Exam 6
1.What role is included with Windows Server 2008 and enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computers?
A.Windows Software Update Services
B.Windows Deployment Services
C.Windows Image Formatting
D.Windows PE
Answer: B
Windows Deployment Services (WDS) is a role included with Windows Server 2008 that enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computers by using network-based boot and installation media. This means that you can install a new computer with no operating system or local boot device on it by deploying image files stored on a server running Windows Deployment Services.
2.What role service of the Print Services role installs the Print Management snap-in for MMC, which provides centralized printer management for an entire enterprise network?
A.LPD Service
B.Internet Printing
C.Print Server
D.Print Management
Answer: C
The Print Services role includes the Print Server role service that installs the Print Management snap-in for MMC, providing centralized printer management for an entire enterprise network.
3.Newly installed disks in Windows Server 2008 always appear first as what type of disk?
A.basic disk
B.simple disk
C.primary disk
D.dynamic disk
Answer: A
Most personal computers use basic disks because they are the easiest to manage. A basic disk uses primary partitions, extended partitions, and logical drives to organize data.
4.What is the underlying disk drive structure that enables you to store information on your computer?
A.disk structure
B.file structure
C.file system
D.disk system
Answer: C
To organize and store data or programs on a hard drive, you must install a file system. You install file systems by formatting a partition or volume on the hard disk.
5.What command-line utility along with the Use parameter can be used to map drive letters to folders in logon scripts?
A.Net.exe
B.Cmd.exe
C.Ipconfig.exe
D.Cscript.exe
Answer: A
Another way to automate the drive-mapping process is to create batch files and use them as logon scripts for your users. You can use the Net.exe command-line utility with the Use parameter to map drive letters to folders, so your logon scripts need only contain certain commands.
6.Which of the following items simplifies the process of locating files and folders on network servers?
A.Distributed File System
B.Distributed Server Manager
C.Remote File Services
D.All of the above
Answer: A
The Distributed File System simplifies the process of locating files and folders on network servers. For administrators, DFS facilitates traffic control and network backups.
7.What will the Window’s Server 2008 “Deploying a File Server” default allow you to manage on the server?
A.disk drives
B.share folders
C.map drives
D.all of the above
Answer: D
The “Deploying a File Server” default Windows Server 2008 installation includes all of the components needed for a basic file server deployment. You can manage the server’s disk drives, share folders, and map drives and control access to those shares with no additional software installations.
8.What is the new platform-independent document format included with Windows 2008 and Windows Vista that allows print job files to use a single format for their entire journey to the print device?
A.Web Server (IIS) role
B.LPD Services
C.Print Management
D.XML Paper Specification (XPS)
Answer: D
XML Paper Specification (XPS) is a new platform-independent document format included with Windows Server 2008 and Windows Vista, in which print job files use a single XPS format for their entire journey to the print device rather than being converted first to EMS and then to PCL.
9.What tool do printing administrators on large enterprise networks use to keep track of print devices?
A.Server Manager console
B.Internet Printing role
C.printer pool
D.Print Management console
Answer: D
The Print Management snap-in for MMC, an administrative tool, consolidates the controls for the printing components throughout the enterprise into a single console. With this tool, you can access the print queues and Properties sheets for all network printers in the enterprise, deploy printers to client computers using Group Policy, and create custom views that simplify the process of detecting print devices that need attention due to errors or depleted consumables.
10.What does PCL stand for?
A.printer command location
B.printer color level
C.printer case lever
D.printer control language
Answer: D
The printer is associated with a printer driver that takes the commands generated by the application and converts them into a printer control language (PCL), a language understood by the printer. PCLs can be standardized, like the PostScript language, or they can be proprietary languages developed by the print device manufacturer.
11.Windows Server 2008 includes a Fax Server role that allows users to send faxes from ______.
A.the Internet
B.mobile phones
C.routers
D.their desktops
Answer: D
Windows Server 2008 includes a Fax Server role that enables users to send faxes from and receive them to their desktops.
12.What application layer protocol enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers?
A.File Transfer Protocol (FTP)
B.Application server
C.IIS Services
D.Web server
Answer: A
File Transfer Protocol (FTP) is an application layer protocol that enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers. FTP is defined by the RFC 114 document, which the Internet Engineering Task Force (IETF) published in 1971, making it one of the oldest TCP/IP protocols still in use.
13.Which feature enables you to use a Website to publish files located anywhere on the network?
A.fault tolerance
B.live hosting
C.resource allocation
D.virtual directories
Answer: D
A virtual directory is an alias that points to a folder in another physical location. It is essentially a shortcut that enables you to publish content found on different drives or different computers without copying or moving it.
