Practice Quiz 1

Card Set Information

Author:
rcpantoni
ID:
185512
Filename:
Practice Quiz 1
Updated:
2012-11-27 21:41:36
Tags:
ITN 200
Folders:

Description:
Practice Quiz 1
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user rcpantoni on FreezingBlue Flashcards. What would you like to do?


  1. ____ is the most basic server version on which the other versions are based.
    A.  Windows Server 2008 Enterprise Edition
    B.  Windows Server 2008 Standard Edition
    C.  Windows Server 2008 Datacenter Edition without Hyper-V
    D.  Windows Server 2008 for Itanium-Based Systems
    B.  Windows Server 2008 Standard Edition
    (this multiple choice question has been scrambled)
  2. Windows Server 2008 Enterprise Edition supports clusters of up to ____ computers.
    A.  8
    B.  16
    C.  24
    D.  32
    B.  16
    (this multiple choice question has been scrambled)
  3. Windows Server 2008 Enterprise Edition has ____, which enables memory to resynchronize after transient memory problems so there is no interruption to current computing
    activities.
    A.  parallel memory sync
    B.  fault managed memory sync
    C.  fault tolerant memory sync
    D.  fault resistant memory sync
    C.  fault tolerant memory sync
    (this multiple choice question has been scrambled)
  4. ____ means that a processor can be added to an empty processor slot while the system is running.
    A.  Live swap processor
    B.  Online-capable processor
    C.  Plug and play processor
    D.  Hot-add processor
    D.  Hot-add processor
    (this multiple choice question has been scrambled)
  5. The design of an Itanium processor enables it to be scaled up to ____ processors.
    A.  768
    B.  256
    C.  512
    D.  1024
    C.  512
    (this multiple choice question has been scrambled)
  6. ____ is a database of computers, users, groups of users, shared printers, shared folders, and other network resources.
    A.  Exchange
    B.  SQL
    C.  Active Directory
    D.  SharePoint
    C.  Active Directory
    (this multiple choice question has been scrambled)
  7. ____ are files that contain commands to be run by a computer operating system.
    A.  Scripts
    B.  Cores
    C.  Templates
    D.  Shells
    A.  Scripts
    (this multiple choice question has been scrambled)
  8. ____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers.
    A.  Windows Server Platform
    B.  Windows Core System
    C.  Windows Server Base
    D.  Windows Server Core
    D.  Windows Server Core
    (this multiple choice question has been scrambled)
  9. ____ is a command-line interface that offers a shell, a customized environment for executing commands and scripts.
    A.  Hyper-V
    B.  Windows Script Host
    C.  Windows PowerShell
    D.  Windows Power Host
    C.  Windows PowerShell
    (this multiple choice question has been scrambled)
  10. The ____ addition to Windows Server 2008 provides the ability to run two or more operating systems on a single computer.
    A.  Hyper-V
    B.  Terminal Services
    C.  App-V
    D.  Intel VT/AMD-V
    A.  Hyper-V
    (this multiple choice question has been scrambled)
  11. A ____ is a computer program or portion of a program that is currently running.
    A.  process
    B.  fiber
    C.  thread
    D.  kernel
    A.  process
    (this multiple choice question has been scrambled)
  12. A(n) ____ is a communications system enabling computer users to share computer equipment, application software, and data, voice, and video transmissions.
    A.  environment
    B.  shell
    C.  network
    D.  server
    C.  network
    (this multiple choice question has been scrambled)
  13. A ____ is a network of computers in relatively close proximity,
    such as on the same floor or in the same building.
    A.  local area network
    B.  metropolitan area network
    C.  wide area network
    D.  near area network
    A.  local area network
    (this multiple choice question has been scrambled)
  14. A ____ is a transmission in which one packet is sent from a server to each client that requests a file or application, such as a video presentation.
    A.  unicast
    B.  bi-cast
    C.  multicast
    D.  broadcast
    C.  multicast
    (this multiple choice question has been scrambled)
  15. A(n) ____ is used for two purposes: to show the class of
    addressing used and to divide a network to control network traffic.
