Quizzes
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Computer
Windows 2008 Administration
125 Questions
|
By Man04 | Updated: Mar 31, 2020
| Attempts: 222
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 126
🏆
Rank #--
▾
0 %
0/100
Score
0/100
1.
Which built in role enables Windows server 2008 to host virtual machines?
Fax
Application
File
Hyper-V
Submit
Start Quiz
About This Quiz
.
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.
2.
Which permissions do administrators typically use to assign storage space as well as modify permissions on a Windows Server 2008 file server
FAT
NTFS
DHCP
DNS
Submit
3.
To use a Windows Server 2008 computer as a domain controller,you must configure it to use a
APIPA address
Address supplied by a DHCP server
Static IP address
None of the above
Submit
4.
Hyper-V available on which version of Server Core
X32
X64
X86
None of the above
Submit
5.
Which of the following is the preferred file system for a server ?
FAT32
NTFS
GPT
FAT16
Submit
6.
Which version of WIndows Server 2008 must computers be running to create a failover cluster ?
Basic
Enterprise
Standard
Web
Submit
7.
What is the term for the ability of entire servers to be redundant so that if anything goes wrong with one computer ,another one can take its place almost immediately?
NLB
Failover
NSCA
Server
Submit
8.
Which drive type must a WDS servers have to store image files ?
NTFS
Ghost
Partitioned
Standalone
Submit
9.
The simple print architecture consists of one print device that is connected to one computer this printer device is also known as a
Printer
Locally attached print device
Printer driver
Print server
Submit
10.
What is the full DNS name for a particular computer called ?
Functional domain name (FDN)
Domain name (DN)
Qualified domain name (QDN)
Fully qualified domain name (FQDN)
Submit
11.
To send email messages ,what service does a Windows Server 2008 computer need to be running
SMB
POP
SImple Mail Transfer Protocol
File sharing and Transfer
Submit
12.
Active Directory was first introduced in which operating system?
Windows 2000 Server
Windows XP SP2
Windows 2003 Server
Windows VIsta
Submit
13.
A well designed sharing strategy provides each user with three resources .which of the following is not a provided resource?
Private a storage space ,such as home folder,to which the user has exclusive access
Public storage space where each user can store files that want colleagues to be able to access
Access to a thawspace for temporary storage
Submit
14.
Which windows installation option in windows server 2008 provides a stripped-down version of the provides a stripped down version of the operating system when you select it?
Hyper-V
Server-Core
Enhanced
Basic
Submit
15.
Which group is used for non security-related functions such as sending email messages to a collection of users ?
Distribution
Universal
Global
Security
Submit
16.
An active Directory domain controller can verify user's identity by which of the following methods ?
Smart cards
Passwords
Biometrics
All of the above
Submit
17.
Which of the following is an advantage of using Microsoft Terminal Services?
Single application installation
Low bandwidth consumption
Conversation of licenses
All of the above
Submit
18.
To whom should you always assign security permissions ?
Individuals
Groups
Domains
Forests
Submit
19.
In what type of configuration does the computer write the same data to identical volumes on two different disks ?
Disk mirroring
Disk duplexing
Disk stripping
RAID 5
Submit
20.
Which role is used when performing unattended installations of Windows Server 2008 and other operating systems on remote computers using network -based boot and installation media ?
Server Core
Windows Deployment Services
Preboot Execution Environment
Windows Automated Installaiton Kit
Submit
21.
Which of the following is part of the recommended hardware environment for a failover cluster ?
Duplicate servers
Shared storage
Redundant network connections
All of the above
Submit
22.
Where do users log in when joining an Active Directory?
Application
Individual computer
Domain
Server
Submit
23.
The read only domain Controller (RODC) supports only incoming replication traffic.As a result .What is it possible to do when using a Read-Only Domain Controller?
Create Active Directory objects
Modify Active Directory objects
Delete Active Directory objects
None of the above
Submit
24.
Which operating system cannot process the Software installation policy?
Windows XP home
WIndows XP professional
Windows Vista Business
WIndows 2000 WorkStation
Submit
25.
