Se Ep Cxii

33 Questions | Attempts: 300
Share
Please wait...
Question 1 / 33
0 %
0/100
Score 0/100
1. Fill in the blanks with the appropriate protocol according to the description given. (i) _____________________provides a means for transfer of e-mail messages from a server to client computers. (ii)_____________________transmits e-mail messages from an e-mail client to an e-mail server.
Submit
Please wait...
About This Quiz
Se Ep Cxii - Quiz

Tell us your name to personalize your report, certificate & get on the leaderboard!
2.
Submit
3. Oriental is the sole distributor  for a brand of electric fans. It want its Sales staff to be able to upload monthly sales reports to the server for sharing with the Marketing department. The Sales staff should also be able to remotely download products manuals from the server while they are away from office. Which one of the following can be used to accomplish this goal?
Submit
4. Jenson works for a large corporation and a network administrator has created a user account with logon name HRUser12 for him. Jenson has been instructed to create strong passwords that conforms to Windows Server secure password requirements. Which one of the following password is the MOST suitable?
Submit
5. When a Windows Server enables multiple client computers to share one or more print devices, it is functioning as a______________.
Submit
6. Which one of the following information is NOT required to configure an e-mail account in Microsoft Outlook?
Submit
7. Which one of the following is NOT a valid group scope within Windows Server 2008?
Submit
8. Given the FQDN (Fully Qualified Domain Name) server1.sales.macmall.com. What is the second level domain name?
Submit
9. Which one of the following about Virtual PC 2007 is TRUE?
Submit
10. The output of the nslookup command can be used to troubleshoot which one of the following?
Submit
11. What does ODBC stands for?
Submit
12. Which one of the following editions of Windows Server 2008 supports only a single processor and is sold only by OEMs (Original Equipment Manufacturers)?
Submit
13. Which one of the following statements describes ASP.NET?
Submit
14. A company has been severely hit by e-mail spam over the last few months. It decides to adopt a strict anti-spam policy in which only e-mails from a list of trusted users are allowed to be received. What kind of list-based filters is recommended?
Submit
15. What is the web server software called in Windows Server 2008?
Submit
16.
Submit
17.
Submit
18. What is capacity management?
Submit
19. Which one of the following is a technology that allows a network which uses private IP addresses to connect to the Internet through a single IP public address?
Submit
20. Which one of the following hosts should be configured to receive their IP addresses from the DHCP server?
Submit
21. Which one of the following is a limitation of server virtualization?
Submit
22. Which one of the following tools can be used to access the security state of a Windows machine, such as checking for weak passwords?
Submit
23. Fly Hypermart is a retailer chain with stores in Singapore and Kuala Lumpur, each with a server running Windows Server 2008. There is a connectivity problem between the two servers. While performing the ping from Singapore to Kuala Lumpur, the ping utility repeatedly returns "Request timed out". Which one of the following can be provide additional information to help resolve the connectivity problems?
Submit
24. Which of the following statements is correct with regard to CALs (Client Access Licenses) for Windows Server 2008?
Submit
25. What has to be installed in Windows Server 2008 to support the use of  Windows Server Backup command-line tools?
Submit
26. The purpose in a network infrastructure is to resolve_______________.
Submit
27. Implementing a storage ceiling that limits the amount of data each user can store on server is also known as________________.
Submit
28. A software developer is writing an application that will run in Windows Server 2008. The application needs to store some configuration information which will be used as the application's initial settings. Where should these configuration settings be stored?
Submit
29. What is Hyper-V?
Submit
30. An NTFS folder on a Windows 2008 system is to be shared to other network users. After right-clicking on the folder and clicking "Properties", which tab should be selected?
Submit
31. (i) _____________________ provides a means for transfer of e-mail messages from a server to client computers. (ii) _____________________ transmits e-mail messages from an e-mail messages from an e-mail client to an e-mail server
Submit
32. A trojan horse is a___________________________________.
Submit
33. Which one of the following statements describes the simple recovery model in SQL Server 2008?
Submit
View My Results

Quiz Review Timeline (Updated): Jul 23, 2015 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 23, 2015
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 29, 2013
    Quiz Created by
    Ict_cc_mp
Cancel
  • All
    All (33)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Fill in the blanks with the appropriate protocol according to the...
Oriental is the sole distributor  for a brand of electric fans....
Jenson works for a large corporation and a network administrator has...
When a Windows Server enables multiple client computers to share one...
Which one of the following information is NOT required to configure an...
Which one of the following is NOT a valid group scope within...
Given the FQDN (Fully Qualified Domain Name)...
Which one of the following about Virtual PC 2007 is TRUE?
The output of the nslookup command can be used to troubleshoot which...
What does ODBC stands for?
Which one of the following editions of Windows Server 2008 supports...
Which one of the following statements describes ASP.NET?
A company has been severely hit by e-mail spam over the last few...
What is the web server software called in Windows Server 2008?
What is capacity management?
Which one of the following is a technology that allows a network which...
Which one of the following hosts should be configured to receive their...
Which one of the following is a limitation of server virtualization?
Which one of the following tools can be used to access the security...
Fly Hypermart is a retailer chain with stores in Singapore and Kuala...
Which of the following statements is correct with regard to CALs...
What has to be installed in Windows Server 2008 to support the use of...
The purpose in a network infrastructure is to resolve_______________.
Implementing a storage ceiling that limits the amount of data each...
A software developer is writing an application that will run in...
What is Hyper-V?
An NTFS folder on a Windows 2008 system is to be shared to other...
(i) _____________________ provides a means for transfer of e-mail...
A trojan horse is a___________________________________.
Which one of the following statements describes the simple recovery...
Alert!

Advertisement