    A.  subnet number
    B.  MAC address
    C.  subnet mask
    D.  IP address
    C.  subnet mask
    (this multiple choice question has been scrambled)
  16. ____ involves assigning a dotted decimal address that becomes each workstation’s permanent, unique IP address.
    A.  Block addressing
    B.  Dynamic addressing
    C.  Reserved addressing
    D.  Static addressing
    D.  Static addressing
    (this multiple choice question has been scrambled)
  17. The ____ is the IP address of the router that has a connection to other networks.
    A.  subnet mask
    B.  default transmission point
    C.  default route
    D.  default gateway
    D.  default gateway
    (this multiple choice question has been scrambled)
  18. Every NIC has a physical address, or ____ address.
    A.  ARP
    B.  IP
    C.  MAC
    D.  DN
    C.  MAC
    (this multiple choice question has been scrambled)
  19. Every computer running Windows Server 2008 has a(n) ____ cache that can include the recently resolved MAC addresses as well as statically assigned values.
    A.  IP
    B.  resolution
    C.  ARP
    D.  name
    C.  ARP
    (this multiple choice question has been scrambled)
  20. The ____ command shows you the MAC addresses along with the corresponding IP addresses that the local computer currently has in its ARP cache.
    A.  arp -a
    B.  arp -d
    C.  cache -a
    D.  ipconfig /all
    A.  arp -a
    (this multiple choice question has been scrambled)
  21. The most up-to-date listing of compatible hardware (and software) is the Windows Server Catalog of ____.
    A.  Compatible Products
    B.  Tested Products
    C.  Approved Products
    D.  Labeled Products
    B.  Tested Products
    (this multiple choice question has been scrambled)
  22. ____ is a process in which a hard disk section or a complete hard disk is prepared for use by an operating system.
    A.  Creating a partition
    B.  Segmenting a disk
    C.  Disk compression
    D.  Mounting a disk
    A.  Creating a partition
    (this multiple choice question has been scrambled)
  23. When you format a disk, this process divides the disk into small
    sections called tracks and ____ for the storage of files by a particular file system.
    A.  sectors
    B.  partitions
    C.  blocks
    D.  sections
    A.  sectors
    (this multiple choice question has been scrambled)
  24. NTFS follows the ____ standard, which includes case-sensitive
    filenames and the use of multiple filenames.
    A.  Windows
    B.  POSIX.1
    C.  SYSV
    D.  POSTIX
    B.  POSIX.1
    (this multiple choice question has been scrambled)
  25. ____ by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file.
    A.  Versioning
    B.  Journaling
    C.  Auditing
    D.  Snapshot tracking
    B.  Journaling
    (this multiple choice question has been scrambled)
  26. Prior to Windows Server 2008, a damaged disk area meant that you had to take down the server and then bring it back up offline to users to run the ____ utility that rebuilt the data in the damaged area.
    A.  wdsutil
    B.  repair disk
    C.  dskutil
    D.  chkdsk
    D.  chkdsk
    (this multiple choice question has been scrambled)
  27. ____ is an interim version of Windows Server 2003 developed as a way to offer a newer server version while waiting for Windows Server 2008.
    A.  SP3
    B.  SP2
    C.  R1
    D.  R2
    D.  R2
    (this multiple choice question has been scrambled)
  28. One ____ is a license for one workstation to access the server.
    A.  CAL
    B.  PPL
    C.  EAL
    D.  WAL
    A.  CAL
    (this multiple choice question has been scrambled)
  29. When installing Windows Server 2008, you can specify a domain or workgroup on the ____ window that is displayed when the computer reboots after the actual installation process is completed.
    A.  BIOS
    B.  Setup Tasks
    C.  Initial Configuration Tasks
    D.  Management Options
    C.  Initial Configuration Tasks
    (this multiple choice question has been scrambled)
  30. A ____ is a set of unique identification information that is
    typically put at the end of a file, or that is associated with a computer communication.
    A.  public key
    B.  digital signature
    C.  hash
    D.  digital certificate
    D.  digital certificate
    (this multiple choice question has been scrambled)
  31. The ____ role is central to implementing Active Directory and
    creating one or more domains.