14.What determines how listeners will identify requests on a Website?
A.Remote Desktop Connection
B.Windows Process Activation Service
C.binding
D.icon-based interface
Answer: C
IIS7 is capable of hosting many separate Websites simultaneously. However, for the Websites to be accessible to clients, the HTTP protocol listener, Http.sys, must have some way of associating each incoming request with one particular Website. The binding for each site determines how the listener will identify its requests.
15.What type of interface that is integrated into most browser applications is used most often by FTP clients?
A.touch pad interface
B.graphical interface
C.Windows Deployment interface
D.Windows System Image interface
Answer: B
Originally implemented as command-line applications, FTP clients now most often use a graphical interface that is integrated into most browser applications, including Internet Explorer.
16.When IIS is installed, where is the root directory of the default Website placed?
A.C:\inetpub\wwwroot
B.C:\wwwroot\inetpub
C.C:\WINDOWS\inetpub\wwwroot
D.C:\wwwpub\inetroot
Answer: A
When you install the Web Server (IIS) role on a Windows Server 2008 computer, IIS7 creates the user and the group and assigns the group the NTFS permissions needed to access the designated root directory of the default Website (C:\inetpub\wwwroot).
17.What is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate?
A.administration
B.authentication
C.association
D.confirmation
Answer: B
Authentication is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate.
18.A digital certificate is an electronic credential issued by a ______.
A.certificate server
B.certificate provider
C.certification authority
D.certification initiator
Answer: C
A digital certificate is an electronic credential, issued by a certification authority (CA), that confirms the identity of the party to which it is issued. For example, a digital certificate issued to a user contains identifying information about the individual as well as a public key, which enables the user to participate in encrypted communications and prove his or her identity. A certificate issued to a server enables clients to verify that this really is the server it claims to be.
19.What was designed to be an alternative to CGI, enabling a Web server to execute applications without spawning a separate process for each incoming request?
A.CGI
B.ISAPI
C.UDDI
D.SSI
Answer: B
Internet Server Application Programming Interface (ISAPI) was designed to be an alternative to CGI, enabling a Web server to execute applications without spawning a separate process for each incoming request.
20.What licensing mode permits one client device, such as a computer, terminal, or handheld, to connect to the terminal server no matter who is using it?
A.Per Device
B.Per User
C.Per System
D.Per OU
Answer: A
The Per Device licensing type permits one client device, such as a computer, terminal, or handheld, to connect to the terminal server no matter who is using it.
21.What is the modern equivalent of mainframe computing in which servers perform most of the processing and clients are relatively simple devices that provide the user interface?
A.Role Services
B.Terminal Services
C.Domain Services
D.Function Services
Answer: B
Terminal Services is the modern equivalent of mainframe computing in which servers perform most of the processing and clients are relatively simple devices that provide the user interface. With Terminal Services, client computers can connect to a server and run individual applications or an entire desktop environment.
22.What are the advantages of Terminal Services?
A.reduced client hardware requirements
B.simplified application deployment
C.easy configuration and updates
D.all of the above
Answer: D
Deploying Terminal Services offers several advantages to the network administrator, including the following: Reduced client hardware requirements, simplified application deployment, easy configuration and updates, low network bandwidth consumption, support for thin clients, conservation of licenses, power savings, no client backups, and remote control help and training.
23.What type of files store Remote Desktop Client settings in a recallable and portable form?
A.RDC files
B.RDP files
C.RDP packages
D.RDC packages
Answer: B
RDP files store Remote Desktop Client settings in a recallable and portable form.
24.The process of installing a TS Licensing server and preparing it for use consists of four basic steps. What is the first of these steps?
A.Activate the TS Licensing server.
B.Install the TS Licensing role service.
C.Configure the licensing settings on the terminal servers.
D.Install the TS CALs on the TS Licensing server.
Answer: B
The process of installing a TS Licensing server and preparing it for use consists of the following basic steps: Install the TS Licensing role service, activate the TS Licensing server, install the TS CALs on the TS Licensing server, and configure the licensing settings on the terminal servers.
25. What has the technology of choice been for remote network access in recent years?
A.SSL
B.HTTP
C.VPN
D.SSH
Answer: C
Generally, the technology of choice for remote network access has, in recent years, been virtual private networking (VPN). In a VPN connection, computers use a technique called tunneling that encapsulates an entire client/server session within another protocol.
26.What new Windows Server 2008 Terminal Services role service enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers?
A.Terminal Services Gateway
B.TS Web Access
C.TS RemoteApp
D.RemoteApp Integration
Answer: A
Terminal Services Gatewayis a new Windows Server 2008 Terminal Services role service that enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers.
