Microsoft Server 2008 Quiz 2 & 3

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by V_gray
V
V_gray
Community Contributor
Quizzes Created: 2 | Total Attempts: 238
Questions: 35 | Attempts: 64

SettingsSettingsSettings
Microsoft Server 2008 Quiz 2 & 3 - Quiz


Questions and Answers
  • 1. 

    __________ permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system.

    Explanation
    NTFS permissions refer to the access controls set on files and folders stored on disk volumes formatted with the NTFS file system. These permissions determine who can access, modify, or delete files and folders, and also specify the level of access granted to different users or groups. NTFS permissions provide a more advanced and granular level of security compared to other file systems, allowing administrators to effectively manage and control access to sensitive data.

    Rate this question:

  • 2. 

    _________ folders makes them accessible to network users.

    Explanation
    The term "Sharing" refers to the process of granting access or permission to other users on a network to view, edit, or use the contents of a particular folder. By sharing folders, network users can easily access and collaborate on files, documents, and resources stored within those folders. This allows for efficient sharing and communication among users, promoting teamwork and productivity in a networked environment.

    Rate this question:

  • 3. 

    An access __________ list is a collection of individual permissions in the form of access control entries.

    Explanation
    An access control list is a collection of individual permissions in the form of access control entries. This list is used to control and manage access to resources or systems by specifying who is allowed or denied access. By organizing permissions into a list, it becomes easier to manage and enforce access control policies.

    Rate this question:

  • 4. 

    When you assign a __________ permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects.

    Explanation
    When you assign a "Deny" permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects. This means that even if the element has been granted permission to perform a certain action by its parent objects, the "Deny" permission will take precedence and prevent the element from carrying out that action.

    Rate this question:

  • 5. 

    Folder __________ asks users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server.

    Explanation
    The term "redirection" accurately describes the action of clicking on a folder that appears to be local, but actually leads to files stored on a server. This is a common practice in computer systems where the user interface is designed to mimic a local file system, giving the illusion that the files are stored locally when they are actually stored remotely. The user is redirected to the server where the files are stored when they click on the folder.

    Rate this question:

  • 6. 

    You can use the Net.exe command-line utility with the __________ parameter to map drive letters to folders.

    Explanation
    The correct answer is "USE". The Net.exe command-line utility can be used with the "USE" parameter to map drive letters to folders. This allows users to access specific folders on a network drive by assigning them a drive letter for easy navigation and file management.

    Rate this question:

  • 7. 

    What type of devices are essentially dedicated file servers that provide file-based storage services directly to clients on the network?

    Explanation
    Network attached storage (NAS) devices are essentially dedicated file servers that provide file-based storage services directly to clients on the network. NAS devices are designed to be connected to a network and provide a centralized storage location for multiple clients to access and share files. They typically have their own operating system and file management capabilities, allowing them to handle file sharing, data backup, and other storage-related tasks. NAS devices are commonly used in home and small business environments to provide easy and convenient file storage and sharing solutions.

    Rate this question:

  • 8. 

    What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?

    Explanation
    The Microsoft Management Console (MMC) snap-in used to perform disk-related tasks is called Disk Management. This tool allows users to view and manage the disks and volumes on a computer. It provides functionalities such as creating, deleting, and formatting partitions, assigning drive letters, extending or shrinking volumes, and initializing new disks. Disk Management is a useful tool for managing storage devices and organizing disk space efficiently.

    Rate this question:

  • 9. 

    What type of permissions control access to specific parts of an Active Directory hierarchy?

    Explanation
    Active Directory permissions control access to specific parts of an Active Directory hierarchy. These permissions determine what actions users or groups can perform on objects within the Active Directory structure, such as creating, modifying, or deleting objects. By assigning appropriate permissions, administrators can ensure that only authorized users have access to sensitive information and can perform necessary tasks within the Active Directory environment.

    Rate this question:

  • 10. 

    Drives can be mapped through Group Policy or though what other method?

    Explanation
    Drives can be mapped through Group Policy or through logon scripts. Logon scripts are a method used to automate the mapping of network drives for users when they log in to their computers. These scripts can be written using scripting languages such as VBScript or PowerShell and are executed during the user's logon process. By configuring the logon script to map specific network drives, administrators can ensure that users have access to the necessary network resources upon logging in.

    Rate this question:

  • 11. 

    What lookup service maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts?

    • A. 

      Name User Map

    • B. 

      User Mapping Function

    • C. 

      User Name Mapping

    • D. 

      None of the above

    Correct Answer
    C. User Name Mapping
    Explanation
    User Name Mapping is the correct answer because it is the lookup service that maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts. This service is used to map the user names between UNIX and Windows/Active Directory environments, allowing for seamless integration and authentication across different systems.

    Rate this question:

  • 12. 

    You must install the File Services role to use the Distributed File System.

    • A. 

      True

    • B. 

      False

    Correct Answer
    A. True
    Explanation
    To use the Distributed File System (DFS), it is necessary to install the File Services role. DFS is a feature in Windows Server that allows users to access and manage files stored on multiple servers as if they were on a single shared folder. By installing the File Services role, the necessary components and services required for DFS are enabled, allowing for the implementation and utilization of DFS. Therefore, the statement that installing the File Services role is required to use DFS is true.

    Rate this question:

  • 13. 

    Which Windows operating system protocol is used for file sharing?    

    • A. 

      Network File System (NFS)

    • B. 

      Server Message Blocks (SMB)

    • C. 

      Internet Engineering Task Force (IETF)

    • D. 

      Active Directory

    Correct Answer
    B. Server Message Blocks (SMB)
    Explanation
    Server Message Blocks (SMB) is the protocol used for file sharing in Windows operating systems. It allows for the sharing of files, printers, and other resources between computers on a network. SMB provides a standardized way for different devices and operating systems to communicate and access shared files and resources. It is commonly used in Windows-based networks and is supported by a wide range of devices and operating systems.

    Rate this question:

  • 14. 

    Which system can warn administrators of excessive storage utilization trends or apply hard restrictions to user accounts?ques

    • A. 

      Ques

    • B. 

      Quota

    • C. 

      File Restrict option

    • D. 

      Regulation Sever

    Correct Answer
    B. Quota
    Explanation
    The correct answer is "Quota." A quota system can warn administrators of excessive storage utilization trends by setting limits on the amount of storage space that can be used by individual users or groups. When the storage utilization approaches or exceeds the set limit, the system can generate warnings or notifications to the administrators. Additionally, a quota system can also apply hard restrictions to user accounts by preventing them from using additional storage once they have reached their allocated quota.

    Rate this question:

  • 15. 

    For organizations utilizing Windows and UNIX computers, Windows Server 2008 includes which role service?

    • A. 

      Services for Network File System

    • B. 

      Services for Combined Systems File Share Services for Combined Systems

    • C. 

      File Share

    • D. 

      None of the above

    Correct Answer
    A. Services for Network File System
    Explanation
    Windows Server 2008 includes the role service of "Services for Network File System" for organizations utilizing both Windows and UNIX computers. This role service allows for the sharing of files and resources between Windows and UNIX systems, facilitating seamless communication and collaboration between the two platforms.

    Rate this question:

  • 16. 

    Which console includes several predefined quota templates that can be used to create your own quota template?

    • A. 

      Quota Server Resource Manager

    • B. 

      File Server Resource Manager

    • C. 

      Server Template Resource Manager

    • D. 

      Template Wizard

    Correct Answer
    B. File Server Resource Manager
    Explanation
    The correct answer is File Server Resource Manager. The File Server Resource Manager console includes several predefined quota templates that can be used to create your own quota template. This allows users to easily set up and manage quotas for file shares on a Windows file server. The console provides a user-friendly interface for configuring and monitoring quotas, and the predefined templates offer a starting point for creating custom quotas based on specific requirements.

    Rate this question:

  • 17. 

    What will the Window’s Server 2008 “Deploying a File Server” default allow you to manage on the server?

    • A. 

      Disk drives

    • B. 

      Share drives

    • C. 

      Map drives

    • D. 

      All the above

    Correct Answer
    D. All the above
    Explanation
    The default settings for "Deploying a File Server" in Windows Server 2008 allow you to manage disk drives, share drives, and map drives on the server. This means that you can control and manipulate the storage devices, create shared folders for network access, and assign drive letters to network locations, all within the file server environment.

    Rate this question:

  • 18. 

    Which system simplifies the process of locating files and folders on network servers?

    • A. 

      Distributed File System

    • B. 

      Distributed Server Manager

    • C. 

      Remote File Services

    • D. 

      All of the above

    Correct Answer
    A. Distributed File System
    Explanation
    The correct answer is Distributed File System. Distributed File System simplifies the process of locating files and folders on network servers by providing a unified and transparent view of multiple file servers. It allows users to access files and folders from different servers as if they were on a single server, eliminating the need to know the specific location of each file. This simplifies file management and improves efficiency in a networked environment.

    Rate this question:

  • 19. 

    To raise the domain functional level of a domain, use the Active Directory Domains and Trusts console.

    • A. 

      True

    • B. 

      False

    Correct Answer
    A. True
    Explanation
    To raise the domain functional level of a domain, the Active Directory Domains and Trusts console is used. This console allows administrators to manage trust relationships and domain functional levels. By raising the domain functional level, administrators can enable additional features and capabilities within the domain, such as improved security and compatibility with newer versions of Windows Server. Therefore, the statement is true.

