1.
Windows Web Server 2008 can be used to manage directory resources via hosting Active Directory.
Correct Answer
B. False
Explanation
Windows Web Server 2008 is not designed to manage directory resources or host Active Directory. Instead, it is specifically designed as a web server platform, providing the necessary tools and features for hosting websites and web applications. Active Directory is a separate service provided by Windows Server operating systems, such as Windows Server 2008 Standard or Enterprise editions, which are designed for managing directory resources and hosting Active Directory. Therefore, the given statement is false.
2.
Exceeding the minimum requirements makes your server more scalable and able to meet increased
requirements as the organization grows.
Correct Answer
A. True
Explanation
Exceeding the minimum requirements for a server means that it is built with additional resources and capabilities. This allows the server to handle higher workloads and accommodate increased demands as the organization grows. By having a more scalable server, the organization can easily adapt to changing needs without the need for frequent upgrades or replacements. Therefore, the statement "Exceeding the minimum requirements makes your server more scalable and able to meet increased requirements as the organization grows" is true.
3.
NTFS supports large disk volumes of up to 16 GB.
Correct Answer
B. False
Explanation
The statement is incorrect. NTFS (New Technology File System) supports large disk volumes of up to 16 terabytes (TB), not 16 gigabytes (GB).
4.
ServerManagerCmd.exe is executed from the command line through the Command Prompt window.
Correct Answer
A. True
Explanation
ServerManagerCmd.exe is a command-line tool used to manage server roles and features on Windows Server operating systems. It is executed from the command line through the Command Prompt window, where users can type commands to interact with the tool. Therefore, the statement "ServerManagerCmd.exe is executed from the command line through the Command Prompt window" is true.
5.
A computer contains an unlimited number of IRQ lines.
Correct Answer
B. False
Explanation
A computer does not contain an unlimited number of IRQ (Interrupt Request) lines. IRQ lines are limited resources that are used to manage and prioritize hardware interrupts in a computer system. The number of IRQ lines available varies depending on the specific computer architecture and hardware configuration. Therefore, the statement that a computer contains an unlimited number of IRQ lines is false.
6.
Device drivers that are unsigned can also be loaded in x64 versions of Windows Server 2008.
Correct Answer
B. False
Explanation
Unsigned device drivers cannot be loaded in x64 versions of Windows Server 2008. This is because x64 versions of Windows Server 2008 only allow the loading of digitally signed device drivers. Unsigned drivers pose a security risk as they have not been verified by Microsoft, and therefore the operating system does not allow their installation or loading.
7.
Memory activities performed through virtual memory are as fast as those performed in RAM.
Correct Answer
B. False
Explanation
The statement is false because memory activities performed through virtual memory are not as fast as those performed in RAM. Virtual memory is a technique used by operating systems to extend the available memory by using a portion of the hard disk as additional memory. Accessing data from virtual memory involves transferring data between RAM and the hard disk, which is slower compared to accessing data directly from RAM. Therefore, memory activities performed in virtual memory are slower than those performed in RAM.
8.
____ is the ability to increase the access to server resources and provide fail-safe services by linking two ormore discrete computer systems so they appear to function as though they are one.
Correct Answer
A. Clustering
Explanation
Clustering is the ability to increase the access to server resources and provide fail-safe services by linking two or more discrete computer systems so they appear to function as though they are one. This means that multiple servers are interconnected and work together to distribute the workload and increase the availability of resources. By doing so, clustering enhances the performance, reliability, and scalability of the system.
9.
____ means that a processor can be added to an empty processor slot while the system is running.
Correct Answer
D. Hot-add processor
Explanation
Hot-add processor means that a processor can be added to an empty processor slot while the system is running. This feature allows for easy expansion and scalability of the system without the need for a system shutdown or restart. It is a convenient and efficient way to increase processing power in real-time, making it a valuable feature for high-performance computing environments.
10.
A ____ is a grouping of network objects, such as computers, servers, and user accounts, that provides for
easier management.
Correct Answer
C. Domain
Explanation
A domain is a grouping of network objects, such as computers, servers, and user accounts, that provides for easier management. In a domain, all network resources and user accounts are centrally managed by a domain controller, allowing administrators to easily assign permissions, enforce security policies, and manage user accounts and resources. This simplifies the management process and provides a centralized control and administration point for the network.
11.
