CT 4

37 Questions

Settings
Please wait...
Computed Tomography Quizzes & Trivia

Questions and Answers
  • 1. 
    Which edition of Windows Server 2008 is used in small offices with limited requirements and is a low cost edition. It is sold only by original equipment manufacturers (OEMs), not at retail outlets or through volume liscensing.
    • A. 

      Windows Web Server 2008

    • B. 

      Windows Server 2008 Standard

    • C. 

      Windows Server 2008 Foundation

    • D. 

      Windows Server 2008 HPC Edition

  • 2. 
    The type of OS license that is purchased from online and physical shops or merchants is referred to as______________.
    • A. 

      OEM license

    • B. 

      Retail license

    • C. 

      Select license

    • D. 

      Volume license

  • 3. 
    Microsoft introduced a process to prevent casual copying software. The process associates a specific set of hardware to a product key to ensure that the product key is not reused on an unauthorized computer. What is the process?
    • A. 

      Product activation

    • B. 

      Product registration

    • C. 

      Product commission

    • D. 

      Product maintenance

  • 4. 
    What is Master Boot Record (MBR) in Windows Server 2008 system?
    • A. 

      It is a software utility available all server system

    • B. 

      It is a disk partition style used in Windows Server 2008

    • C. 

      It is disk formatting style used in Windows Server 2008

    • D. 

      It is a file system creation process in Windows Server 2008

  • 5. 
    With the arrival of Windows Server 2008, both x86 32-bit and 64-bit systems can support different partition styles (MBR, GPT). Which statement is TRUE?
    • A. 

      32-bit systems can boot from MBR-based disks

    • B. 

      Both 32-bits and 64-bits systems can boot from MBR-based disks

    • C. 

      32-bits systems can boot from MBR-based and GPT-based disks

    • D. 

      64-bits systems can boot from MBR-based and GPT-based disks

  • 6. 
    The system administrator just received a called to do a password reset for one of the user. As he is not in the office, he decided to use remote log in to do the reset and force the user to change password o the log in. Which of the following is the correct command he should type on the command prompt?
    • A. 

      Dsrm UserDN

    • B. 

      Dsmod user UserDN -disabled yes

    • C. 

      Dsmod user UserDN -pwd NewPassword

    • D. 

      Dsmod user UserDN -pwd NewPassword -mustchpwd yes

  • 7. 
    What group scope should an administrator set to allow members from a trusted external domain to access an object/group from the current domain?
    • A. 

      Groups

    • B. 

      Universal

    • C. 

      Domain local

    • D. 

      External domain

  • 8. 
    A company has a team of 50 sales representatives travelling around the country everyday to do sales. They often work as a team of two and carried  a portable device to access the servers to retrieve sales and logistic information. Which type of licensing would be recommended in this scenario?
    • A. 

      Per seat licensing with user CAL

    • B. 

      Per server licensing with user CAL

    • C. 

      Per seat licensing with device CAL

    • D. 

      Per server licensing with device CAL

  • 9. 
    Which role in Windows Server 2008 is responsible to assign IP address dynamically in a network?
    • A. 

      DNS

    • B. 

      DHCP

    • C. 

      FSRM

    • D. 

      WINS

  • 10. 
    What can you conclude from the IP address 130.146.169.11 and subnet mask 255.255.240.0?
    • A. 

      The size of the host portion is 8 bits

    • B. 

      The size of the host portion is 16 bits

    • C. 

      The size of the network portion is 20 bits

    • D. 

      The size of the network portion is 24 bits

  • 11. 
    The CNAMES record is used within the______________________.
    • A. 

      Forward Lookup Zones

    • B. 

      Reverse Lookup Zones

    • C. 

      Windows Server Zones

    • D. 

      Windows Firewall Zones

  • 12. 
    The IP address 155.128.195.99/20 can be written as_____________________.
    • A. 

      155.128.195.99 / 255.255.128.0

    • B. 

      155.128.195.99 / 255.255.192.0

    • C. 

      155.128.195.99 / 255.255.224.0

    • D. 

      155.128.195.99 / 255.255.240.0

  • 13. 
    How many root domain servers are there worldwide?
    • A. 

      11

    • B. 

      13

    • C. 

      15

    • D. 

      17

  • 14. 
    Which of the following statement regarding the IP address 10.1.2.1 is TRUE?
    • A. 

      It is an IPv4 public address

    • B. 

      It is an IPv4 class B address

    • C. 

      It is an IPv4 public class B address

    • D. 

      It is an IPv4 private class A address

  • 15. 
    In a networked environment, all the clients are assigned IP addresses by a DHCP server  and are periodically renewed. Certain clients and resources required permanent IP addresses to be assign, these addresses are defined in_________________.
    • A. 

      DHCP Scope

    • B. 

      DHCP Options

    • C. 

      DHCP Client Reservation

    • D. 

      DHCP IP Exclusion Range

  • 16. 
    Given FQDN (Fully Qualified Domain Name) sales.south.nwtraders.com, what is the second domain name?
    • A. 

      Com

    • B. 

      Sales

    • C. 

