Storage Solutions
High Availability
Security
Infrastructure Services
Managing Servers
100
Which of the following options should be considered the minimum acceptable rotational speed for a server? a) 7,000 rpm b) 9,000 rpm c) 10,000 rpm d) 15,000 rpm
c) 10,000 rpm
100
What is the term for the ability of entire servers to be redundant so that if anything goes wrong with one computer, another one can take its place almost immediately?
b) failover
100
What term refers to automatic identification of individuals based on physiological characteristics?
biometrics
100
A root CA issues its own __________ certificate, which functions as the top of the certificate chain for all certificates issued by all CAs subordinate to the root.
self-signed
100
Which program downloads updates from the Microsoft Update Website and stores them for administrative evaluation?
Windows Server Update Services, WSUS
200
What is the maximum dynamic volume size for a RAID-5 volume in Windows Server 2008?
62 terabytes
200
Which version of Windows Server 2008 must computers be running to create a failover cluster?
b) Enterprise
200
Which of the following is not an operation mode in BitLocker? a) transparent operation mode b) user authentication mode c) volume encryption mode d) USB key mode
c) volume encryption mode
200
Only __________ CAs can issue certificates based on certificate templates; standalone CAs cannot.
Enterprise
200
What difference exists between disconnecting from a session and logging off from a session in Remote Desktop?
When you disconnect, the session still exists on the remote computer, and any applications you have left open will continue to run. When you log off, the session ends, terminating all running applications.
300
For applications that use large data files, such as databases and email stores, which access is preferable? a) block I/O b) file-based I/O c) server to storage d) server to server
a) block I/O
300
The servers that you intend to add to an NLB cluster must have dynamic IP addresses. True or False ?
False
300
Proof of identity typically takes one of three forms. Which of the following is not a typical form of proof? a) something you see b) something you know c) something you have d) something you are
something you see
300
The data-link and network layers are two of the seven layers defined by which reference model?
OSI
300
Instead of working directly with individual permissions, what can you use in the Active Directory Users and Computers console to assign permissions based on common administrative tasks?
Delegation of Control Wizard
400
Which volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume? a) simple b) spanned c) striped d) RAID-5
b) spanned
400
Shadow copies are __________-based.
Block
400
Which of the following is an example of a strong password? a) Password b) 55Caterpillars c) *&_I5y#<.h d) 09071981
55Caterpillars
400
What occurs when the client and the server establish a Point-to-Point Protocol (PPP) connection?
The server authenticates the client, and the computers negotiate a set of communication parameters they have in common.
400
When administrators are granted the Allow Full Control permission for a disk volume or folder, what does this permission enable them to do?
It enables them to modify the file system in any way, including assigning permissions to other users or groups.
500
__________ is a mathematical algorithm that some RAID levels use to provide data redundancy in their disk write operations.
Parity
500
What must you create first before deploying Remote Desktop Services with network load balancing?
terminal server farm
500
Which of the following is not a port that Windows uses for network browsing? a) 5355 b) 8080 c) 137 d) 138
8080
500
Some of the default templates supplied with Active Directory Certificate Services are version 2, which can only be used to issue certificates with a CA running which operating systems?
Windows Server 2003 Enterprise Edition, Windows Server 2003 Datacenter Edition, or Windows Server 2008
500
The Server: Bytes Total/Sec counter specifies the total number of bytes sent and received by the server over all of its network interfaces. This value should be no more than __________ percent of the total bandwidth capacity of the network interfaces in the server.
50