____ enables the server administrator to manage critical configuration features from inside one tool.Server Core
Correct Answer
D. Server Manager
Explanation
Server Manager enables the server administrator to manage critical configuration features from inside one tool. It provides a centralized interface for managing multiple servers, allowing administrators to easily monitor and control various aspects such as server roles, features, storage, networking, and security. With Server Manager, administrators can efficiently perform tasks like installing and removing server roles, configuring services, monitoring performance, and troubleshooting issues. It simplifies the management process by providing a single tool that consolidates all the necessary configuration features, making it easier for administrators to maintain and control their server infrastructure.
12.
____ is an umbrella of security protection features that monitor and manage a server and its clients.
Correct Answer
C. NAP
Explanation
NAP stands for Network Access Protection, which is an umbrella of security protection features that monitor and manage a server and its clients. NAP ensures that all devices connecting to a network meet certain security requirements, such as having up-to-date antivirus software or the latest security patches. It helps to enforce network health policies and prevent the spread of malware or other security threats.
13.
Windows Server 2008 comes with Microsoft ____ to transform the server into a versatile Web server.
Correct Answer
B. IIS
Explanation
Windows Server 2008 comes with Microsoft IIS (Internet Information Services) to transform the server into a versatile Web server. IIS is a web server software that provides a platform for hosting websites, applications, and services on the internet or intranet. It offers features such as website management, security, performance optimization, and support for various web technologies like ASP.NET, PHP, and HTML. By using IIS, organizations can easily deploy and manage web applications, making Windows Server 2008 a suitable choice for hosting websites and web services.
14.
____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and
Linux servers.
Correct Answer
A. Windows Server Core
Explanation
Windows Server Core is a minimum server configuration that is designed to function similarly to traditional UNIX and Linux servers. It provides a lightweight and stripped-down version of the Windows Server operating system, without the graphical user interface (GUI). This allows for reduced resource usage and a smaller attack surface, making it more secure and efficient. Windows Server Core is managed through the command line interface, making it ideal for headless server deployments and automation.
15.
Windows ____ is a command-line interface that offers a shell.
Correct Answer
C. PowerShell
Explanation
PowerShell is the correct answer because it is a command-line interface that provides a shell in Windows. It is a powerful scripting language and automation framework that allows users to manage and control the Windows operating system and other Microsoft applications. PowerShell offers a wide range of commands and features that enable system administrators to perform various tasks efficiently and effectively. It is widely used in Windows environments for its flexibility and extensive capabilities.
16.
Windows PowerShell offers over 130 command-line tools, also called____
Correct Answer
D. Cmdlets
Explanation
Windows PowerShell offers over 130 command-line tools, also called cmdlets. Cmdlets are specialized .NET classes that are designed to perform a specific task. They are the building blocks of PowerShell commands and provide a way to automate administrative tasks, manage system components, and perform various operations on Windows systems. Cmdlets are easy to use and provide a consistent and efficient way to interact with the underlying operating system and applications.
17.
The operating system kernel runs in ____ mode, which protects it from problems created by a malfunctioning
program or process.
Correct Answer
D. Privileged
Explanation
The operating system kernel runs in privileged mode, which protects it from problems created by a malfunctioning program or process. Privileged mode gives the kernel higher privileges and control over the system resources, allowing it to perform critical tasks and manage the execution of programs. By running in privileged mode, the kernel can isolate and contain any issues that may arise from a malfunctioning program or process, preventing them from affecting the stability and functionality of the entire system.
18.
Before any final decisions are made in selecting hardware, you should check the hardware for the ____ sticker
or consult the Windows Server Catalog of Tested Products.
Correct Answer
A. Certified for Windows Server 2008
Explanation
Before any final decisions are made in selecting hardware, you should check the hardware for the "Certified for Windows Server 2008" sticker or consult the Windows Server Catalog of Tested Products. This ensures that the hardware has been tested and certified to be compatible and reliable with Windows Server 2008.
19.
If you are upgrading a computer that has been used for a different operating system, such as one currently
running Windows Server 2003, that computer might already be in the Catalog of Tested Products, but it might
still be necessary to upgrade the ____.
Correct Answer
D. BIOS
Explanation
When upgrading a computer that has been used for a different operating system, such as Windows Server 2003, it is possible that the computer is already listed in the Catalog of Tested Products. However, it may still be necessary to upgrade the BIOS. The BIOS (Basic Input/Output System) is firmware that is responsible for initializing the hardware components of the computer and starting the operating system. Upgrading the BIOS ensures compatibility with the new operating system and can improve system performance and stability.
