Shared Flashcard Set

Details

Microsoft Network Server 2008 Class Final
A series of questions to help pass the final exam for my Server 2008 class. They may help you too!
100
Computer Networking
12/16/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
Which Windows installation option in Windows Server 2008 provides a stripped-down
version of the operating system when you select it?

A)

B)
C)
D)

Definition
B) Server Core
Term
Which role is not available in a Server Core installation?

A)
B)
C)
D)

Definition
A) Application Server
Term
Which new tool provides capabilities so you can evaluate the hardware on servers as well
as workstations?

A)
B)
C)
D)
Definition
B) Microsoft Assessment and Planning Solution Accelerator (MAP)
Term
Which role is used when performing unattended installations of Windows Server 2008 and
other operating systems on remote computers using network-based boot and installation media?

A)
B)
C)
D)

Definition
B) Windows Deployment Services
Term
What must a network adapter support on the client computer for the WDS server to work?

 

A)
B)
C)
D)

Definition
B)
Term
The Add Roles Wizard enforces no other dependencies for the Windows Deployment Services role, but the role has several other prerequisites. Which of the following is not a prerequisite?

 

A)
B)
C)
D)

Definition
D)
Term
To which type of server do client computers on the network send their DNS queries?

A)
B)
C)
D)

Definition
B)
Term
What must at least one DNS server support when running Active Directory on your network?

A)
B)
C)
D)

Definition
C)
Term
What process is used when it is necessary for a computer to convert an IP address into a
DNS name?

A)
B)
C)
D)

Definition
B)
Term
The DNS server receiving a name resolution request can take full responsibility for resolving the name by using what type of query?

A)
B)
C)
D)

Definition
A)
Term
Which method is most frequently used for providing fault tolerance to DHCP servers?

A)
B)
C)
D)

Definition
C)
Term
There are many advantages to the distributed DHCP infrastructure. Which of the following
is not an advantage?

A)
B)
C)
D)

Definition
B)
Term
Which type of DHCP packet is used by servers to acknowledge a client’s acceptance of an offered IP address?

A)
B)
C)
D)

Definition

C)

 

 

Notes:

(DHCP ACKnowledge)

Term
Which of the following is not a standard DHCP address allocation method?

A)
B)
C)
D)

Definition
D)
Term
By default, the DHCP Server service in Windows Server 2008 uses dynamic allocation, leasing IP addresses to clients for how many days?

A)
B)
C)
D)

Definition
C)
Term
Each individual domain name can be no more than how many characters?

A)
B)
C)
D)

Definition
A)
Term
Which of the following is not an element of DNS?

A)
B)
C)
D)

Definition
D)
Term
Which of the following Active Directory elements provides a true security boundary?

A)
B)
C)
D)

Definition
D)
Term
An Active Directory domain controller can verify a user’s identity by which of the following methods?

A)
B)
C)
D)

Definition
D)
Term
Every Active Directory domain should have a minimum of __________ domain controllers.

A)
B)
C)
D)

Definition
B)
Term
Which of the following is not a variable that can affect the performance of an Active Directory installation?

A)
B)
C)
D)

Definition
A)
Term
When using the subzone method, you can leave the Internet DNS servers in place and use Windows Server 2008 DNS servers to host the zone for the subdomain. Which of the following is a configuration change that you must make?

A)
B)
C)
D)
Definition
D)
Term
The Read-Only Domain Controller (RODc. supports only incoming replication traffic. As a result, what is it possible to do when using a Read-Only Domain Controller?

A)
B)
C)
D)

Definition
D)
Term
Where do users log in when joining an Active Directory domain?

A)
B)
C)
D)

Definition
C)
Term
There are two basic classes of objects in an Active Directory domain. Which of the following is one of them?

A)
B)
C)
D)

Definition

B)

 

 

 

Note: the other is "container" object

Term
The second generation of SATA standard increased the maximum transmission speed to __________ MB/sec.

A)
B)
C)
D)

Definition
D)
Term
You must add the __________ role to use a Windows Server 2008 computer as a fax server.

A)
B)
C)
D)

Definition
C)
Term
To whom should you always assign security permissions?

A)
B)
C)
D)

Definition
B)
Term
Shadow copies can utilize up to __________ percent of a volume by default.

A)
B)
C)
D)

Definition
C)
Term
When creating a GPO software installation, which option causes the client computer to automatically install the application the next time the computer starts or the user logs on?
 

A)
B)
C)
D)

Definition
B)
Term
What converts the print jobs generated by applications into an appropriate string of commands for a specific print device?

A)
B)
C)
D) print device

Definition
A)
Term
Which console can be used to create multiple shares and exercise more granular control over their properties?

