Exam 1

1. The roles in the Add Roles Wizard fall into what three basic categories? A. Directory Services B. Application Services C. Infrastructure Services D Network Services Answer: D The three basic categories are Directory services, Infrastructure services, and Application services. 2. What is Microsoft’s program for automating and managing the activation of products obtained using volume licenses? A. Windows Validation B. Volume Activation C. Volume Activation 2.0 D Windows Genuine Advantage Answer: C Volume Activation (VA) 2.0 does not alter the terms of your license agreement with Microsoft in any way; it is simply a tool to simplify the activation process. For end users, the activation process is completely transparent, and administrators do not have to supply individual product keys when installing Windows. 3. A ______is a complete installation of an operating system that runs in a software environment emulating a physical computer. A. virtual machine B. virtual server C. terminal machine D terminal server Answer: B Applications such as Microsoft Virtual Server 2005 and the Windows Server virtualization technology in Windows Server 2008 make it possible for a single computer to host multiple virtual machines, each of which runs in a completely independent environment. 4. The Windows Server 2008 paging file is ______times the amount of memory installed in the computer by default. A. 1.5 B. 2 C. 2.5 D 3 Answer: A By default, the paging file on a Windows Server 2008 computer is 1.5 times the amount of memory installed in the computer. 5. Used with the Use parameter, what command-line utility can be used to map drive letters to folders in logon scripts? A. Net.exe B. Cmd.exe C. Ipconfig.exe D Cscript.exe Answer: A Another way to automate the drive-mapping process is to create batch files and use them as logon scripts for your users. You can use the Net.exe command-line utility with the Use parameter to map drive letters to folders, so your logon scripts need only contain certain commands. 6. What Windows Server 2008 feature enables you to maintain previous versions of files on a server? A. Backup Tape B. Shadow Copies C. Shadow Files D Offline Files Answer: B Shadow Copies is a Windows Server 2008 mechanism that automatically retains copies of files on a server volume in multiple versions from specific points in time. When users accidentally overwrite or delete files, they can access the shadow copies to restore earlier versions. This feature is designed to prevent administrators from having to load backup media to restore individual files for users. 7. What feature of DFS distributes access requests, thus preventing any one server from shouldering the entire traffic load? A. data distribution B. data collection C. server clustering D load balancing Answer: D A DFS Namespace by itself can simplify the process by which users locate the files they need. However, if people all over the network need access to the same file, the requests are still directed to the same file server, which can cause a performance bottleneck in the computer itself or on the subnet where the file server is located. By replicating shared folders to multiple servers, DFS can distribute the access requests, thus preventing any one server from shouldering the entire traffic load. This is called load balancing. 8. DFS can distribute access requests by using what feature, thus preventing any one server from shouldering the entire traffic load? A. data distribution B. load balancing C. data collection D server clustering Answer: B A DFS namespace by itself can simplify the process by which users locate the files they need. However, if people all over the network need access to the same file, the requests are still directed to the same file server, which can cause a performance bottleneck in the computer itself or on the subnet where the file server is located. By replicating shared folders to multiple servers, DFS can distribute the access requests, thus preventing any one server from shouldering the entire traffic load. This is called load balancing. 9. What administrative tool consolidates the controls for printing components throughout the enterprise into a single console? A. Print Services role B. Print Management snap-in C. Server Manager D Server Core Answer: B The Print Management snap-in for MMC, an administrative tool, consolidates the controls for printing components throughout the enterprise into a single console. With this tool, you can access the print queues and Properties sheets for all network printers in the enterprise, deploy printers to client computers using Group Policy, and create custom views that simplify the process of detecting print devices that need attention due to errors or depleted consumables. 10. How is a local print device attached to a computer? A. through the network B. through computer ports C. through another computer D none of the above Answer: B Windows Server 2008 supports both local print devices, which are directly attached to computer ports, and network interface print devices, which are connected to the network either directly or through another computer. 11. What snap-in for MMC is an administrative tool that consolidates the controls for the printing components throughout the enterprise into a single console? A. Print Management B. Print and Fax Wizard C. Device Manager D None of the above Answer: A The Print Management snap-in for MMC, an administrative tool, consolidates the controls for the printing components throughout the enterprise into a single console. With this tool, you can access the print queues and Properties sheets for all of the network printers in the enterprise, deploy printers to client computers using Group Policy, and create custom views that simplify the process of detecting print devices that need attention due to errors or depleted consumables. 