Itnw 1354 Implementing And Supporting Servers (Purple)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Angel38101
A
Angel38101
Community Contributor
Quizzes Created: 1 | Total Attempts: 113
| Attempts: 113 | Questions: 52
Please wait...
Question 1 / 52
0 %
0/100
Score 0/100
1. ______________________________ is a set of standards designed to enable portability of applications from one computer system to another and has been used particularly for UNIX and Linux systems.

Explanation

POSIX (Portable Operating System Interface) is a set of standards that allows applications to be easily transferred from one computer system to another. It has been widely used for UNIX and Linux systems, ensuring compatibility and portability across different platforms. By adhering to POSIX standards, developers can write code that will work on various operating systems, reducing the need for rewriting or modifying applications for different environments.

Submit
Please wait...
About This Quiz
Itnw 1354 Implementing And Supporting Servers (Purple) - Quiz

This ITNW 1354 quiz focuses on implementing and supporting servers, covering topics like Windows Server 2008, Active Directory, NTFS, and server scalability. It assesses key skills in server... see moremanagement and preparation for increased organizational demands. see less

2. Windows Server 2008 supports UNIX and Linux clients using the _______

Explanation

Windows Server 2008 supports UNIX and Linux clients using the SUA (Subsystem for UNIX-based Applications). SUA is a compatibility layer that allows UNIX and Linux applications to run on Windows Server 2008. It provides a set of tools, utilities, and APIs that enable cross-platform integration and interoperability between Windows and UNIX/Linux systems. With SUA, administrators can manage and administer UNIX and Linux clients from a Windows Server environment, making it easier to integrate and manage heterogeneous IT environments.

Submit
3. The ______________________________ is the full cost of owning a network, including hardware, software, training, maintenance, and user support costs.

Explanation

The TCO, or Total Cost of Ownership, is the complete expense associated with owning and operating a network. It encompasses all costs involved in maintaining the network, such as purchasing hardware and software, providing training to users, conducting maintenance activities, and offering support to users. The TCO provides a comprehensive view of the financial investment required to sustain a network infrastructure.

Submit
4. NTFS supports large disk volumes of up to 16 GB.

Explanation

The statement is incorrect. NTFS (New Technology File System) supports large disk volumes of up to 16 terabytes (TB), not 16 gigabytes (GB).

Submit
5. Device drivers that are unsigned can also be loaded in x64 versions of Windows Server 2008.

Explanation

Unsigned device drivers cannot be loaded in x64 versions of Windows Server 2008. This is because x64 versions of Windows Server 2008 only allow the loading of digitally signed device drivers. Unsigned drivers pose a security risk as they have not been verified by Microsoft, and therefore the operating system does not allow their installation or loading.

Submit
6. Memory activities performed through virtual memory are as fast as those performed in RAM.

Explanation

The statement is false because memory activities performed through virtual memory are not as fast as those performed in RAM. Virtual memory is a technique used by operating systems to extend the available memory by using a portion of the hard disk as additional memory. Accessing data from virtual memory involves transferring data between RAM and the hard disk, which is slower compared to accessing data directly from RAM. Therefore, memory activities performed in virtual memory are slower than those performed in RAM.

Submit
7. When a driver is verified, a unique digital signature is incorporated into it in a process called ____________________.

Explanation

Driver signing refers to the process of incorporating a unique digital signature into a driver when it is verified. This digital signature ensures that the driver comes from a trusted source and has not been tampered with. By incorporating a digital signature, the driver signing process enhances the security and integrity of the driver, providing assurance to users that the driver is authentic and safe to use.

Submit
8. A computer contains an unlimited number of IRQ lines.

Explanation

A computer does not contain an unlimited number of IRQ (Interrupt Request) lines. IRQ lines are limited resources that are used to manage and prioritize hardware interrupts in a computer system. The number of IRQ lines available varies depending on the specific computer architecture and hardware configuration. Therefore, the statement that a computer contains an unlimited number of IRQ lines is false.

Submit
9. Exceeding the minimum requirements makes your server more scalable and able to meet increased requirements as the organization grows.

