2.
Which permissions do administrators typically use to assign storage space as well as modify permissions on a Windows Server 2008 file server?
Explanation
Administrators typically use NTFS permissions to assign storage space and modify permissions on a Windows Server 2008 file server. NTFS (New Technology File System) provides more advanced and granular control over file and folder permissions compared to FAT (File Allocation Table). NTFS allows administrators to set permissions for individual users or groups, restrict access to specific files or folders, and define different levels of access such as read, write, or execute. DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System) are network services and not directly related to storage space or permissions on a file server.
3.
To whom should you always assign security permissions?
Explanation
Assigning security permissions to groups is preferred over assigning them to individuals because it allows for easier management and scalability. By assigning permissions to groups, you can easily add or remove users from the group, and the permissions will automatically apply to all members of the group. This simplifies the process of granting or revoking access rights and ensures consistency across multiple users. Additionally, using groups allows for better organization and categorization of users based on their roles or responsibilities.
4.
Which console can be used to create multiple shares and exercise more granular control over their properties?
Correct Answer
A. Share and Storage Management
Explanation
Share and Storage Management is the correct answer because it is a console that allows users to create multiple shares and have more control over their properties. This console provides a centralized location for managing shared resources on a network, allowing administrators to easily create, modify, and delete shares, as well as set permissions, quotas, and other properties for each share. It offers a more granular level of control over shares compared to other consoles like Computer Management or System Management, making it the appropriate choice for this scenario.
5.
The most common use of a file screen is to __________.
Correct Answer
A. prevent users from storing unauthorized file types on the server
Explanation
A file screen is commonly used to prevent users from storing unauthorized file types on the server. By setting up file screens, administrators can restrict the types of files that can be stored on the server, ensuring that only authorized file types are allowed. This helps to maintain security and prevent the storage of potentially harmful or malicious files on the server.
6.
A replication group can have up to __________ members.
Explanation
A replication group can have up to 256 members. This means that a replication group can consist of a maximum of 256 nodes or servers. Having more members in a replication group allows for increased redundancy and fault tolerance, as data can be replicated across multiple nodes. It also enables better performance and scalability, as the workload can be distributed among the members of the group. However, it is important to note that having too many members in a replication group can also lead to increased complexity and management overhead.
7.
Each server can be a member of up to __________ replication groups.
Explanation
Each server can be a member of up to 256 replication groups. This means that a server can participate in the replication of data across a maximum of 256 different groups, allowing for efficient distribution and redundancy of data. This limit ensures that the server's resources are not overwhelmed by participating in an excessive number of replication groups, while still providing ample flexibility for data replication needs.
8.
A collection of settings in a quota template defines all of the following except __________.
Correct Answer
A. The user credentials under which FSRM operates
Explanation
The correct answer is the user credentials under which FSRM operates. A quota template in FSRM (File Server Resource Manager) is used to define settings related to quotas and file screening. It includes defining actions to be taken when a user reaches a threshold, setting thresholds for the quota, and determining whether the quota should be hard or soft. However, the user credentials under which FSRM operates are not defined in the quota template.
9.
To send email messages, what service does a Windows Server 2008 computer need to be running?
Correct Answer
A. Simple Mail Transfer Protocol
Explanation
To send email messages, a Windows Server 2008 computer needs to be running the Simple Mail Transfer Protocol (SMTP). SMTP is a standard communication protocol used for transmitting email between servers and is responsible for the reliable and efficient delivery of email messages. It allows the server to send outgoing emails to other servers and handles the routing of messages to their intended recipients.
10.
Which of the following statements is not true regarding FSRM quotas?
Correct Answer
A. They can be configured to create event log entries only.
Explanation
FSRM quotas can be configured to execute commands, generate reports, and send email notifications. However, they cannot be configured to create event log entries only. This means that event log entries are not a feature of FSRM quotas.
11.
What hardware actually produces hard-copy documents on paper or other print media?
Correct Answer
A. Print device
Explanation
A print device is the hardware that produces hard-copy documents on paper or other print media. It can refer to various types of printers such as inkjet printers, laser printers, or even 3D printers. These devices receive digital files or commands from a computer or network and use various mechanisms to transfer ink or toner onto the print media, resulting in the creation of physical documents.
12.
A computer communicates with a print device through which software interface?
Correct Answer
A. Printer
Explanation
A computer communicates with a print device through a software interface called a printer. This interface allows the computer to send print jobs to the printer and control various printing settings. The printer software interface acts as a bridge between the computer and the physical printer, ensuring that the print jobs are properly processed and executed.
13.
