CT 5

41 Questions

Settings
Please wait...
Computed Tomography Quizzes & Trivia

Questions and Answers
  • 1. 
    ______________is the typical type of licensing used by small organizations that are purchasing a limited number of licenses.
    • A. 

      OEM licenses

    • B. 

      Retail licenses

    • C. 

      Select licenses

    • D. 

      Volume licenses

  • 2. 
    ________________is the types of volume licenses designed for companies that provide hosting services to other organizations. You pay a monthly licensing fee based on requirements.
    • A. 

      Open license

    • B. 

      Enterprise agreement

    • C. 

      Enterprise subscription agreement

    • D. 

      Services provider licensing agreement

  • 3. 
    ________________is not the common applications for server.
    • A. 

      E-mail

    • B. 

      Terminal services

    • C. 

      Post office protocols

    • D. 

      File and printer sharing

  • 4. 
    _________________offers the ability for remote users to connect to terminal services with just a web browser.
    • A. 

      Remote applications

    • B. 

      Published applications

    • C. 

      Terminal Services Gateway

    • D. 

      Terminal Services Web Access

  • 5. 
    _____________requires each user or device to have only one CAL to access any number of services.
    • A. 

      Open licensing

    • B. 

      Select licensing

    • C. 

      Per-seat licensing

    • D. 

      Per-server licensing

  • 6. 
    ______________is NOT the type of authentication providers built into ASP.NET.
    • A. 

      Mixed Authentication Provider

    • B. 

      Forms Authentication Provider

    • C. 

      Passport Authentication Provider

    • D. 

      Windows Authentication Provider

  • 7. 
    A good password characteristics is______________.
    • A. 

      At least three characters long

    • B. 

      A rotation or reuse of the characters in a logon name

    • C. 

      At least two alphabetic characters and one non-alphabetic character

    • D. 

      The personal data such as birth date, telephone number, license plate number

  • 8. 
    Almost all groups used by Windows Server 2008 are security groups because they are the only groups through which permission can be assigned. Each group is also assigned a___________which defines how permissions are assigned to  the group members.
    • A. 

      User name

    • B. 

      User scope

    • C. 

      Group name

    • D. 

      Group scope

  • 9. 
    For IPv4 addressing: 172.16.16.1/20, the /20 represents how many subnet bits are in the mask, and this notation is________________.
    • A. 

      Variable Bits Subnet Masking(VBSM)

    • B. 

      Variable Bytes Subnet Masking(VBSM)

    • C. 

      Variable Hosts Subnet Masking(VHSM)

    • D. 

      Variable Length Subnet Masking(VLSM)

  • 10. 
    DHCP simplifies the____________process for a network administrator.
    • A. 

      IP configuration

    • B. 

      Host configuration

    • C. 

      Security configuration

    • D. 

      Network configuration

  • 11. 
    DHCP uses____________to initiate communications.
    • A. 

      IP broadcasts

    • B. 

      WIN broadcasts

    • C. 

      NetBIOS broadcasts

    • D. 

      Network broadcasts

  • 12. 
    The purpose of WINS in a network infrastructure is to resolve__________________for effective communication between systems and applications that still makes use of single names.
    • A. 

      Host names to IP addresses

    • B. 

      IP addresses to Host names

    • C. 

      NetBIOS names to IP addresses

    • D. 

      IP addresses to NetBIOS names

  • 13. 
    An example of a second-level domain is___________in the www.microsoft.com domain.
    • A. 

      .

    • B. 

      Com

    • C. 

      Www

    • D. 

      Microsoft

  • 14. 
    WINS provided a distributed__________for registering and querying dynamic computer name-to-IP address mapping in a routed network environment.
    • A. 

      Network

    • B. 

      Database

    • C. 

      IP address

    • D. 

      Host name

  • 15. 
    Domain Name System is a_______________database.
    • A. 

      List

    • B. 

      Access

    • C. 

      Tree distributed

    • D. 

      Hierarchical distributed

  • 16. 
    Which one of the following is the private IPv4 address range for 10.0.0.0/8?
    • A. 

      10.0.0.0 - 10.255.255.255.255

    • B. 

      10.1.0.0 - 10.255.255.255.255

    • C. 

      10.1.1.0 - 10.255.255.255.255

    • D. 

      10.1.1.1 - 10.255.255.255.255

  • 17. 
    What does DNS stand for?
    • A. 

      Domain Name Server

    • B. 

      Domain Name System

    • C. 

      Domain Naming System

    • D. 

      Domain Naming Services

  • 18. 
    Installation of DHCP service is done using the Server Manager console and under add___________option.
    • A. 

      Roles

    • B. 

      Scope

    • C. 

      Features

    • D. 

      Command

  • 19. 
    ________________uses reverse lookups to validate that the IP address sending messages is associated with a domain.
    • A. 

