Itnw 1354 Implementing And Supporting Servers (Purple)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Angel38101
A
Angel38101
Community Contributor
Quizzes Created: 1 | Total Attempts: 96
Questions: 52 | Attempts: 96

SettingsSettingsSettings
Itnw 1354 Implementing And Supporting Servers (Purple) - Quiz


Questions and Answers
  • 1. 

    Windows Web Server 2008 can be used to manage directory resources via hosting Active Directory.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Windows Web Server 2008 is not designed to manage directory resources or host Active Directory. Instead, it is specifically designed as a web server platform, providing the necessary tools and features for hosting websites and web applications. Active Directory is a separate service provided by Windows Server operating systems, such as Windows Server 2008 Standard or Enterprise editions, which are designed for managing directory resources and hosting Active Directory. Therefore, the given statement is false.

    Rate this question:

  • 2. 

    Exceeding the minimum requirements makes your server more scalable and able to meet increased requirements as the organization grows.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Exceeding the minimum requirements for a server means that it is built with additional resources and capabilities. This allows the server to handle higher workloads and accommodate increased demands as the organization grows. By having a more scalable server, the organization can easily adapt to changing needs without the need for frequent upgrades or replacements. Therefore, the statement "Exceeding the minimum requirements makes your server more scalable and able to meet increased requirements as the organization grows" is true.

    Rate this question:

  • 3. 

    NTFS supports large disk volumes of up to 16 GB.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is incorrect. NTFS (New Technology File System) supports large disk volumes of up to 16 terabytes (TB), not 16 gigabytes (GB).

    Rate this question:

  • 4. 

    ServerManagerCmd.exe is executed from the command line through the Command Prompt window.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    ServerManagerCmd.exe is a command-line tool used to manage server roles and features on Windows Server operating systems. It is executed from the command line through the Command Prompt window, where users can type commands to interact with the tool. Therefore, the statement "ServerManagerCmd.exe is executed from the command line through the Command Prompt window" is true.

    Rate this question:

  • 5. 

    A computer contains an unlimited number of IRQ lines.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A computer does not contain an unlimited number of IRQ (Interrupt Request) lines. IRQ lines are limited resources that are used to manage and prioritize hardware interrupts in a computer system. The number of IRQ lines available varies depending on the specific computer architecture and hardware configuration. Therefore, the statement that a computer contains an unlimited number of IRQ lines is false.

    Rate this question:

  • 6. 

    Device drivers that are unsigned can also be loaded in x64 versions of Windows Server 2008.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Unsigned device drivers cannot be loaded in x64 versions of Windows Server 2008. This is because x64 versions of Windows Server 2008 only allow the loading of digitally signed device drivers. Unsigned drivers pose a security risk as they have not been verified by Microsoft, and therefore the operating system does not allow their installation or loading.

    Rate this question:

  • 7. 

    Memory activities performed through virtual memory are as fast as those performed in RAM.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because memory activities performed through virtual memory are not as fast as those performed in RAM. Virtual memory is a technique used by operating systems to extend the available memory by using a portion of the hard disk as additional memory. Accessing data from virtual memory involves transferring data between RAM and the hard disk, which is slower compared to accessing data directly from RAM. Therefore, memory activities performed in virtual memory are slower than those performed in RAM.

    Rate this question:

  • 8. 

    ____ is the ability to increase the access to server resources and provide fail-safe services by linking two ormore discrete computer systems so they appear to function as though they are one.

    • A.

      Clustering

    • B.

      Peer-to-peer networking

    • C.

      Virtualization

    • D.

      SMP

    Correct Answer
    A. Clustering
    Explanation
    Clustering is the ability to increase the access to server resources and provide fail-safe services by linking two or more discrete computer systems so they appear to function as though they are one. This means that multiple servers are interconnected and work together to distribute the workload and increase the availability of resources. By doing so, clustering enhances the performance, reliability, and scalability of the system.

    Rate this question:

  • 9. 

    ____ means that a processor can be added to an empty processor slot while the system is running.

    • A.

      SMP

    • B.

      Hot-add memory

    • C.

      Hot-replace processor

    • D.

