Deck 8: Using a Server

ملء الشاشة (f)
exit full mode
سؤال
The ____ tab of an account set up in Active Directory is used to configure session parameters for a client using terminal services .

A)Sessions
B)Remote control
C)Environment
D)Dial-in
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
UNIX and Linux support file systems compatible with Windows operating systems.
سؤال
The ____ tab of an account set up in Active Directory provides information about the logon name, domain name, and account options.

A)General
B)Address
C)Profile
D)Account
سؤال
The ifconfig command in UNIX/Linux displays the amount of free and used memory in the system.
سؤال
Optimizing performance for the number of users who access a Windows server involves configuring how ____ is used.

A)the CPU
B)memory
C)the keyboard
D)the PCI bus
سؤال
You can install Fedora as a server system.
سؤال
A(n)____ script is a text file that contains sequences of UNIX/Linux commands that execute when the script executes.

A)ASP
B)Java
C)shell
D)VB
سؤال
In the ____ server model, the physical security used for servers may vary widely from server to server and department to department.

A)hierarchical
B)decentralized
C)centralized
D)structured
سؤال
A ____ is a single computer that offers multiuser access.

A)workstation
B)client
C)server
D)peer
سؤال
A(n)____ server is one that does not have Active Directory installed.

A)individual
B)stand-alone
C)isolated
D)single
سؤال
The ____ file is disk space, in the form of a file, for use when memory requirements exceed the available RAM.

A)frame
B)thread
C)handle
D)page
سؤال
A ____ centralizes control of network resources into a logical grouping of user accounts, computers, printers, and network devices.

A)domain
B)server farm
C)directory
D)console
سؤال
In a Windows server, the normal priority at which a process runs is set in the program code of the application, which is called the ____ priority class.

A)average
B)normal
C)base
D)standard
سؤال
The ____ option in the Processes tab of Task Manager is given an extra advantage at +15.

A)Realtime
B)High
C)Normal
D)AboveNormal
سؤال
The upper limit for peer-to-peer sharing using Windows XP is 20.
سؤال
You have the option to look up an account password in Active Directory.
سؤال
____ accounts enable you to manage who accesses resources on one or more servers.

A)Peer
B)Shared
C)Administrator
D)User
سؤال
____ access services enable users to access a server through a WAN connection, such as through an Internet connection or a direct dial-up connection.

A)Remote
B)Distributed
C)Virtual
D)Distant
سؤال
____ mode enables secure VPN communications between routers or gateways on two networks or between a server and a client computer on the same or different networks .

A)Connection
B)Virtual
C)Transport
D)Tunnel
سؤال
The ____ option in the Applications tab of Task Manager takes you into the highlighted program .

A)Bring To Front
B)Switch To
C)Minimize
D)Maximize
سؤال
What information is provided by the Users tab in Windows Task Manager and what actions may be performed there?
سؤال
A(n)____________________ is a resource, such as a file, used by a program and having its own identification so the program is able to access it.
سؤال
The _________________________ is a program on a read-only or flash memory chip that establishes basic communication with components such as the monitor and disk drives .
سؤال
What is Active Directory and what services does it provide?
سؤال
What are two options for choosing a computer as a server?
سؤال
Provide a general description of the Task Manager application in Windows Server 2003.
سؤال
To monitor who is logged in to a UNIX/Linux systems, use the ____ command.

A)top
B)who
C)free
D)df
سؤال
The ____________________ command in UNIX/Linux systems displays a listing of the most CPU-intensive tasks, such as the processor state, in real time .
سؤال
The ____ option of the top command in UNIX/Linux allows the top utility to run in secure mode.

A)-d
B)-p
C)-s
D)-S
سؤال
____ space is disk space that acts like an extension of memory and is configured when you install the operating system.

A)Swap
B)Exchange
C)Page
D)Frame
سؤال
A(n)_________________________ ensures that servers remain working when there is a brief power outage, or that there is time to properly shut down a server during a long power outage.
سؤال
The ____ option of the df command in UNIX/Linux displays information in human readable format.

A)-h
B)-l
C)-m
D)-t
سؤال
The ____ option of the free command in UNIX/Linux creates totals for RAM and swap memory statistics.

A)-b
B)-m
C)-g
D)-t
سؤال
Provide five reasons for having a server in a home network.
سؤال
What are the advantages of a decentralized server model?
سؤال
What are the four most important server setup tasks?
سؤال
The ____ option of the who command in UNIX/Linux provides a quick list and total of users logged in.

