and troubleshoot the network and firewall settings - Manage services and processes - Perform remote administration of computers - Cmdlets allow an administrator to specify the computer name for a task - Execute a PowerShell script on several computers within a domain

PowerShell scripts

- Script: don't have to write code, but will need to write commands - Text file with a .ps1 extension executed within Windows PowerShell - Commands execute from top-to-bottom - Contents - Windows commands, PowerShell cmdlets, complex control structures - Can reuse Windows PowerShell code in different situations

User environment variables

- User environment variables can be defined on a per-user basis - may be used to provide a wide variety of different information, such as specifying the path where application files are stored Follows System Variables

Installing Windows Admin Center

1) Download the desired version (usually "regular") 2) Start the installer; navigate through several screens, clicking Next each time 3) URL to access Admin Center displayed on final screen Will be prompted to allow Windows admin center to modify the local computers trusted host settings - necessary if wish to manage other systems with Admin center.

Using Windows Admin Center

1) log in with credentials 2) complete quick tour 3) The server hosting the Windows Admin Center will be labelled with [gateway] following its name 4) Click manage to provide specific connection credential for that system 5) Click edit tags to add one or more tags to each server line that can be searched * Similar to Server Manager

Interrupt Request (IRQ) line

A channel within the computer that is used for communications with the CPUm and other elements such as the Input/output (I/o) address and reserved memory range. A computer contains a limited number of IRQ lines. The video display, each disk drive, USB ports, and the sound card each use a dedicated IRQ to communicate with the processor. Each component also needs reserved memory addresses for I/O operations. Resource conflicts can sometimes occur when a network interface, a new storage controller, or some other hardware is added to the system that does not communicate properly with PnP, or is not fully PnP-compliant.

piping.

Administrators use the pipe symbol ( | ) extensively within Windows PowerShell as it is one of the most useful ways of sending information between cmdlets to build more complex commands or filter output to display only the output that they wish to see

Flushing

After data is written to disk, the memory used for that cached data is freed, via a process called flushing. Freeing memory used for cached data after data written to disk turn off file caching and flushing because this enables them to more easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use. When file caching is turned off, the server can seem slower to users particularly during times of heavy disk read and write operations. When flushing is turned off, less memory is used for file operations, but there may be data loss when a disk drive is hot swapped while the server is in use server performance is better and disk operations are safer when file caching and flushing are turned on.

BPA scan

After you have installed a new server role, and periodically afterwards, determines whether your role configuration meets minimum guidelines When the BPA finds problems, you will see a level of severity as well as a category within the results three levels of severity: • Information • Warning • Error If problems are detected using the BPA, the boxes representing each affected server and service will be flagged red within Server Manager. After remedying or accepting each BPA result, you can remove the associated red flag by right-clicking the result and choosing Exclude Result.

What would you use to see what network adapters are installed in your Windows computer?

Device Manager Utility

Device Manager Utility

Device Manager shows all devices on the system, including many that are not shown in the Devices and Printers utility. Open Device Manager from Control Panel to update a device driver Devices that show up with Generic or Unknown within Device Manager will require an updated driver to provide full functionality. PnP hardware resource must be considered to prevent conflicts To open Device Manager, click the Hardware category within Control Panel and then click Device Manager in the Devices and Printers section. To update the device driver for a device within the Device Manager, you can right-click the device and choose Update driver, You can use Device Manager to check for a resource conflict as well as examine other properties associated with a device - right click > properties

Power Shell objects

Everything in Windows PowerShell can be treated as an object that has attributes (properties that describe the object) and methods (things that the object can do). This is a very powerful feature of Windows PowerShell that can be used to control nearly all aspects of the Windows operating system including processes, files, and network sockets. Get-Member cmdlet (alias gm) to view these attributes and methods.

Registry's five root keys

HKEY_LOCAL_MACHINE • HKEY_CURRENT_USER • HKEY_USERS • HKEY_CLASSES_ROOT • HKEY_CURRENT_CONFIG A root key, also called a subtree, is a primary or highest level category of data contained in the Windows Registry. It might be compared with a main folder, such as the C:\ folder, which is at the root level of folders on C drive. All root keys start with HKEY to show they are the highest level key.