      Hot-add processor

    Correct Answer
    D. Hot-add processor
    Explanation
    Hot-add processor means that a processor can be added to an empty processor slot while the system is running. This feature allows for easy expansion and scalability of the system without the need for a system shutdown or restart. It is a convenient and efficient way to increase processing power in real-time, making it a valuable feature for high-performance computing environments.

    Rate this question:

  • 10. 

    A ____ is a grouping of network objects, such as computers, servers, and user accounts, that provides for easier management.

    • A.

      TCO

    • B.

      Client

    • C.

      Domain

    • D.

      Workstation

    Correct Answer
    C. Domain
    Explanation
    A domain is a grouping of network objects, such as computers, servers, and user accounts, that provides for easier management. In a domain, all network resources and user accounts are centrally managed by a domain controller, allowing administrators to easily assign permissions, enforce security policies, and manage user accounts and resources. This simplifies the management process and provides a centralized control and administration point for the network.

    Rate this question:

  • 11. 

    ____ enables the server administrator to manage critical configuration features from inside one tool.Server Core

    • A.

      Server Core

    • B.

      PowerShell

    • C.

      SMP

    • D.

      Server Manager

    Correct Answer
    D. Server Manager
    Explanation
    Server Manager enables the server administrator to manage critical configuration features from inside one tool. It provides a centralized interface for managing multiple servers, allowing administrators to easily monitor and control various aspects such as server roles, features, storage, networking, and security. With Server Manager, administrators can efficiently perform tasks like installing and removing server roles, configuring services, monitoring performance, and troubleshooting issues. It simplifies the management process by providing a single tool that consolidates all the necessary configuration features, making it easier for administrators to maintain and control their server infrastructure.

    Rate this question:

  • 12. 

    ____ is an umbrella of security protection features that monitor and manage a server and its clients.

    • A.

      SMP

    • B.

      PAP

    • C.

      NAP

    • D.

      TCO

    Correct Answer
    C. NAP
    Explanation
    NAP stands for Network Access Protection, which is an umbrella of security protection features that monitor and manage a server and its clients. NAP ensures that all devices connecting to a network meet certain security requirements, such as having up-to-date antivirus software or the latest security patches. It helps to enforce network health policies and prevent the spread of malware or other security threats.

    Rate this question:

  • 13. 

    Windows Server 2008 comes with Microsoft ____ to transform the server into a versatile Web server.

    • A.

      TCO

    • B.

      IIS

    • C.

      SMP

    • D.

      DNS

    Correct Answer
    B. IIS
    Explanation
    Windows Server 2008 comes with Microsoft IIS (Internet Information Services) to transform the server into a versatile Web server. IIS is a web server software that provides a platform for hosting websites, applications, and services on the internet or intranet. It offers features such as website management, security, performance optimization, and support for various web technologies like ASP.NET, PHP, and HTML. By using IIS, organizations can easily deploy and manage web applications, making Windows Server 2008 a suitable choice for hosting websites and web services.

    Rate this question:

  • 14. 

    ____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers.

    • A.

      Windows Server Core

    • B.

      PowerShell

    • C.

      IIS

    • D.

      Server Manager

    Correct Answer
    A. Windows Server Core
    Explanation
    Windows Server Core is a minimum server configuration that is designed to function similarly to traditional UNIX and Linux servers. It provides a lightweight and stripped-down version of the Windows Server operating system, without the graphical user interface (GUI). This allows for reduced resource usage and a smaller attack surface, making it more secure and efficient. Windows Server Core is managed through the command line interface, making it ideal for headless server deployments and automation.

    Rate this question:

  • 15. 

    Windows ____ is a command-line interface that offers a shell.

    • A.

      IIS

    • B.

      Server Core

    • C.

      PowerShell

    • D.

      Server Manager

    Correct Answer
    C. PowerShell
    Explanation
    PowerShell is the correct answer because it is a command-line interface that provides a shell in Windows. It is a powerful scripting language and automation framework that allows users to manage and control the Windows operating system and other Microsoft applications. PowerShell offers a wide range of commands and features that enable system administrators to perform various tasks efficiently and effectively. It is widely used in Windows environments for its flexibility and extensive capabilities.

