You are on page 1of 18

Author:

rcpantoni

ID:

185512

Filename:

Practice Quiz 1

Updated:

2012-11-27 21:41:36

Description: Practice Quiz 1

1. ____ is the most basic server version on which the other versions are based. a. Windows Server 2008 Enterprise Edition b. Windows Server 2008 for Itanium-Based Systems c. Windows Server 2008 Standard Edition d. Windows Server 2008 Datacenter Edition without Hyper-V
c. Windows Server 2008 Standard Edition

2. Windows Server 2008 Enterprise Edition supports clusters of up to ____ computers. a. 8 b. 16 c. 24 d. 32


b. 16

3. Windows Server 2008 Enterprise Edition has ____, which enables memory to resynchronize after transient memory

problems so there is no interruption to current computing activities. a. fault tolerant memory sync b. fault resistant memory sync c. fault managed memory sync d. parallel memory sync
a. fault tolerant memory sync

4. ____ means that a processor can be added to an empty processor slot while the system is running. a. Live swap processor b. Online-capable processor c. Plug and play processor d. Hot-add processor
d. Hot-add processor

5. The design of an Itanium processor enables it to be scaled up to ____ processors. a. 256 b. 512 c. 768 d. 1024
b. 512

6. ____ is a database of computers, users, groups of users, shared printers, shared folders, and other network resources. a. Active Directory b. Exchange c. SharePoint d. SQL

a. Active Directory

7. ____ are files that contain commands to be run by a computer operating system. a. Cores b. Templates c. Scripts d. Shells
c. Scripts

8. ____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers. a. Windows Server Base b. Windows Server Core c. Windows Core System d. Windows Server Platform
b. Windows Server Core

9. ____ is a command-line interface that offers a shell, a customized environment for executing commands and scripts. a. Windows Script Host b. Hyper-V c. Windows Power Host d. Windows PowerShell
d. Windows PowerShell

10. The ____ addition to Windows Server 2008 provides the ability to run two or more operating systems on a single computer.

a. b. c. d.

Hyper-V App-V Terminal Services Intel VT/AMD-V

a. Hyper-V

11. A ____ is a computer program or portion of a program that is currently running. a. thread b. fiber c. kernel d. process
d. process

12. A(n) ____ is a communications system enabling computer users to share computer equipment, application software, and data, voice, and video transmissions. a. shell b. environment c. network d. server
c. network

13. A ____ is a network of computers in relatively close proximity, such as on the same floor or in the same building. a. local area network b. wide area network c. metropolitan area network d. near area network

a. local area network

14. A ____ is a transmission in which one packet is sent from a server to each client that requests a file or application, such as a video presentation. a. multicast b. broadcast c. bi-cast d. unicast
a. multicast

15. A(n) ____ is used for two purposes: to show the class of addressing used and to divide a network to control network traffic. a. IP address b. MAC address c. subnet mask d. subnet number
c. subnet mask

16. ____ involves assigning a dotted decimal address that becomes each workstations permanent, unique IP address. a. Static addressing b. Dynamic addressing c. Reserved addressing d. Block addressing
a. Static addressing

17. The ____ is the IP address of the router that has a connection to other networks.

a. b. c. d.

default route default gateway subnet mask default transmission point

b. default gateway

18. a. b. c. d.

Every NIC has a physical address, or ____ address. DN MAC ARP IP

b. MAC

19. Every computer running Windows Server 2008 has a(n) ____ cache that can include the recently resolved MAC addresses as well as statically assigned values. a. ARP b. IP c. name d. resolution
a. ARP

20. The ____ command shows you the MAC addresses along with the corresponding IP addresses that the local computer currently has in its ARP cache. a. arp -d b. ipconfig /all c. arp -a d. cache -a
c. arp -a

21. The most up-to-date listing of compatible hardware (and software) is the Windows Server Catalog of ____. a. Labeled Products b. Tested Products c. Compatible Products d. Approved Products
b. Tested Products

