Se Ep Cxii

37 Questions | Attempts: 300
Share

SettingsSettingsSettings
Se Ep Cxii - Quiz

Questions and Answers
  • 1. 

    Which one of the following editions of Windows Server 2008 supports only a single processor and is sold only by OEMs (Original Equipment Manufacturers)?

    • A.

      Windows Server 2008 Standard

    • B.

      Windows Server 2008 Enterprise

    • C.

      Windows Server 2008 Datacentre

    • D.

      Windows Server 2008 Foundation

    Correct Answer
    D. Windows Server 2008 Foundation
  • 2. 

    Which one of the following is NOT a valid group scope within Windows Server 2008?

    • A.

      Global

    • B.

      Universal

    • C.

      Domain local

    • D.

      Machine public

    Correct Answer
    D. Machine public
  • 3. 

    Which of the following statements is correct with regard to CALs (Client Access Licenses) for Windows Server 2008?

    • A.

      A device CAL licenses a specific user to use any device to access the server

    • B.

      A user CAL licenses a specific device for use any user to access the server

    • C.

      A user CAL licenses a specific user to use any device to access the server

    • D.

      A device CAL licenses a specific user for use by a specific user to access the server

    Correct Answer
    C. A user CAL licenses a specific user to use any device to access the server
  • 4. 

    Jenson works for a large corporation and a network administrator has created a user account with logon name HRUser12 for him. Jenson has been instructed to create strong passwords that conforms to Windows Server secure password requirements. Which one of the following password is the MOST suitable?

    • A.

      JeN#

    • B.

      HRUser12

    • C.

      Jens#&world

    • D.

      Jensonsworld

    Correct Answer
    C. Jens#&world
  • 5. 

    Which one of the following is a technology that allows a network which uses private IP addresses to connect to the Internet through a single IP public address?

    • A.

      NAT

    • B.

      AJAX

    • C.

      NetBIOS

    • D.

      Virtual PC

    Correct Answer
    A. NAT
  • 6. 

    The purpose in a network infrastructure is to resolve_______________.

    • A.

      NetBIOS names to IP addresses

    • B.

      Fully qualified domain names to IP addresses

    • C.

      IP addresses to physical network card addresses

    • D.

      Wireless network names to wireless router names

    Correct Answer
    A. NetBIOS names to IP addresses
  • 7. 

    Given the FQDN (Fully Qualified Domain Name) server1.sales.macmall.com. What is the second level domain name?

    • A.

      Com

    • B.

      Macmall

    • C.

      Sales

    • D.

      Server1

    Correct Answer
    B. Macmall
  • 8. 

    Which one of the following hosts should be configured to receive their IP addresses from the DHCP server?

    • A.

      The mail server

    • B.

      The file servers

    • C.

      The DNS server

    • D.

      The client computers

    Correct Answer
    D. The client computers
  • 9. 

    An NTFS folder on a Windows 2008 system is to be shared to other network users. After right-clicking on the folder and clicking "Properties", which tab should be selected?

    • A.

      Customize

    • B.

      Permissions

    • C.

      Roles

    • D.

      Security

    Correct Answer
    D. Security
  • 10. 

    When a Windows Server enables multiple client computers to share one or more print devices, it is functioning as a______________.

    • A.

      Print queue

    • B.

      Print server

    • C.

      Print daemon

    • D.

      Print volume licenser

    Correct Answer
    B. Print server
  • 11. 

    • A.

      Members of the Marketing group only

    • B.

      Members of the Administrators group only

    • C.

      Any member of the Marketing or Administrators groups

    • D.

      Any member of the Engineering or Administrators groups

    Correct Answer
    C. Any member of the Marketing or Administrators groups
  • 12. 

    What does ODBC stands for?

    • A.

      Object Database Control

    • B.

      Open Database Connectivity

    • C.

      Overt Database Connections

    • D.

      Oracle Database Banking Community

    Correct Answer
    B. Open Database Connectivity
  • 13. 

    A company has been severely hit by e-mail spam over the last few months. It decides to adopt a strict anti-spam policy in which only e-mails from a list of trusted users are allowed to be received. What kind of list-based filters is recommended?

    • A.

      Blacklist

    • B.