12. HTTP uses what well-known port number? A. 80 B. 25 C. 12 D 110 Answer: C HTTP Websites use the well-known port number 80, but you can differentiate sites by assigning different port numbers to them. 13. What determines how listeners will identify requests on a Website? A. Remote Desktop Connection B. Windows Process Activation Service C. binding D icon-based interface Answer: C IIS7 is capable of hosting many separate Websites simultaneously. However, for the Websites to be accessible to clients, the HTTP protocol listener, Http.sys, must have some way of associating each incoming request with one particular Website. The binding for each site determines how the listener will identify its requests. 14. What allows a company to host the same documents on several different Websites without copying the documents to each content folder? A. Role Manager B. virtual directory C. Add Role Wizard D Server Role Administration Answer: B A virtual directory is an alias that points to a folder in another physical location. It is essentially a shortcut that enables you to publish content found on different drives or different computers, without copying or moving it. 15. Participants in what type of infrastructure are issued a public and a private key? A. public key B. private key C. secure key D encrypted key Answer: A Participants in a public key infrastructure are issued two keys, one public and one private. The participant keeps the private key secret, while the public key is freely available in the digital certificate. Data encrypted with the private key can only be decrypted using the public key, and data encrypted with the public key can only be decrypted using the private key. 16. What is the weakest of the challenge/response authentication methods supported by IIS7? A. Basic Authentication B. Anonymous Authentication C. Digest Authentication D Windows Authentication Answer: A Basic Authentication is the weakest of the challenge/response authentication methods supported by IIS7. When a client authenticates to an IIS7 server using Basic Authentication, the client transmits its credentials unencrypted, using Base64 encoding, so anyone capturing the network packets can read the user’s credentials.. 17. Permissions tend to run down through a hierarchy, which is called ______. A. permission translation B. permission propagation C. permission flow D permission inheritance Answer: D Permissions tend to run down through a hierarchy, which is called permission inheritance. 18. What XML-based directory service enables businesses to publish listings about their activities and the services they offer? A. ASP B. ASP.NET C. UDDI D SSI Answer: C Windows Server 2008 includes a UDDI Services role that organizations can use to share information about their Websites and services with clients on an intranet, extranet, or the Internet. Universal Discovery, Description, and Integration (UDDI) is an XML-based directory service that enables businesses to publish listings about their activities and the services they offer. 19. What component is most likely to be a bottleneck on a terminal server? A. resource allocation B. memory C. processor D scalability Answer: B Memory is the component that is most likely to be a bottleneck on a terminal server. The server requires additional memory for each client and application you plan to support. Because it is difficult to determine in advance how much memory a terminal server needs, purchase a server with plenty of room for memory upgrades. 20. Users must have the appropriate privileges to access a terminal server, and the easiest way to provide those privileges is by adding the user to what group? A. RDP Users B. Remote Desktop Users C. Terminal Users D Domain Administrators Answer: B Users must have the appropriate privileges to access a terminal server, and the easiest way to provide those privileges is to add the users to the Remote Desktop Users group. 21. What type of licensing permits one user to connect to the terminal server no matter what device the user is running? A. Per Device B. Per User C. Per System D Per OU Answer: B The Per User licensing type permits one user to connect to the terminal server no matter what device the user is running. 22. What Windows Server 2008 feature eliminates the need for the printer driver on the terminal server? A. Easy Print B. Print Driver 6.1 C. Quick Print D Print+ Answer: A In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. 23. What real-time, modular operating system is designed for devices with minimal amounts of memory? A. Windows CE B. Proprietary OS C. Windows XPe D Linux Answer: A Windows CE is a real-time, modular operating system designed for devices with minimal amounts of memory. Windows CE is not based on the NT kernel, but it provides users with a familiar Windows graphical user interface (GUI) and has been adapted to a variety of devices including handhelds, smart phones, and game consoles. 24. The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within what protocol? A. HTTP B. SSH C. RDP D SSL Answer: D The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within Secure Sockets Layer (SSL) packets. SSL uses TCP port number 443, which most organizations with an Internet presence leave open in their firewalls so that Internet clients can establish secure connections to their Web servers. 