    A.  Active Directory Management Services
    B.  Active Directory Domain Services
    C.  Active Directory Listing Services
    D.  Active Directory Certificate Services
    B.  Active Directory Domain Services
    (this multiple choice question has been scrambled)
  32. ____ enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers.
    A.  HFS
    B.  RFS
    C.  DFS
    D.  CFS
    C.  DFS
    (this multiple choice question has been scrambled)
  33. ____ are directories on one or more computers that users on other computers can access through the network.
    A.  Merged directories
    B.  Catalog directories
    C.  Shared directories
    D.  Quorum directories
    C.  Shared directories
    (this multiple choice question has been scrambled)
  34. ____ is a TCP/IP application protocol that transfers files in bulk data streams and is commonly used on the Internet.
    A.  FTP
    B.  SMB
    C.  SMTP
    D.  CIFS
    A.  FTP
    (this multiple choice question has been scrambled)
  35. ____ is a protocol in the TCP/IP suite of protocols that is used
    to transport document and other data transmissions over networks and the Internet for access by Web browsers.
    A.  HTTP
    B.  SMTP
    C.  FTP
    D.  ICMP
    A.  HTTP
    (this multiple choice question has been scrambled)
  36. The ____ role is designed to enable the installation of Windows operating systems—Windows Vista, Windows 7, and Windows Server 2008—on multiple computers.
    A.  WDS
    B.  ODS
    C.  WDT
    D.  DHCP
    A.  WDS
    (this multiple choice question has been scrambled)
  37. In the Initial Configuration Tasks window, you use the ____
    section to set the time zone, configure networking, and provide computer name and domain or workgroup information.
    A.  Customize This Server
    B.  Provide Computer Information
    C.  Setup This Server
    D.  Initialize This Server
    B.  Provide Computer Information
    (this multiple choice question has been scrambled)
  38. To install the Active Directory Lightweight Directory Services
    role, enter: ____.
    A.  start /w ocsetup Directory-Server-Core-Role
    B.  start /w ocsetup All Services
    C.  start /w ocsetup LDDS-Install
    D.  start /w ocsetup DirectoryServices-ADAM-ServerCore
    D.  start /w ocsetup DirectoryServices-ADAM-ServerCore
    (this multiple choice question has been scrambled)
  39. In Windows Server Core at the command line, enter ____ to view a listing of commands.
    A.  list
    B.  enum
    C.  help
    D.  all
    C.  help
    (this multiple choice question has been scrambled)
  40. ____ are designed to correct things such as security issues as well as problems affecting stability, performance, or the operation of features included with the operating system.
    A.  Service updates
    B.  Service packs
    C.  Hotfixes
    D.  Service upgrades
    B.  Service packs
    (this multiple choice question has been scrambled)
  41. The ____ role focuses on sharing files from the server or using
    the server to coordinate and simplify file sharing through Distributed File System (DFS).
    A.  Directory Services
    B.  WDS
    C.  Print Services
    D.  File Services
    D.  File Services
    (this multiple choice question has been scrambled)
  42. In the ____ role, the Windows Server 2008 server can be used to manage network printing services and it can offer one or more network printers connected to the network through the server itself.
    A.  WDS
    B.  Directory Services
    C.  Print Services
    D.  File Services
    C.  Print Services
    (this multiple choice question has been scrambled)
  43. You can use the ____ command-line tool for managing server roles.
    A.  Ocsetup.exe
    B.  ServerCoreCmd.exe
    C.  ServerManagerCmd.exe
    D.  WDSUtil.exe
    C.  ServerManagerCmd.exe
    (this multiple choice question has been scrambled)
  44. ServerManagerCmd.exe can be used to run the parameters in a(n) ____ on a group of servers to save configuration time and ensure that the servers are configured the same way.
    A.  parameter file
    B.  configuration file
    C.  XML answer file
    D.  setup file
    C.  XML answer file
    (this multiple choice question has been scrambled)
  45. ServerManagerCmd.exe is executed from the command line through the ____ window.
    A.  MMC
    B.  Command Prompt
    C.  GUI
    D.  Control Panel
    B.  Command Prompt
    (this multiple choice question has been scrambled)
  46. The ability to automatically detect and configure newly installed
    hardware devices, such as a disk or tape drive is called ____.
