Se Ep Cxii

33 Questions | Attempts: 300
Please wait...
Question 1 / 34
🏆 Rank #--
Score 0/100

1. Fill in the blanks with the appropriate protocol according to the description given. (i) _____________________provides a means for transfer of e-mail messages from a server to client computers. (ii)_____________________transmits e-mail messages from an e-mail client to an e-mail server.

Submit
Please wait...
About This Quiz
Se Ep Cxii - Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2.

Submit

3. Oriental is the sole distributor  for a brand of electric fans. It want its Sales staff to be able to upload monthly sales reports to the server for sharing with the Marketing department. The Sales staff should also be able to remotely download products manuals from the server while they are away from office. Which one of the following can be used to accomplish this goal?

Submit

4. Jenson works for a large corporation and a network administrator has created a user account with logon name HRUser12 for him. Jenson has been instructed to create strong passwords that conforms to Windows Server secure password requirements. Which one of the following password is the MOST suitable?

Submit

5. When a Windows Server enables multiple client computers to share one or more print devices, it is functioning as a______________.

Submit

6. Which one of the following information is NOT required to configure an e-mail account in Microsoft Outlook?

Submit

7. Which one of the following is NOT a valid group scope within Windows Server 2008?

Submit

8. Given the FQDN (Fully Qualified Domain Name) server1.sales.macmall.com. What is the second level domain name?

Submit

9. Which one of the following about Virtual PC 2007 is TRUE?

Submit

10. The output of the nslookup command can be used to troubleshoot which one of the following?

Submit

11. What does ODBC stands for?

Submit

12. Which one of the following editions of Windows Server 2008 supports only a single processor and is sold only by OEMs (Original Equipment Manufacturers)?

Submit

13. Which one of the following statements describes ASP.NET?

Submit

14. A company has been severely hit by e-mail spam over the last few months. It decides to adopt a strict anti-spam policy in which only e-mails from a list of trusted users are allowed to be received. What kind of list-based filters is recommended?

Submit

15. What is the web server software called in Windows Server 2008?

Submit

16.

Submit

17.

Submit

18. What is capacity management?

Submit

19. Which one of the following is a technology that allows a network which uses private IP addresses to connect to the Internet through a single IP public address?

Submit

20. Which one of the following hosts should be configured to receive their IP addresses from the DHCP server?

Submit

21. Which one of the following is a limitation of server virtualization?

Submit

22. Which one of the following tools can be used to access the security state of a Windows machine, such as checking for weak passwords?

Submit

23. Fly Hypermart is a retailer chain with stores in Singapore and Kuala Lumpur, each with a server running Windows Server 2008. There is a connectivity problem between the two servers. While performing the ping from Singapore to Kuala Lumpur, the ping utility repeatedly returns "Request timed out". Which one of the following can be provide additional information to help resolve the connectivity problems?

Submit

24. Which of the following statements is correct with regard to CALs (Client Access Licenses) for Windows Server 2008?

Submit

25. What has to be installed in Windows Server 2008 to support the use of  Windows Server Backup command-line tools?

Submit

26. The purpose in a network infrastructure is to resolve_______________.

Submit

27. Implementing a storage ceiling that limits the amount of data each user can store on server is also known as________________.

Submit

28. A software developer is writing an application that will run in Windows Server 2008. The application needs to store some configuration information which will be used as the application's initial settings. Where should these configuration settings be stored?

Submit

29. What is Hyper-V?

Submit

30. An NTFS folder on a Windows 2008 system is to be shared to other network users. After right-clicking on the folder and clicking "Properties", which tab should be selected?

Submit

31. (i) _____________________ provides a means for transfer of e-mail messages from a server to client computers. (ii) _____________________ transmits e-mail messages from an e-mail messages from an e-mail client to an e-mail server

Submit

32. A trojan horse is a___________________________________.

Submit

33. Which one of the following statements describes the simple recovery model in SQL Server 2008?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (33)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Fill in the blanks with the appropriate protocol according to the...
Oriental is the sole distributor  for a brand of electric fans....
Jenson works for a large corporation and a network administrator has...
When a Windows Server enables multiple client computers to share one...
Which one of the following information is NOT required to configure an...
Which one of the following is NOT a valid group scope within...
Given the FQDN (Fully Qualified Domain Name)...
Which one of the following about Virtual PC 2007 is TRUE?
The output of the nslookup command can be used to troubleshoot which...
What does ODBC stands for?
Which one of the following editions of Windows Server 2008 supports...
Which one of the following statements describes ASP.NET?
A company has been severely hit by e-mail spam over the last few...
What is the web server software called in Windows Server 2008?
What is capacity management?
Which one of the following is a technology that allows a network which...
Which one of the following hosts should be configured to receive their...
Which one of the following is a limitation of server virtualization?
Which one of the following tools can be used to access the security...
Fly Hypermart is a retailer chain with stores in Singapore and Kuala...
Which of the following statements is correct with regard to CALs...
What has to be installed in Windows Server 2008 to support the use of...
The purpose in a network infrastructure is to resolve_______________.
Implementing a storage ceiling that limits the amount of data each...
A software developer is writing an application that will run in...
What is Hyper-V?
An NTFS folder on a Windows 2008 system is to be shared to other...
(i) _____________________ provides a means for transfer of e-mail...
A trojan horse is a___________________________________.
Which one of the following statements describes the simple recovery...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!