Explanation

Exceeding the minimum requirements for a server means that it is built with additional resources and capabilities. This allows the server to handle higher workloads and accommodate increased demands as the organization grows. By having a more scalable server, the organization can easily adapt to changing needs without the need for frequent upgrades or replacements. Therefore, the statement "Exceeding the minimum requirements makes your server more scalable and able to meet increased requirements as the organization grows" is true.

Submit
10. ____ means that a processor can be added to an empty processor slot while the system is running.

Explanation

Hot-add processor means that a processor can be added to an empty processor slot while the system is running. This feature allows for easy expansion and scalability of the system without the need for a system shutdown or restart. It is a convenient and efficient way to increase processing power in real-time, making it a valuable feature for high-performance computing environments.

Submit
11. Before any final decisions are made in selecting hardware, you should check the hardware for the ____ sticker or consult the Windows Server Catalog of Tested Products.

Explanation

Before any final decisions are made in selecting hardware, you should check the hardware for the "Certified for Windows Server 2008" sticker or consult the Windows Server Catalog of Tested Products. This ensures that the hardware has been tested and certified to be compatible and reliable with Windows Server 2008.

Submit
12. A Registry ____ is a category or division of information within the Registry.

Explanation

In a Registry, a key is a category or division of information. It acts as a container that holds various subkeys and values. Keys are used to organize and manage data within the Registry, allowing users to easily locate and modify specific information.

Submit
13. Windows Web Server 2008 can be used to manage directory resources via hosting Active Directory.

Explanation

Windows Web Server 2008 is not designed to manage directory resources or host Active Directory. Instead, it is specifically designed as a web server platform, providing the necessary tools and features for hosting websites and web applications. Active Directory is a separate service provided by Windows Server operating systems, such as Windows Server 2008 Standard or Enterprise editions, which are designed for managing directory resources and hosting Active Directory. Therefore, the given statement is false.

Submit
14. ServerManagerCmd.exe is executed from the command line through the Command Prompt window.

Explanation

ServerManagerCmd.exe is a command-line tool used to manage server roles and features on Windows Server operating systems. It is executed from the command line through the Command Prompt window, where users can type commands to interact with the tool. Therefore, the statement "ServerManagerCmd.exe is executed from the command line through the Command Prompt window" is true.

Submit
15. A server's ____________________ include the interrupt request (IRQ) line (which is a channel for communication with the CPU) and other elements such as the I/O address and reserved memory range

Explanation

The server's resources refer to the various components and elements that it utilizes for communication and operation. These resources include the interrupt request (IRQ) line, which serves as a channel for communication with the CPU. Additionally, the server's resources encompass other elements such as the I/O address and reserved memory range. These resources are essential for the server to function properly and efficiently.

Submit
16. When programs are running on the server, ______________________________ monitors how they use memory to ensure they are not causing memory problems

Explanation

DEP (Data Execution Prevention) is a security feature in operating systems that monitors the memory usage of running programs on a server. It ensures that these programs do not cause memory problems by preventing the execution of code in certain memory locations. DEP helps protect against malicious attacks that exploit vulnerabilities in a program's memory. Therefore, DEP is the correct answer as it accurately describes the feature that monitors program memory usage to prevent memory problems.

Submit
17. If you are upgrading a computer that has been used for a different operating system, such as one currently running Windows Server 2003, that computer might already be in the Catalog of Tested Products, but it might still be necessary to upgrade the ____.

Explanation

When upgrading a computer that has been used for a different operating system, such as Windows Server 2003, it is possible that the computer is already listed in the Catalog of Tested Products. However, it may still be necessary to upgrade the BIOS. The BIOS (Basic Input/Output System) is firmware that is responsible for initializing the hardware components of the computer and starting the operating system. Upgrading the BIOS ensures compatibility with the new operating system and can improve system performance and stability.

Submit
18. ____ means that when software in Windows Server 2008 runs into a damaged disk area, NTFS can heal the area without having to take down the server.

Explanation

Self-healing means that when software in Windows Server 2008 runs into a damaged disk area, NTFS can automatically repair or fix the area without requiring the server to be taken down. This feature ensures that the server remains operational and minimizes downtime caused by disk errors.

Submit
19. Windows Server 2008 ____ version is designed to have a small footprint on a network, making it less vulnerable to Internet attackers.