    Rate this question:

  • 20. 

    What technique duplicates copies of a file that are all updated on a regular basis, no matter which copy changes?

    • A. 

      Virtual namespace

    • B. 

      Multimaster replication

    • C. 

      Data collection

    • D. 

      Remote Differential Compression (RDC)

    Correct Answer
    B. Multimaster replication
    Explanation
    Multimaster replication is a technique that duplicates copies of a file and ensures that all copies are regularly updated, regardless of which copy changes. This means that any changes made to one copy of the file are automatically replicated to all other copies, ensuring consistency and synchronization across multiple locations or systems. Multimaster replication is commonly used in distributed systems or environments where multiple copies of the same file need to be kept up to date.

    Rate this question:

  • 21. 

    An NFS server exports part of its file system and the NFS client integrates the exported information into its own file system. What is this process called?

    • A. 

      Mounting

    • B. 

      Installing

    • C. 

      Expanding

    • D. 

      Exporting

    Correct Answer
    A. Mounting
    Explanation
    The process described in the question is called "mounting". Mounting refers to the process of integrating a remote file system into a local file system, allowing the client to access and use the exported information from the NFS server as if it were part of its own file system. This enables seamless file sharing and access between the NFS server and client.

    Rate this question:

  • 22. 

    Network File System (NFS) places the bulk of the file-sharing process on the __________.

    • A. 

      Server

    • B. 

      File Manager

    • C. 

      Storage device

    • D. 

      Client

    Correct Answer
    D. Client
    Explanation
    NFS is a distributed file system protocol that allows a client computer to access files over a network as if they were stored locally. The client is responsible for initiating the file-sharing process and requesting files from the server. The server, on the other hand, is responsible for storing and managing the files. Therefore, the correct answer is client.

    Rate this question:

  • 23. 

    What works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection?

    • A. 

      DFS Load Balancing

    • B. 

      DFS Replication

    • C. 

      DFS Mirroring

    • D. 

      DFS Looping

    Correct Answer
    B. DFS Replication
    Explanation
    DFS Replication works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection. DFS Replication ensures that files are replicated across multiple servers, allowing for improved data availability and fault tolerance. This replication process helps to distribute the load among multiple servers, ensuring that clients can access data from the nearest or least loaded server. Additionally, DFS Replication allows for data collection by consolidating files from multiple servers into a single location, making it easier for administrators to manage and analyze the data.

    Rate this question:

  • 24. 

    Which option allows clients to revert to a previously unavailable target when it becomes available again at a lower cost than the present target?

    • A. 

      Replication group

    • B. 

      Client Failback

    • C. 

      File Replication Service (FRS)

    • D. 

      WAN monitor

    Correct Answer
    B. Client Failback
    Explanation
    Client Failback allows clients to revert to a previously unavailable target when it becomes available again at a lower cost than the present target. This means that if a target becomes unavailable, clients will automatically switch to an alternative target. Once the previously unavailable target becomes available again and is at a lower cost than the current target, clients will revert back to it. This feature helps optimize costs and ensure that clients are always connected to the most cost-effective target.

    Rate this question:

  • 25. 

    Replication groups use which topology to limit the replication traffic to specific pairs of members?

    • A. 

      Full mesh topology

    • B. 

      Limited mesh topology

    • C. 

      Hub/spoke topology

    • D. 

      Both a and b

    Correct Answer
    C. Hub/spoke topology
    Explanation
    Replication groups use a hub/spoke topology to limit the replication traffic to specific pairs of members. In this topology, there is a central hub that connects to multiple spoke nodes. The hub acts as a central point for communication, and the spokes only communicate with the hub, reducing the replication traffic between members. This allows for more efficient and controlled replication within the group.

    Rate this question:

  • 26. 

    Windows Server 2008 supports the UNIX and Linux file server clients with Server Message Blocks (SMB).

    • A. 

      True

    • B. 

      False

    Correct Answer
    B. False
    Explanation
    Windows Server 2008 does not support UNIX and Linux file server clients with Server Message Blocks (SMB). This statement is false.

    Rate this question:

  • 27. 

    Which of the following items allows administrators to monitor and regulate the storage consumed by network users?

    • A. 

      File Server Resource Manager

    • B. 

      Regulation Server

    • C. 

      LAN Manager Resource

    • D. 

      Server File Resource Manager

    Correct Answer
    A. File Server Resource Manager
    Explanation
    File Server Resource Manager allows administrators to monitor and regulate the storage consumed by network users. It provides tools for managing and classifying files, creating storage quotas, generating reports on storage usage, and implementing file screening and storage management policies. This allows administrators to effectively manage and control the storage resources on the network, ensuring efficient use of storage and preventing storage overutilization.

    Rate this question:

  • 28. 

    For enterprise networks, creating workgroups is the recommended method for managing quota assignments on a large scale.