    Rate this question:

  • 16. 

    Windows PowerShell offers over 130 command-line tools, also called____

    • A.

      Shells

    • B.

      Cmdshlls

    • C.

      Cmditems

    • D.

      Cmdlets

    Correct Answer
    D. Cmdlets
    Explanation
    Windows PowerShell offers over 130 command-line tools, also called cmdlets. Cmdlets are specialized .NET classes that are designed to perform a specific task. They are the building blocks of PowerShell commands and provide a way to automate administrative tasks, manage system components, and perform various operations on Windows systems. Cmdlets are easy to use and provide a consistent and efficient way to interact with the underlying operating system and applications.

    Rate this question:

  • 17. 

    The operating system kernel runs in ____ mode, which protects it from problems created by a malfunctioning program or process.

    • A.

      Optimized

    • B.

      Monitored

    • C.

      Process

    • D.

      Privileged

    Correct Answer
    D. Privileged
    Explanation
    The operating system kernel runs in privileged mode, which protects it from problems created by a malfunctioning program or process. Privileged mode gives the kernel higher privileges and control over the system resources, allowing it to perform critical tasks and manage the execution of programs. By running in privileged mode, the kernel can isolate and contain any issues that may arise from a malfunctioning program or process, preventing them from affecting the stability and functionality of the entire system.

    Rate this question:

  • 18. 

    Before any final decisions are made in selecting hardware, you should check the hardware for the ____ sticker or consult the Windows Server Catalog of Tested Products.

    • A.

      Certified for Windows Server 2008

    • B.

      Windows-ready

    • C.

      Windows Server

    • D.

      Windows-friendly

    Correct Answer
    A. Certified for Windows Server 2008
    Explanation
    Before any final decisions are made in selecting hardware, you should check the hardware for the "Certified for Windows Server 2008" sticker or consult the Windows Server Catalog of Tested Products. This ensures that the hardware has been tested and certified to be compatible and reliable with Windows Server 2008.

    Rate this question:

  • 19. 

    If you are upgrading a computer that has been used for a different operating system, such as one currently running Windows Server 2003, that computer might already be in the Catalog of Tested Products, but it might still be necessary to upgrade the ____.

    • A.

      Processor

    • B.

      Motherboard

    • C.

      CPU

    • D.

      BIOS

    Correct Answer
    D. BIOS
    Explanation
    When upgrading a computer that has been used for a different operating system, such as Windows Server 2003, it is possible that the computer is already listed in the Catalog of Tested Products. However, it may still be necessary to upgrade the BIOS. The BIOS (Basic Input/Output System) is firmware that is responsible for initializing the hardware components of the computer and starting the operating system. Upgrading the BIOS ensures compatibility with the new operating system and can improve system performance and stability.

    Rate this question:

  • 20. 

    NTFS has been supported in Windows Server systems from when ____ was introduced in the early 1990s to Windows 2000 Server and Windows Server 2003.

    • A.

      Windows 3.1

    • B.

      Windows 95

    • C.

      Windows 3.11

    • D.

      Windows NT Server

    Correct Answer
    D. Windows NT Server
    Explanation
    NTFS has been supported in Windows Server systems from when Windows NT Server was introduced in the early 1990s to Windows 2000 Server and Windows Server 2003.

    Rate this question:

  • 21. 

    ____ is used in conjunction with Active Directory to make file searching and retrieval faster.

    • A.

      Journaling

    • B.

      Indexing

    • C.

      Disk quota

    • D.

      Encryption

    Correct Answer
    B. Indexing
    Explanation
    Indexing is used in conjunction with Active Directory to make file searching and retrieval faster. Indexing creates a catalog of file names, keywords, and other attributes, allowing for quick and efficient searching based on specific criteria. This catalog is stored separately from the actual files, reducing the time required to locate and retrieve files. By utilizing indexing, users can quickly find the files they need within the Active Directory environment.

    Rate this question:

  • 22. 

    ____ by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file.

    • A.

      Journaling

    • B.

      Compression

    • C.

      POSIX

    • D.