Explanation

Server Core is the correct answer because it is a stripped-down version of Windows Server 2008 that is designed to have a small footprint on a network. By removing unnecessary components and features, Server Core reduces the attack surface and minimizes the potential vulnerabilities that can be exploited by Internet attackers. This lightweight version of Windows Server is ideal for running specific server roles, such as domain controllers or file servers, while providing improved security and stability.

Submit
20. NTFS has been supported in Windows Server systems from when ____ was introduced in the early 1990s to Windows 2000 Server and Windows Server 2003.

Explanation

NTFS has been supported in Windows Server systems from when Windows NT Server was introduced in the early 1990s to Windows 2000 Server and Windows Server 2003.

Submit
21. Windows Server 2008 comes with Microsoft ____ to transform the server into a versatile Web server.

Explanation

Windows Server 2008 comes with Microsoft IIS (Internet Information Services) to transform the server into a versatile Web server. IIS is a web server software that provides a platform for hosting websites, applications, and services on the internet or intranet. It offers features such as website management, security, performance optimization, and support for various web technologies like ASP.NET, PHP, and HTML. By using IIS, organizations can easily deploy and manage web applications, making Windows Server 2008 a suitable choice for hosting websites and web services.

Submit
22. The ____ role is central to implementing Active Directory and creating one or more domains.

Explanation

The correct answer is Active Directory Domain Services. This role is central to implementing Active Directory and creating one or more domains. Active Directory Domain Services is responsible for managing and organizing a network's resources, such as users, computers, and groups, and providing a centralized authentication and authorization mechanism. It allows for the creation and management of domains, which are logical groupings of resources within a network.

Submit
23. ____ is a Windows Server 2008 tool that verifies system and critical files to determine if they have a signature.

Explanation

Sigverif is a Windows Server 2008 tool that verifies system and critical files to determine if they have a signature. This tool is used to check the integrity and authenticity of files by comparing their digital signatures with the ones stored in a trusted database. By verifying the signatures of files, Sigverif helps to ensure that the system is protected against tampering or unauthorized modifications.

Submit
24. On a typical x86 computer, data is paged in blocks of ____ KB.

Explanation

On a typical x86 computer, data is paged in blocks of 4 KB. This means that the computer's memory management system divides the memory into fixed-size blocks called pages, and each page is 4 KB in size. This paging system allows for efficient memory management and allocation, as well as facilitating virtual memory and the use of page tables.

Submit
25. Windows PowerShell offers over 130 command-line tools, also called____

Explanation

Windows PowerShell offers over 130 command-line tools, also called cmdlets. Cmdlets are specialized .NET classes that are designed to perform a specific task. They are the building blocks of PowerShell commands and provide a way to automate administrative tasks, manage system components, and perform various operations on Windows systems. Cmdlets are easy to use and provide a consistent and efficient way to interact with the underlying operating system and applications.

Submit
26. The operating system kernel runs in ____ mode, which protects it from problems created by a malfunctioning program or process.

Explanation

The operating system kernel runs in privileged mode, which protects it from problems created by a malfunctioning program or process. Privileged mode gives the kernel higher privileges and control over the system resources, allowing it to perform critical tasks and manage the execution of programs. By running in privileged mode, the kernel can isolate and contain any issues that may arise from a malfunctioning program or process, preventing them from affecting the stability and functionality of the entire system.

Submit
27. Windows ____ is a command-line interface that offers a shell.

Explanation

PowerShell is the correct answer because it is a command-line interface that provides a shell in Windows. It is a powerful scripting language and automation framework that allows users to manage and control the Windows operating system and other Microsoft applications. PowerShell offers a wide range of commands and features that enable system administrators to perform various tasks efficiently and effectively. It is widely used in Windows environments for its flexibility and extensive capabilities.

Submit
28. ____ enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers

Explanation

DFS (Distributed File System) enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers. This allows users to access and manage files and folders from different locations as if they were all stored in one place. DFS provides a unified view of the distributed file system and simplifies file sharing and organization across multiple machines.

Submit
29. ____ allows you to configure how processor resources are allocated to programs.

