Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
Se Ep Cxii
33 Questions
|
By Ict_cc_mp | Updated: Jul 23, 2015
| Attempts: 300
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 33
0 %
0/100
Score
0/100
1.
Fill in the blanks with the appropriate protocol according to the description given. (i) _____________________provides a means for transfer of e-mail messages from a server to client computers. (ii)_____________________transmits e-mail messages from an e-mail client to an e-mail server.
Submit
Start Quiz
About This Quiz
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
Security
Select a Match
Allow access to all memebers of the planning group some confidential documents which are stored in a folder
E-mail monthly network reports to some members of the disaster recovery planning group
Distribution
Select a Match
Allow access to all memebers of the planning group some confidential documents which are stored in a folder
E-mail monthly network reports to some members of the disaster recovery planning group
Submit
3.
Oriental is the sole distributor for a brand of electric fans. It want its Sales staff to be able to upload monthly sales reports to the server for sharing with the Marketing department. The Sales staff should also be able to remotely download products manuals from the server while they are away from office. Which one of the following can be used to accomplish this goal?
FTP
RIP
SNMP
WAS
Submit
4.
Jenson works for a large corporation and a network administrator has created a user account with logon name
HRUser12
for him. Jenson has been instructed to create strong passwords that conforms to Windows Server secure password requirements. Which one of the following password is the
MOST
suitable?
JeN#
HRUser12
Jens#&world
Jensonsworld
Submit
5.
When a Windows Server enables multiple client computers to share one or more print devices, it is functioning as a______________.
Print queue
Print server
Print daemon
Print volume licenser
Submit
6.
Which one of the following information is
NOT
required to configure an e-mail account in Microsoft Outlook?
User name
DNS server address
E-mail server address
Type of e-mail account
Submit
7.
Which one of the following is
NOT
a valid group scope within Windows Server 2008?
Global
Universal
Domain local
Machine public
Submit
8.
Given the FQDN (Fully Qualified Domain Name)
server1.sales.macmall.com
. What is the second level domain name?
Com
Macmall
Sales
Server1
Submit
9.
Which one of the following about Virtual PC 2007 is
TRUE
?
It can be downloaded for free
It can run on Windows Mobile 5.0
It can be run on a computer with 64-bit CPU
It comes pre-installed with Windows Server 2008
Submit
10.
The output of the
nslookup
command can be used to troubleshoot which one of the following?
DHCP
DNS
FTP
SMTP
Submit
11.
What does ODBC stands for?
Object Database Control
Open Database Connectivity
Overt Database Connections
Oracle Database Banking Community
Submit
12.
Which one of the following editions of Windows Server 2008 supports only a single processor and is sold only by OEMs (Original Equipment Manufacturers)?
Windows Server 2008 Standard
Windows Server 2008 Enterprise
Windows Server 2008 Datacentre
Windows Server 2008 Foundation
Submit
13.
Which one of the following statements describes ASP.NET?
An ASP.NET web page has the extensions of .asp
ASP.NET can be used to create dynamic web pages
"ASP" in ASP.NET stands for Application Server Providers
An ASP.NET web page can only be displayed in Internet Explorer
Submit
14.
A company has been severely hit by e-mail spam over the last few months. It decides to adopt a strict anti-spam policy in which only e-mails from a list of trusted users are allowed to be received. What kind of list-based filters is recommended?
Blacklist
Content-based
Greylist
Whitelist
Submit
15.
What is the web server software called in Windows Server 2008?
IIS
SQL
Apache
Internet Explorer
Submit
16.
512MB
640MB
896MB
1024MB
Submit
17.
Members of the Marketing group only
Members of the Administrators group only
Any member of the Marketing or Administrators groups
Any member of the Engineering or Administrators groups
Submit
18.
What is capacity management?
It is a process of restricting employee's use of corporate data storage space to store non-work-related files and programs
It refers to the audit of the various types of data stored in a server to ensure that resource management...
It refers to the audit of the various types of data stored in a server to ensure that resource management policies are followed
It is the process of planning, analyzing, sizing, and optimizing overall data storage space to satisfy an organization's increase in...
It is the process of planning, analyzing, sizing, and optimizing overall data storage space to satisfy an organization's increase in data storage demands
It refers to the retention of critical information and generation of data storage usage reports at predefined intervals to meet...
It refers to the retention of critical information and generation of data storage usage reports at predefined intervals to meet regulatory requirements
Submit
19.
Which one of the following is a technology that allows a network which uses private IP addresses to connect to the Internet through a single IP public address?
NAT
AJAX
NetBIOS
Virtual PC
Submit
20.
Which one of the following hosts should be configured to receive their IP addresses from the DHCP server?
The mail server
The file servers
The DNS server
The client computers
Submit
21.
Which one of the following is a limitation of server virtualization?
It results in increased hardware cost
It is not possible to test hardware drivers or firmware updates
It results in more complex disaster recovery in the event of a disaster
It cannot be used to host both 32-bit and 64-bit versions of the Windows Server operating systems on a single...
It cannot be used to host both 32-bit and 64-bit versions of the Windows Server operating systems on a single server
Submit
22.