22. ____ is a process in which a hard disk section or a complete hard disk is prepared for use by an operating system. a. Creating a partition b. Mounting a disk c. Disk compression d. Segmenting a disk
a. Creating a partition

23. When you format a disk, this process divides the disk into small sections called tracks and ____ for the storage of files by a particular file system. a. blocks b. sections c. partitions d. sectors
d. sectors

24. NTFS follows the ____ standard, which includes casesensitive filenames and the use of multiple filenames. a. SYSV

b. POSIX.1 c. Windows d. POSTIX


b. POSIX.1

25. ____ by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file. a. Auditing b. Versioning c. Snapshot tracking d. Journaling
d. Journaling

26. Prior to Windows Server 2008, a damaged disk area meant that you had to take down the server and then bring it back up offline to users to run the ____ utility that rebuilt the data in the damaged area. a. chkdsk b. repair disk c. dskutil d. wdsutil
a. chkdsk

27. ____ is an interim version of Windows Server 2003 developed as a way to offer a newer server version while waiting for Windows Server 2008. a. SP3 b. SP2 c. R1 d. R2

d. R2

28. One ____ is a license for one workstation to access the server. a. EAL b. CAL c. WAL d. PPL
b. CAL

29. When installing Windows Server 2008, you can specify a domain or workgroup on the ____ window that is displayed when the computer reboots after the actual installation process is completed. a. Initial Configuration Tasks b. BIOS c. Setup Tasks d. Management Options
a. Initial Configuration Tasks

30. A ____ is a set of unique identification information that is typically put at the end of a file, or that is associated with a computer communication. a. public key b. digital signature c. hash d. digital certificate
d. digital certificate

31. The ____ role is central to implementing Active Directory and creating one or more domains. a. Active Directory Certificate Services b. Active Directory Management Services c. Active Directory Domain Services d. Active Directory Listing Services
c. Active Directory Domain Services

32. ____ enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers. a. CFS b. DFS c. HFS d. RFS
b. DFS

33. ____ are directories on one or more computers that users on other computers can access through the network. a. Shared directories b. Merged directories c. Quorum directories d. Catalog directories
a. Shared directories

34. ____ is a TCP/IP application protocol that transfers files in bulk data streams and is commonly used on the Internet. a. SMTP b. SMB

c. CIFS d. FTP
d. FTP

35. ____ is a protocol in the TCP/IP suite of protocols that is used to transport document and other data transmissions over networks and the Internet for access by Web browsers. a. SMTP b. FTP c. HTTP d. ICMP
c. HTTP

36. The ____ role is designed to enable the installation of Windows operating systemsWindows Vista, Windows 7, and Windows Server 2008on multiple computers. a. WDS b. ODS c. DHCP d. WDT
a. WDS

37. In the Initial Configuration Tasks window, you use the ____ section to set the time zone, configure networking, and provide computer name and domain or workgroup information. a. Initialize This Server b. Provide Computer Information

c. Customize This Server d. Setup This Server


b. Provide Computer Information

38. To install the Active Directory Lightweight Directory Services role, enter: ____. a. start /w ocsetup DirectoryServices-ADAM-ServerCore b. start /w ocsetup LDDS-Install c. start /w ocsetup Directory-Server-Core-Role d. start /w ocsetup All Services
a. start /w ocsetup DirectoryServices-ADAM-ServerCore

39. In Windows Server Core at the command line, enter ____ to view a listing of commands. a. enum b. all c. list d. help
d. help

40. ____ are designed to correct things such as security issues as well as problems affecting stability, performance, or the operation of features included with the operating system. a. Service updates b. Hotfixes c. Service packs d. Service upgrades
c. Service packs

41. The ____ role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through Distributed File System (DFS). a. Print Services b. Directory Services c. WDS d. File Services
d. File Services