A)
B)
C)
D)

Definition
B)
Term
Which of the following enables communication between the terminal server and the client?
 

A)
B)
C)
D)

Definition
C)
Term
Which product is designed for large enterprises and can be used to deploy applications as well as perform a wide variety of other network management tasks?
 

A)
B)
C)
D)

Definition
C)
Term
A collection of settings in a quota template defines all of the following except __________.

A)
B)
C)
D)

Definition
B)
Term
The number of roles that a server can perform is dependent on all of the following factors except the __________.

A)
B)
C)
D)

Definition
D)
Term
After you install the Terminal Services role, you can install the applications that the terminal server will deploy to your clients. What command do you key in first?

A)
B)
C)
D)

Definition
B)
Term
A computer communicates with a print device through which software interface?

A)
B)
C)
D)

Definition
C)
Term
In Windows Server 2008, which Session ID is always dedicated to the system services running on the computer, which isolates them from applications for security reasons?

A)
B)
C)
D)

Definition
A)
Term
Which fault tolerance solution uses duplicate host adapters as well as duplicate hard drives?

A)
B)
C)
D)

Definition
C)
Term
To send email messages, what service does a Windows Server 2008 computer need to be running?

A)
B)
C)
D)

Definition
C)
Term
Which command prompt utility can be used to perform disk management tasks?

A)
B)
C)
D)

Definition
A)
Term
The most common use of a file screen is to __________.

A)
B)
C)
D)

Definition
A)
Term
The GPT disk partitioning style supports volumes up to __________ exabytes.

A)
B)
C)
D)

Definition
C)
Term
A well-designed sharing strategy provides each user with three resources. Which of the following is not a provided resource?

A)
B)
C)
D)

Definition
D)
Term
What is the maximum dynamic volume size for a RAID-5 volume in Windows Server 2008?

A)
B)
C)
D)

Definition
D)
Term
For applications that use large data files, such as databases and email stores, which access is preferable?

A)
B)
C)
D)

Definition
A)
Term
By default, the paging file on a Windows Server 2008 computer is __________ time(s) the amount of memory installed in the computer.

A)
B)
C)
D)

Definition
B)
Term
The Fax Service Manager application enables administrators to do all of the following except __________.
 

A)
B)
C)
D)

Definition
B)
Term
When installing the Terminal Services role using Server Manager, the Add Roles Wizard enables you to select from a variety of role services. Which role service balances the client load among multiple terminal servers and saves session state information so that clients can reconnect to the same session from which they disconnected?
 

A)
B)
C)
D)

Definition
C)
Term
Which of the following is not a required permission that must be granted to the same user or group for the autoenrollment certificate template permission to function correctly?

A)
B)
C)
D)

Definition
B)
Term
What is the most commonly used high-availability solution for data storage, primarily because it is far more scalable than disk mirroring and enables you realize more storage space from your hard disks?

A)
B)
C)
D)

Definition
A)
Term
Which of the following is not a default configuration of Windows Firewall?

A)
B)
C)
D)

Definition
B)
Term
What is the term for the ability of entire servers to be redundant so that if anything goes wrong with one computer, another one can take its place almost immediately?

A)
B)
C)
D) serve

Definition
C)
Term
Which role service maintains a database of client sessions and enables a disconnected client to reconnect to the same terminal server?

A)
B)
C)
D)

Definition
B)
Term
In the Kerberos Policy Settings, what is the default value for Maximum Lifetime for User Ticket?

A)
B)
C)
D)

Definition
B)
Term
What type of list does SAM enable computers to maintain?

A)
B)
C)
D)

Definition
D)
Term
Which network profile is not supported by Windows Server 2008?

A)
B)
C)
D)

Definition
C)
Term
An ACL is a collection of individual permissions presented in what form?

A)
B)
C)
D)

Definition
B)
Term
Which of the following is the only technology included in Windows Server 2008 that can protect data while it is in transit?

A)
B)
C)
D)

Definition
A)
Term
For authentication, PPTP supports all of the following authentication protocols except __________.

A)
B)
C)
D)

Definition
B)
Term
Which of the following holds the failover cluster configuration database?

A)
B)
C)
D)

Definition
C)
Term
Which of the following is not a factor that administrators should consider when choosing the length for a certificate’s lifetime?

A)
B)
C)
D)

Definition
A)
Term
How many consecutive heartbeats must fail before convergence occurs?

A)
B)
C)
D)

Definition
B)
Term
Which of the following is the strongest authentication protocol supported by Windows Server 2008?

A)
B)
C)
D) Challenge Handshake Authentication Protocol

Definition
B)
Term
Regardless of how much space you allocate to the storage area, Windows Server 2008 supports a maximum of __________ shadow copies for each volume.