A)-b
B)-H
C)-q
D)-u
سؤال
Identify and briefly describe four options that may be used with the df utility in UNIX/Linux systems.
سؤال
A(n)____________________ private network uses LAN protocols as well as tunneling protocols to encapsulate the data as it is sent across a public network such as the Internet.
سؤال
What information is provided by the lower portion of the Networking tab in Windows Task Manager and how is it used?
سؤال
Match between columns
related to the number of user connections at a given time.
server farm
related to the number of user connections at a given time.
Active Directory
related to the number of user connections at a given time.
Microsoft Management Console (MMC)
related to the number of user connections at a given time.
network connectivity
related to the number of user connections at a given time.
PPTP protocol
related to the number of user connections at a given time.
IPSec
related to the number of user connections at a given time.
thread
related to the number of user connections at a given time.
du utility
related to the number of user connections at a given time.
finger utility
set of secure communications standards used to protect IP networks.
server farm
set of secure communications standards used to protect IP networks.
Active Directory
set of secure communications standards used to protect IP networks.
Microsoft Management Console (MMC)
set of secure communications standards used to protect IP networks.
network connectivity
set of secure communications standards used to protect IP networks.
PPTP protocol
set of secure communications standards used to protect IP networks.
IPSec
set of secure communications standards used to protect IP networks.
thread
set of secure communications standards used to protect IP networks.
du utility
set of secure communications standards used to protect IP networks.
finger utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
server farm
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Active Directory
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Microsoft Management Console (MMC)
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
network connectivity
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
PPTP protocol
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
IPSec
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
thread
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
du utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
finger utility
used to create an encrypted tunnel between a client and a VPN server.
server farm
used to create an encrypted tunnel between a client and a VPN server.
Active Directory
used to create an encrypted tunnel between a client and a VPN server.
Microsoft Management Console (MMC)
used to create an encrypted tunnel between a client and a VPN server.
network connectivity
used to create an encrypted tunnel between a client and a VPN server.
PPTP protocol
used to create an encrypted tunnel between a client and a VPN server.
IPSec
used to create an encrypted tunnel between a client and a VPN server.
thread
used to create an encrypted tunnel between a client and a VPN server.
du utility
used to create an encrypted tunnel between a client and a VPN server.
finger utility
summarizes disk usage in UNIX/Linux systems.
server farm
summarizes disk usage in UNIX/Linux systems.
Active Directory
summarizes disk usage in UNIX/Linux systems.
Microsoft Management Console (MMC)
summarizes disk usage in UNIX/Linux systems.
network connectivity
summarizes disk usage in UNIX/Linux systems.
PPTP protocol
summarizes disk usage in UNIX/Linux systems.
IPSec
summarizes disk usage in UNIX/Linux systems.
thread
summarizes disk usage in UNIX/Linux systems.
du utility
summarizes disk usage in UNIX/Linux systems.
finger utility
block of code within a program.
server farm
block of code within a program.
Active Directory
block of code within a program.
Microsoft Management Console (MMC)
block of code within a program.
network connectivity
block of code within a program.
PPTP protocol
block of code within a program.
IPSec
block of code within a program.
thread
block of code within a program.
du utility
block of code within a program.
finger utility
centralized location for servers, such as a computer room or machine room.
server farm
centralized location for servers, such as a computer room or machine room.
Active Directory
centralized location for servers, such as a computer room or machine room.
Microsoft Management Console (MMC)
centralized location for servers, such as a computer room or machine room.
network connectivity
centralized location for servers, such as a computer room or machine room.
PPTP protocol
centralized location for servers, such as a computer room or machine room.
IPSec
centralized location for servers, such as a computer room or machine room.
thread
centralized location for servers, such as a computer room or machine room.
du utility
centralized location for servers, such as a computer room or machine room.
finger utility
displays information about users in many UNIX/Linux systems.
server farm
displays information about users in many UNIX/Linux systems.
Active Directory
displays information about users in many UNIX/Linux systems.
Microsoft Management Console (MMC)
displays information about users in many UNIX/Linux systems.
network connectivity
displays information about users in many UNIX/Linux systems.
PPTP protocol
displays information about users in many UNIX/Linux systems.
IPSec
displays information about users in many UNIX/Linux systems.
thread
displays information about users in many UNIX/Linux systems.
du utility
displays information about users in many UNIX/Linux systems.
finger utility
directory service that houses information about all network resources .
server farm
directory service that houses information about all network resources .
Active Directory
directory service that houses information about all network resources .
Microsoft Management Console (MMC)
directory service that houses information about all network resources .
network connectivity
directory service that houses information about all network resources .
PPTP protocol
directory service that houses information about all network resources .
IPSec
directory service that houses information about all network resources .
thread
directory service that houses information about all network resources .
du utility
directory service that houses information about all network resources .
finger utility
سؤال
What is the who command used for in UNIX/Linux systems?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Using a Server
1
The ____ tab of an account set up in Active Directory is used to configure session parameters for a client using terminal services .