25. What process do clients and the server use to negotiate the most efficient protocol to use when you enable both the RTSP and HTTP protocols on a Windows Media Services server? A. multicast B. protocol negotiation C. protocol rollover D multicast rollover Answer: C When you enable both the RTSP and HTTP protocols on a Windows Media Services server, the clients and the server use a process called protocol rollover to negotiate the most efficient protocol they have in common. A client establishing a connection to a Windows Media Services server sends information about the protocols it can use, and the server selects the best protocol it is capable of using. 26. What type of server must you install to provide users with email capabilities in Windows SharePoint Server? A. POP B. SMTP C. HTTP D PHP Answer: B Windows SharePoint Services can integrate with email in a variety of ways, enabling users to set up calendar appointments, post announcements, add documents, and contribute to blogs and discussion forums. To provide users with these email capabilities, you must install a Simple Mail Transfer Protocol (SMTP) server and configure the incoming and outgoing email settings in Windows SharePoint Services. 27. What enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information? A. Digital Rights Management B. Digital Media Management C. Digital Authenticity Management D Digital File Management Answer: A Digital Rights Management (DRM) enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information. 28. The Windows Server 2008 version of Windows Media Services uses what protocol to stream multimedia content? A. Hypertext Transfer Protocol (HTTP) B. Real Time Streaming Protocol (RTSP) C. File Transfer Protocol (FTP) D Standard Media Protocol (SMP) Answer: B When you add the Windows Media Services role on a Windows Server 2008 computer, the Select Data Transfer Protocols page enables you to select Real Time Streaming Protocol (RTSP), Hypertext Transfer Protocol (HTTP), or both. The Windows Server 2008 version of Windows Media Services uses the RTSP protocol by default. 29. What does RAID stand for? A. Redundant Array of Interoperative Disks B. Repetitive Array of Independent Disks C. Redundant Array of Interpretive Disks D Redundant Array of Independent Disks Answer: D RAID (Redundant Array of Independent Disks) is one of the most basic and commonly used high-availability technologies. 30. When deploying a server using a WDS installation, the client downloads a boot image that loads ______. A. Windows PE B. Windows Software Update Services C. Windows Deployment Services D Windows Image Formatting Answer: A Instead of booting from a local drive, the computer in a PXE connects to a server on the network and downloads the boot files it needs to run. In the case of a WDS installation, the client downloads a boot image that loads Windows PE (Preinstallation Environment) 2.1, after which it installs the operating system using another image file. 31. The process of granting a user access to a file server share by reading their permissions is called ______. A. authorization B. authentication C. ownership D delegation Answer: A When a user attempts to access an NTFS file or folder, the system reads the user’s security access token, which contains the SIDs for the user’s account and all of the groups to which the user belongs. The system then compares these SIDs to those stored in the file or folder’s ACEs to determine what access the user should have. This process is called authorization. 32. How many fax job queues can be on a single system? A. 1 B. 2 C. 3 D 4 Answer: A The Fax printer created by the Fax Server role represents all of the fax devices installed on the computer. If there are multiple devices, the server can distribute outgoing faxes among a group of devices, but there is only one single fax job queue on the system. 33. Which service enables IIS to respond to a variety of incoming message types and not just HTTP? A. Terminal Services B. File Transfer Protocol (FTP) C. Windows Process Activation Service (WPAS) D Directory Services Answer: C The component that manages the request pipeline, the server’s application pools, and the worker processes running in them is called the Windows Process Activation Service (WPAS). 34. Which service enables developers to modify the functionality of the Web server, using the ASP.Net extensibility model and the .NET application programming interfaces (APIs)? A. Role Manager B. Server Role Administration C. .NET Extensibility D Add Role Wizard Answer: C .NET Extensibility enables developers to modify the functionality of the Web server, using the ASP.Net extensibility model and the .NET application programming interfaces (APIs). 35. What is the only authentication method integrated into IIS7 that IIS7 enables by default? A. Basic Authentication B. Anonymous Authentication C. Digest Authentication D Windows Authentication Answer: B Anonymous Authentication is the only authentication method integrated into IIS7 and the only one that IIS7 enables by default. As the name implies, Anonymous Authentication enables any user to access a Website that employs it without supplying an account name or password. This method of authentication is designed primarily for public Websites on the Internet or any internal site that you want to be available to all users. 36. Which listener enables IIS7 to receive client requests using ports other than port 80 and protocols other than HTTP? A. NET.PIPE B. NET.MSMQ C. NET.TCP D All of the above Answer: D In addition to HTTP.sys, IIS7 also adds three new protocol listeners: NET.TCP, NET.PIPE, and NET.MSMQ. These listeners enable IIS7 to receive client requests using protocols other than HTTP and ports other than port 80. 