Explanation

Processor scheduling allows you to configure how processor resources are allocated to programs. It determines the order and priority in which programs are executed, ensuring that each program gets its fair share of processing time. By adjusting the scheduling settings, you can prioritize certain programs or processes, optimize resource allocation, and improve overall system performance. This feature is particularly important in multitasking operating systems, where multiple programs are running simultaneously and competing for processor resources.

Submit
30. The ____ role is used to enable client computers to run services and software applications on the server instead of on the client.

Explanation

Terminal Services is the correct answer because it allows client computers to run services and software applications on the server instead of on the client. This enables centralized management and control of applications, reduces the load on client machines, and allows for remote access to applications from any device with an internet connection.

Submit
31. The ____ command enables you to view and configure network interfaces

Explanation

The netsh command is used to view and configure network interfaces. It allows users to manage various network settings such as IP addresses, DNS servers, and network protocols. By using the netsh command, users can easily modify network configurations and troubleshoot network connectivity issues.

Submit
32. ____ provides a graphical view of all hardware currently installed on your computer.

Explanation

Device Manager is a Windows tool that provides a graphical view of all hardware currently installed on a computer. It allows users to view and manage devices, update drivers, disable or enable devices, and troubleshoot hardware issues. By accessing the Device Manager, users can easily identify and monitor the hardware components of their computer system.

Submit
33. Virtual memory works through a technique called ____, whereby blocks of information, called pages, are moved from RAM into virtual memory on disk.

Explanation

Virtual memory works through a technique called paging, whereby blocks of information, called pages, are moved from RAM into virtual memory on disk. This allows the operating system to free up physical memory by storing less frequently accessed pages on disk, and bringing them back into RAM when they are needed. Paging helps in managing memory efficiently and allows for larger programs to run on systems with limited physical memory.

Submit
34. The Windows Server 2008 ____ is a very complex database containing all information the operating system needs about the entire server

Explanation

The correct answer is "Registry". The Windows Server 2008 Registry is a very complex database that contains all the information the operating system needs about the entire server. It stores configuration settings for hardware, software, and user preferences, allowing the system to function properly. The Registry is crucial for the smooth operation of the server as it holds vital information for various system components and applications.

Submit
35. A ____ is a grouping of network objects, such as computers, servers, and user accounts, that provides for easier management.

Explanation

A domain is a grouping of network objects, such as computers, servers, and user accounts, that provides for easier management. In a domain, all network resources and user accounts are centrally managed by a domain controller, allowing administrators to easily assign permissions, enforce security policies, and manage user accounts and resources. This simplifies the management process and provides a centralized control and administration point for the network.

Submit
36. One ____ is a license for one workstation to access the server.

Explanation

A CAL (Client Access License) is a license that allows one workstation to access the server. It is a type of license that is required in certain software or server environments to regulate the number of client devices or users that can connect to the server. CALs are typically used in Microsoft server environments and are necessary for each individual device or user that accesses the server.

Submit
37. ____ is the ability to increase the access to server resources and provide fail-safe services by linking two ormore discrete computer systems so they appear to function as though they are one.

Explanation

Clustering is the ability to increase the access to server resources and provide fail-safe services by linking two or more discrete computer systems so they appear to function as though they are one. This means that multiple servers are interconnected and work together to distribute the workload and increase the availability of resources. By doing so, clustering enhances the performance, reliability, and scalability of the system.

Submit
38. The File Services role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through ____.

Explanation

The File Services role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through DFS. DFS stands for Distributed File System, which is a Microsoft technology that allows users to access and manage files located on different servers as if they were all stored in one location. It provides a unified namespace and allows for load balancing and fault tolerance.

Submit
39. ____ enables the server administrator to manage critical configuration features from inside one tool.Server Core

Explanation

Server Manager enables the server administrator to manage critical configuration features from inside one tool. It provides a centralized interface for managing multiple servers, allowing administrators to easily monitor and control various aspects such as server roles, features, storage, networking, and security. With Server Manager, administrators can efficiently perform tasks like installing and removing server roles, configuring services, monitoring performance, and troubleshooting issues. It simplifies the management process by providing a single tool that consolidates all the necessary configuration features, making it easier for administrators to maintain and control their server infrastructure.