An Install image contains the operating system that WDS will install on the client computer .What file from the Windows Server 2008 Installation DVD is used to install the WDS ?
Install.cab
Install.bat
Install.wim
Install.exe
Submit
26.
Which type of file is a script containing responses to all of the prompts that appear on the WDS client computer during the installation process?
Unattended file
Answer file
Logical file
None of the above
Submit
27.
To which type of server do client computers on the network send their DNS queries ?
DCHP servers
DNS servers
SMB servers
Domain controllers
Submit
28.
Which of the following features can be used to automate the shadow copy process ?
File Redirection
Print Services
DNS Server
Streaming Media Servces
Submit
29.
What mechanism allows users to work with copies of files that remain accessible whether the workstation can access the server or not ?
Shadow Copies
Offline Files
Terminal Services
None of the above
Submit
30.
In what type of communication can servers access storage devices over the SAN as if they are connected directly to the computer ?
Server to server
Storage to storage
Server to storage
None of the above
Submit
31.
Which of the following has become the primary backup medium for home users and small network in recent years ?
Optical disk
Hard disk drive
Magnetic tape
Tape library
Submit
32.
What must a network adapter support on the client computer for the WDS server to work ?
Windows PE (Preinstalllation Environment )2.1
Preboot Execution Environment (PXE)
Windows PE(PreInstallation Environment )2,0
Preboot Exception Environment (PEE)
Submit
33.
Which of the following s not a primary management tool for Active Directory
Active Directory Domains and Trusts
Active Directory Users and Computers
Active Directory Trust Management
Active Directory Sites and Services
Submit
34.
Which of the following is not a variable that can affect the performance of an Active DIrectory installation ?
Length of the domain name you create
Hardware you select for your domain controllers
Capabilities of your network
Types of WAN links connecting your remote sites
Submit
35.
Which console can be used to create multiple shares and exercise more granular control over their properties ?
Computer Management
Share and storage management
Active Directory domains and trusts
System Management
Submit
36.
Which command prompt utility can be used to perform disk management tasks ?
DiskPart.exe
CheckDisk.exe
Msconfig.exe
Fdsk.exe
Submit
37.
Which of the following authentication devices verifies the identify of a user during logon?
IP security
Smart card
Software code signing
Internet authentication
Submit
38.
Which of the following is the most basic type of backup job and copies the entire set of selected targets to the backup medium ?
Full
Differential
Incremental
Partial
Submit
39.
Which kind of backup job backs up only the files that have changed since since the last backup job of any kind ?
Full
Differential
Incremental
Partial
Submit
40.
What is the name of the communications protocol called for by the original X:500 standard?
Directory access protocol
Data access protocol
Lightweight directory access protocol
Lightweight data access protocol
Submit
41.
The Fax Service Manager application enables administrators to do all of the following except
Monitor fax devices
Create optional role services
Create fax rules and policies
Manage all of the faxes for the organization
Submit
42.
Which type of backup job backs only the files that have changed since the last full backup and does not reset their archive bits ?
Full
Differential
Incremental
Partial
Submit
43.
MAP can run on the 32 -bit version of all the following operating except
Windows XP Professional with Service Pack 1
Windows Vista
Windows XP Professional with Service Pack 2
Windows Server 2003 R2
Submit
44.
Which of the following is not a top level domain ?
Com
Net
Int
Biz
Submit
45.
Which technique creates multiple resource records using the same name with a different server IP address in each record ?
Routing token redirection
Network load balancing
DNS round robin
Terminal server farm
Submit
46.
In which operating system is the Previous Versions Client not available by default ?
Windows Vista
WIndows Xp Service Pack 2
Windows Server 2003
Windows XP Service Pack 1
Submit
47.
Which of the following is a disadvantage of a centralized DHCP infrastructure?
Reduced administrative burden
No need to scale up your scale up your hardware to accommodate DHCP relay servers
Fewer servers
Burden on the servers increase
Submit
48.
Which print services role installs the print management console for Microsoft Management console (MMC) that enables administrators to deploy,monitor,and manage printers throughout the enterprise ?
