Vous êtes sur la page 1sur 8

Server 2008 Practice Questions

1. ____ is the most basic server version on which the other versions are based. a. Windows Server 2008 Enterprise Edition b. Windows Server 2008 for Itanium-Based Systems c. Windows Server 2008 Standard Edition d. Windows Server 2008 Datacenter Edition without Hyper-V c. Windows Server 2008 Standard Edition Windows Server 2008 Enterprise Edition supports clusters of up to ____ computers. a. 8 b. 16 c. 24 d. 32 b. 16 Windows Server 2008 Enterprise Edition has ____, which enables memory to resynchronize after transient memory problems so there is no interruption to current computing activities. a. fault tolerant memory sync b. fault resistant memory sync c. fault managed memory sync d. parallel memory sync a. fault tolerant memory sync ____ means that a processor can be added to an empty processor slot while the system is running. a. Live swap processor b. Online-capable processor c. Plug and play processor d. Hot-add processor d. Hot-add processor The design of an Itanium processor enables it to be scaled up to ____ processors. a. 256 b. 512 c. 768 d. 1024 b. 512 ____ is a database of computers, users, groups of users, shared printers, shared folders, and other network resources. a. Active Directory b. Exchange c. SharePoint d. SQL a. Active Directory ____ are files that contain commands to be run by a computer operating system. a. Cores b. Templates c. Scripts d. Shells c. Scripts ____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers. a. Windows Server Base b. Windows Server Core c. Windows Core System d. Windows Server Platform b. Windows Server Core








Server 2008 Practice Questions

9. ____ is a command-line interface that offers a shell, a customized environment for executing commands and scripts. a. Windows Script Host b. Hyper-V c. Windows Power Host d. Windows PowerShell d. Windows PowerShell The ____ addition to Windows Server 2008 provides the ability to run two or more operating systems on a single computer. a. Hyper-V b. App-V c. Terminal Services d. Intel VT/AMD-V a. Hyper-V A ____ is a computer program or portion of a program that is currently running. a. thread b. fiber c. kernel d. process d. process A(n) ____ is a communications system enabling computer users to share computer equipment, application software, and data, voice, and video transmissions. a. shell b. environment c. network d. server c. network A ____ is a network of computers in relatively close proximity, such as on the same floor or in the same building. a. local area network b. wide area network c. metropolitan area network d. near area network a. local area network A ____ is a transmission in which one packet is sent from a server to each client that requests a file or application, such as a video presentation. a. multicast b. broadcast c. bi-cast d. unicast a. multicast A(n) ____ is used for two purposes: to show the class of addressing used and to divide a network to control network traffic. a. IP address b. MAC address c. subnet mask d. subnet number c. subnet mask ____ involves assigning a dotted decimal address that becomes each workstations permanent, unique IP address. a. Static addressing b. Dynamic addressing c. Reserved addressing








Server 2008 Practice Questions

d. Block addressing a. Static addressing The ____ is the IP address of the router that has a connection to other networks. a. default route b. default gateway c. subnet mask d. default transmission point b. default gateway Every NIC has a physical address, or ____ address. a. DN b. MAC c. ARP d. IP b. MAC Every computer running Windows Server 2008 has a(n) ____ cache that can include the recently resolved MAC addresses as well as statically assigned values. a. ARP b. IP c. name d. resolution a. ARP The ____ command shows you the MAC addresses along with the corresponding IP addresses that the local computer currently has in its ARP cache. a. arp -d b. ipconfig /all c. arp -a d. cache -a c. arp -a The most up-to-date listing of compatible hardware (and software) is the Windows Server Catalog of ____. a. Labeled Products b. Tested Products c. Compatible Products d. Approved Products b. Tested Products ____ is a process in which a hard disk section or a complete hard disk is prepared for use by an operating system. a. Creating a partition b. Mounting a disk c. Disk compression d. Segmenting a disk a. Creating a partition When you format a disk, this process divides the disk into small sections called tracks and ____ for the storage of files by a particular file system. a. blocks b. sections c. partitions d. sectors d. sectors NTFS follows the ____ standard, which includes case-sensitive filenames and the use of multiple filenames. a. SYSV b. POSIX.1









Server 2008 Practice Questions

c. Windows d. POSTIX b. POSIX.1 ____ by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file. a. Auditing b. Versioning c. Snapshot tracking d. Journaling d. Journaling Prior to Windows Server 2008, a damaged disk area meant that you had to take down the server and then bring it back up offline to users to run the ____ utility that rebuilt the data in the damaged area. a. chkdsk b. repair disk c. dskutil d. wdsutil a. chkdsk ____ is an interim version of Windows Server 2003 developed as a way to offer a newer server version while waiting for Windows Server 2008. a. SP3 b. SP2 c. R1 d. R2 d. R2 One ____ is a license for one workstation to access the server. a. EAL b. CAL c. WAL d. PPL b. CAL When installing Windows Server 2008, you can specify a domain or workgroup on the ____ window that is displayed when the computer reboots after the actual installation process is completed. a. Initial Configuration Tasks b. BIOS c. Setup Tasks d. Management Options a. Initial Configuration Tasks A ____ is a set of unique identification information that is typically put at the end of a file, or that is associated with a computer communication. a. public key b. digital signature c. hash d. digital certificate d. digital certificate The ____ role is central to implementing Active Directory and creating one or more domains. a. Active Directory Certificate Services b. Active Directory Management Services c. Active Directory Domain Services d. Active Directory Listing Services c. Active Directory Domain Services ____ enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers.