27.What Microsoft technology allows you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content?
A.Windows Media Rights Manager
B.Windows Server Update Services
C.Digital Rights Management
D.Windows SharePoint Services
Answer: A
Windows Media Rights Manager (WMRM) is a Microsoft technology that enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content.
28.What converts content into the Windows Media format and sends it to the Windows Media Services server for real-time distribution?
A.Windows Media Services
B.Windows Media Player
C.Windows Media Center
D.Windows Media Encoder
Answer: D
Windows Media Encoder converts content into the Windows Media format and sends it to the Windows Media Services server for real-time distribution.
29.You can access the administration interface for Windows SharePoint Services by selecting what from the Administrative Tools program group?
A.Active Directory Users and Computers
B.Computer Management
C.SharePoint 3.0 Central Administration
D.Active Directory Sites and Services
Answer: C
After you install and configure Windows SharePoint Services, you can access the administration interface by selecting SharePoint 3.0 Central Administration from the Administrative Tools program group.
30.Because any device on a SAN can communicate with any other device on the same SAN, high-speed data transfers can occur in which of the following ways?
A.server to storage
B.client to server
C.client to client
D.client to storage
Answer: A
Because any device on a SAN can communicate with any other device on the same SAN, high-speed data transfers can occur in any of the following ways: server to storage, server to server, and storage to storage.
31.What capability of the File Services role consists of two role services that allow administrators to create a virtual directory tree consisting of folders stored on different servers and to maintain duplicate copies of that information?
A.Windows Search Services
B.Distributed File System
C.File Server Resources Manager
D.Single Instance Store
Answer: B
The distributed file system consists of two role services: DFS Namespace, which enables administrators to create a virtual directory tree consisting of folders stored on different servers, and DFS Replication, which maintains duplicate copies of the DFS namespace in remote locations.
32. What is the combination of Allow permissions and Deny permissions called that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership?
A.effective permissions
B.special permissions
C.extended permissions
D.NTFS permissions
Answer: A
Because a security principal can receive permissions from so many sources, it is not unusual for those permissions to conflict. Therefore, rules define how the permissions combine to form the effective permissions.
33.Windows Server 2008 computers must run which protocol service to send email messages?
A.Email Router Protocol (ERP)
B.Default Email Protocol (DEP)
C.Simple Mail Transfer Protocol (SMTP)
D.Simple Modem Target Protocol (SMTP)
Answer: C
A Windows Server 2008 computer must be running the Simple Mail Transfer Protocol (SMTP) service to be able to send email messages.
34.To browse for print servers on the network, you must activate ______.
A.devices
B.the Print Management Tool
C.the Network Discovery Setting
D.Administrative Tools
Answer: C
To browse for print servers on the network, you must activate the Network Discovery setting in the Network and Sharing Center control panel.
35.What feature enables IIS7 to log additional diagnostic information and details on reasons for failures?
A.directory services
B.Failed Request Tracing
C.UDDI services
D.print services
Answer: B
The IIS log file format includes new error subcodes that provide more detailed reasons for a failure. Failed Request Tracing capabilities enable IIS7 to log additional diagnostic information when an application meets specified status code, time elapsed, or error type conditions.
36.What is the only authentication method integrated into IIS7 that is enabled by default?
A.Basic Authentication
B.Anonymous Authentication
C.Digest Authentication
D.Windows Authentication
Answer: B
Anonymous Authentication is the only authentication method integrated into IIS7 and the only one that IIS7 enables by default. As the name implies, Anonymous Authentication enables any user to access a Website that employs it without supplying an account name or password. This method of authentication is designed primarily for public Websites on the Internet or any internal site that you want to be available to all users.
37.Which application pool type consists of multiple applications serviced by multiple worker processes?
A.medium process
B.pooled process
C.isolated process
D.Web garden
Answer: D
The configuration of the application pools, worker processes, and applications is highly flexible in IIS7. A Web garden consists of multiple applications serviced by multiple worker processes.
38.What role service balances the client load among multiple terminal servers and saves session state information so that clients can reconnect to the same session from which they disconnected?
A.TS Gateway
B.TS Session Broker
C.TS Web Access
D.TS Licensing
Answer: B
The TS Session Broker role service balances the client load among multiple terminal servers and saves session state information so that clients can reconnect to the same session from which they disconnected.
39.Which TS server licensing scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest?
A.Tree
B.Domain
C.Forest
D.Workgroup
Answer: C
When you install the TS Licensing role service, you must specify the server’s discovery scope. The Forest discovery scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest. Microsoft recommends this scope setting for domain members.