A)
B)
C)

D)

Definition
C)
Term
In Windows Server 2008, a root CA’s self-generated certificate defaults to a validity period of __________.

A)
B)
C)
D)

Definition
A)
Term
Which of the following is part of the recommended hardware environment for a failover cluster?

A)
B)
C)
D)

Definition
B)
Term
Which technique creates multiple resource records using the same name, with a different server IP address in each record?

A)
B)
C)
D)

Definition
Term
Which of the following is the default maximum password age?

A)
B)
C)
D)

Definition
C)
Term
Which of the following is not a reason code for revoking a certificate?

A)
B)
C)
D)

Definition
B)
Term
Which of the following steps is not part of the certificate enrollment process?

A)
B)
C)
D)

Definition
D)
Term
Which version of Windows Server 2008 must computers be running to create a failover cluster?

A)
B)
C)
D)

Definition
D)
Term
Which of the following specifies a value assigned by the CA that uniquely identifies the certificate?

A)
B)
C)
D)

Definition
C)
Term
Which of the following is not an operation mode in BitLocker?

A)
B)
C)
D)

Definition
D)
Term
Which window presents a consolidated view of the post-installation tasks that, in previous Windows Server versions, you had to perform using various interfaces presented during and after the OS setup process?

A)
B)
C)
D)

Definition
B)
Term
The Events page in Server Manager Events displays a subset of the computer’s System log containing all events related to the role for __________ hours.

A)
B)
C)
D)

Definition
B)
Term
In an MMC snap-in, which of the following panes contains a hierarchical list of the snap-ins installed in the console and any subheadings that the snap-ins provide?

A)
B)
C)
D)

Definition
D)
Term
What Terminal Services key combination toggles the client session between a full screen and a window?

A)
B)
C)
D)

Definition
D)
Term
Which of the following is not a permission rule when allowing or denying permissions to security principals? (Which statement is false.)

A)
B)
C)
D)

Definition
C)
Term
A single WSUS server can support as many as __________ clients.

A)
B)
C)
D)

Definition
C)
Term
What must you download and install before using WSUS?

A)
B)
C)
D)

Definition
A)
Term
Which of the following is the default mode when you create a new MMC console?

A)
B)
C)
D)

Definition
D)
Term
The Summary of Administrative Events displays the total number of events recorded in all of the following time increments except for the last __________.

A)
B)
C)
D)

Definition
D)
Term
Which type of event is triggered when there is service degradation or an occurrence that can potentially cause service degradation in the near future?

A)
B)
C)
D)

Definition
C)
Term
The number of counters that you can display effectively depends on the __________.

A)
B)
C)
D)

Definition
C)
Term
The optimal value for the Server Work Queues: Queue Length should be less than __________.

A)
B)
C)
D)

Definition
A)
Term
Which of the following logs contains information about events generated by the operating system components, such as services and device drivers?

A)
B)
C)
D)

Definition
D)
Term
Which type of event warns of a problem that is not likely to affect the performance of the component or process where the problem occurred, but could affect the performance of other components or processes on the system?

A)
B)
C)
D)

Definition
B)
Term
Which type of log contains events that signify a change in the application or service, such as the addition or removal of a printer?

A)
B)
C)
D)

Definition
B)
Term
Performance objects, performance counters, and instances that appear in the Add Counters dialog box depend on all of the following except the __________.

A)
B)
C)
D)

Definition
C)
Term
Which of the following has become the primary backup medium for home users and small networks in recent years?

A)
B)
C)
D)

Definition
B)
Term
What is the ratio at which executables and other program files typically compress?

A)
B)
C)
D)

Definition
B)
Term
Which type of backup job backs up only the files that have changed since the last full backup and does not reset their archive bits?

A)
B)
C)
D)

Definition
B)
Term
Which of the following is the most basic type of backup job and copies the entire set of selected targets to the backup medium?

A)
B)
C)
D)

Definition
A)
Term
When files are written to a computer’s hard disk for the first time, their archive bits are activated and set to a value of __________.

A)
B)
C)
D)

Definition
B)
Term
Which backup is faster to restore?

A)
B)
C)
D)

Definition
D)
Term
When using Windows Server Backup for scheduled backup jobs, which type of drives can you use as a backup?

A)
B)
C)
D)

Definition
B)
Term
To perform a full server restore, you must boot the system using a Windows Server 2008 installation disk and access the backup disk using which interface?

A)
B)
C)
D)

Definition

C)

 

 

 

note: RE = Recovery Environment

Term
When you open a Command Prompt window in a standard Windows session and restore the system state, you are performing a(n) __________ restore.

A)
B)
C)
D)

Definition
C)