      South

    • D. 

      Nwtraders

  • 17. 
    Which one of the following is an option that can be configured within the DHCP service?
    • A. 

      DHCP options

    • B. 

      Scope options

    • C. 

      Server options

    • D. 

      Domain options

  • 18. 
    Installation of  DNS service in done using the Server Manager console under the add_____________option.
    • A. 

      Roles

    • B. 

      Features

    • C. 

      Configuration

    • D. 

      Computer Management

  • 19. 
    Joyce wants to setup a network that comprises of 100 workstations, a DHCP server, a file server and a DNS server. Which one of the following hosts should be configured automatically receive their IP addresses from the DHCP server?
    • A. 

      File Server

    • B. 

      DNS server

    • C. 

      Workstations

    • D. 

      DHCP server

  • 20. 
    Which one of the following items is included in the DFS (Distributed File System) technology?
    • A. 

      Distributed Compression

    • B. 

      Distributed File Comparison

    • C. 

      Remote Desktop Management

    • D. 

      Remote Differential Compression

  • 21. 
    What role should be added through Server Manager console to enable a file server?
    • A. 

      IIS services

    • B. 

      File services

    • C. 

      Print services

    • D. 

      Database services

  • 22. 
    Joyce wants to create a shared folder , which console should she use to get the job done?
    • A. 

      DHCP console

    • B. 

      File Service Console

    • C. 

      File Manager Console

    • D. 

      Service Manager Console

  • 23. 
    Administrator of a large company wants to group shared folders located on different servers into one or more logically structured namespaces, which one of the following could help him do the job?
    • A. 

      Use DFS namespaces

    • B. 

      Use DNS namespaces

    • C. 

      Use DHCP namespaces

    • D. 

      Use NetBIOS namespaces

  • 24. 
    In file sharing over a network, the Read and Execute permission allows the use to____________.
    • A. 

      Read folder contents and start programs

    • B. 

      Read folder contents and delete programs

    • C. 

      Execute folder contents and write programs

    • D. 

      Execute folder contents and modify programs

  • 25. 
    Joyce wants to configure her company's network to support high availability of shared printers, which is the most effective way to get the job done?
    • A. 

      Enable print sharing

    • B. 

      Enable print server clustering

    • C. 

      Enable print ports for one or more users

    • D. 

      Enable print queue for one or more users

  • 26. 
    Which one of the following about SQL Server 2008 Express edition is TRUE?
    • A. 

      It can be downloaded for free

    • B. 

      It has a database size limit of 8 GB

    • C. 

      It is designed for use on mobile devices only

    • D. 

      It can be used for development purpose only

  • 27. 
    Which one of the following editions support features for high availability, security, data mining, data warehousing and analysis services?
    • A. 

      SQL Server 2008 Express editions

    • B. 

      SQL Server 2008 Compact editions

    • C. 

      SQL Server 2008 Standard editions

    • D. 

      SQL Server 2008 Enterprise editions

  • 28. 
    A user wants to install a SQL server, what should be done to secure the SQL server installation?
    • A. 

      Use firewall

    • B. 

      Enable NetBIOS

    • C. 

      Enable SQL services

    • D. 

      Use complex password

  • 29. 
    Joyce installed the SQL Server 2008 R2 on a domain controller under a local service account. What will happen?
    • A. 

      It cannot run the SQL Server services on a domain controller

    • B. 

      It can support the SQL Server services on a domain controller

    • C. 

      It cannot re-installaton the SQL Server services on a domain controller

    • D. 

      It can automatically start the SQL Server services on a domain controller

  • 30. 
    Joyce wants to start and stop SQL services, modify and manage accounts used by SQL services. What tool can she can use to perform this task?
    • A. 

      SQL Server Management Studio

    • B. 

      SQL Server Configuration Management

    • C. 

      SQL Server Services Management Studio

    • D. 

      SQL Server Configuration Management Manager

  • 31. 
    A newly established company decided to equip all their staffs with notebooks. The IT department is looking at volume licensing to save cost. List 5 types of volume licensing scheme.
  • 32. 
    (A) XYZ company has just revamped the company network. Peter is the new network administrator of XYZ company. He decided to create user account for each user in the company. List 3 characteristics for creating a good password.  It is not a rotation or reuse of the characters in a logon name It contains at least two alphabetic characters and one non alphabetic character It is at least eight characters long
  • 33. 
    (B) List the two group types allowed in Windows Server 2008. Distribution Security
  • 34. 
    (A) Calculate the maximum number of host IP addresses that can be obtained from the network address 192.168.10.0/24. 254
  • 35. 
    (B) List four DHCP scope properties. Subnet mask Scope name Network IP address range Network ID Lease duration Exclusion range
  • 36. 
    A company has set up a DNS server to include forward lookup zone in DNS. List five common resource records that can be found in a forward lookup zone. CNAME A SOA SRV MX NS
  • 37. 
    A company needs to install a SQL Server 2008. Name five best practices  to setup the server environment. Use firewall Enhance physical security Isolate services Disable NetBIOS and server message block Configure a secure file system