      Indexing

    Correct Answer
    A. Journaling
    Explanation
    Journaling by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file. This log file acts as a safety net in case of system crashes or power failures, ensuring that any changes made to files are not lost or corrupted. It allows for quick recovery and prevents data loss by providing a reliable way to restore the file system to a consistent state.

    Rate this question:

  • 23. 

    ____ means that when software in Windows Server 2008 runs into a damaged disk area, NTFS can heal the area without having to take down the server.

    • A.

      Hard Link

    • B.

      Journaling

    • C.

      Self-healing

    • D.

      Indexing

    Correct Answer
    C. Self-healing
    Explanation
    Self-healing means that when software in Windows Server 2008 runs into a damaged disk area, NTFS can automatically repair or fix the area without requiring the server to be taken down. This feature ensures that the server remains operational and minimizes downtime caused by disk errors.

    Rate this question:

  • 24. 

    One ____ is a license for one workstation to access the server.

    • A.

      CAL

    • B.

      DAL

    • C.

      WAL

    • D.

      SAL

    Correct Answer
    A. CAL
    Explanation
    A CAL (Client Access License) is a license that allows one workstation to access the server. It is a type of license that is required in certain software or server environments to regulate the number of client devices or users that can connect to the server. CALs are typically used in Microsoft server environments and are necessary for each individual device or user that accesses the server.

    Rate this question:

  • 25. 

    Windows Server 2008 ____ version is designed to have a small footprint on a network, making it less vulnerable to Internet attackers.

    • A.

      Itanium

    • B.

      Datacenter

    • C.

      Server Core

    • D.

      Hyper-V

    Correct Answer
    C. Server Core
    Explanation
    Server Core is the correct answer because it is a stripped-down version of Windows Server 2008 that is designed to have a small footprint on a network. By removing unnecessary components and features, Server Core reduces the attack surface and minimizes the potential vulnerabilities that can be exploited by Internet attackers. This lightweight version of Windows Server is ideal for running specific server roles, such as domain controllers or file servers, while providing improved security and stability.

    Rate this question:

  • 26. 

    A(n) ____ is a set of unique identification information that is typically put at the end of a file, or that is associated with a computer communication.

    • A.

      Digital certificate

    • B.

      Security role

    • C.

      Active Directory credential

    • D.

      Public-key pair

    Correct Answer
    A. Digital certificate
    Explanation
    A digital certificate is a set of unique identification information that is typically put at the end of a file or associated with a computer communication. It serves as a form of identification and verification, ensuring the authenticity and integrity of the file or communication. Digital certificates are commonly used in secure communication protocols such as HTTPS, where they verify the identity of websites and encrypt data transmission. They are also used in email encryption and digital signatures to provide security and trust in electronic communication.

    Rate this question:

  • 27. 

    The ____ role is central to implementing Active Directory and creating one or more domains.

    • A.

      Active Directory Certificate Services

    • B.

      Active Directory Federation Services

    • C.

      Active Directory Lightweight Directory Services

    • D.

      Active Directory Domain Services

    Correct Answer
    D. Active Directory Domain Services
    Explanation
    The correct answer is Active Directory Domain Services. This role is central to implementing Active Directory and creating one or more domains. Active Directory Domain Services is responsible for managing and organizing a network's resources, such as users, computers, and groups, and providing a centralized authentication and authorization mechanism. It allows for the creation and management of domains, which are logical groupings of resources within a network.

    Rate this question:

  • 28. 

    ____ is used to manage security tokens and security services on a Windows Server 2008 Web-based network.

    • A.

      Active Directory Lightweight Directory Services

    • B.

      Active Directory Certificate Services

    • C.

      Active Directory Federation Services

    • D.

      Active Directory Domain Services

    Correct Answer
    C. Active Directory Federation Services
    Explanation
    Active Directory Federation Services (ADFS) is used to manage security tokens and security services on a Windows Server 2008 Web-based network. ADFS enables single sign-on (SSO) across different applications and platforms by securely sharing user authentication and authorization information between trusted entities. It allows users to access multiple applications and services using a single set of credentials, reducing the need for multiple logins. ADFS also provides a secure way to federate identities with external organizations, allowing users from different domains or forests to access resources in a trusted manner.