20.
NTFS has been supported in Windows Server systems from when ____ was introduced in the early 1990s to
Windows 2000 Server and Windows Server 2003.
Correct Answer
D. Windows NT Server
Explanation
NTFS has been supported in Windows Server systems from when Windows NT Server was introduced in the early 1990s to Windows 2000 Server and Windows Server 2003.
21.
____ is used in conjunction with Active Directory to make file searching and retrieval faster.
Correct Answer
B. Indexing
Explanation
Indexing is used in conjunction with Active Directory to make file searching and retrieval faster. Indexing creates a catalog of file names, keywords, and other attributes, allowing for quick and efficient searching based on specific criteria. This catalog is stored separately from the actual files, reducing the time required to locate and retrieve files. By utilizing indexing, users can quickly find the files they need within the Active Directory environment.
22.
____ by a file system means that it tracks changes to files and keeps a record of these changes in a separate
log file.
Correct Answer
A. Journaling
Explanation
Journaling by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file. This log file acts as a safety net in case of system crashes or power failures, ensuring that any changes made to files are not lost or corrupted. It allows for quick recovery and prevents data loss by providing a reliable way to restore the file system to a consistent state.
23.
____ means that when software in Windows Server 2008 runs into a damaged disk area, NTFS can heal the
area without having to take down the server.
Correct Answer
C. Self-healing
Explanation
Self-healing means that when software in Windows Server 2008 runs into a damaged disk area, NTFS can automatically repair or fix the area without requiring the server to be taken down. This feature ensures that the server remains operational and minimizes downtime caused by disk errors.
24.
One ____ is a license for one workstation to access the server.
Correct Answer
A. CAL
Explanation
A CAL (Client Access License) is a license that allows one workstation to access the server. It is a type of license that is required in certain software or server environments to regulate the number of client devices or users that can connect to the server. CALs are typically used in Microsoft server environments and are necessary for each individual device or user that accesses the server.
25.
Windows Server 2008 ____ version is designed to have a small footprint on a network, making it less
vulnerable to Internet attackers.
Correct Answer
C. Server Core
Explanation
Server Core is the correct answer because it is a stripped-down version of Windows Server 2008 that is designed to have a small footprint on a network. By removing unnecessary components and features, Server Core reduces the attack surface and minimizes the potential vulnerabilities that can be exploited by Internet attackers. This lightweight version of Windows Server is ideal for running specific server roles, such as domain controllers or file servers, while providing improved security and stability.
26.
A(n) ____ is a set of unique identification information that is typically put at the end of a file, or that is
associated with a computer communication.
Correct Answer
A. Digital certificate
Explanation
A digital certificate is a set of unique identification information that is typically put at the end of a file or associated with a computer communication. It serves as a form of identification and verification, ensuring the authenticity and integrity of the file or communication. Digital certificates are commonly used in secure communication protocols such as HTTPS, where they verify the identity of websites and encrypt data transmission. They are also used in email encryption and digital signatures to provide security and trust in electronic communication.
27.
The ____ role is central to implementing Active Directory and creating one or more domains.
Correct Answer
D. Active Directory Domain Services
Explanation
The correct answer is Active Directory Domain Services. This role is central to implementing Active Directory and creating one or more domains. Active Directory Domain Services is responsible for managing and organizing a network's resources, such as users, computers, and groups, and providing a centralized authentication and authorization mechanism. It allows for the creation and management of domains, which are logical groupings of resources within a network.
28.
____ is used to manage security tokens and security services on a Windows Server 2008 Web-based network.
Correct Answer
C. Active Directory Federation Services
Explanation
Active Directory Federation Services (ADFS) is used to manage security tokens and security services on a Windows Server 2008 Web-based network. ADFS enables single sign-on (SSO) across different applications and platforms by securely sharing user authentication and authorization information between trusted entities. It allows users to access multiple applications and services using a single set of credentials, reducing the need for multiple logins. ADFS also provides a secure way to federate identities with external organizations, allowing users from different domains or forests to access resources in a trusted manner.
29.
____ enables folders shared from multiple computers to appear as though they exist in one centralized
hierarchy of folders instead of on many different computers
Correct Answer
C. DFS
Explanation
DFS (Distributed File System) enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers. This allows users to access and manage files and folders from different locations as if they were all stored in one place. DFS provides a unified view of the distributed file system and simplifies file sharing and organization across multiple machines.
30.
The ____ role is used to enable client computers to run services and software applications on the server
instead of on the client.