Print Server
LPD service
Internet Printing
Spooler
Submit
49.
What role service maintains a database of client sessions and enables a disconnected client to reconnect to the same terminal server?
Terminal Services
Session Broker
Server Broker
Server Farm
Submit
50.
Which of type of log contains events that signify a change in the application or service,such as the addition or removal of a printer ?
Admin
Operational
Analytic
Debug
Submit
51.
Which new tool provides capabilities so you can evaluate the hardware on servers as well as workstations ?
Microsoft Assessment and Planning Systems Accelerator (MAP)
Microsoft Assessment and Planning Solution Accelerator( MAP)
Microsoft Assessment and Programming Solution Accelerator (MAP)
Microsoft Assessment and Programming Systems Accelerator (MAP)
Submit
52.
What converts the print jobs generated by applications into an appropriate string of commands for specific print device?
Print spooler
Print server
Printer
Print device
Submit
53.
is the only role service that is required when you add the print services role
Print Server
LPD service
Internet Printing
Spooler
Submit
54.
What is one way to simplify the process of deploying applications on a large number of computers?
Thin client computing
Server side processing
Mainframe computing
Terminal Services
Submit
55.
Which tool builds automated deployment solutions and is included with Windows Server 2008 ?
Sysprep.exe
ImageX.exe
Windows System Image Manager
None of the above
Submit
56.
Which method is most frequently used for providing fault tolerance to DHCP servers ?
Fail over clustering
Standby servers
Splitting scopes
None of the above
Submit
57.
What must at least one DNS server support when running Active Directory on your network?
DCHP server service
Service core
Service Location (SRV) resource record
Active Directory Services
Submit
58.
To protect workstation applications and ensure their continued availability what feature should be used to run them?
PowerShell
Server Core
Virtual Private Networking
Terminal Services
Submit
59.
Which graphical utility creates and modifies the answer files you can use to perform unattended operating system installations on remote computers ?
Image.exe
Windows Preinstallation Environment (Windows PE)
Windows System Image Manager (Windows SIM)
Windows Recovery Environment (Windows RE)
Submit
60.
There are two basic classes of objects in an Active Directory domain. which of the following is an object ?
Logical
Leaf
Tree
Attribute
Submit
61.
Which of the following is not a reason why you should try to create as few domains as possible when designing an infrastructure ?
A license must be purchased from Microsoft for each domain you create .
Additional domains increase the overall hardware and maintenance costs of the deployment
Some applications might be present security issues when working in the forest with multiple domains
Additional domains increase the number of administrative tasks that must be performed
Submit
62.
Which of the following is the simplest form of disk redundancy ?
Disk striping
Disk duplexing
Disk mirroring
Parity-based RAID
Submit
63.
What is the primary difference between global and universal groups?
Global groups decrease the amount of replication traffic between sites
Universal groups add more data to the global catalog
You can use universal groups across the board if your network consists of multiple sites
Global Groups add more data to the universal catalog
Submit
64.
When creating a GPO software installation which option causes the client computer to automatically install the application the next time the computer starts or the user logs on ?
Published
Assigned
Deploy
Advanced
Submit
65.
Which of the following is the strongest authentication protocol supported by windows Server 2008?
Microsoft Encrypted Authentication Versiion 2
Challenge Handshake Authentication Protocol
Password Authentication Protocol (PAP)
Extensible Authentication Protocol (EAP)
Submit
66.
Which of the following is a main group type found in Active Directory ?
Security
Domain
Global
Unversal
Submit
67.
Which application role provides an integrated environment for deploying and running server based business applications ?
Fax
Application
File
Hyper-V
Submit
68.
You must add the role to use a Windows Server 2008 computer as a fax server
Fax server
Fax service
Print Services
WIndows Fax and Scan
Submit
69.
What is the traditional choice for server and network backups ?
Optical disk
Hard disk drive
Magnetic tape
Tape library
Submit
70.