    Rate this question:

  • 29. 

    ____ enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers

    • A.

      COM

    • B.

      DNS

    • C.

      DFS

    • D.

      DDL

    Correct Answer
    C. DFS
    Explanation
    DFS (Distributed File System) enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers. This allows users to access and manage files and folders from different locations as if they were all stored in one place. DFS provides a unified view of the distributed file system and simplifies file sharing and organization across multiple machines.

    Rate this question:

  • 30. 

    The ____ role is used to enable client computers to run services and software applications on the server instead of on the client.

    • A.

      Print Services

    • B.

      Terminal Services

    • C.

      Application Server

    • D.

      UDDI Services

    Correct Answer
    B. Terminal Services
    Explanation
    Terminal Services is the correct answer because it allows client computers to run services and software applications on the server instead of on the client. This enables centralized management and control of applications, reduces the load on client machines, and allows for remote access to applications from any device with an internet connection.

    Rate this question:

  • 31. 

    Windows Deployment Services operate in a(n) ____.

    • A.

      Preboot Execution Environment (PXE)

    • B.

      Remote Installation Services (RIS)

    • C.

      Active Directory (AD)

    • D.

      DHCP server

    Correct Answer
    A. Preboot Execution Environment (PXE)
    Explanation
    Windows Deployment Services operate in a Preboot Execution Environment (PXE). PXE is a network protocol that allows a computer to boot using files stored on a network server. It enables network booting, which is essential for deploying operating systems and other software across multiple computers in a network. With PXE, administrators can remotely install and configure Windows operating systems on client computers without the need for physical media. Windows Deployment Services utilize PXE to streamline the deployment process and make it more efficient and centralized.

    Rate this question:

  • 32. 

    The ____ command enables you to view and configure network interfaces

    • A.

      Interface

    • B.

      Netsh

    • C.

      Start

    • D.

      Slmgr

    Correct Answer
    B. Netsh
    Explanation
    The netsh command is used to view and configure network interfaces. It allows users to manage various network settings such as IP addresses, DNS servers, and network protocols. By using the netsh command, users can easily modify network configurations and troubleshoot network connectivity issues.

    Rate this question:

  • 33. 

    The File Services role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through ____.

    • A.

      NFS

    • B.

      NTFS

    • C.

      AFS

    • D.

      DFS

    Correct Answer
    D. DFS
    Explanation
    The File Services role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through DFS. DFS stands for Distributed File System, which is a Microsoft technology that allows users to access and manage files located on different servers as if they were all stored in one location. It provides a unified namespace and allows for load balancing and fault tolerance.

    Rate this question:

  • 34. 

    In addition to the Server Manager GUI tool, you can also use the ____ command-line tool for managing server roles.

    • A.

      ServerManagerCmd.exe

    • B.

      SvrMngCmd.exe

    • C.

      ManagerCmd.exe

    • D.

      ServerMngCmd.exe

    Correct Answer
    A. ServerManagerCmd.exe
    Explanation
    ServerManagerCmd.exe is the correct answer because it is a command-line tool that can be used for managing server roles, in addition to the Server Manager GUI tool. This tool allows administrators to perform various tasks and configurations on a server without relying on a graphical interface, providing flexibility and efficiency in managing server roles.

    Rate this question:

  • 35. 

    ____ provides a graphical view of all hardware currently installed on your computer.

    • A.

      ServerManagerCmd.exe

    • B.

      Device Manager

    • C.

      SWC

    • D.

      SMP

    Correct Answer
    B. Device Manager
    Explanation
    Device Manager is a Windows tool that provides a graphical view of all hardware currently installed on a computer. It allows users to view and manage devices, update drivers, disable or enable devices, and troubleshoot hardware issues. By accessing the Device Manager, users can easily identify and monitor the hardware components of their computer system.

    Rate this question:

  • 36. 

    ____ is a Windows Server 2008 tool that verifies system and critical files to determine if they have a signature.

    • A.

      Verif

    • B.

      Signature

    • C.

      Sigverif

    • D.