Configuring Server Hardware Device

Hardware devices can include the following: • Storage devices such as hard disks, SSDs, and optical drives • Disk controllers • Network interface adapters • Input devices such as keyboards and mice • Specialized devices

devices and Printers utility

If Windows Server 2019 does not automatically detect newly installed hardware, or if the device you are installing is not PnP, you can use the devices and Printers utility to manually launch PnP or to manually install the device without PnP. The Devices and Printers utility can be used to: • Force the operating system to detect and install new PnP hardware • Install non-PnP hardware • Troubleshoot problems you might be having with existing hardware You start the Devices and Printers utility from Control Panel. - Classic view - Category View Add Device - To add a new hardware device, you can click Add a device under the Hardware category. This will probe for both PnP devices that were not previously detected, as well as search for other devices that are not PnP-capable, and prompt you to install the correct driver from a file if one is not found included with Windows Server 2019 Display device - Devices and Printers utility will display common devices on the system. Trouble Shoot - To troubleshoot a device in this utility, you can right-click the device and select Troubleshoot from the menu.

Information (Levels of BPA Severity)

Information—The role is in compliance, but a change is recommended. For example, a server's network interface might have a valid IPv4 address temporarily leased by DHCP, but a static address is recommended for the particular role.

Performance Pane

Performance (shown in Figure 2-6) allows you to see the performance of the associated servers as well as configure processor (CPU) usage and memory alerts. By default, performance data is displayed for the past 24 hours, and you are alerted when processor usage exceeds 85% or less than 2 MB of memory remains available. However, you can modify these values if you select Tasks, Configure Performance Alerts within the Performance pane

PowerShell providers

PowerShell plug-ins that provide functionality within Windows PowerShell (e.g., aliases, functions, variables) or allow PowerShell to interact with other parts of the system

Roles and Feature Pane

Roles and Features (shown in Figure 2-6) displays the roles and features that are installed on the associated servers. By selecting Add Roles and Features from the Tasks menu in this pane, you can add additional roles and features to your local server. Alternatively, selecting Remove Roles and Features from the Tasks menu will allow you to remove roles and features that are already installed

Verifying System File

Sometimes, drivers and system files can be overwritten, corrupted, or modified by malware. In these cases, the signature on the file will be invalid

Scans system files for integrity and replace damaged or overwritten files with the proper version.

System File Checker can run the System File Checker manually from a Command Prompt window (MS-DOS shell) or Windows PowerShell

HKEY_USERS

The ____ root key contains profile information for each user who has logged onto the computer. The HKEY_USERS root key contains profile information for each user who has signed in to the computer. Each profile is listed under this root key. The profile used when you are signed in is one of the profiles stored under HKEY_USERS.

paging file.

The area of disk that is allocated for this purpose. The location of the paging file is also important. Server performance increases dramatically if the paging file is not placed on the hard disk or SSD that contains the Windows Server 2019 operating system Thus, moving your paging from the default location on C:\ to another physical storage device (e.g., D:\) will improve performance. If your system has multiple physical storage devices, you can create a paging file on each disk that does not contain the Windows Server 2019 operating system to further increase performance. When you tune the size of the paging file, two parameters must be set: initial size and maximum size. A general rule for configuring the initial size is to multiply the amount of installed RAM times 1.5. For a server with 64 GB of RAM, the initial paging file size should be at least 96 GB. Set the maximum size so it affords plenty of room for growth, such as twice the size of your initial paging file setting. The maximum paging file size on a 64-bit server computer is 256 terabytes

WMI infrastructure

The components that are built into the operating system that respond to WMI queries are collectively called the WMI infrastructure.

Configuring Power Options

The power options that you can set are as follows: • Select a power plan. • Choose what the power button does. • Create a power plan. • Choose when to turn off the display

Adding roles and features within Server Manager

There are three different ways to add roles and features within Server Manager: • Selecting Add roles and features from the Welcome to Server Manager pane within the Dashboard section • Selecting Add Roles and Features from the Manage menu • Selecting Add Roles and Features from the Tasks menu within the Roles and Features pane for a server or server role Alternatively, you can choose to install roles and features to a virtual hard disk file (.vhdx) that has Windows Server installed, provided that the virtual machine that is using it is powered off. This allows you to install new roles and features on a virtual hard disk file that you use as a template when creating new virtual machines

T/F You should use the System File Checker during periods of low server activity, such as after normal business hours.