42. In the ____ role, the Windows Server 2008 server can be used to manage network printing services and it can offer one or more network printers connected to the network through the server itself. a. Print Services b. Directory Services c. WDS d. File Services
a. Print Services

43. You can use the ____ command-line tool for managing server roles. a. Ocsetup.exe b. WDSUtil.exe c. ServerManagerCmd.exe d. ServerCoreCmd.exe
c. ServerManagerCmd.exe

44. ServerManagerCmd.exe can be used to run the parameters in a(n) ____ on a group of servers to save configuration time and ensure that the servers are

configured the same way. a. setup file b. configuration file c. parameter file d. XML answer file
d. XML answer file

45. ServerManagerCmd.exe is executed from the command line through the ____ window. a. GUI b. Command Prompt c. Control Panel d. MMC
b. Command Prompt

46. The ability to automatically detect and configure newly installed hardware devices, such as a disk or tape drive is called ____. a. Plug and Play b. DHCP c. dynamic configuration d. automatic configuration
a. Plug and Play

47. When a driver is verified, a unique digital signature is incorporated into it in a process called ____. a. device signing b. module signing c. driver validation d. driver signing

d. driver signing

48. Windows Server 2008 offers the ____ to scan system files for integrity. a. System Compatibility Checker b. System Integrity Checker c. System File Checker d. System Configuration Checker
c. System File Checker

49. After a Sigverif scan is complete, the results are written to a log file, called ____. a. sigverif.dat b. sigverif.txt c. sigverif.html d. sigverif.pdf
b. sigverif.txt

50. ____ is disk storage used to expand the capacity of the physical RAM installed in the computer. a. Virtual memory b. Flash memory c. Expansion memory d. Device memory
a. Virtual memory

51. ____ are defined by the operating system and apply to any user logged onto the computer. a. User environment blocks

b. System environment blocks c. User environment variables d. System environment variables


c. User environment variables

52. ____ can be defined on a per-user basis, such as specifying the path where application files are stored. a. System environment variables b. User environment variables c. System environment entries d. User environment entries
b. User environment variables

53. ____ is used for multimedia transmissions, such as a combined voice and video transmission to provide user training to multiple people. a. Realtime Streaming Protocol b. Reliable Multiuser Protocol c. Reliable Multicast Protocol d. Realtime Multicast Protocol
c. Reliable Multicast Protocol

54. A ____ is a data parameter associated with a software or hardware characteristic under a key (or subkey). a. Registry module b. Registry value c. Registry branch d. Registry entry

d. Registry entry

55. A ____, also called a subtree, is a primary or highest level category of data contained in the Registry. a. hive key b. root key c. branch key d. subkey
b. root key

56. The ____ root key contains profile information for each user who has logged onto the computer. a. HKEY_USERS b. HKEY_LOCAL_MACHINE c. HKEY_CURRENT_USER d. HKEY_CURRENT_CONFIG
a. HKEY_USERS

57. ____ holds information about the monitor type, keyboard, mouse, and other hardware characteristics for the current profile. a. HKEY_LOCAL_MACHINE b. HKEY_CURRENT_USER c. HKEY_CURRENT_CONFIG d. HKEY_USERS
c. HKEY_CURRENT_CONFIG

58. The ____ tool is automatically installed when you install Windows Server 2008 and provides an interactive interface for analyzing and configuring security on a server.

a. b. c. d.

Security Configuration Wizard Security Management Wizard Security System Wizard Security Content Wizard

a. Security Configuration Wizard

59. ____ examines the roles a server plays and then tries to adjust security to match these roles. a. SCF b. SCM c. SMF d. SCW
d. SCW

60. The ____ command enables you to configure and modify security settings, as well as convert them to Active Directory Group Policy Objects and to apply them to multiple servers. a. scwmgt b. scwcmd c. scwutil d. scwcli
b. scwcmd
<question> ____ is the most basic server ve a. Windows Server 2008 Enterp b. Windows Server 2008 for Itan

You might also like