| Term 
 
        | In the Reliability and Performance Monitor, which view provides information about system events that can affect a server’s stability, including software installation and un-installation, as well as any application, operating system, or hardware failures that have occurred over a particular time period? -Performance Monitor
 -Reliability Monitor
 -Resource
 -Network
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________. -Windows Server 2008
 -Windows Server 2003
 -Windows XP
 -Windows NT
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is not a category for the Windows operating system updates? -Group Policy updates
 -critical updates
 -recommended downloads
 -multilanguage features
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________. -approved content download from a WSUS server
 -scheduled content download and installation
 -the ability to configure all Automatic Updates options by using Group Policy Object Editor or by editing the registry
 -support for Unix-based systems
 |  | Definition 
 
        | support for Unix-based systems |  | 
        |  | 
        
        | Term 
 
        | From where can a server that runs WSUS be synchronized? -public Windows Update servers
 -another server running WSUS
 -manually configured content distribution point
 -all of the above
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is sending or receiving data? -IPsec
 -checksum
 -TCP
 -UDP
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the IPSEC default settings for the key lifetime in minutes? -350
 -380
 -450
 -480
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as membership in a particular Active Directory domain? -Tunnel
 -Authentication exemption
 -Isolation
 -Server to server
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic? -Tunnel
 -Authentication exemption
 -Isolation
 -Server to server
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | To set the Netsh IPSec context, what is the first command you enter at the command prompt? -netsh
 -IPsec
 -static
 -dynamic
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started? -Receive Failures
 -Acquire Failures
 -Send Failures
 -Authentication Failures
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The Reliability and Performance Monitor is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools. Which of the following is not a feature? -Performance Logs and Alerts
 -Performance Monitor
 -Server Performance Advisor
 -System Monitor
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The command “set config property=ipsecloginterval value=value” can be set to what range of values? -0 - 7
 -0, 1
 60 – 86,400
 -0, 1, 2
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which “middle-of-the-road” form of NTLM authentication was used to improve upon the security of LM Authentication? -LMv2 Authentication
 -NTLM Authentication
 -NTLMv2 Authentication
 -None of the above
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which process is used to establish trust between communicating systems, after which only trusted systems can communicate with each other? -shared cryptography
 -cryptographic checksum
 -mutual authentication
 -filtered methodology
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment? -Kerberos v5 protocol
 -PKI certificate from a Certification Authority (CA)
 -preshared key
 -IPSec Authentication mode
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What allows traffic that is defined in one direction to also be defined in the opposite direction? -manifestation
 -reflection
 -mirroring
 -evidencing
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer? -Windows Server 2008
 -Windows Server 2003
 -Windows Vista
 -Windows 2000
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which field does the IPSec driver use to match the correct SA with the correct packet? -IPSec Driver field
 -IKE Authentication field
 -IP Filter field
 -SPI field
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications? -quick mode negotiations
 -quick mode messages
 -main mode negotiations
 -main mode messages
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started? -Key Addition Failures
 -Key Update Failures
 -Get SPI Failures
 -Receive Failures
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the default authentication protocol in an Active Directory network? -Kerberos v5
 -LM Authentication
 -NTLM Authentication
 -NTLMv2 Authentication
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is the most frequently used view within the Reliability and Performance Monitor? -Performance Logs and Alerts
 -System Monitor
 -Server Performance Advisor
 -Performance Monitor
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What version of IIS is included in Windows Server 2008? -4
 -5
 -6
 -7
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which box should you leave checked to make a site active as soon as it is created? -Directory Services
 -Start Web site immediately
 -Network Services
 -Application Services
 |  | Definition 
 