    A.  Plug and Play
    B.  dynamic configuration
    C.  DHCP
    D.  automatic configuration
    A.  Plug and Play
    (this multiple choice question has been scrambled)
  47. When a driver is verified, a unique digital signature is
    incorporated into it in a process called ____.
    A.  driver signing
    B.  module signing
    C.  driver validation
    D.  device signing
    A.  driver signing
    (this multiple choice question has been scrambled)
  48. Windows Server 2008 offers the ____ to scan system files for integrity.
    A.  System Compatibility Checker
    B.  System Configuration Checker
    C.  System File Checker
    D.  System Integrity Checker
    C.  System File Checker
    (this multiple choice question has been scrambled)
  49. After a Sigverif scan is complete, the results are written to a
    log file, called ____.
    A.  sigverif.dat
    B.  sigverif.txt
    C.  sigverif.pdf
    D.  sigverif.html
    B.  sigverif.txt
    (this multiple choice question has been scrambled)
  50. ____ is disk storage used to expand the capacity of the physical RAM installed in the computer.
    A.  Expansion memory
    B.  Virtual memory
    C.  Flash memory
    D.  Device memory
    B.  Virtual memory
    (this multiple choice question has been scrambled)
  51. ____ are defined by the operating system and apply to any user
    logged onto the computer.
    A.  System environment blocks
    B.  User environment variables
    C.  System environment variables
    D.  User environment blocks
    B.  User environment variables
    (this multiple choice question has been scrambled)
  52. ____ can be defined on a per-user basis, such as specifying the
    path where application files are stored.
    A.  System environment variables
    B.  User environment entries
    C.  System environment entries
    D.  User environment variables
    D.  User environment variables
    (this multiple choice question has been scrambled)
  53. ____ is used for multimedia transmissions, such as a combined
    voice and video transmission to provide user training to multiple people.
    A.  Realtime Multicast Protocol
    B.  Reliable Multicast Protocol
    C.  Realtime Streaming Protocol
    D.  Reliable Multiuser Protocol
    B.  Reliable Multicast Protocol
    (this multiple choice question has been scrambled)
  54. A ____ is a data parameter associated with a software or hardware characteristic under a key (or subkey).
    A.  Registry entry
    B.  Registry value
    C.  Registry branch
    D.  Registry module
    A.  Registry entry
    (this multiple choice question has been scrambled)
  55. A ____, also called a subtree, is a primary or highest level
    category of data contained in the Registry.
    A.  subkey
    B.  hive key
    C.  branch key
    D.  root key
    D.  root key
    (this multiple choice question has been scrambled)
  56. The ____ root key contains profile information for each user who has logged onto the computer.
    A.  HKEY_CURRENT_USER
    B.  HKEY_CURRENT_CONFIG
    C.  HKEY_LOCAL_MACHINE
    D.  HKEY_USERS
    D.  HKEY_USERS
    (this multiple choice question has been scrambled)
  57. ____ holds information about the monitor type, keyboard, mouse, and other hardware characteristics for the current profile.
    A.  HKEY_CURRENT_CONFIG
    B.  HKEY_USERS
    C.  HKEY_CURRENT_USER
    D.  HKEY_LOCAL_MACHINE
    A.  HKEY_CURRENT_CONFIG
    (this multiple choice question has been scrambled)
  58. The ____ tool is automatically installed when you install Windows Server 2008 and provides an interactive interface for analyzing and configuring security on a server.
    A.  Security Management Wizard
    B.  Security Content Wizard
    C.  Security System Wizard
    D.  Security Configuration Wizard
    D.  Security Configuration Wizard
    (this multiple choice question has been scrambled)
  59. ____ examines the roles a server plays and then tries to adjust
    security to match these roles.
    A.  SMF
    B.  SCM
    C.  SCF
    D.  SCW
    D.  SCW
    (this multiple choice question has been scrambled)
  60. The ____ command enables you to configure and modify security settings, as well as convert them to Active Directory Group Policy Objects and to apply them to multiple servers.
    A.  scwutil
    B.  scwcmd
    C.  scwcli
    D.  scwmgt
    B.  scwcmd
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview