1.
Distributing server roles among several computers has several distinct advantages, including which of the following?
A. 
B. 
C. 
D. 
2.
To create unattend files, Microsoft recommends using what tool in the Windows Automated Installation Kit?
A. 
B. 
C. 
Windows Deployment Services
D. 
Windows System Image Manager
3.
What Windows Server 2008 role implements Internet Information Services (IIS) 7.0 as its core?
A. 
B. 
C. 
D. 
4.
The Windows Server 2008 installation DVD includes a boot image file, located in the \sources folder, that loads Windows PE 2.1 on the client computer. What is the name of this image file?
A. 
B. 
C. 
D. 
5.
To use ImageX.exe, you must boot the target computer to Windows PE and run the tool from the command line.
6.
What role enables an application server to provide digital audio and video content to network clients in real time by using HTTP or the Real Time Streaming Protocol (RTSP)?
A. 
B. 
C. 
D. 
7.
What technology enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there?
A. 
B. 
C. 
D. 
8.
A __________ is a complete installation of an operating system that runs in a software environment emulating a physical computer.
A. 
B. 
C. 
D. 
9.
What is Microsoft’s program for automating and managing the activation of products obtained using volume licenses?
A. 
B. 
C. 
Windows Genuine Advantage
D. 
10.
Corporate customers are not required to activate all Windows Vista and Windows Server 2008 computers using volume license keys.
11.
What role service of the Print Services role installs the Print Management snap-in for MMC, which provides centralized printer management for an entire enterprise network?
A. 
B. 
C. 
D. 
12.
Windows Server 2008 Web Edition does not support what role?
A. 
B. 
C. 
D. 
13.
Which of these roles is supported in Windows Server 2008 Server Core?
A. 
B. 
C. 
D. 
14.
What role is essentially a superset of the Web Server (IIS) role that enables IIS to host Web services developed using environments such as Windows Communication Foundation (WCF) and .NET Framework 3.0?
A. 
B. 
C. 
D. 
15.
What capability of the File Services role consists of two role services that allow administrators to create a virtual directory tree consisting of folders stored on different servers and to maintain duplicate copies of that information?
A. 
File Server Resources Manager
B. 
C. 
D. 
16.
Windows Server 2008 computers can NOT perform multiple roles at the same time.
17.
The activities performed for network clients by a Windows Server 2008 are known as __________.
A. 
B. 
C. 
D. 
18.
What is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools?
A. 
B. 
C. 
D. 
Server Role Administration
19.
What client application is needed by workstations to connect to a terminal server and utilize all of its capabilities?
A. 
Remote Desktop Connection 4.1
B. 
Remote Desktop Connection 5.1
C. 
Remote Desktop Connection 6.1
D. 
Remote Desktop Connection 7.1
20.
Unlike virtual private network (VPN) or direct dial-up connections, a Terminal Services connection uses relatively little network bandwidth because the applications are running on the server computer.
21.
Web servers receiving large amounts of traffic will not need higher-end network adapters or multiple adapters to connect to different subnets
22.
When deploying a server using a WDS installation, the client downloads a boot image that loads __________.
A. 
Windows Software Update Services
B. 
Windows Deployment Services
C. 
D. 
23.
What enables Windows Server 2008 and Windows Vista computers to activate themselves using a host on the local network?
A. 
B. 
Key Distribution Services
C. 
Multiple Activation Center
D. 
24.
What role is included with Windows Server 2008 and enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computer by using network-based boot and installation media?
A. 
Windows Software Update Services
B. 
Windows Deployment Services
C. 
D. 
25.
Drive letters can be mapped with logon scripts or with __________.
A. 
B. 
C. 
Active Directory Users and Computers
D.