Correct Answer
B. Terminal Services
Explanation
Terminal Services is the correct answer because it allows client computers to run services and software applications on the server instead of on the client. This enables centralized management and control of applications, reduces the load on client machines, and allows for remote access to applications from any device with an internet connection.
31.
Windows Deployment Services operate in a(n) ____.
Correct Answer
A. Preboot Execution Environment (PXE)
Explanation
Windows Deployment Services operate in a Preboot Execution Environment (PXE). PXE is a network protocol that allows a computer to boot using files stored on a network server. It enables network booting, which is essential for deploying operating systems and other software across multiple computers in a network. With PXE, administrators can remotely install and configure Windows operating systems on client computers without the need for physical media. Windows Deployment Services utilize PXE to streamline the deployment process and make it more efficient and centralized.
32.
The ____ command enables you to view and configure network interfaces
Correct Answer
B. Netsh
Explanation
The netsh command is used to view and configure network interfaces. It allows users to manage various network settings such as IP addresses, DNS servers, and network protocols. By using the netsh command, users can easily modify network configurations and troubleshoot network connectivity issues.
33.
The File Services role focuses on sharing files from the server or using the server to coordinate and simplify
file sharing through ____.
Correct Answer
D. DFS
Explanation
The File Services role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through DFS. DFS stands for Distributed File System, which is a Microsoft technology that allows users to access and manage files located on different servers as if they were all stored in one location. It provides a unified namespace and allows for load balancing and fault tolerance.
34.
In addition to the Server Manager GUI tool, you can also use the ____ command-line tool for managing
server roles.
Correct Answer
A. ServerManagerCmd.exe
Explanation
ServerManagerCmd.exe is the correct answer because it is a command-line tool that can be used for managing server roles, in addition to the Server Manager GUI tool. This tool allows administrators to perform various tasks and configurations on a server without relying on a graphical interface, providing flexibility and efficiency in managing server roles.
35.
____ provides a graphical view of all hardware currently installed on your computer.
Correct Answer
B. Device Manager
Explanation
Device Manager is a Windows tool that provides a graphical view of all hardware currently installed on a computer. It allows users to view and manage devices, update drivers, disable or enable devices, and troubleshoot hardware issues. By accessing the Device Manager, users can easily identify and monitor the hardware components of their computer system.
36.
____ is a Windows Server 2008 tool that verifies system and critical files to determine if they have a
signature.
Correct Answer
C. Sigverif
Explanation
Sigverif is a Windows Server 2008 tool that verifies system and critical files to determine if they have a signature. This tool is used to check the integrity and authenticity of files by comparing their digital signatures with the ones stored in a trusted database. By verifying the signatures of files, Sigverif helps to ensure that the system is protected against tampering or unauthorized modifications.
37.
____ allows you to configure how processor resources are allocated to programs.
Correct Answer
A. Processor scheduling
Explanation
Processor scheduling allows you to configure how processor resources are allocated to programs. It determines the order and priority in which programs are executed, ensuring that each program gets its fair share of processing time. By adjusting the scheduling settings, you can prioritize certain programs or processes, optimize resource allocation, and improve overall system performance. This feature is particularly important in multitasking operating systems, where multiple programs are running simultaneously and competing for processor resources.
38.
Virtual memory works through a technique called ____, whereby blocks of information, called pages, are
moved from RAM into virtual memory on disk.
Correct Answer
D. Paging
Explanation
Virtual memory works through a technique called paging, whereby blocks of information, called pages, are moved from RAM into virtual memory on disk. This allows the operating system to free up physical memory by storing less frequently accessed pages on disk, and bringing them back into RAM when they are needed. Paging helps in managing memory efficiently and allows for larger programs to run on systems with limited physical memory.
39.
On a typical x86 computer, data is paged in blocks of ____ KB.
Correct Answer
B. 4
Explanation
On a typical x86 computer, data is paged in blocks of 4 KB. This means that the computer's memory management system divides the memory into fixed-size blocks called pages, and each page is 4 KB in size. This paging system allows for efficient memory management and allocation, as well as facilitating virtual memory and the use of page tables.
40.
When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the ____ transfer mode
by default.
Correct Answer
B. DMA
Explanation
When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the DMA (Direct Memory Access) transfer mode by default. DMA is a method of data transfer between the computer's memory and the storage device without involving the CPU. It allows for faster and more efficient data transfer compared to PIO (Programmed Input/Output) mode, which relies on the CPU for data transfer. SCSI (Small Computer System Interface) is a different type of interface used for connecting storage devices, and SWT (Software Transactional Memory) is a programming concept unrelated to drive transfer modes.