Submit
40. ____ is an umbrella of security protection features that monitor and manage a server and its clients.

Explanation

NAP stands for Network Access Protection, which is an umbrella of security protection features that monitor and manage a server and its clients. NAP ensures that all devices connecting to a network meet certain security requirements, such as having up-to-date antivirus software or the latest security patches. It helps to enforce network health policies and prevent the spread of malware or other security threats.

Submit
41. Windows Deployment Services operate in a(n) ____.

Explanation

Windows Deployment Services operate in a Preboot Execution Environment (PXE). PXE is a network protocol that allows a computer to boot using files stored on a network server. It enables network booting, which is essential for deploying operating systems and other software across multiple computers in a network. With PXE, administrators can remotely install and configure Windows operating systems on client computers without the need for physical media. Windows Deployment Services utilize PXE to streamline the deployment process and make it more efficient and centralized.

Submit
42. Microsoft ____ Protocol is used when the Hyper-V role is installed in Windows Server 2008.

Explanation

The correct answer is "Virtual Network Switch". When the Hyper-V role is installed in Windows Server 2008, the Microsoft Virtual Network Switch Protocol is used. This protocol allows for the creation and management of virtual switches, which are used to connect virtual machines to the physical network. The virtual network switch acts as a bridge between the virtual machines and the physical network, allowing them to communicate with other machines and access network resources.

Submit
43. ____ is used in conjunction with Active Directory to make file searching and retrieval faster.

Explanation

Indexing is used in conjunction with Active Directory to make file searching and retrieval faster. Indexing creates a catalog of file names, keywords, and other attributes, allowing for quick and efficient searching based on specific criteria. This catalog is stored separately from the actual files, reducing the time required to locate and retrieve files. By utilizing indexing, users can quickly find the files they need within the Active Directory environment.

Submit
44. ____ by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file.

Explanation

Journaling by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file. This log file acts as a safety net in case of system crashes or power failures, ensuring that any changes made to files are not lost or corrupted. It allows for quick recovery and prevents data loss by providing a reliable way to restore the file system to a consistent state.

Submit
45. ____ environment variables can be defined on a per-user basis, such as specifying the path where application files are stored

Explanation

User environment variables can be defined on a per-user basis, allowing each user to customize their own environment settings. These variables can include information such as the path where application files are stored, allowing users to easily access their files and applications. This ensures that each user has their own personalized environment, tailored to their specific needs and preferences.

Submit
46. ____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers.

Explanation

Windows Server Core is a minimum server configuration that is designed to function similarly to traditional UNIX and Linux servers. It provides a lightweight and stripped-down version of the Windows Server operating system, without the graphical user interface (GUI). This allows for reduced resource usage and a smaller attack surface, making it more secure and efficient. Windows Server Core is managed through the command line interface, making it ideal for headless server deployments and automation.

Submit
47. A(n) ____ is a set of unique identification information that is typically put at the end of a file, or that is associated with a computer communication.

Explanation

A digital certificate is a set of unique identification information that is typically put at the end of a file or associated with a computer communication. It serves as a form of identification and verification, ensuring the authenticity and integrity of the file or communication. Digital certificates are commonly used in secure communication protocols such as HTTPS, where they verify the identity of websites and encrypt data transmission. They are also used in email encryption and digital signatures to provide security and trust in electronic communication.

Submit
48. In addition to the Server Manager GUI tool, you can also use the ____ command-line tool for managing server roles.

Explanation

ServerManagerCmd.exe is the correct answer because it is a command-line tool that can be used for managing server roles, in addition to the Server Manager GUI tool. This tool allows administrators to perform various tasks and configurations on a server without relying on a graphical interface, providing flexibility and efficiency in managing server roles.

Submit
49. ____ environment variables are defined by the operating system and apply to any user logged onto the computer.

Explanation

System environment variables are defined by the operating system and apply to any user logged onto the computer. These variables are accessible system-wide and can be used by all users and processes running on the computer. They provide important information and configuration settings for the operating system and various software applications.

Submit
50. When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the ____ transfer mode by default.