The number of roles that a server can perform is dependent on all of the following factors except the
Computer's hardware configuration
Size and scope of the enterprise
Hardware requirements of the role
Functional level of the domain
Submit
71.
The most common use of a file screen is to
Prevent users from storing unauthorized files types on the server
Protect unauthorized access to files
Prevent users from consuming to much storage space on network server drives
Report users file access
Submit
72.
Which of the following allows designated recovery agents to create public keys that can decode encrypted information ?
Internet authenticaton
Digital signatures
Encrypting File System
IP secuirty
Submit
73.
Which group is used most often when designing an Active Directory infrastructure ?
Distribution
Universal
Global
Security
Submit
74.
What hardware actually produces hard copy documents on paper or other print media ?
Printer driver
Print server
Printer
Print device
Submit
75.
Which single device contains one or more magnetic tape drives as well as a robotic mechanism that inserts tapes into and removes them from the drives?
Tape switcher
Autoloader
SAN
None of the above
Submit
76.
What process is used when is necessary for a computer to convert an IP addresses into a DNS name ?
Name resolution
Reverse name resolution
Iterative querying
Receiving querying
Submit
77.
By default the DHCP server service in windows server 2008 uses dynamic allocation,leasing IP addresses for clients for how many days ?
4 days
5 days
6 days
7 days
Submit
78.
DNS naming limitations call for a maximum of how many characters per domain name ?
32
63
128
255
Submit
79.
When you open a Command Prompt window in standard Windows session and restore the system state ,you are performing a restore
Group Policy
Authoritative
Non-authoritative
Full
Submit
80.
Which of the following is not an element of the client /server model implemented by IIS and Internet Explorer?
Internet Explorer client browser running on the workstation
IIS server running on a Windows Server 2008 computer
Application that makes use of the services provided by the Web server and the client browser
Virtual instance that interacts with both the client and server
Submit
81.
Which fault tolerance solution uses duplicate host adapters as well as duplicate hard drives ?
Disk mirroring
Disk duplication
Disk duplexing
Disk striping
Submit
82.
Which of the following is a hardware or software device running on a computer that accesses the storage devices on the SAN?
ISCSI initiator
ISCSI target
Logical unit number (LUN)
ISCSI SOftware Initiator
Submit
83.
To use shadow copes effectively where must users store their files?
Removable hard drive
Server
Local hard drive
SCSI hard drive
Submit
84.
Which of the following is not a factor that administrators should consider when choosing the length for certificate's lifetime?
Provider of the certificate
Standard practices in the industry
Government regulations
Type of certificate
Submit
85.
In an MMC snap-in ,which of the following panes contains links to the tasks most commonly associated with the content appearing in the detail pane ?
Console pane
Actions pane
Detail pane
Scope pane
Submit
86.
What is the primary drawback of optical disks ?
Cost
Speed
Capacity
Automation
Submit
87.
The windows Deployment Services role includes all the following role services except
Application server
Deployment server
Transport Server
None of the above
Submit
88.
Which of the folllowing is not a message type defined by the DHCP communication protocol?
DHCPACK
DHCPOFFER
DHCPACCEPT
DHCPNAK
Submit
89.
Which of the following holds the failover cluster configuration database ?
Mirrored disk
Fail over disk
Witness disk
None of the above
Submit
90.
Which of the following enables communication between the terminal server and the client ?
Terminal Services
Remote Desktop Connection
Remote Desktop Protocol
Thin client connection
Submit
91.
What MMC console contains a collection of snap-ins that is most commonly used by Windows Server 2008 administrators ?
Reliability and Performance Monitor
Server Manager
File Server Resource Manager
Administrative tools
Submit
92.
Which component in WIndows Server 2008 enables the system to install software packaged as files with an .msi extension ?
Windows Installer 2.0
Windows Installer 3.0
Windows Installer 4.0
Windows Installer 5.0
Submit
93.
For authentication ,PPTP supports all the following authentication protocols except
Microsoft Challenge HandShake Authenticaton Protococol version 1
Microsoft Challenge HandShake Authenticaton Protococol version 2
Microsoft Point to Point Encryption (MPPE)
Extensible Authenticaion Protocol
Submit
94.