Which one of the following tools can be used to access the security state of a Windows machine, such as checking for weak passwords?
Microsoft Management Console
Microsoft Baseline Security Analyzer
Microsoft Internet Information Services
Microsoft SQL Server Management Studio
Submit
23.
Fly Hypermart is a retailer chain with stores in Singapore and Kuala Lumpur, each with a server running Windows Server 2008. There is a connectivity problem between the two servers. While performing the
ping
from Singapore to Kuala Lumpur, the
ping
utility repeatedly returns "Request timed out". Which one of the following can be provide additional information to help resolve the connectivity problems?
Gpudate
Ipconfig
Netstat
Tracert
Submit
24.
Which of the following statements is correct with regard to CALs (Client Access Licenses) for Windows Server 2008?
A device CAL licenses a specific user to use any device to access the server
A user CAL licenses a specific device for use any user to access the server
A user CAL licenses a specific user to use any device to access the server
A device CAL licenses a specific user for use by a specific user to access the server
Submit
25.
What has to be installed in Windows Server 2008 to support the use of Windows Server Backup command-line tools?
Netsh
NTBackup
Windows PowerShell
Volume Shadow Copy Service
Submit
26.
The purpose in a network infrastructure is to resolve_______________.
NetBIOS names to IP addresses
Fully qualified domain names to IP addresses
IP addresses to physical network card addresses
Wireless network names to wireless router names
Submit
27.
Implementing a storage ceiling that limits the amount of data each user can store on server is also known as________________.
RAID
Static allocation
Defragmentation
Quota management
Submit
28.
A software developer is writing an application that will run in Windows Server 2008. The application needs to store some configuration information which will be used as the application's initial settings. Where should these configuration settings be stored?
In a cookie
In a Windows registry
In a text file with extention .txt
In the RAM (Random Access Memory)
Submit
29.
What is Hyper-V?
Virtual LAN
Windows Virtual PC
Windows Server Virtualization
Hyper-Visor Text Protocols
Submit
30.
An NTFS folder on a Windows 2008 system is to be shared to other network users. After right-clicking on the folder and clicking "Properties", which tab should be selected?
Customize
Permissions
Roles
Security
Submit
31.
(i) _____________________ provides a means for transfer of e-mail messages from a server to client computers. (ii) _____________________ transmits e-mail messages from an e-mail messages from an e-mail client to an e-mail server
Submit
32.
A trojan horse is a___________________________________.
Program that presents itself as another program to obtain information such as user's password
Self-replicating program that uses the network to send copies of itself to other hosts on the network, often without any...
Self-replicating program that uses the network to send copies of itself to other hosts on the network, often without any user intervention
Type of security threat in which the attacker exploits human nature by convincing someone to reveal information or perform an...
Type of security threat in which the attacker exploits human nature by convincing someone to reveal information or perform an activity
Type of security threat that uses e-mail that appears to be from a legitimate sender and asks the e-mail recipient...
Type of security threat that uses e-mail that appears to be from a legitimate sender and asks the e-mail recipient to visit a website to enter confidential information
Submit
33.
Which one of the following statements describes the simple recovery model in SQL Server 2008?
It can be recover to the end of any backup
It can only recover to the point that the backup was taken
It can only recover to a specific point in time as long as the backups are complete up to that...
It can only recover to a specific point in time as long as the backups are complete up to that point in time
As transactions are written to the database, they are kept in the transaction log until they are backed up
Submit
View My Results
Related Quizzes
Ep Jan Day 4
Ep Jan Day 4
Java Se 8 Programmer OCA Exam Quiz!
Java Se 8 Programmer OCA Exam Quiz!
Hidden EP Quiz No.02
Hidden EP Quiz No.02
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (33)
Unanswered (
)
Answered (
)
Fill in the blanks with the appropriate protocol according to the...
Oriental is the sole distributor for a brand of electric fans....
Jenson works for a large corporation and a network administrator has...
When a Windows Server enables multiple client computers to share one...
Which one of the following information is NOT required to configure an...
Which one of the following is NOT a valid group scope within...
Given the FQDN (Fully Qualified Domain Name)...
Which one of the following about Virtual PC 2007 is TRUE?
The output of the nslookup command can be used to troubleshoot which...
What does ODBC stands for?
Which one of the following editions of Windows Server 2008 supports...
Which one of the following statements describes ASP.NET?
A company has been severely hit by e-mail spam over the last few...
What is the web server software called in Windows Server 2008?
What is capacity management?
Which one of the following is a technology that allows a network which...
Which one of the following hosts should be configured to receive their...
Which one of the following is a limitation of server virtualization?
Which one of the following tools can be used to access the security...
Fly Hypermart is a retailer chain with stores in Singapore and Kuala...
Which of the following statements is correct with regard to CALs...
What has to be installed in Windows Server 2008 to support the use of...
The purpose in a network infrastructure is to resolve_______________.
Implementing a storage ceiling that limits the amount of data each...
A software developer is writing an application that will run in...
What is Hyper-V?
An NTFS folder on a Windows 2008 system is to be shared to other...
(i) _____________________ provides a means for transfer of e-mail...
A trojan horse is a___________________________________.
Which one of the following statements describes the simple recovery...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement