Se Ep Cxii

37 Questions | Total Attempts: 256

Settings
Please wait...
Networking Quizzes & Trivia

Questions and Answers
  • 1. 
    • A. 

      Windows Server 2008 Standard

    • B. 

      Windows Server 2008 Enterprise

    • C. 

      Windows Server 2008 Datacentre

    • D. 

      Windows Server 2008 Foundation

  • 2. 
    • A. 

      Global

    • B. 

      Universal

    • C. 

      Domain local

    • D. 

      Machine public

  • 3. 
    • A. 

      A device CAL licenses a specific user to use any device to access the server

    • B. 

      A user CAL licenses a specific device for use any user to access the server

    • C. 

      A user CAL licenses a specific user to use any device to access the server

    • D. 

      A device CAL licenses a specific user for use by a specific user to access the server

  • 4. 
    Jenson works for a large corporation and a network administrator has created a user account with logon name HRUser12 for him. Jenson has been instructed to create strong passwords that conforms to Windows Server secure password requirements. Which one of the following password is the MOST suitable?
    • A. 

      JeN#

    • B. 

      HRUser12

    • C. 

      Jens#&world

    • D. 

      Jensonsworld

  • 5. 
    • A. 

      NAT

    • B. 

      AJAX

    • C. 

      NetBIOS

    • D. 

      Virtual PC

  • 6. 
    The purpose in a network infrastructure is to resolve_______________.
    • A. 

      NetBIOS names to IP addresses

    • B. 

      Fully qualified domain names to IP addresses

    • C. 

      IP addresses to physical network card addresses

    • D. 

      Wireless network names to wireless router names

  • 7. 
    Given the FQDN (Fully Qualified Domain Name) server1.sales.macmall.com. What is the second level domain name?
    • A. 

      Com

    • B. 

      Macmall

    • C. 

      Sales

    • D. 

      Server1

  • 8. 
    Which one of the following hosts should be configured to receive their IP addresses from the DHCP server?
    • A. 

      The mail server

    • B. 

      The file servers

    • C. 

      The DNS server

    • D. 

      The client computers

  • 9. 
    An NTFS folder on a Windows 2008 system is to be shared to other network users. After right-clicking on the folder and clicking "Properties", which tab should be selected?
    • A. 

      Customize

    • B. 

      Permissions

    • C. 

      Roles

    • D. 

      Security

  • 10. 
    When a Windows Server enables multiple client computers to share one or more print devices, it is functioning as a______________.
    • A. 

      Print queue

    • B. 

      Print server

    • C. 

      Print daemon

    • D. 

      Print volume licenser

  • 11. 
    • A. 

      Members of the Marketing group only

    • B. 

      Members of the Administrators group only

    • C. 

      Any member of the Marketing or Administrators groups

    • D. 

      Any member of the Engineering or Administrators groups

  • 12. 
    • A. 

      Object Database Control

    • B. 

      Open Database Connectivity

    • C. 

      Overt Database Connections

    • D. 

      Oracle Database Banking Community

  • 13. 
    A company has been severely hit by e-mail spam over the last few months. It decides to adopt a strict anti-spam policy in which only e-mails from a list of trusted users are allowed to be received. What kind of list-based filters is recommended?
    • A. 

      Blacklist

    • B. 

      Content-based

    • C. 

      Greylist

    • D. 

      Whitelist

  • 14. 
    • A. 

      IIS

    • B. 

      SQL

    • C. 

      Apache

    • D. 

      Internet Explorer

  • 15. 
    • A. 

      An ASP.NET web page has the extensions of .asp

    • B. 

      ASP.NET can be used to create dynamic web pages

    • C. 

      "ASP" in ASP.NET stands for Application Server Providers

    • D. 

      An ASP.NET web page can only be displayed in Internet Explorer

  • 16. 
    Oriental is the sole distributor  for a brand of electric fans. It want its Sales staff to be able to upload monthly sales reports to the server for sharing with the Marketing department. The Sales staff should also be able to remotely download products manuals from the server while they are away from office. Which one of the following can be used to accomplish this goal?
    • A. 

      FTP

    • B. 

      RIP

    • C. 

      SNMP

    • D. 

      WAS

  • 17. 
    What is Hyper-V?
    • A. 

      Virtual LAN

    • B. 

      Windows Virtual PC

    • C. 

      Windows Server Virtualization

    • D. 

      Hyper-Visor Text Protocols

  • 18. 
    • A. 

      It results in increased hardware cost

    • B. 

      It is not possible to test hardware drivers or firmware updates

    • C. 

      It results in more complex disaster recovery in the event of a disaster

    • D. 

      It cannot be used to host both 32-bit and 64-bit versions of the Windows Server operating systems on a single server

  • 19. 
    • A. 

      It can be downloaded for free

    • B. 

      It can run on Windows Mobile 5.0

    • C. 

      It can be run on a computer with 64-bit CPU

    • D. 

      It comes pre-installed with Windows Server 2008

  • 20. 
    • A. 