Explanation

When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the DMA (Direct Memory Access) transfer mode by default. DMA is a method of data transfer between the computer's memory and the storage device without involving the CPU. It allows for faster and more efficient data transfer compared to PIO (Programmed Input/Output) mode, which relies on the CPU for data transfer. SCSI (Small Computer System Interface) is a different type of interface used for connecting storage devices, and SWT (Software Transactional Memory) is a programming concept unrelated to drive transfer modes.

Submit
51. A Registry ____ is a data parameter associated with a software or hardware characteristic under a key (or subkey).

Explanation

An "entry" in a registry is a specific data parameter that is associated with a software or hardware characteristic under a key (or subkey). It represents a specific value or information stored within the registry, allowing the software or hardware to access and utilize that data when needed.

Submit
52. ____ is used to manage security tokens and security services on a Windows Server 2008 Web-based network.

Explanation

Active Directory Federation Services (ADFS) is used to manage security tokens and security services on a Windows Server 2008 Web-based network. ADFS enables single sign-on (SSO) across different applications and platforms by securely sharing user authentication and authorization information between trusted entities. It allows users to access multiple applications and services using a single set of credentials, reducing the need for multiple logins. ADFS also provides a secure way to federate identities with external organizations, allowing users from different domains or forests to access resources in a trusted manner.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 30, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 30, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 13, 2011
    Quiz Created by
    Angel38101
Cancel
  • All
    All (52)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
______________________________ is a set of standards designed to...
Windows Server 2008 supports UNIX and Linux clients using the _______
The ______________________________ is the full cost of owning a...
NTFS supports large disk volumes of up to 16 GB.
Device drivers that are unsigned can also be loaded in x64 versions of...
Memory activities performed through virtual memory are as fast as...
When a driver is verified, a unique digital signature is incorporated...
A computer contains an unlimited number of IRQ lines.
Exceeding the minimum requirements makes your server more scalable and...
____ means that a processor can be added to an empty processor slot...
Before any final decisions are made in selecting hardware, you should...
A Registry ____ is a category or division of information within the...
Windows Web Server 2008 can be used to manage directory resources via...
ServerManagerCmd.exe is executed from the command line through the...
A server's ____________________ include the interrupt request (IRQ)...
When programs are running on the server,...
If you are upgrading a computer that has been used for a different...
____ means that when software in Windows Server 2008 runs into a...
Windows Server 2008 ____ version is designed to have a small footprint...
NTFS has been supported in Windows Server systems from when ____ was...
Windows Server 2008 comes with Microsoft ____ to transform the server...
The ____ role is central to implementing Active Directory and creating...
____ is a Windows Server 2008 tool that verifies system and critical...
On a typical x86 computer, data is paged in blocks of ____ KB.
Windows PowerShell offers over 130 command-line tools, also called____
The operating system kernel runs in ____ mode, which protects it from...
Windows ____ is a command-line interface that offers a shell.
____ enables folders shared from multiple computers to appear as...
____ allows you to configure how processor resources are allocated to...
The ____ role is used to enable client computers to run services and...
The ____ command enables you to view and configure network interfaces
____ provides a graphical view of all hardware currently installed on...
Virtual memory works through a technique called ____, whereby blocks...
The Windows Server 2008 ____ is a very complex database containing all...
A ____ is a grouping of network objects, such as computers, servers,...
One ____ is a license for one workstation to access the server.
____ is the ability to increase the access to server resources and...
The File Services role focuses on sharing files from the server or...
____ enables the server administrator to manage critical configuration...
____ is an umbrella of security protection features that monitor and...
Windows Deployment Services operate in a(n) ____.
Microsoft ____ Protocol is used when the Hyper-V role is installed in...
____ is used in conjunction with Active Directory to make file...
____ by a file system means that it tracks changes to files and keeps...
____ environment variables can be defined on a per-user basis, such as...
____ is a minimum server configuration, designed to function in a...
A(n) ____ is a set of unique identification information that is...
In addition to the Server Manager GUI tool, you can also use the ____...
____ environment variables are defined by the operating system and...
When you install Windows Server 2008, it configures IDE/ATA/SATA...
A Registry ____ is a data parameter associated with a software or...
____ is used to manage security tokens and security services on a...
Alert!

Advertisement