      Default gateway

    • B. 

      Internet gateway

    • C. 

      E-mail security gateway

    • D. 

      Instant messaging gateway

  • 20. 
    ___________enables multiple client computers to share one or more print devices.
    • A. 

      Print queue

    • B. 

      Print server

    • C. 

      Print spooler

    • D. 

      Print services

  • 21. 
    The__________permission allows a user to read the content of a folder.
    • A. 

      Write

    • B. 

      Modify

    • C. 

      Read and Write

    • D. 

      List folder contents

  • 22. 
    Tom wants to share an NTFS folder Windows System to other users within the same network. Which tab should be selected in the properties panel of the folder to enable that?
    • A. 

      Roles

    • B. 

      Sharing

    • C. 

      General

    • D. 

      Customized

  • 23. 
    Which one of the followings describes the term Job redirection?
    • A. 

      To cancel the print job if the print device is offline.

    • B. 

      To hold the print job until the print device is online.

    • C. 

      To resubmit the print job to another print device by prompting user to resubmit the job

    • D. 

      To redirect the print job to another print device without requiring the user to resubmit the job

  • 24. 
    Tom wants to run the Print Management console in the Windows Server 2008 system but he cannot locate it anywhere. What could be the MOST likely reason?
    • A. 

      Print Queue role was not installed

    • B. 

      Print Server role was not installed

    • C. 

      Print Services role was not installed

    • D. 

      Print Daemon role was not installed

  • 25. 
    Tom needs to setup a print server to provide for high availability of shared printers. Which one of the following print components should Tom deploy?
    • A. 

      Print queue

    • B. 

      Print spooler

    • C. 

      Print daemon

    • D. 

      Print server cluster

  • 26. 
    Which of the following SQL server editions offers data synchronization for remote offices?
    • A. 

      SQL Server 2008 Express Editions

    • B. 

      SQL Server 2008 Compact Editions

    • C. 

      SQL Server 2008 Standard Editions

    • D. 

      SQL Server 2008 Workgroup Editions

  • 27. 
    Which one of the following is TRUE regarding the Mixed Authentication?
    • A. 

      It allows user logon using Windows accounts only

    • B. 

      It allows user logon using SA or Windows accounts only

    • C. 

      It allows permission to be linked to Active Directory only

    • D. 

      It allows permission to be linked to Windows accounts only

  • 28. 
    The____________command allows a user to send SQL scripts to a SQL Server.
    • A. 

      Sqlcmd

    • B. 

      Doscmd

    • C. 

      Osqlcmd

    • D. 

      Scriptcmd

  • 29. 
    Which one of the following is the best practice to setup the server environment before installing SQL Server?
    • A. 

      Use firewalls

    • B. 

      Use licensed software

    • C. 

      Use unsolicited software

    • D. 

      Use NetBIOS and server message block

  • 30. 
    __________________is a SQL utility used to transfer data between databases.
    • A. 

      SQL Server Manager

    • B. 

      SQL Server Query Tool

    • C. 

      SQL Server Management Studio

    • D. 

      SQL Server Configuration Manager

  • 31. 
    (A) Server Operating Systems are designed from the ground up to provide platforms for multi-user, frequently business-critical, networked applications. Name any THREE key concepts of a server operating systems.  Security Scalability Collaboration Stability
  • 32. 
    (B) Name any TWO types of volume licenses. Select license Enterprise agreement Enterprise subscription agreement Open licence Educational programs Services provider licensing agreement
  • 33. 
    Name any FIVE important general features of Windows Server 2008. Easy scalability Save cost Save time File sharing Printer Management Server Management Email Security DNS DHCP Domain Controller Create Groups Group Policy Active Directory Terminal Service Email Management
  • 34. 
    (A) State THREE reasons for using a subnet? Use a single IP class across multiple physical locations Reduce network congestions Overcome limitations, such as exceeding maximum number of hosts that each segment have
  • 35. 
    (B) Calculate the range of host IP addresses that can be obtained from the network address 192.168.1.0/25 192.168.1.1 - 192.168.1.126
  • 36. 
    (A) What is the purpose of a Forward Lookup Zone in DNS? It resolves host names to IP addressses
  • 37. 
    (B) Name any FOUR common resource records that can be found in a forward lookup zone. CNAMES A MX SOA NS SRV
  • 38. 
    (A) Briefly explain what is the primary usage of a database? It is used to store application data and configuration information.
  • 39. 
    (B) state TWO key usages of a SQL Server Configuration Manager? Perform start/stop of SQL services Modify network protocols Modify and manage accounts used by SQL services
  • 40. 
    (C) State TWO key requirements of a SQL Server Express Edition? Supports only 1 CPU Minimum 1 GB of RAM Maximum database size is 4 GB
  • 41. 
    Please fill answer below