      512MB

    • B. 

      640MB

    • C. 

      896MB

    • D. 

      1024MB

  • 21. 
    • A. 

      Netsh

    • B. 

      NTBackup

    • C. 

      Windows PowerShell

    • D. 

      Volume Shadow Copy Service

  • 22. 
    Implementing a storage ceiling that limits the amount of data each user can store on server is also known as________________.
    • A. 

      RAID

    • B. 

      Static allocation

    • C. 

      Defragmentation

    • D. 

      Quota management

  • 23. 
    • A. 

      It is a process of restricting employee's use of corporate data storage space to store non-work-related files and programs

    • B. 

      It refers to the audit of the various types of data stored in a server to ensure that resource management policies are followed

    • C. 

      It is the process of planning, analyzing, sizing, and optimizing overall data storage space to satisfy an organization's increase in data storage demands

    • D. 

      It refers to the retention of critical information and generation of data storage usage reports at predefined intervals to meet regulatory requirements

  • 24. 
    A software developer is writing an application that will run in Windows Server 2008. The application needs to store some configuration information which will be used as the application's initial settings. Where should these configuration settings be stored?
    • A. 

      In a cookie

    • B. 

      In a Windows registry

    • C. 

      In a text file with extention .txt

    • D. 

      In the RAM (Random Access Memory)

  • 25. 
    • A. 

      User name

    • B. 

      DNS server address

    • C. 

      E-mail server address

    • D. 

      Type of e-mail account

  • 26. 
    • A. 

      It can be recover to the end of any backup

    • B. 

      It can only recover to the point that the backup was taken

    • C. 

      It can only recover to a specific point in time as long as the backups are complete up to that point in time

    • D. 

      As transactions are written to the database, they are kept in the transaction log until they are backed up

  • 27. 
    • A. 

      Microsoft Management Console

    • B. 

      Microsoft Baseline Security Analyzer

    • C. 

      Microsoft Internet Information Services

    • D. 

      Microsoft SQL Server Management Studio

  • 28. 
    A trojan horse is a___________________________________.
    • A. 

      Program that presents itself as another program to obtain information such as user's password

    • B. 

      Self-replicating program that uses the network to send copies of itself to other hosts on the network, often without any user intervention

    • C. 

      Type of security threat in which the attacker exploits human nature by convincing someone to reveal information or perform an activity

    • D. 

      Type of security threat that uses e-mail that appears to be from a legitimate sender and asks the e-mail recipient to visit a website to enter confidential information

  • 29. 
    The output of the nslookup command can be used to troubleshoot which one of the following?
    • A. 

      DHCP

    • B. 

      DNS

    • C. 

      FTP

    • D. 

      SMTP

  • 30. 
    Fly Hypermart is a retailer chain with stores in Singapore and Kuala Lumpur, each with a server running Windows Server 2008. There is a connectivity problem between the two servers. While performing the ping from Singapore to Kuala Lumpur, the ping utility repeatedly returns "Request timed out". Which one of the following can be provide additional information to help resolve the connectivity problems?
    • A. 

      Gpudate

    • B. 

      Ipconfig

    • C. 

      Netstat

    • D. 

      Tracert

  • 31. 
    (i) What is the purpose of forward lookup zone in DNS? To resolve host names to IP addresses
  • 32. 
    (ii) Name a common resource record that can be found in a forward lookup zone. A or Host address CNAMES or Canonical Names SRV or Service name MX or Mail exchanger NS or Name Server SOA or Start Of Authority
  • 33. 
    Fill in the blanks with the appropriate protocol according to the description given. (i) _____________________provides a means for transfer of e-mail messages from a server to client computers. (ii)_____________________transmits e-mail messages from an e-mail client to an e-mail server.
  • 34. 
    A school has replaced its paper-based assessments with one whereby all tests are conducted electronically. To support this, SQL Server 2008 has been installed. Name two best practices with regard to accounts and authentication modes which the school should adopt in order to enhance security of the SQL Server.
    • Use Kerberos authentication 
    • SQL Server services should run using the lowest possible permissions, eg by using low priviledged Windows local user account, or domain user account
    • Requires Windows authentication for connections to SQL Server
    • Assign strong passwords to the sa account
    • Always enable password policy checking for password strength and expiration
    • Always use strong passwords for all SQL Server logins
  • 35. 
    John is the system administrator of a server running Windows Server 2008. He wants to enhance the security of the server by preventing attackers from using brute-force attempts to guess user's password. His plan is to disable a user account when a certain number failed logons occur due to wrong passwords being entered. (i) State the policy setting within the Group Policy Management. Editor which John should edit.    Account lockout threshold (ii)If the policy is changed such that a user account will never be locked out no matter how many failed logons occur, what should be the setting in (i)? 0
  • 36. 
    (i) _____________________ provides a means for transfer of e-mail messages from a server to client computers. (ii) _____________________ transmits e-mail messages from an e-mail messages from an e-mail client to an e-mail server