Which of the following do attackers use if they want to find an organization 's dial -up ports ?
VPN requests
Port scanner
War dialer
Application fuzzer
Submit
95.
Which of the following is the default windows server 2008 printer sharing configuration ?
Each client uses print server
Print resources are shared between the server and client
Each client uses its own printer and printer driver
Each client its own printer and a shared printer driver
Submit
96.
What must you download and install before using WSUS ?
Microsoft Report Viewer 2005
SQL Server 2005 SP1
WIndows Internal Database
DNS
Submit
97.
Which of the following specifies a value assigned by the CA that uniquely identifies the certificate ?
Signature algorithm
Serial number
Version
Subject
Submit
98.
which of the following is not a role that can be selected when you install Active Directory Certificate Services on a Windows Server 2008 computer ?
Subordinate
Enterprise
Standalone
Intermediate
Submit
99.
Which of the following WIndows Server 2008 certificate templates allows user authenticaton,EFS encryption secure email,and certificate trust list signing ?
Administrator
User
Computer
Domain controller
Submit
100.
Which of the following is the default mode when you create a new MMC console ?
User Mode -Full Access
User Mode -Limited Access ,Multiple Windows
User Mode-limited Access ,Single Window
Author Mode
Submit
101.
To perform a full server restore ,you must boot the system using a Windows Server 2008 installation disk and access the backup disk using which interface ?
PATA
Wbadmin.exe
Windows RE
Ntbackup.exe
Submit
102.
You must also install the when installing the Internet Printing role service
Web Server (IIS) role
WIndows Process Activation Service Feature
Both and a &b
None of the above
Submit
103.
Performance objects,performance counters ,and instances that appear in the Add Counters dialog box depend on all of the following except the
Computer's hardware configuration
Software installed on the computer
Number of servers on the network
Computer's role on the network
Submit
104.
Which of the following is not a main criterion to consider when evaluating the suitability of a storage device for backups?
Speed
Capacity
Cost
Scalability
Submit
105.
Which of the following methods enables the server to support authentication with smart cards or other types of digital certificates ?
Extensible Authentication Protocol Transport level security (EAP-TLS
Protected EAP (PEAP)
Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2)
Encrypted Authentication
Submit
106.
Which of the following is not a permission rule when allowing or denying permissions to security principals ?
Explicit permissions take precedence over inherited permissions.
Allow permissions are cumulative
Deny permissions override Explicit Permissions
Deny Permissions override Allow permissions
Submit
107.
At a minimum the Remote Desktop server must be running the operating system to use Network Level Authentication
Windows XP
Windows Vista
Remote Desktop Connection version 6.0
Windows Server 2008
Submit
108.
Which windows presents a consolidated view of the post-installation tasks that,in previous Windows Server versions,you had to perform using various interfaces presented during and after the OS setup process ?
Customize This Server
Initial Configuration tasks
Add Roles and Add Features
Server Manager Console
Submit
109.
Which of the following is a hard disk partition style supported by Windows Server 2008 ?
MBR
FAT
NTFS
FAT32
Submit
110.
Which of the following contains a digest of the certificate data used for digital signing ?
Certificate policies
Friendly name
Thumbprint algorithm
Thumbprint
Submit
111.
The DNS server receiving a name resolution request can take full responsibility for resolving the name by using what type of query ?
Recursive
Receiving
Responding
Resolution
Submit
112.
Which of the following statements is not true regarding FSRM quotas ?
They can be configured to execute commands
They can be configured to generate reports
They can be configured to create event log entries only
They can be configured to send email notifications
Submit
113.
Which of the following types of connectons is established between two computers involved in the tunneling process ?
VPNs
PPP
PPTP
SSTP
Submit
114.
There are many reasons for registering an internet domain name .which of the following is one of those reasons ?
Create email addresses
Increase network performance
Increase cache
FTP access
Submit
115.
The Services for Network File System snap in does not display in Server Manager when you install the File Services Role .From what area must you run the Services for Network File System snap-in ?