True

HKEY_CURRENT_USER

When a user logs into Windows, what registry key is created? contains profile information about the desktop configuration for the user account currently signed in to the system contains data on color combinations, font sizes and type, the keyboard layout, the taskbar, clock configuration, and nearly any setup action you have made on the desktop

gateway server mode

When you install the Windows Admin Center on a Windows Server 2016 or 2019 system to provide remote Web access for administrations, provides the ability to manage other Windows Server systems on the network when you install the Windows Admin Center on a Windows 10 PC, it functions similar to the RSAT by connecting to other servers within the Active Directory domain for administration

Performance - BPA recommendations

• Performance—Indicates whether the role can perform the tasks for which it is intended on-time and adequately for the intended workload

HKEY_LOCAL_MACHINE

Which registry key holds the specific settings of a local computer? Information on every hardware component in the server information about what drivers are loaded and their version levels, what IRQ (interrupt request) lines are used, setup configurations, the BIOS version, and more Default that happens to everyone

HKEY_CLASSES_ROOT

Which registry key stores information that determines which application is opened when the user double-clicks a file? The HKEY_CLASSES_ROOT key holds data to associate file extensions with programs. This is a more extensive list than the one viewed under HKEY_CURRENT_USER.

Aliases and functions

Windows PowerShell can use UNIX/Linux-style command aliases, which are essentially shortcuts to commands. To view all aliases on your system, sorted alphabetically, you can run the following command: PS C:\Users\Administrator>Get-Alias | more - Alias is a command shortcut that makes using PowerShell easier - Functions can execute multiple cmdlets

Using Windows Powershell

Windows PowerShell is a modern replacement for the MS-DOS shell, used since the first Microsoft operating system, that provides advanced system configuration and scripting features. Windows PowerShell can be used to execute most MS-DOS commands, as well as many UNIX/Linux commands. - Supports MS-DOS shell output redirection (>>) and command chaining (;) - Most commands run within PowerShell will consist of cmdlets. each cmdlet has an action-object or verb-noun structure. - Piping (|) sends information between cmdlets to build more complex commands - Many cmdlets options - Supports navigation keys and key combinations - PowerShell's features provide additional functionality or efficiency

Data Execution Prevention (DEP)

Windows feature that uses a combination of software and hardware to prevent the execution of code in unintended areas of memory to protect against buffer overflow attacks. When programs are running on the server, DEP monitors how they use memory to ensure they are not causing memory problems. This is intended to foil malware, such as computer viruses, Trojan horses, and worms. Malware sometimes works by trying to invade the memory space allocated to system functions. If DEP notices a program trying to use system memory space, it stops the program and notifies the system administrator. - In Control Panel, navigate to System and Security, and select System - Select Advanced system settings, click Settings in the Performance section - Highlight Advanced tab or Data Execution Prevention tab

Mangage Clusters

You can also manage clusters within the Windows Admin Center by selecting Failover Cluster Manager from the Server Manager

How can you resolved most hardware resource conflicts?

You can solve most hardware resource conflicts by uninstalling the device driver for a device, rebooting the system, and reinstalling the device drive

Postdeployment - BPA recommendations

• Postdeployment—Indicates whether services needed for the role are started and running

WMI (Windows Management Instrumentation)

allowed programs and system software to query the hardware and software on the Windows computer. frequently used to obtain system information

Virtual desktop Infrastructure (VdI)

allows client computers to remotely connect to a central server to obtain their Windows desktop.

Processor scheduling

allows you to configure how processor resources are allocated to programs. You can access the processor scheduling option within Control Panel > System and Security, System from the Category view. > select Advanced system settings > click Settings under the Performance section > highlight the Advanced tab

Remote Server Administration Tools (RSAT)

allows you to perform server administration remotely using Server Manager and a wide range of MMC tools from a Windows 10 PC within your IT office.