A)Sessions
B)Remote control
C)Environment
D)Dial-in
A
2
UNIX and Linux support file systems compatible with Windows operating systems.
True
3
The ____ tab of an account set up in Active Directory provides information about the logon name, domain name, and account options.

A)General
B)Address
C)Profile
D)Account
D
4
The ifconfig command in UNIX/Linux displays the amount of free and used memory in the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Optimizing performance for the number of users who access a Windows server involves configuring how ____ is used.

A)the CPU
B)memory
C)the keyboard
D)the PCI bus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
You can install Fedora as a server system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
A(n)____ script is a text file that contains sequences of UNIX/Linux commands that execute when the script executes.

A)ASP
B)Java
C)shell
D)VB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
In the ____ server model, the physical security used for servers may vary widely from server to server and department to department.

A)hierarchical
B)decentralized
C)centralized
D)structured
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ____ is a single computer that offers multiuser access.

A)workstation
B)client
C)server
D)peer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n)____ server is one that does not have Active Directory installed.

A)individual
B)stand-alone
C)isolated
D)single
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ____ file is disk space, in the form of a file, for use when memory requirements exceed the available RAM.

A)frame
B)thread
C)handle
D)page
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
A ____ centralizes control of network resources into a logical grouping of user accounts, computers, printers, and network devices.

A)domain
B)server farm
C)directory
D)console
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
In a Windows server, the normal priority at which a process runs is set in the program code of the application, which is called the ____ priority class.

A)average
B)normal
C)base
D)standard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
The ____ option in the Processes tab of Task Manager is given an extra advantage at +15.

A)Realtime
B)High
C)Normal
D)AboveNormal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The upper limit for peer-to-peer sharing using Windows XP is 20.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
You have the option to look up an account password in Active Directory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ accounts enable you to manage who accesses resources on one or more servers.

A)Peer
B)Shared
C)Administrator
D)User
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ access services enable users to access a server through a WAN connection, such as through an Internet connection or a direct dial-up connection.

A)Remote
B)Distributed
C)Virtual
D)Distant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ mode enables secure VPN communications between routers or gateways on two networks or between a server and a client computer on the same or different networks .

A)Connection
B)Virtual
C)Transport
D)Tunnel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ____ option in the Applications tab of Task Manager takes you into the highlighted program .

A)Bring To Front
B)Switch To
C)Minimize
D)Maximize
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
What information is provided by the Users tab in Windows Task Manager and what actions may be performed there?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n)____________________ is a resource, such as a file, used by a program and having its own identification so the program is able to access it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
The _________________________ is a program on a read-only or flash memory chip that establishes basic communication with components such as the monitor and disk drives .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is Active Directory and what services does it provide?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are two options for choosing a computer as a server?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Provide a general description of the Task Manager application in Windows Server 2003.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
To monitor who is logged in to a UNIX/Linux systems, use the ____ command.

A)top
B)who
C)free
D)df
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
The ____________________ command in UNIX/Linux systems displays a listing of the most CPU-intensive tasks, such as the processor state, in real time .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ____ option of the top command in UNIX/Linux allows the top utility to run in secure mode.

A)-d
B)-p
C)-s
D)-S
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ space is disk space that acts like an extension of memory and is configured when you install the operating system.

A)Swap
B)Exchange
C)Page
D)Frame
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
A(n)_________________________ ensures that servers remain working when there is a brief power outage, or that there is time to properly shut down a server during a long power outage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
The ____ option of the df command in UNIX/Linux displays information in human readable format.

A)-h
B)-l
C)-m
D)-t
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The ____ option of the free command in UNIX/Linux creates totals for RAM and swap memory statistics.

A)-b
B)-m
C)-g
D)-t
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Provide five reasons for having a server in a home network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the advantages of a decentralized server model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
What are the four most important server setup tasks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
The ____ option of the who command in UNIX/Linux provides a quick list and total of users logged in.