Server 2008 Practice Questions

a. CFS b. DFS c. HFS d. RFS b. DFS ____ are directories on one or more computers that users on other computers can access through the network. a. Shared directories b. Merged directories c. Quorum directories d. Catalog directories a. Shared directories ____ is a TCP/IP application protocol that transfers files in bulk data streams and is commonly used on the Internet. a. SMTP b. SMB c. CIFS d. FTP d. FTP ____ is a protocol in the TCP/IP suite of protocols that is used to transport document and other data transmissions over networks and the Internet for access by Web browsers. a. SMTP b. FTP c. HTTP d. ICMP c. HTTP The ____ role is designed to enable the installation of Windows operating systemsWindows Vista, Windows 7, and Windows Server 2008on multiple computers. a. WDS b. ODS c. DHCP d. WDT a. WDS In the Initial Configuration Tasks window, you use the ____ section to set the time zone, configure networking, and provide computer name and domain or workgroup information. a. Initialize This Server b. Provide Computer Information c. Customize This Server d. Setup This Server b. Provide Computer Information To install the Active Directory Lightweight Directory Services role, enter: ____. a. start /w ocsetup DirectoryServices-ADAM-ServerCore b. start /w ocsetup LDDS-Install c. start /w ocsetup Directory-Server-Core-Role d. start /w ocsetup All Services a. start /w ocsetup DirectoryServices-ADAM-ServerCore In Windows Server Core at the command line, enter ____ to view a listing of commands. a. enum b. all c. list








Server 2008 Practice Questions

d. help d. help ____ are designed to correct things such as security issues as well as problems affecting stability, performance, or the operation of features included with the operating system. a. Service updates b. Hotfixes c. Service packs d. Service upgrades c. Service packs The ____ role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through Distributed File System (DFS). a. Print Services b. Directory Services c. WDS d. File Services d. File Services In the ____ role, the Windows Server 2008 server can be used to manage network printing services and it can offer one or more network printers connected to the network through the server itself. a. Print Services b. Directory Services c. WDS d. File Services a. Print Services You can use the ____ command-line tool for managing server roles. a. Ocsetup.exe b. WDSUtil.exe c. ServerManagerCmd.exe d. ServerCoreCmd.exe c. ServerManagerCmd.exe ServerManagerCmd.exe can be used to run the parameters in a(n) ____ on a group of servers to save configuration time and ensure that the servers are configured the same way. a. setup file b. configuration file c. parameter file d. XML answer file d. XML answer file ServerManagerCmd.exe is executed from the command line through the ____ window. a. GUI b. Command Prompt c. Control Panel d. MMC b. Command Prompt The ability to automatically detect and configure newly installed hardware devices, such as a disk or tape drive is called ____. a. Plug and Play b. DHCP c. dynamic configuration d. automatic configuration a. Plug and Play When a driver is verified, a unique digital signature is incorporated into it in a process called ____. a. device signing b. module signing









Server 2008 Practice Questions

c. driver validation d. driver signing d. driver signing Windows Server 2008 offers the ____ to scan system files for integrity. a. System Compatibility Checker b. System Integrity Checker c. System File Checker d. System Configuration Checker c. System File Checker After a Sigverif scan is complete, the results are written to a log file, called ____. a. sigverif.dat b. sigverif.txt c. sigverif.html d. sigverif.pdf b. sigverif.txt ____ is disk storage used to expand the capacity of the physical RAM installed in the computer. a. Virtual memory b. Flash memory c. Expansion memory d. Device memory a. Virtual memory ____ are defined by the operating system and apply to any user logged onto the computer. a. User environment blocks b. System environment blocks c. User environment variables d. System environment variables c. User environment variables ____ can be defined on a per-user basis, such as specifying the path where application files are stored. a. System environment variables b. User environment variables c. System environment entries d. User environment entries b. User environment variables ____ is used for multimedia transmissions, such as a combined voice and video transmission to provide user training to multiple people. a. Realtime Streaming Protocol b. Reliable Multiuser Protocol c. Reliable Multicast Protocol d. Realtime Multicast Protocol c. Reliable Multicast Protocol A ____ is a data parameter associated with a software or hardware characteristic under a key (or subkey). a. Registry module b. Registry value c. Registry branch d. Registry entry d. Registry entry A ____, also called a subtree, is a primary or highest level category of data contained in the Registry. a. hive key b. root key









Server 2008 Practice Questions

c. branch key d. subkey b. root key The ____ root key contains profile information for each user who has logged onto the computer. a. HKEY_USERS b. HKEY_LOCAL_MACHINE c. HKEY_CURRENT_USER d. HKEY_CURRENT_CONFIG a. HKEY_USERS ____ holds information about the monitor type, keyboard, mouse, and other hardware characteristics for the current profile. a. HKEY_LOCAL_MACHINE b. HKEY_CURRENT_USER c. HKEY_CURRENT_CONFIG d. HKEY_USERS c. HKEY_CURRENT_CONFIG The ____ tool is automatically installed when you install Windows Server 2008 and provides an interactive interface for analyzing and configuring security on a server. a. Security Configuration Wizard b. Security Management Wizard c. Security System Wizard d. Security Content Wizard a. Security Configuration Wizard ____ examines the roles a server plays and then tries to adjust security to match these roles. a. SCF b. SCM c. SMF d. SCW d. SCW The ____ command enables you to configure and modify security settings, as well as convert them to Active Directory Group Policy Objects and to apply them to multiple servers. a. scwmgt b. scwcmd c. scwutil d. scwcli b. scwcmd