      Content-based

    • C.

      Greylist

    • D.

      Whitelist

    Correct Answer
    D. Whitelist
  • 14. 

    What is the web server software called in Windows Server 2008?

    • A.

      IIS

    • B.

      SQL

    • C.

      Apache

    • D.

      Internet Explorer

    Correct Answer
    A. IIS
  • 15. 

    Which one of the following statements describes ASP.NET?

    • A.

      An ASP.NET web page has the extensions of .asp

    • B.

      ASP.NET can be used to create dynamic web pages

    • C.

      "ASP" in ASP.NET stands for Application Server Providers

    • D.

      An ASP.NET web page can only be displayed in Internet Explorer

    Correct Answer
    B. ASP.NET can be used to create dynamic web pages
  • 16. 

    Oriental is the sole distributor  for a brand of electric fans. It want its Sales staff to be able to upload monthly sales reports to the server for sharing with the Marketing department. The Sales staff should also be able to remotely download products manuals from the server while they are away from office. Which one of the following can be used to accomplish this goal?

    • A.

      FTP

    • B.

      RIP

    • C.

      SNMP

    • D.

      WAS

    Correct Answer
    A. FTP
  • 17. 

    What is Hyper-V?

    • A.

      Virtual LAN

    • B.

      Windows Virtual PC

    • C.

      Windows Server Virtualization

    • D.

      Hyper-Visor Text Protocols

    Correct Answer
    C. Windows Server Virtualization
  • 18. 

    Which one of the following is a limitation of server virtualization?

    • A.

      It results in increased hardware cost

    • B.

      It is not possible to test hardware drivers or firmware updates

    • C.

      It results in more complex disaster recovery in the event of a disaster

    • D.

      It cannot be used to host both 32-bit and 64-bit versions of the Windows Server operating systems on a single server

    Correct Answer
    B. It is not possible to test hardware drivers or firmware updates
  • 19. 

    Which one of the following about Virtual PC 2007 is TRUE?

    • A.

      It can be downloaded for free

    • B.

      It can run on Windows Mobile 5.0

    • C.

      It can be run on a computer with 64-bit CPU

    • D.

      It comes pre-installed with Windows Server 2008

    Correct Answer
    A. It can be downloaded for free
  • 20. 

    • A.

      512MB

    • B.

      640MB

    • C.

      896MB

    • D.

      1024MB

    Correct Answer
    C. 896MB
  • 21. 

    What has to be installed in Windows Server 2008 to support the use of  Windows Server Backup command-line tools?

    • A.

      Netsh

    • B.

      NTBackup

    • C.

      Windows PowerShell

    • D.

      Volume Shadow Copy Service

    Correct Answer
    C. Windows PowerShell
  • 22. 

    Implementing a storage ceiling that limits the amount of data each user can store on server is also known as________________.

    • A.

      RAID

    • B.

      Static allocation

    • C.

      Defragmentation

    • D.

      Quota management

    Correct Answer
    D. Quota management
  • 23. 

    What is capacity management?

    • A.

      It is a process of restricting employee's use of corporate data storage space to store non-work-related files and programs

    • B.

      It refers to the audit of the various types of data stored in a server to ensure that resource management policies are followed

    • C.

      It is the process of planning, analyzing, sizing, and optimizing overall data storage space to satisfy an organization's increase in data storage demands

    • D.

      It refers to the retention of critical information and generation of data storage usage reports at predefined intervals to meet regulatory requirements

    Correct Answer
    C. It is the process of planning, analyzing, sizing, and optimizing overall data storage space to satisfy an organization's increase in data storage demands
  • 24. 

    A software developer is writing an application that will run in Windows Server 2008. The application needs to store some configuration information which will be used as the application's initial settings. Where should these configuration settings be stored?

    • A.

      In a cookie

    • B.

      In a Windows registry

    • C.

      In a text file with extention .txt

    • D.

      In the RAM (Random Access Memory)

    Correct Answer
    B. In a Windows registry
  • 25. 

    Which one of the following information is NOT required to configure an e-mail account in Microsoft Outlook?

    • A.

      User name

    • B.

      DNS server address

    • C.

      E-mail server address

    • D.