    • A. 

      True

    • B. 

      False

    Correct Answer
    B. False
    Explanation
    Creating workgroups is not the recommended method for managing quota assignments on a large scale in enterprise networks. Instead, enterprise networks typically use centralized management systems or directory services to manage quota assignments more efficiently and effectively. Workgroups are generally used in smaller networks or home environments where the number of users and resources is limited.

    Rate this question:

  • 29. 

    Which role service selection allows you to install the Share and Storage Management console for Microsoft Management Console (MMC)?  

    • A. 

      DFS Namespaces

    • B. 

      File Server Resource Manager

    • C. 

      File Server

    • D. 

      Windows Search Service

    Correct Answer
    C. File Server
    Explanation
    The correct answer is File Server. The File Server role service allows you to install the Share and Storage Management console for Microsoft Management Console (MMC). This console provides a graphical interface for managing shares, volumes, and storage pools on a file server.

    Rate this question:

  • 30. 

    DFS can distribute access requests by using what feature, thus preventing any one server from shouldering the entire traffic load?    

    • A. 

      Data distribution

    • B. 

      Load balancing

    • C. 

      Data collection

    • D. 

      Server clustering

    Correct Answer
    B. Load balancing
    Explanation
    DFS can distribute access requests by using load balancing, which helps prevent any one server from shouldering the entire traffic load. Load balancing evenly distributes the incoming requests across multiple servers, ensuring that no single server becomes overwhelmed with traffic. This helps to improve overall performance, optimize resource utilization, and enhance the reliability and availability of the system.

    Rate this question:

  • 31. 

    Which UNIX operating system protocol is used for file sharing?

    • A. 

      Network File System (NFS)

    • B. 

      Server Message Blocks (SMB)

    • C. 

      Internet Engineering Task Force (IETF)

    • D. 

      None of the above

    Correct Answer
    A. Network File System (NFS)
    Explanation
    Network File System (NFS) is the correct answer because it is a protocol commonly used in UNIX operating systems for file sharing. NFS allows clients to access files on remote servers as if they were local files. It provides a simple and efficient way to share files between different machines on a network. Server Message Blocks (SMB) is a protocol used for file sharing in Windows operating systems, not UNIX. Internet Engineering Task Force (IETF) is a standards organization that develops and promotes Internet standards, but it is not specifically related to file sharing protocols. Therefore, the correct answer is Network File System (NFS).

    Rate this question:

  • 32. 

    Configuring role services as you install them saves time and effort later.

    • A. 

      True

    • B. 

      False

    Correct Answer
    A. True
    Explanation
    Configuring role services as you install them saves time and effort later because it allows you to set up the necessary services and configurations during the initial installation process. This eliminates the need to go back and manually configure the role services at a later time, which can be time-consuming and potentially prone to errors. By configuring the role services as you install them, you ensure that the necessary services are properly set up and ready to use immediately after the installation is completed.

    Rate this question:

  • 33. 

    What protocol conserves network bandwidth by detecting changes in files and transmitting only the modified data to the destination?

    • A. 

      Remote Desktop Protocol

    • B. 

      Remote Differential Compressions

    • C. 

      Load Balancing Protocol

    • D. 

      Server Message Block

    Correct Answer
    B. Remote Differential Compressions
    Explanation
    Remote Differential Compressions is the correct answer because it is a protocol that specifically detects changes in files and transmits only the modified data to the destination. This helps to conserve network bandwidth by reducing the amount of data that needs to be transmitted. Remote Desktop Protocol is not the correct answer as it is used for remote access to desktops, not for conserving network bandwidth. Load Balancing Protocol and Server Message Block are also not the correct answers as they do not have the specific functionality of detecting changes in files and transmitting only modified data.

    Rate this question:

  • 34. 

    The File Services node provides access to which of the following elements?

    • A. 

      System Services

    • B. 

      Roles Services

    • C. 

      Resources and Support

    • D. 

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The File Services node provides access to all of the above elements, including System Services, roles Services, and Resources and Support. This means that users can access and manage various file-related services, system services, roles services, and resources and support through the File Services node.

    Rate this question:

  • 35. 

    Windows Server 2008 computers must run which protocol service to send email messages?

    • A. 

      Email Router Protocol (ERP)

    • B. 

      Default Email Protocol (DEP)

    • C. 

      Simple Mail Transfer Protocol (SMTP)

    • D. 

      Simple Modem Target Protocol (SMTP)

    Correct Answer
    C. Simple Mail Transfer Protocol (SMTP)
    Explanation
    Windows Server 2008 computers must run the Simple Mail Transfer Protocol (SMTP) service to send email messages. SMTP is a widely used protocol for sending email over the internet. It is responsible for the transmission of email between servers and is necessary for the proper functioning of email communication.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.