BPA to Verfiy

allows you to scan the associated servers and roles for configuration issues that do not follow Microsoft's recommendations

Best Practices Analyzer Pane (BPA)

allows you to scan the associated servers and roles for configuration issues that do not follow Microsoft's recommendations. To perform a Best Practices Analyzer (BPA) scan, select Start BPA Scan from the Tasks menu. Following the scan, the results will be listed in the pane for you to view. Because this list is often large, you can use the Filter dialog box within this pane to display only certain results.

Performance - Server Manager

allows you to see the performance of the associated servers as well as configure processor (CPU) usage and memory alerts.

Plug and Play (PnP)

allows your operating system to work with hardware devices to automatically detect and configure recently installed hardware to work with the operating system. Installing a PnP device is a relatively simple process of 1) attaching the device 2) waiting for Windows Server 2019 to detect it 3) install the appropriate device drivers. In some cases, after the device is installed you might need to configure its properties and settings. You may also need to download the latest device driver from the manufacturer's website. might have to restart your computer for Windows to detect the new device some computer manufacturers prefer that you use the device driver that they have supplied on a companion CD, DVD, or website, instead of the generic driver that may be provided by Windows Server 2019.

universal PnP (uPnP)

an open standard that is used in all types of systems and that enables connectivity through networks and network protocols. UPnP supports server-based networking, wireless networking, peer-to-peer networking, and other networking services.

power plans

are already created: -Balanced, -Power saver, and - High performance. Each plan consists of a combination of power options including how soon to turn off the display, whether to require a password on wakeup, how soon to turn off the storage devices, sleep/hibernate settings, USB settings, PCI card settings, and processor settings.

Disk Metrics

are not enabled by default as they cause a slight performance degradation on the server itself.

Server Manager Dashboard

at top of the navigation allows you to perform common tasks within the Server Manager as well as see the state of the servers and roles within your organization. options for configuring the local server, adding roles and features, adding other Windows Servers to manage from the Server Manager console, and creating groups to organize other Windows Servers as well as a wizard that allows you to connect Server Manager to servers and roles that you manage within the Microsoft Azure cloud many administrators choose to hide the Welcome to Server Manager pane so that the Dashboard section only displays the status of roles within your organization,

environment variables

used to tell the operating system where to find certain programs and program-related information. Example: where do I find system files

file caching

cache file data for reading the data from a disk or writing it to disk - turned on by default - uses an area of memory already established for file caching and controlled by the Windows cache manager. - Because file caching uses memory, it can speed up the time it takes to read from or write to a disk.

alias provider

can be used to view and manage aliases,

certificate provider

can be used to view and manage encryption certificates issued to user accounts on the system as well as on the local computer.

function provider

can be used to view and manage functions within Windows PowerShell.

registry provider

can be used to view and modify the Windows Registry keys HKEY_LOCAL_ MACHINE and HKEY_CURRENT_USER.

Windows Registry

database containing all information the operating system needs about the entire system, including hardware and software. - vital for the Windows operating system; if becomes corrupted, the system may fail to boot or function normally

System environment variables

defined by the operating system apply to any user logged into the computer. Administrators can add new system environment variables or change the values of existing ones System environment variables are always set first, then user environment variables

Virtual memory

disk storage used to expand the capacity of the physical memory installed in the computer. When the currently running programs and processes exceed the physical memory, they treat disk space allocated for virtual memory just as if it were physical memory. The disadvantage of this is that memory activities performed through virtual memory are not as fast as those performed in physical memory (although disk access and data transfer speeds can be quite fast). Virtual memory works through a technique called paging, whereby blocks of information, called pages, are moved from physical memory into virtual memory on disk. On a typical computer, data is paged in blocks of 4 KB. For example, if the system is not presently using a 7 KB block of code, it divides the code block between two pages, each 4 KB in size (part of one page will not be completely full). Next, both pages are moved to virtual memory on disk until needed. When the processor calls for that code block, the pages are moved back into physical memory.

Roles and Features - Server Manager

displays the roles and features that are installed on the associated servers.

When a driver is verified, a unique Microsoft digital signature is incorporated into it in a process

driver signing.

self-signed certificate

encryption certificate for use with HTTPS, prompted to generate when installing windows Admin Center or could supply the thumbprint for an existing HTTPS cert already installed on the computer and signed by the Certification authority HTTPS port 443

High performance power plan

favors performance over energy savings.

Server Roles (2012)

have their configuration tools built into the Server Manager interface. Ex: Storage Spaces, which can be configured on any server that has been added to the Server Manager console by selecting File and Storage Services Other server roles often have their own MMC tool for configuration. Although you can select these tools from the Start menu on your local server, it is often easier to select them from the Tools menu

HKEY_CURRENT_CONFIG

information about the current hardware profile. It holds information about the monitor type, keyboard, mouse, and other hardware characteristics for the current profile.

filesystem provider

is the default provider, which is why you see PS C:\Users\Administrator> as your prompt when you start PowerShell. You can use the filesystem provider to view and manage the files on your filesystem.

Services Pane

lists the services that are installed on the associated servers. If you right-click a service listed, you can choose to start, stop, restart, pause, or resume that service.

Events - Server Manger

lists warning, error, and critical events from all event logs on the associated servers from the past 24 hours.

Events Pane

lists warning, error, and critical events from all event logs on the associated servers from the past 24 hours.

Starting an MMC tool

navigate to a server group or role section within the navigation area, right-click a server in the Servers pane and choose the appropriate tool (only tools related to the role and server will be shown) Example: DHCP server role

Windows Admin center tools

normally be provided by MMC tools: • Certificates allows you to view and import encryption certificates. • Containers allows you to monitor and manage Windows Containers. • Devices allows you to configure hardware devices on the system. • DHCP allows you to monitor and manage DHCP server configuration. • DNS allows you to monitor and manage DNS server configuration. • Events allows you to view and search the system event logs. • Files allows you to upload and download files to and from the filesystems on the server. • Firewall allows you to view and configure firewall rules. • Installed Apps allows you to view and remove installed applications. • Local Users & Groups allows you to create and manage accounts on the system that are not part of Active Directory. • Network allows you to configure IP on network interfaces as well as add the Azure Network Adapter for cloud integration. • Processes allows you to manage processes on the system as well as create a process dump file that lists detailed process information (often required by Microsoft Support when a support ticket is created). • Registry allows you to view, create, modify, or import Windows Registry keys. • Roles and Features allows you to add or remove roles and features on the system. • Scheduled Tasks allows you to schedule a command or script to run repetitively. • Services allows you to view, configure, start, and stop services on the system. • Storage allows you create and manage storage volumes and file shares. • Storage Replica allows you replicate volumes between servers. • System Insights allows you to perform ongoing capacity planning for your server by monitoring processor, network, and storage trends over time. • Updates allows you to configure Windows Update settings as well as check for and apply updates. • Virtual Machines allows you to monitor and manage virtual machines. • Virtual Switches allows you to monitor and manage virtual switches

Balanced power plans

offers equal emphasis to energy savings and performance.

CIMv2 namespace (Common Information Model version 2)

only namespace that is useful to IT administrators within Windows PowerShell can query the hardware and software components on systems as well as modify software components as necessary. WMI providers are like the drawers in a file cabinet

WMI consumers

programs and system software that can query WMI

Working with admin Center

remotely manage Windows Server 2019 remotely from any computer that has a modern Web browser. preferred in environments that host a large number of remote Windows Server systems that must be managed centrally, including cloud environments. relatively new tool wide range of monitoring an management functionality that Microsoft wants to expand to all areas of Windows Server administration

Power Power Plan

saver favors energy savings over performance,

environment provider

used to view and manage variables. The environment provider works with environment variables that are normally set within the Windows operating system. When working with the environment provider, you can use Get-ChildItem (alias gci) or Get-Item (alias gi) to obtain information about the environment variables on your Windows system as well as the New-Item, Rename-Item, and Remove-Item cmdlets to create, rename, and remove them, respectively.

variable provider

used to view and manage variables. The variable provider works with user-defined variables that exist within your Windows PowerShell session only. Variables created by the variable provider are only valid during the time that your PowerShell window is open.

File Signature Verification tool (Sigverif)

verifies system and critical files to determine if they have a signature, including device drivers. only scans files and does not overwrite inappropriate files, thereby allowing safe use of the tool while the server is active. output written to a log file, called sigverif.txt. If the tool finds a file without a signature that you believe needs to be replaced, you can replace the file using the System File Checker, by obtaining the appropriate file from Microsoft's website, or by reinstalling the associated device driver or program with an updated version.