      Type of e-mail account

    Correct Answer
    B. DNS server address
  • 26. 

    Which one of the following statements describes the simple recovery model in SQL Server 2008?

    • A.

      It can be recover to the end of any backup

    • B.

      It can only recover to the point that the backup was taken

    • C.

      It can only recover to a specific point in time as long as the backups are complete up to that point in time

    • D.

      As transactions are written to the database, they are kept in the transaction log until they are backed up

    Correct Answer
    B. It can only recover to the point that the backup was taken
  • 27. 

    Which one of the following tools can be used to access the security state of a Windows machine, such as checking for weak passwords?

    • A.

      Microsoft Management Console

    • B.

      Microsoft Baseline Security Analyzer

    • C.

      Microsoft Internet Information Services

    • D.

      Microsoft SQL Server Management Studio

    Correct Answer
    B. Microsoft Baseline Security Analyzer
  • 28. 

    A trojan horse is a___________________________________.

    • A.

      Program that presents itself as another program to obtain information such as user's password

    • B.

      Self-replicating program that uses the network to send copies of itself to other hosts on the network, often without any user intervention

    • C.

      Type of security threat in which the attacker exploits human nature by convincing someone to reveal information or perform an activity

    • D.

      Type of security threat that uses e-mail that appears to be from a legitimate sender and asks the e-mail recipient to visit a website to enter confidential information

    Correct Answer
    A. Program that presents itself as another program to obtain information such as user's password
  • 29. 

    The output of the nslookup command can be used to troubleshoot which one of the following?

    • A.

      DHCP

    • B.

      DNS

    • C.

      FTP

    • D.

      SMTP

    Correct Answer
    B. DNS
  • 30. 

    Fly Hypermart is a retailer chain with stores in Singapore and Kuala Lumpur, each with a server running Windows Server 2008. There is a connectivity problem between the two servers. While performing the ping from Singapore to Kuala Lumpur, the ping utility repeatedly returns "Request timed out". Which one of the following can be provide additional information to help resolve the connectivity problems?

    • A.

      Gpudate

    • B.

      Ipconfig

    • C.

      Netstat

    • D.

      Tracert

    Correct Answer
    D. Tracert
  • 31. 

    (i) What is the purpose of forward lookup zone in DNS? To resolve host names to IP addresses

  • 32. 

    (ii) Name a common resource record that can be found in a forward lookup zone. A or Host address CNAMES or Canonical Names SRV or Service name MX or Mail exchanger NS or Name Server SOA or Start Of Authority

  • 33. 

    Fill in the blanks with the appropriate protocol according to the description given. (i) _____________________provides a means for transfer of e-mail messages from a server to client computers. (ii)_____________________transmits e-mail messages from an e-mail client to an e-mail server.

    Correct Answer
    IMAP, SMTP
  • 34. 

    A school has replaced its paper-based assessments with one whereby all tests are conducted electronically. To support this, SQL Server 2008 has been installed. Name two best practices with regard to accounts and authentication modes which the school should adopt in order to enhance security of the SQL Server.
    • Use Kerberos authentication 
    • SQL Server services should run using the lowest possible permissions, eg by using low priviledged Windows local user account, or domain user account
    • Requires Windows authentication for connections to SQL Server
    • Assign strong passwords to the sa account
    • Always enable password policy checking for password strength and expiration
    • Always use strong passwords for all SQL Server logins

  • 35. 

    John is the system administrator of a server running Windows Server 2008. He wants to enhance the security of the server by preventing attackers from using brute-force attempts to guess user's password. His plan is to disable a user account when a certain number failed logons occur due to wrong passwords being entered. (i) State the policy setting within the Group Policy Management. Editor which John should edit.    Account lockout threshold (ii)If the policy is changed such that a user account will never be locked out no matter how many failed logons occur, what should be the setting in (i)? 0

  • 36. 

    (i) _____________________ provides a means for transfer of e-mail messages from a server to client computers. (ii) _____________________ transmits e-mail messages from an e-mail messages from an e-mail client to an e-mail server

    Correct Answer
    (i) POP3/IMAP (ii) SMTP

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 23, 2015
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 29, 2013
    Quiz Created by
    Ict_cc_mp
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.