      SigMngCmd.exe

    Correct Answer
    C. Sigverif
    Explanation
    Sigverif is a Windows Server 2008 tool that verifies system and critical files to determine if they have a signature. This tool is used to check the integrity and authenticity of files by comparing their digital signatures with the ones stored in a trusted database. By verifying the signatures of files, Sigverif helps to ensure that the system is protected against tampering or unauthorized modifications.

    Rate this question:

  • 37. 

    ____ allows you to configure how processor resources are allocated to programs.

    • A.

      Processor scheduling

    • B.

      SWC

    • C.

      Signature

    • D.

      SigMngCmd.exe

    Correct Answer
    A. Processor scheduling
    Explanation
    Processor scheduling allows you to configure how processor resources are allocated to programs. It determines the order and priority in which programs are executed, ensuring that each program gets its fair share of processing time. By adjusting the scheduling settings, you can prioritize certain programs or processes, optimize resource allocation, and improve overall system performance. This feature is particularly important in multitasking operating systems, where multiple programs are running simultaneously and competing for processor resources.

    Rate this question:

  • 38. 

    Virtual memory works through a technique called ____, whereby blocks of information, called pages, are moved from RAM into virtual memory on disk.

    • A.

      Memoring

    • B.

      Segmenting

    • C.

      Blocking

    • D.

      Paging

    Correct Answer
    D. Paging
    Explanation
    Virtual memory works through a technique called paging, whereby blocks of information, called pages, are moved from RAM into virtual memory on disk. This allows the operating system to free up physical memory by storing less frequently accessed pages on disk, and bringing them back into RAM when they are needed. Paging helps in managing memory efficiently and allows for larger programs to run on systems with limited physical memory.

    Rate this question:

  • 39. 

    On a typical x86 computer, data is paged in blocks of ____ KB.

    • A.

      2

    • B.

      4

    • C.

      3

    • D.

      5

    Correct Answer
    B. 4
    Explanation
    On a typical x86 computer, data is paged in blocks of 4 KB. This means that the computer's memory management system divides the memory into fixed-size blocks called pages, and each page is 4 KB in size. This paging system allows for efficient memory management and allocation, as well as facilitating virtual memory and the use of page tables.

    Rate this question:

  • 40. 

    When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the ____ transfer mode by default.

    • A.

      PIO

    • B.

      DMA

    • C.

      SCSI

    • D.

      SWT

    Correct Answer
    B. DMA
    Explanation
    When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the DMA (Direct Memory Access) transfer mode by default. DMA is a method of data transfer between the computer's memory and the storage device without involving the CPU. It allows for faster and more efficient data transfer compared to PIO (Programmed Input/Output) mode, which relies on the CPU for data transfer. SCSI (Small Computer System Interface) is a different type of interface used for connecting storage devices, and SWT (Software Transactional Memory) is a programming concept unrelated to drive transfer modes.

    Rate this question:

  • 41. 

    ____ environment variables are defined by the operating system and apply to any user logged onto the computer.

    • A.

      Computer

    • B.

      Session

    • C.

      System

    • D.

      User

    Correct Answer
    C. System
    Explanation
    System environment variables are defined by the operating system and apply to any user logged onto the computer. These variables are accessible system-wide and can be used by all users and processes running on the computer. They provide important information and configuration settings for the operating system and various software applications.

    Rate this question:

  • 42. 

    ____ environment variables can be defined on a per-user basis, such as specifying the path where application files are stored

    • A.

      Computer

    • B.

      Session

    • C.

      User

    • D.

      System

    Correct Answer
    C. User
    Explanation
    User environment variables can be defined on a per-user basis, allowing each user to customize their own environment settings. These variables can include information such as the path where application files are stored, allowing users to easily access their files and applications. This ensures that each user has their own personalized environment, tailored to their specific needs and preferences.

    Rate this question:

  • 43. 

    Microsoft ____ Protocol is used when the Hyper-V role is installed in Windows Server 2008.

    • A.

      Virtual Network Switch

    • B.

      Hyper-V

    • C.

      Hyper-V Network

    • D.