Executing PowerShell scripts

§ Enable script support in Windows PowerShell and verify execution policy § Call the script name in powershell § Execute a PowerShell script in PowerShell § Full path: C:\scripts\myscript.ps1 § Relative path (within the C:\scripts directory): .\myscript.ps1 or ./myscript.ps1 § Execute a PowerShell script outside PowerShell § Run PowerShell command in the Windows Run dialog box Command Prompt window, supply script path as an argument

Disadvantages of Server Manager

§ Needs to connect to Windows Server system to run it § Need to install the RSAT on a Windows 10 PC § Can't run directly on a machine, can install RSAT on windows 10 pc / similar. But if want to run have to get on actual counsel.

Windows Admin center tools - Azure cloud integration

• Azure hybrid services allows you to register your Windows Admin Center within the Azure cloud to perform management of cloud-based systems and services. • Azure File Sync can be used to synchronize files between on-premises and Azure storage. • Backup can be used to back up files to Azure storage. • Storage Migration Service can be used to migrate servers and storage to the Azure cloud.

BPA Prerequisites - BPA recommendations

• BPA Prerequisites—Indicates whether the role is set up in such a way that BPA can analyze the role. Failure here simply means that a component or setting prevented the BPA from properly analyzing the role.

BPA recommendations

• Configuration • Predeployment • Postdeployment • Performance • BPA Prerequisites

Configuration - BPA recommendations

• Configuration—Indicates whether role settings are configured for best performance and avoid conflicts with other services

Error (Levels of BPA Severity)

• Error—The role does not meet best practices and problems can be expected.

minimum, the properties for each device in Device Manager displays four tabs

• General - indicates whether the device is functioning properly or not (and why) • Driver - allows you to view the driver installed, as well as update, disable, or uninstall it. • Details - allows you to view device properties, including hardware information. • Events - displays detailed events related to the device that often indicates the nature of a problem, including resource conflicts.

Data in Registry Window

• Information about all hardware components, including the CPU, disk drives, network interface cards, optical drives, and more • Information about Windows Server 2019 services that are installed, which services they depend on, and the order in which they are started • Data about user profiles • Data on the previous settings used to boot the computer • Configuration information about all software in use • Software licensing information • Server Manager and Control Panel parameter configurati

Registry Window Structure (hierarchical)

• Key—A folder that appears in the left pane of the Registry Editor and can contain subkeys and entries, for example, HKEY_CURRENT_USER. • Subkey—A part of the Windows Registry that is below a key. A subkey can contain entries or other subkeys. • entry—An item that appears in the details pane and is the lowest level in the Windows Registry. An entry consists of an entry name, its data type, and its value. A key is a category or division of information within the Windows Registry. A single key may contain one or more lower-level keys called subkeys, just as a folder may contain several subfolders. An entry is a data parameter associated with a software or hardware characteristic under a key (or subkey). An entry consists of three parts— - a name, - the data type, - configuration parameter. For example, in ErrorControl:REG_DWORD:0, ErrorControl is the name, REG_DWORD is the data type, and 0 is the parameter setting.

Windows Admin center tools - Remote Access

• PowerShell provides access to a PowerShell prompt on the target system as the current user. • Remote Desktop provides access to a graphical desktop using Remote desktop Protocol (Rd

Predeployment - BPA recommendations

• Predeployment—Indicates whether prerequisites for the role are properly installed or configured

Main ares you can configure

• Processor scheduling and Data Execution Prevention • Virtual memory • File caching and flushing

Warning (Levels of BPA Severity)

• Warning—The role complies under current operating conditions, but this may change if the operating conditions change. For example, the Hyper-V role might become noncompliant if another virtual machine is added for which there is no available virtual disk space.


Related study sets

UNIT ONE: Intro to Human Geography Lab Questions

View Set

The Community College Experience, Ed.4 - Ch. 3, 4, 9

View Set

american federal government exam 1

View Set

CH 6 Health Insurance Policy and Provisions

View Set

Ch. 7: Business Markets & Buying Behavior

View Set

International Business: Module 8 (final)

View Set