37. When installed, the SMTP server is integrated into ______. A. IIS B. Windows Server 2008 C. UDDI D Microsoft SQL Server Answer: A Windows Server 2008 includes a feature that implements an SMTP server, which you can configure to handle all of the outgoing email messages sent by the system’s various roles and features. The SMTP server is integrated into IIS because the sites you host on a Web server also can require its services. 38. What role configures a computer to function as a Terminal Services Licensing Server, enabling it to allocate client access licenses (CALs) to clients? A. TS Session Broker B. TS Gateway C. Terminal Server D TS Licensing Answer: D The TS Licensing role service configures the computer to function as a Terminal Services Licensing Server, which enables it to allocate client access licenses (CALs) to clients. You must have a Licensing Server on your network to use Terminal Services. You can install TS Licensing on the same computer as the other role services or on another computer. 39. The Easy Print driver is based on what document format introduced in Windows Vista and Windows Server 2008? A. PXS B. XPS C. XP D XML Answer: B In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. 40. What is used to specify which Internet users are allowed to use a terminal server? A. connection authorization policies B. resource authorization policies C. Group Policy objects D user authorization policies Answer: A CAPs enable you to restrict TS Gateway access to members of specific local or domain user groups. You can also specify the authentication method that clients must use and limit client device redirection. 41. What specifies the terminal servers on the private network that users are permitted to access? A. Group Policy objects B. user authorization policies C. connection authorization policies D resource authorization policies Answer: D RAPs enable you to restrict clients connecting to a TS Gateway server to specific terminal servers on the private network. 42. Which component registers and locates iSCSI initiators and targets? A. iSCSI Initiator B. Storage Manager for SANs C. Internet Storage Name Server D Storage Explorer Answer: C The Internet Storage Name Server component registers and locates iSCSI initiators and targets. 43. Which of the following defines the basic transport mechanism of a Fibre Channel network, including the frame format and three service classes: a connection-oriented class, a connectionless class with acknowledgments, and a connectionless class without acknowledgments? A. FC1 B. FC2 C. FC3 D FC4 Answer: B FC2 defines the basic transport mechanism of a Fibre Channel network, including the frame format and three service classes: a connection-oriented class, a connectionless class with acknowledgments, and a connectionless class without acknowledgments. 44. Network File System (NFS) places the bulk of the file sharing process on the ______. A. storage device B. client C. server D File Manager Answer: B In NFS, the bulk of the file-sharing process rests on the client. Compared with the Windows SMB file-sharing system, NFS servers are relatively simple and, in technical terms, dumb. NFS servers simply respond to file access requests from clients; they do not maintain any information about the client connections or the files that individual clients have open. 45. Network File System (NFS) places the bulk of the file-sharing process on the ______. A. server B. File Manager C. storage device D client Answer: D In NFS, the bulk of the file-sharing process rests on the client. Compared with the Windows SMB file-sharing system, NFS servers are relatively simple and, in technical terms, dumb. NFS servers simply respond to file access requests from clients; they do not maintain any information about the client connections or the files that individual clients have open. 46. What increases the production capability of a single printer by connecting it to multiple print devices? A. print spooler B. print priority C. printer pool D print queue Answer: C A printer pool increases the production capability of a single printer by connecting it to multiple print devices. When you create a printer pool, the print server sends each incoming job to the first print device it finds that is not busy. This effectively distributes the jobs among the available print devices, providing users with more rapid service. 47. The IIS7 built-in account IUSR is a member of what group? A. WWW_IUSRS B. IIS_WWWUSRS C. IIS_IUSRS D IIS_GROUP Answer: C The anonymous user account in IIS7 is a built-in account called IUSR, which is a member of a group called IIS_IUSRS. 48. In what application pool mode does IIS7 use the new, generic request pipeline for all protocol listeners and application development environments? A. Classic B. Integrated C. Basic D Enhanced Answer: B Integrated application pool mode IIS7 uses the new, generic request pipeline for all protocol listeners and application development environments. 49. What is the executable program file for the RDC client? A. rdp.exe B. msrdp.exe C. Mstsc.exe D msrdcc.exe Answer: C The executable program file for the RDC client, Mstsc.exe, is located in the C:\Windows\System32 folder by default. When you run the Mstsc.exe program with no parameters, the Remote Desktop Connection window appears with its default settings intact. 50. When you obtain a certificate from an external CA, either public or local, which of these tasks must you complete? A. Set up SSH access to the TS Gateway server. B. Install the certificate on the TS Gateway server. C. Install multiple root certificates. D None of the above Answer: B When you obtain a certificate from an external CA, either public or local, you must complete the following tasks: Install the certificate on the TS Gateway server and map the certificate to the TS Gateway server.