41.
____ environment variables are defined by the operating system and apply to any user logged onto the
computer.
Correct Answer
C. System
Explanation
System environment variables are defined by the operating system and apply to any user logged onto the computer. These variables are accessible system-wide and can be used by all users and processes running on the computer. They provide important information and configuration settings for the operating system and various software applications.
42.
____ environment variables can be defined on a per-user basis, such as specifying the path where application
files are stored
Correct Answer
C. User
Explanation
User environment variables can be defined on a per-user basis, allowing each user to customize their own environment settings. These variables can include information such as the path where application files are stored, allowing users to easily access their files and applications. This ensures that each user has their own personalized environment, tailored to their specific needs and preferences.
43.
Microsoft ____ Protocol is used when the Hyper-V role is installed in Windows Server 2008.
Correct Answer
A. Virtual Network Switch
Explanation
The correct answer is "Virtual Network Switch". When the Hyper-V role is installed in Windows Server 2008, the Microsoft Virtual Network Switch Protocol is used. This protocol allows for the creation and management of virtual switches, which are used to connect virtual machines to the physical network. The virtual network switch acts as a bridge between the virtual machines and the physical network, allowing them to communicate with other machines and access network resources.
44.
The Windows Server 2008 ____ is a very complex database containing all information the operating system
needs about the entire server
Correct Answer
C. Registry
Explanation
The correct answer is "Registry". The Windows Server 2008 Registry is a very complex database that contains all the information the operating system needs about the entire server. It stores configuration settings for hardware, software, and user preferences, allowing the system to function properly. The Registry is crucial for the smooth operation of the server as it holds vital information for various system components and applications.
45.
A Registry ____ is a category or division of information within the Registry.
Correct Answer
A. Key
Explanation
In a Registry, a key is a category or division of information. It acts as a container that holds various subkeys and values. Keys are used to organize and manage data within the Registry, allowing users to easily locate and modify specific information.
46.
A Registry ____ is a data parameter associated with a software or hardware characteristic under a key (or
subkey).
Correct Answer
C. Entry
Explanation
An "entry" in a registry is a specific data parameter that is associated with a software or hardware characteristic under a key (or subkey). It represents a specific value or information stored within the registry, allowing the software or hardware to access and utilize that data when needed.
47.
The ______________________________ is the full cost of owning a network, including hardware, software,
training, maintenance, and user support costs.
Correct Answer
TCO
Explanation
The TCO, or Total Cost of Ownership, is the complete expense associated with owning and operating a network. It encompasses all costs involved in maintaining the network, such as purchasing hardware and software, providing training to users, conducting maintenance activities, and offering support to users. The TCO provides a comprehensive view of the financial investment required to sustain a network infrastructure.
48.
Windows Server 2008 supports UNIX and Linux clients using the _______
Correct Answer
SUA
Explanation
Windows Server 2008 supports UNIX and Linux clients using the SUA (Subsystem for UNIX-based Applications). SUA is a compatibility layer that allows UNIX and Linux applications to run on Windows Server 2008. It provides a set of tools, utilities, and APIs that enable cross-platform integration and interoperability between Windows and UNIX/Linux systems. With SUA, administrators can manage and administer UNIX and Linux clients from a Windows Server environment, making it easier to integrate and manage heterogeneous IT environments.
49.
______________________________ is a set of standards designed to enable portability of applications from
one computer system to another and has been used particularly for UNIX and Linux systems.
Correct Answer
POSIX
Explanation
POSIX (Portable Operating System Interface) is a set of standards that allows applications to be easily transferred from one computer system to another. It has been widely used for UNIX and Linux systems, ensuring compatibility and portability across different platforms. By adhering to POSIX standards, developers can write code that will work on various operating systems, reducing the need for rewriting or modifying applications for different environments.
50.
A server’s ____________________ include the interrupt request (IRQ) line (which is a channel for
communication with the CPU) and other elements such as the I/O address and reserved memory range
Correct Answer
resources
Explanation
The server's resources refer to the various components and elements that it utilizes for communication and operation. These resources include the interrupt request (IRQ) line, which serves as a channel for communication with the CPU. Additionally, the server's resources encompass other elements such as the I/O address and reserved memory range. These resources are essential for the server to function properly and efficiently.