Vous êtes sur la page 1sur 7

Top of Form

Question 1

The Windows Server 2008 Printers window is enhanced from previous versions to enable more versatility.
0

True

/1

Question 2

0/1

When you configure a VPN server, Windows Server 2008 requires at least two network interfaces in the computer, one for the connection to the LAN and one for a connection to the physical VPN network.
1

True

/1

Question 3

1/1

Group policies are secured so that they can be changed by individual users. False

/1

Question 4

1/1

After accounts are set up, you can specify account auditing to track activity associated with those accounts.
1

True

/1

Question 5

1/1

One DNS server cannot be authoritative for multiple domains because it cannot have multiple zones. False

/1

Question 6

1/1

The computer or print server device offering the printer share is the network ____. b. print server

/1

Question 7

0/1

____ enables UNIX and Linux computers to print to shared printers managed through Windows Server 2008.
0

a. LPD

/1

Question 8

0/1

If a printer is not automatically detected, you can use the ____ to install it. d. Add Printer Wizard

/1

Question 9

0/1

The ____ tab of a printers Properties dialog box is used to enable or disable a printer for sharing as well as to specify the name of the share.
1

d. Sharing

/1

Question 10

1/1

The ____ tab of a printers Properties dialog box has options to specify which server port, such as LPT1, is used for the printer, and options to set up bidirectional printing and printer pooling.
1

a. Ports

/1

Question 11

1/1

The ____ print monitor is used for TCP/IP-based printers that are connected to the network through print server cards or print servers.
1

d. Standard TCP/IP Port

/1

Question 12

1/1

The ____ tool (also called the Print Management Console or PMC) centralizes shared printer control in one place, enabling printer administrators and operators to manage the print functions of some or all of the shared printers on a network. c. Print Management

/1

Question 13

1/1

Disk ____ is the ability to spread data over multiple disks or volumes. b. striping

/1

Question 14

0/1

The ____ partition is the partition where your computer will look for the hardware-specific files to start the operating system.
1

C.active

/1

Question 15

1/1

A RAID-5 volume requires a minimum of ____ disk drives. B.three

/1

Question 16

1/1

A(n) ____ backup only backs up files that are new or that have been updated. C. incremental

/1

Question 17

1/1

A(n) ____ is a DNS resource record that links a computer or network host name to its IP address. A.host

/1

Question 18

1/1

____ automatically registers network clients that use NetBIOS and builds a database that other network clients can query in order to locate a computer. b. WINS

/1

Question 19

0/1

Windows Server 2008 and Windows Vista both enable a network to use ____ for networks that are working to implement IPv6.
1

c. DHCPv6

/1

Question 20

1/1

____ is a dual-key encryption standard for communication between a server and a client and is also used by Microsoft Internet Explorer.
1

c. SSL

/1

Question 21

1/1

____ networking, which has been around since before the Internet, means using a telecommunications line and a modem (or other telephony device) to dial into a network or specific computers on a network.
1

a. Dial-up

/1

Question 22

1/1

____ is a commonly used form of security for communications and transactions over the Web and can be used by all Web browsers.
0

b. SSL

/1

Question 23

0/1

A(n) ____ is a digital modem device designed for use with the cable TV system, providing high-speed data transfer.
1

a. cable modem

/1

Question 24

1/1

____ policies are security measures set up in a group policy that applies to all accounts or to all accounts in a container, such as a domain, when Active Directory is installed.
1

B. account

/1

Question 25

1/1

The operating system can employ ____ to bar access to an account (including the true account owner) after a number of unsuccessful tries.

d. account lockout

/1

Question 26

0/1
d. User rights

____ enable an account or group to perform predefined tasks.

/1

Question 27

1/1

____ can provide security for all TCP/IP-based application and communications protocols, including FTP and HTTP, which are used in Internet transmissions. B. ipsec

/1

Question 28

0/1

A(n) ____ enables clients to run services and software applications on Windows Server 2008 instead of at the client, which means nearly any type of operating system can access Windows Server 2008.

A. terminal sever

/1

Question 29

0/1

Microsoft offers ____ for organizations that want a Windows Server 2008 server, but with a much smaller attack surface.
0

C. server core

/1

Question 30

0/1

____ was developed by IBM and the National Security Agency in cooperation with the National Bureau of Standards (now called the National Institute of Standards and Technology) as an encryption technique using a secret key between the communicating stations.
0

b. DES

/1

Question 31

0/1
0

The workstation or application that initially generates the print job is the network Print Client .

/1

Question 32

0/1

The DMZ, Demiliterized Zone is a portion of a network that is between two networks, such as between a private network and the Internet.
0

/1

Question 33

0/1
0

On a DNS server the Host(A), A record maps a computer name to an IPv4 address.

/1

Question 34

0/1
0

The DNS Reverse Lookup holds the pointer (PTR) resource record.

/1

Question 35

0/1

A(n) Virtual Private Network is like a tunnel through a larger network;such as the Internet, an enterprise network, or both;that is restricted to designated member clients only.
0

/1

Question 36

0/1
0

Briefly describe RAID level 1.

/1

Question 37

0/1
844ba13b3dbf34 s_assessment_v
Bottom of Form

What are the three vital services performed by secondary DNS servers?
form-fe2c7241a3

Back to assessments Schoology 2012

Vous aimerez peut-être aussi