        | Start Web site immediately |  | 
        |  | 
        
        | Term 
 
        | Which role service does not ship with Windows Server 2008, but is available as a free download? -File Server Resources Manager
 -FTP7
 -Windows Search Services
 -Windows Server Manager
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What feature enables IIS7 to log additional diagnostic information and details on reasons for failures? -directory services
 -Failed Request Tracing
 -UDDI services
 -print services
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | When you create additional Websites on an IIS7 server, what server setting is automatically inherited? 
 -LAN Service
 -Internet Listing
 -Default Server Setting
 -FTP Management
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of interface is provided in the modular architecture of IIS7 that can be used to configure a Website’s many properties? -optical filter
 -touchpad interface
 -icon-based interface
 -print interface
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The original format for FTP directory listings was based on a format used by which operating system? -Windows operating system
 -UNIX operating systems
 -Network File operating systems
 -LAN operating systems
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | How many different Websites can be configured in IIS? -100
 -1000
 -10000
 -unlimited
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is a new feature in FTP7? -IIS7 integration -FTP over Secure Sockets Layer (SSL) -combined FTP and Web hosting -all of the above |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What allows a company to host the same documents on several different Websites without copying the documents to each content folder? -Role Manager
 -virtual directory
 -Add Role Wizard
 -Server Role Administration
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In which view can you view the counters associated with Data Collector Sets? -Performance Monitor
 -System Monitor
 -Server Performance Advisor
 -Performance Logs and Alerts
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of IIS authentication is best used for intranet Web servers with clients that are members of the same Active Directory domain and are separated by a firewall or proxy server? -Basic Authentication
 -Anonymous Authentication
 -Digest Authentication
 -Windows Authentication
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | When you install the Web Server (IIS) role on a Windows Server 2008 computer, what user account does IIS7 create? -WWWUSERS
 -IIS_IUSRS
 -IISUSR
 -IUSR
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What authentication protocol is ticket-based and is used by Windows computers that are members of an Active Directory domain? -NTLM
 -NTLMv2
 -Kerberos
 -Certificate Services
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a way to configure an ASP.NET application to run in a security context different from the application’s default context? -ASP.NET Masquerading
 -ASP.NET Impersonation
 -ASP.NET Extensible Security
 -ASP.NET Enhanced Security
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | You are establishing an SSL connection with the server when you click a link or key a URL containing the __________ prefix in your browser. -http
 -https://
 -httpssl://
 -httpsec://
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What tasks must you complete to install SSL on an IIS server? -Obtain and install a server certificate.
 -Create an SSL binding for your Website
 -Configure the Website or FTP7 site to use SSL.
 -All of the above
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A digital certificate is an electronic credential issued by a __________. -certificate server
 -certificate provider
 -certification authority
 -certification initiator
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Participants in what type of infrastructure are issued two keys, one public and one private? -public key
 -private key
 -secure key
 -encrypted key
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | SSL for FTP7 eliminates one of the major shortcomings of FTP, which is __________. -slow connections
 -transmission of passwords in clear text
 -user management
 -limited number of concurrent connections
 |  | Definition 
 
        | transmission of passwords in clear text |  | 
        |  | 
        
        | Term 
 
        | Permissions tend to run down through a hierarchy, which is called __________. -permission translation
 -permission propagation
 -permission flow
 -permission inheritance
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is not a built-in Data Collector Set within Windows Server 2008? -LAN Diagnostics
 -System Diagnostics
 -System Monitor
 -System Performance
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The anonymous user account in IIS7 is a built-in account called IUSR, which is a member of what group? -WWW_IUSRS
 -IIS_WWWUSRS
 -IIS_IUSRS
 -IIS_GROUP
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which log should be the first place you look when you suspect a problem with Active Directory? -Event Viewer
 -Directory Service
 -Service Monitor
 -Event Monitor
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In which node is Event Viewer located? -Setup node
 -Application node
 -Diagnostics node
 -Security node
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which log records events associated with server installation, adding and removing server roles, installing applications, and so forth? -Setup
 -System
 -Forwarded events
 -Security
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | When you first launch Network Monitor, what key do you press to begin capturing network traffic? -F8
 -F9
 -F10
 -F11
 |  | Definition 
 | 
        |  |