A)-b
B)-H
C)-q
D)-u
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Identify and briefly describe four options that may be used with the df utility in UNIX/Linux systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n)____________________ private network uses LAN protocols as well as tunneling protocols to encapsulate the data as it is sent across a public network such as the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What information is provided by the lower portion of the Networking tab in Windows Task Manager and how is it used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
related to the number of user connections at a given time.
server farm
related to the number of user connections at a given time.
Active Directory
related to the number of user connections at a given time.
Microsoft Management Console (MMC)
related to the number of user connections at a given time.
network connectivity
related to the number of user connections at a given time.
PPTP protocol
related to the number of user connections at a given time.
IPSec
related to the number of user connections at a given time.
thread
related to the number of user connections at a given time.
du utility
related to the number of user connections at a given time.
finger utility
set of secure communications standards used to protect IP networks.
server farm
set of secure communications standards used to protect IP networks.
Active Directory
set of secure communications standards used to protect IP networks.
Microsoft Management Console (MMC)
set of secure communications standards used to protect IP networks.
network connectivity
set of secure communications standards used to protect IP networks.
PPTP protocol
set of secure communications standards used to protect IP networks.
IPSec
set of secure communications standards used to protect IP networks.
thread
set of secure communications standards used to protect IP networks.
du utility
set of secure communications standards used to protect IP networks.
finger utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
server farm
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Active Directory
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Microsoft Management Console (MMC)
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
network connectivity
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
PPTP protocol
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
IPSec
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
thread
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
du utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
finger utility
used to create an encrypted tunnel between a client and a VPN server.
server farm
used to create an encrypted tunnel between a client and a VPN server.
Active Directory
used to create an encrypted tunnel between a client and a VPN server.
Microsoft Management Console (MMC)
used to create an encrypted tunnel between a client and a VPN server.
network connectivity
used to create an encrypted tunnel between a client and a VPN server.
PPTP protocol
used to create an encrypted tunnel between a client and a VPN server.
IPSec
used to create an encrypted tunnel between a client and a VPN server.
thread
used to create an encrypted tunnel between a client and a VPN server.
du utility
used to create an encrypted tunnel between a client and a VPN server.
finger utility
summarizes disk usage in UNIX/Linux systems.
server farm
summarizes disk usage in UNIX/Linux systems.
Active Directory
summarizes disk usage in UNIX/Linux systems.
Microsoft Management Console (MMC)
summarizes disk usage in UNIX/Linux systems.
network connectivity
summarizes disk usage in UNIX/Linux systems.
PPTP protocol
summarizes disk usage in UNIX/Linux systems.
IPSec
summarizes disk usage in UNIX/Linux systems.
thread
summarizes disk usage in UNIX/Linux systems.
du utility
summarizes disk usage in UNIX/Linux systems.
finger utility
block of code within a program.
server farm
block of code within a program.
Active Directory
block of code within a program.
Microsoft Management Console (MMC)
block of code within a program.
network connectivity
block of code within a program.
PPTP protocol
block of code within a program.
IPSec
block of code within a program.
thread
block of code within a program.
du utility
block of code within a program.
finger utility
centralized location for servers, such as a computer room or machine room.
server farm
centralized location for servers, such as a computer room or machine room.
Active Directory
centralized location for servers, such as a computer room or machine room.
Microsoft Management Console (MMC)
centralized location for servers, such as a computer room or machine room.
network connectivity
centralized location for servers, such as a computer room or machine room.
PPTP protocol
centralized location for servers, such as a computer room or machine room.
IPSec
centralized location for servers, such as a computer room or machine room.
thread
centralized location for servers, such as a computer room or machine room.
du utility
centralized location for servers, such as a computer room or machine room.
finger utility
displays information about users in many UNIX/Linux systems.
server farm
displays information about users in many UNIX/Linux systems.
Active Directory
displays information about users in many UNIX/Linux systems.
Microsoft Management Console (MMC)
displays information about users in many UNIX/Linux systems.
network connectivity
displays information about users in many UNIX/Linux systems.
PPTP protocol
displays information about users in many UNIX/Linux systems.
IPSec
displays information about users in many UNIX/Linux systems.
thread
displays information about users in many UNIX/Linux systems.
du utility
displays information about users in many UNIX/Linux systems.
finger utility
directory service that houses information about all network resources .
server farm
directory service that houses information about all network resources .
Active Directory
directory service that houses information about all network resources .
Microsoft Management Console (MMC)
directory service that houses information about all network resources .
network connectivity
directory service that houses information about all network resources .
PPTP protocol
directory service that houses information about all network resources .
IPSec
directory service that houses information about all network resources .
thread
directory service that houses information about all network resources .
du utility
directory service that houses information about all network resources .
finger utility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the who command used for in UNIX/Linux systems?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.