File Services
File and Server Resource Manager
Administrative tools
Server Manger
Submit
116.
Which of the following is not a WSUS architecture configuration?
Multple independent WSUS servers
Multiple synchronized WSUS servers
Multiple disconnected WSUS servers
Mulltiple autonomous WSUS servers
Submit
117.
Which of the following template versions provides backward compatibility for CAs running Windows Server 2003,Standard Edition and Windows 2000 family operating systems?
Version 1
Version 2
Version 3
Version 4
Submit
118.
Which backup is faster to restore ?
Full
Partial
Incremental
Differential
Submit
119.
When using windows Server Backup for scheduled backup jobs,which type of drives can use as a backup?
Optical disks
External hard disk
Network shares
All of the above
Submit
120.
In an MMC snap -in which of the following panes contains a hierarchical list of the snap-ins installed in the console and any subheadings that the snap-ins provide ?
Console pane
Actions pane
Detail pane
Scope pane
Submit
121.
Which of the following graphs displays both current and historical values ?
Histogram
Column
Line
Report view
Submit
122.
A collection of settings in quota template defines all of following except
What actions FSRM should take when a user reaches a threshold
The user credientials under which FSRM operates
What thresholds FSRM should apply to the quota
Whether a quota should be hard or soft
Submit
123.
Which type of DHCP packet is used by servers to acknowledge a client 's acceptance of an offered IP address ?
DHCPOFFER
DHCPNAK
DHCPACK
DHCPACCEPT
Submit
124.
A computer communicates with a print device through which software interface ?
Printer driver
Print server
Printer
Print spooler
Submit
125.
Secure Socket Tunneling Protocol (SSTP) is supported only on clients running which of the following operating systems ?
Windows Vista
Windows Vista with Service Pack 1
Windows Server 2008
Windows XP with Service Pack 2
Submit
×
Thank you for your feedback!
View My Results
Related Quizzes
Tablet Quiz: What Tablet Should I Buy Quiz
Tablet Quiz: What Tablet Should I Buy Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (125)
Unanswered (
)
Answered (
)
Which built in role enables Windows server 2008 to host virtual...
Which permissions do administrators typically use to assign storage...
To use a Windows Server 2008 computer as a domain controller,you must...
Hyper-V available on which version of Server Core
Which of the following is the preferred file system for a server ?
Which version of WIndows Server 2008 must computers be running...
What is the term for the ability of entire servers to be redundant so...
Which drive type must a WDS servers have to store image files ?
The simple print architecture consists of one print device that is...
What is the full DNS name for a particular computer called ?
To send email messages ,what service does a Windows Server 2008...
Active Directory was first introduced in which operating system?
A well designed sharing strategy provides each user with three...
Which windows installation option in windows server 2008...
Which group is used for non security-related functions such as sending...
An active Directory domain controller can verify user's identity by...
Which of the following is an advantage of using Microsoft Terminal...
To whom should you always assign security permissions ?
In what type of configuration does the computer write the same data to...
Which role is used when performing unattended installations of Windows...
Which of the following is part of the recommended hardware environment...
Where do users log in when joining an Active Directory?
The read only domain Controller (RODC) supports only incoming...
Which operating system cannot process the Software installation...
An Install image contains the operating system that WDS will install...
Which type of file is a script containing responses to all of the...
To which type of server do client computers on the network send their...
Which of the following features can be used to automate the shadow...
What mechanism allows users to work with copies of files that remain...
In what type of communication can servers access storage devices over...
Which of the following has become the primary backup medium for home...
What must a network adapter support on the client computer for the WDS...
Which of the following s not a primary management tool for Active...
Which of the following is not a variable that can affect the...
Which console can be used to create multiple shares and exercise more...
Which command prompt utility can be used to perform disk management...
Which of the following authentication devices verifies the identify of...
Which of the following is the most basic type of backup job and copies...
Which kind of backup job backs up only the files that have changed...
What is the name of the communications protocol called for by the...
The Fax Service Manager application enables administrators to do all...
Which type of backup job backs only the files that have changed since...