What converts the print jobs generated by applications into an appropriate string of commands for a specific print device?
Correct Answer
A. Printer driver
Explanation
A printer driver is a software program that converts the print jobs generated by applications into an appropriate string of commands for a specific print device. It acts as a bridge between the application and the print device, ensuring that the print job is translated correctly and can be understood and executed by the printer. The printer driver also provides additional functionalities such as print settings, print quality adjustments, and error handling.
14.
The simplest print architecture consists of one print device that is connected to one computer. This print device is also known as a __________.
Correct Answer
A. Locally attached print device
Explanation
A locally attached print device refers to a print device that is directly connected to a computer. In the simplest print architecture, there is only one print device connected to one computer, making it a locally attached print device. This means that the computer can send print jobs directly to the print device without the need for a network or additional devices like print servers.
15.
Which of the following is the default Windows Server 2008 printer-sharing configuration?
Correct Answer
A. Each client uses its own printer and printer driver.
Explanation
In the default Windows Server 2008 printer-sharing configuration, each client uses its own printer and printer driver. This means that each client has their own individual printer connected to the server, and they also have their own printer driver installed on their respective devices. This configuration allows for greater flexibility and customization as each client can use their preferred printer and driver settings.
16.
Which Print Services role enables UNIX clients running the LPR (line printer remote) program to send their print jobs to Windows printers?
Correct Answer
A. LPD Service
Explanation
LPD (Line Printer Daemon) Service is a Print Services role that enables UNIX clients running the LPR program to send their print jobs to Windows printers. LPD Service acts as a bridge between UNIX and Windows systems, allowing seamless printing from UNIX clients to Windows printers. This service receives print jobs from UNIX clients and forwards them to the appropriate Windows printer, ensuring compatibility and smooth printing operations.
17.
Which Print Services role installs the Print Management console for Microsoft Management Console (MMC) that enables administrators to deploy, monitor, and manage printers throughout
Correct Answer
A. Print Server
Explanation
The correct answer is Print Server. The Print Server role installs the Print Management console for MMC, which allows administrators to deploy, monitor, and manage printers throughout the network. This role enables centralized management of printers and print queues, making it easier to control and maintain the printing infrastructure.
18.
__________ is the only role service that is required when you add the Print Services role.
Correct Answer
A. Print Server
Explanation
When adding the Print Services role, the only role service that is necessary is the Print Server. The Print Server role service enables the management and sharing of printers on a network. The LPD Service is not required for adding the Print Services role, as it is used for printing from UNIX-based systems. Internet Printing is also not necessary, as it allows users to connect to printers over the internet, which may not be needed in all situations. The Spooler is a Windows service responsible for managing print jobs, but it is not a role service required for adding the Print Services role.
19.
You must also install the __________ when installing the Internet Printing role service.
Correct Answer
A. Both a & b
Explanation
When installing the Internet Printing role service, both the Web Server (IIS) role and the Windows Process Activation Service feature must be installed. The Web Server (IIS) role provides the necessary infrastructure for hosting websites and web applications, while the Windows Process Activation Service feature enables process activation and management for web applications. Therefore, both components are required for the proper functioning of the Internet Printing role service.
20.
You must add the __________ role to use a Windows Server 2008 computer as a fax server.
Correct Answer
A. Fax Server
Explanation
To use a Windows Server 2008 computer as a fax server, the "Fax Server" role must be added. This role enables the server to send and receive faxes, manage fax devices, and configure fax settings. The "Fax Service" option refers to the actual fax service that is provided by the server, while "Print Services" is a different role used for managing print servers. "Windows Fax and Scan" is a built-in application for sending and receiving faxes on Windows operating systems, but it is not related to configuring a Windows Server 2008 computer as a fax server.
21.
There is no compelling reason to use the FAT file system in Windows Server 2008.
Explanation
The FAT file system is an older file system that lacks many of the features and capabilities of more modern file systems, such as NTFS. Windows Server 2008 is designed for enterprise-level use and has built-in support for NTFS, which offers better security, reliability, and performance. Therefore, there is no compelling reason to use the FAT file system in Windows Server 2008, making the statement "True".
22.
Adding namespace servers to an existing namespace replicates only the virtual directory structure as well as target folders and files referred to by the virtual folders.
Explanation
Adding namespace servers to an existing namespace does not only replicate the virtual directory structure and target folders and files referred to by the virtual folders. It also replicates the actual data contained within those folders and files. Therefore, the correct answer is False.
23.
All versions of the Windows Server 2008 operating system can function as DFS namespace servers.