      Hyper-V Switch

    Correct Answer
    A. Virtual Network Switch
    Explanation
    The correct answer is "Virtual Network Switch". When the Hyper-V role is installed in Windows Server 2008, the Microsoft Virtual Network Switch Protocol is used. This protocol allows for the creation and management of virtual switches, which are used to connect virtual machines to the physical network. The virtual network switch acts as a bridge between the virtual machines and the physical network, allowing them to communicate with other machines and access network resources.

    Rate this question:

  • 44. 

    The Windows Server 2008 ____ is a very complex database containing all information the operating system needs about the entire server

    • A.

      SWC

    • B.

      Active Directory

    • C.

      Registry

    • D.

      Control Panel

    Correct Answer
    C. Registry
    Explanation
    The correct answer is "Registry". The Windows Server 2008 Registry is a very complex database that contains all the information the operating system needs about the entire server. It stores configuration settings for hardware, software, and user preferences, allowing the system to function properly. The Registry is crucial for the smooth operation of the server as it holds vital information for various system components and applications.

    Rate this question:

  • 45. 

    A Registry ____ is a category or division of information within the Registry.

    • A.

      Key

    • B.

      Entry

    • C.

      Value

    • D.

      Subkey

    Correct Answer
    A. Key
    Explanation
    In a Registry, a key is a category or division of information. It acts as a container that holds various subkeys and values. Keys are used to organize and manage data within the Registry, allowing users to easily locate and modify specific information.

    Rate this question:

  • 46. 

    A Registry ____ is a data parameter associated with a software or hardware characteristic under a key (or subkey).

    • A.

      Subkey

    • B.

      Key

    • C.

      Entry

    • D.

      Value

    Correct Answer
    C. Entry
    Explanation
    An "entry" in a registry is a specific data parameter that is associated with a software or hardware characteristic under a key (or subkey). It represents a specific value or information stored within the registry, allowing the software or hardware to access and utilize that data when needed.

    Rate this question:

  • 47. 

    The ______________________________ is the full cost of owning a network, including hardware, software, training, maintenance, and user support costs.

    Correct Answer
    TCO
    Explanation
    The TCO, or Total Cost of Ownership, is the complete expense associated with owning and operating a network. It encompasses all costs involved in maintaining the network, such as purchasing hardware and software, providing training to users, conducting maintenance activities, and offering support to users. The TCO provides a comprehensive view of the financial investment required to sustain a network infrastructure.

    Rate this question:

  • 48. 

    Windows Server 2008 supports UNIX and Linux clients using the _______

    Correct Answer
    SUA
    Explanation
    Windows Server 2008 supports UNIX and Linux clients using the SUA (Subsystem for UNIX-based Applications). SUA is a compatibility layer that allows UNIX and Linux applications to run on Windows Server 2008. It provides a set of tools, utilities, and APIs that enable cross-platform integration and interoperability between Windows and UNIX/Linux systems. With SUA, administrators can manage and administer UNIX and Linux clients from a Windows Server environment, making it easier to integrate and manage heterogeneous IT environments.

    Rate this question:

  • 49. 

    ______________________________ is a set of standards designed to enable portability of applications from one computer system to another and has been used particularly for UNIX and Linux systems.

    Correct Answer
    POSIX
    Explanation
    POSIX (Portable Operating System Interface) is a set of standards that allows applications to be easily transferred from one computer system to another. It has been widely used for UNIX and Linux systems, ensuring compatibility and portability across different platforms. By adhering to POSIX standards, developers can write code that will work on various operating systems, reducing the need for rewriting or modifying applications for different environments.

    Rate this question:

  • 50. 

    A server’s ____________________ include the interrupt request (IRQ) line (which is a channel for communication with the CPU) and other elements such as the I/O address and reserved memory range

    Correct Answer
    resources
    Explanation
    The server's resources refer to the various components and elements that it utilizes for communication and operation. These resources include the interrupt request (IRQ) line, which serves as a channel for communication with the CPU. Additionally, the server's resources encompass other elements such as the I/O address and reserved memory range. These resources are essential for the server to function properly and efficiently.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 30, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 13, 2011
    Quiz Created by
    Angel38101
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.