MAP can run on the 32 -bit version of all the following...
Which of the following is not a top level domain ?
Which technique creates multiple resource records using the same name...
In which operating system is the Previous Versions Client not...
Which of the following is a disadvantage of a centralized DHCP...
Which print services role installs the print management console ...
What role service maintains a database of client sessions and enables...
Which of type of log contains events that signify a change in the...
Which new tool provides capabilities so you can evaluate the hardware...
What converts the print jobs generated by applications into an...
is the only role...
What is one way to simplify the process of deploying applications on a...
Which tool builds automated deployment solutions and is included with...
Which method is most frequently used for providing fault tolerance to...
What must at least one DNS server support when running Active...
To protect workstation applications and ensure their continued...
Which graphical utility creates and modifies the answer files you can...
There are two basic classes of objects in an Active Directory domain....
Which of the following is not a reason why you should try to create as...
Which of the following is the simplest form of disk redundancy ?
What is the primary difference between global and universal groups?
When creating a GPO software installation which option causes the...
Which of the following is the strongest authentication protocol...
Which of the following is a main group type found in Active Directory...
Which application role provides an integrated environment for...
You must add the role to use a Windows Server 2008 computer as a...
What is the traditional choice for server and network backups ?
The number of roles that a server can perform is dependent on all of...
The most common use of a file screen is to
Which of the following allows designated recovery agents to...
Which group is used most often when designing an Active Directory...
What hardware actually produces hard copy documents on paper or other...
Which single device contains one or more magnetic tape drives as well...
What process is used when is necessary for a computer to convert an IP...
By default the DHCP server service in windows server 2008 uses dynamic...
DNS naming limitations call for a maximum of how many characters per...
When you open a Command Prompt window in standard Windows session and...
Which of the following is not an element of the client /server model...
Which fault tolerance solution uses duplicate host adapters as well as...
Which of the following is a hardware or software device running on a...
To use shadow copes effectively where must users store their files?
Which of the following is not a factor that administrators ...
In an MMC snap-in ,which of the following panes contains links ...
What is the primary drawback of optical disks ?
The windows Deployment Services role includes all the following role...
Which of the folllowing is not a message type defined by the DHCP...
Which of the following holds the failover cluster configuration...
Which of the following enables communication between the terminal...
What MMC console contains a collection of snap-ins that is most...
Which component in WIndows Server 2008 enables the system to install...
For authentication ,PPTP supports all the following...
Which of the following do attackers use if they want to find an...
Which of the following is the default windows server 2008 printer...
What must you download and install before using WSUS ?
Which of the following specifies a value assigned by the CA that...
which of the following is not a role that can be selected when...
Which of the following WIndows Server 2008 certificate templates...
Which of the following is the default mode when you create a new...
To perform a full server restore ,you must boot the system using a...
You must also install the when installing the Internet Printing...
Performance objects,performance counters ,and instances that appear in...
Which of the following is not a main criterion to consider when...
Which of the following methods enables the server to support...
Which of the following is not a permission rule when allowing or...
At a minimum the Remote Desktop server must be running...
Which windows presents a consolidated view of the post-installation...
Which of the following is a hard disk partition style supported by...
Which of the following contains a digest of the certificate data used...
The DNS server receiving a name resolution request can take full...
Which of the following statements is not true regarding FSRM quotas ?
Which of the following types of connectons is established between two...
There are many reasons for registering an internet domain name .which...
The Services for Network File System snap in does not display in...
Which of the following is not a WSUS architecture configuration?
Which of the following template versions provides backward...
Which backup is faster to restore ?
When using windows Server Backup for scheduled backup jobs,which type...
In an MMC snap -in which of the following panes contains a...
Which of the following graphs displays both current and historical...
A collection of settings in quota template defines all of following...
Which type of DHCP packet is used by servers to acknowledge a client...
A computer communicates with a print device through which...
Secure Socket Tunneling Protocol (SSTP) is supported only on clients...
X
OK
X
OK
Cancel
X
OK
Cancel
Your Rank: #-- / --
Leaderboard
✕