Explanation
All versions of the Windows Server 2008 operating system can function as DFS namespace servers. This means that regardless of the specific edition or version of Windows Server 2008, it is capable of hosting and managing DFS (Distributed File System) namespaces. This allows for the organization and access of shared folders and files across multiple servers in a network. Therefore, the statement is true.
24.
When implementing DFS on a Windows Server 2008 computer, you do not need to create a replication group
Explanation
When implementing DFS (Distributed File System) on a Windows Server 2008 computer, it is necessary to create a replication group. DFS allows for the replication and synchronization of files across multiple servers, providing redundancy and availability. By creating a replication group, administrators can specify which folders should be replicated and define the replication settings. This ensures that changes made to files in one server are propagated to other servers in the replication group. Therefore, the correct answer is False, as creating a replication group is required for implementing DFS on a Windows Server 2008 computer.
25.
With network-attached print devices, the primary deployment decision that the administrator must make is to decide which computer will function as the print server.
Explanation
The given statement is true. When using network-attached print devices, the administrator needs to determine which computer will act as the print server. The print server is responsible for managing print jobs and sending them to the appropriate printer. This decision is important as it affects the efficiency and accessibility of printing within the network.
26.
Except in special cases, it is usually not necessary to explicitly deny __________ permissions to users or groups.
Correct Answer
New Technology File System
NTFS
Explanation
In the context of permissions for users or groups, the New Technology File System (NTFS) is designed in such a way that it follows a principle of least privilege. This means that by default, users or groups do not have any permissions unless explicitly granted. Therefore, it is usually not necessary to explicitly deny permissions to users or groups in NTFS, as they do not have any permissions unless specifically given.
27.
For each member server, the number of replication groups multiplied by the number of replicated folders multiplied by the number of simultaneous replication connections should not exceed __________.
Correct Answer
1,024
Explanation
The maximum limit for the number of replication groups multiplied by the number of replicated folders multiplied by the number of simultaneous replication connections on each member server is 1,024. This limit ensures that the server can efficiently handle the replication process without overwhelming its resources. Going beyond this limit could lead to performance issues and potential failures in the replication process.
28.
DFS replication between two members is always __________ by default.
Correct Answer
bidirectional
Explanation
DFS replication between two members is always bidirectional by default. This means that changes made on either member will be replicated to the other member. Bidirectional replication ensures that both members have the most up-to-date data and allows for seamless synchronization between them. It is the default setting because it provides a balanced and efficient way of keeping data consistent between the two members of the replication group.
29.
__________ can warn administrators of excessive storage utilization trends or apply hard restrictions to user accounts.
Correct Answer
Quotas
Explanation
Quotas can be used to monitor and manage storage utilization in a system. By setting quotas, administrators can receive warnings when storage utilization exceeds a certain threshold, allowing them to take necessary actions. Quotas can also be used to enforce hard restrictions on user accounts, preventing them from consuming excessive storage resources. This helps in maintaining a fair and balanced allocation of storage space among users and ensures efficient utilization of storage resources.
30.
After the printer processes a print job, it stores the job in a print queue known as a(n) __________.
Correct Answer
spooler
Explanation
After the printer processes a print job, it stores the job in a print queue known as a spooler. A spooler is a software program that manages the printing process by temporarily storing print jobs in a queue. This allows multiple print jobs to be processed in the order they were received, preventing conflicts and ensuring efficient printing. The spooler then sends the print jobs to the printer when it is ready to print, freeing up the computer for other tasks.
31.
In addition to creating storage quotas, FSRM enables administrators to create file ___________ that prevent users from storing specific types of files on a server drive.
Correct Answer
screens
Explanation
FSRM (File Server Resource Manager) allows administrators to create file screens that restrict users from storing certain types of files on a server drive. These file screens act as a preventive measure to ensure that specific file types are not saved on the server. By implementing file screens, administrators can enforce storage policies and prevent users from storing files that may pose security risks or consume excessive storage space.
32.
Using quota __________ simplifies the quota management process.
Correct Answer
templates
Explanation
Using templates simplifies the quota management process because templates provide pre-defined configurations and settings that can be easily applied to multiple quotas. Instead of manually setting up each quota individually, templates allow for the efficient creation and management of quotas by applying a standardized set of rules and limits. This saves time and effort, ensures consistency, and reduces the chances of errors or inconsistencies in quota management.
33.
In an enterprise environment, it is important to monitor and regulate the amount of __________ space consumed by users so that each user receives a fair share and server resources are not overwhelmed by irresponsible user storage practices.
Correct Answer
storage
Explanation
In an enterprise environment, monitoring and regulating the amount of storage space consumed by users is crucial to ensure that each user receives a fair share and to prevent server resources from being overwhelmed by irresponsible user storage practices. By keeping track of the storage usage, administrators can allocate resources effectively and prevent any single user from monopolizing the storage capacity. This helps maintain a balanced and efficient system for all users in the enterprise.
34.
A member server can support up to one __________ of replicated files, with up to eight million replicated files per volume.
Correct Answer
terabyte
Explanation
A member server has the capability to support up to one terabyte of replicated files. Additionally, it can handle up to eight million replicated files per volume. This means that the server can efficiently handle a large amount of data and replicate it across multiple volumes, allowing for effective storage and retrieval of files.
35.
To enable replication for a DFS folder with multiple targets, you must create a replication group, which is a collection of servers. Each of these servers, known as __________, contains a target for a particular DFS folder.
Correct Answer
members
Explanation
To enable replication for a DFS folder with multiple targets, you must create a replication group, which is a collection of servers. Each of these servers, known as members, contains a target for a particular DFS folder. These members are responsible for hosting the replicated data and ensuring that it stays synchronized with the other members in the replication group. By having multiple members, the DFS folder can be accessed from different servers, increasing availability and fault tolerance.
36.
Printing in Microsoft Windows typically involves four components including a print device, printer, and print server. What is the fourth component?
Correct Answer
print driver
Explanation
The fourth component in printing in Microsoft Windows is the print driver. The print driver is a software that acts as a bridge between the operating system and the printer. It translates the print job from the application into a format that the printer can understand. The print driver also provides options for configuring print settings, such as paper size, orientation, and quality. Without a print driver, the operating system would not be able to communicate with the printer effectively, resulting in printing errors or no output at all.
37.
By default, what type of topology is used by replication groups in which every member in a group replicates with every other member?
Correct Answer
full mesh topology
Explanation
In a full mesh topology, every member in a group replicates with every other member. This means that each member has a direct connection to every other member, allowing for efficient and direct communication between all members. This type of topology ensures high redundancy and fault tolerance as data can be easily replicated and shared among all members.
38.
What topology enables you to limit replication traffic to specific pairs of members?
Correct Answer
hub/spoke topology
Explanation
The hub/spoke topology enables you to limit replication traffic to specific pairs of members. In this topology, all communication flows through a central hub node, which controls the traffic between the hub and the spoke nodes. This allows for more efficient and controlled replication, as the hub can selectively send data to specific spoke nodes, reducing unnecessary traffic and optimizing network resources.
39.
The printer is associated with a printer driver that takes the commands generated by the application and converts them into what language?
Correct Answer
Printer Control Language
PCL
Explanation
The correct answer is PCL, which stands for Printer Control Language. This language is used by printer drivers to convert the commands generated by the application into a format that the printer can understand and execute. PCL is a widely used language that allows for efficient and accurate printing, making it a common choice for many printers and applications.
40.
The simplest print architecture consists of one print device connected to one computer. What is this print device also known as?
Correct Answer
locally attached print device
Explanation
The given correct answer is "locally attached print device". This refers to a print device that is directly connected to a computer. In this architecture, there is only one print device connected to one computer, making it the simplest form of print setup. This eliminates the need for any network connections or additional devices, allowing for a straightforward and direct printing process.
41.
What enables administrators to monitor and regulate the storage consumed by network users?
Correct Answer
File Server Resource Manager
Explanation
File Server Resource Manager is a tool that enables administrators to monitor and regulate the storage consumed by network users. It provides various features such as quota management, file screening, and storage reports. With File Server Resource Manager, administrators can set storage limits for users, track their storage usage, and generate reports to analyze storage patterns. This allows administrators to effectively manage and allocate storage resources, ensuring optimal usage and preventing any misuse or overconsumption of storage space by network users.
42.
Windows Fax and Scan is packaged as part of a single feature named what (along with other nonessential elements, such as desktop themes and Windows Media Player)?
Correct Answer
Desktop Experience
Explanation
Windows Fax and Scan is packaged as part of a single feature called Desktop Experience. This feature includes various nonessential elements like desktop themes and Windows Media Player.
43.
Which service does Windows Server 2008 include that provides basic functionality for devices that conform to the Unimodem driver standard?
Correct Answer
Microsoft Modem Device Provider
Explanation
Windows Server 2008 includes the Microsoft Modem Device Provider service, which offers basic functionality for devices that follow the Unimodem driver standard. This service allows Windows Server 2008 to communicate with and control modems that adhere to this standard, ensuring compatibility and proper functioning of the devices.