W2k8 NIC Ch. 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Red.poppy22
R
Red.poppy22
Community Contributor
Quizzes Created: 2 | Total Attempts: 410
Questions: 20 | Attempts: 141

SettingsSettingsSettings
W2k8 NIC Ch. 2 - Quiz


Review of 70-642 Chapter 2: Installing Microsoft Windows Server 2008


Questions and Answers
  • 1. 

    The ability to use the installation process to fix problems with an existing Windows Server System is called:

    • A.

      Repair mode

    • B.

      Core mode

    • C.

      Safe mode

    • D.

      Sleep mode

    Correct Answer
    A. Repair mode
    Explanation
    Repair mode refers to the ability to use the installation process to fix problems with an existing Windows Server System. In repair mode, the installation process can be used to repair corrupted system files, recover from system crashes, and resolve other issues that may be preventing the server from functioning properly. This mode allows users to access advanced troubleshooting options and perform repairs without having to reinstall the entire operating system. It is a valuable tool for troubleshooting and resolving issues with a Windows Server System.

    Rate this question:

  • 2. 

    Installation of just the neccesary components for a particular server role, without the GUI and other software features, is called:

    • A.

      System core

    • B.

      Windows core

    • C.

      Apple core

    • D.

      Server core

    Correct Answer
    D. Server core
    Explanation
    Server Core is the correct answer because it refers to the installation of only the necessary components for a specific server role, without the GUI and other software features. This allows for a more streamlined and efficient server setup, reducing resource usage and potential security vulnerabilities. By removing unnecessary components, Server Core minimizes the attack surface and provides a more focused and secure server environment.

    Rate this question:

  • 3. 

    This screen appears by default when the Windows Server 2008 operating system is first installed:

    • A.

      System

    • B.

      Features and settings

    • C.

      Startup

    • D.

      Initial configuration

    Correct Answer
    D. Initial configuration
    Explanation
    The initial configuration screen appears by default when the Windows Server 2008 operating system is first installed. This screen allows users to set up basic system features and settings, such as network configuration, user accounts, and security options. It provides an initial setup process to customize the server according to the user's requirements before fully utilizing the operating system.

    Rate this question:

  • 4. 

    This offers the best performance of any multi-disk configuration option within the Disk Management MMC, but does so at the expence of fault tolerance:

    • A.

      RAID-5 volume

    • B.

      RAID-1 volume

    • C.

      RAID-3 volume

    • D.

      RAID-0 volume

    Correct Answer
    A. RAID-5 volume
    Explanation
    A RAID-5 volume offers the best performance among the given options in the Disk Management MMC. However, this performance comes at the expense of fault tolerance. RAID-5 uses striping with parity, which distributes data and parity information across multiple disks. This allows for improved read and write speeds. However, if one disk fails, there is no redundancy to recover the lost data, which reduces fault tolerance compared to other RAID configurations like RAID-1 or RAID-3.

    Rate this question:

  • 5. 

    The feature that allows users on different computers to access the Internet through a single connection is called:

    • A.

      Internet Connection Sharing

    • B.

      Network and Sharing Center

    • C.

      Sharing Properties

    • D.

      Shareware

    Correct Answer
    A. Internet Connection Sharing
    Explanation
    Internet Connection Sharing is the correct answer because it refers to the feature that enables multiple users on different computers to access the Internet through a single connection. This feature allows one computer to act as a gateway or router, sharing its internet connection with other devices on the network. It is commonly used in home or small office environments where there is a limited number of internet connections available.

    Rate this question:

  • 6. 

    This provides a single point of administration to configure networking and firewall configuration tasks on a Windows Server 2008 computer:

    • A.

      Network and sharing center

    • B.

      Internet connection sharing

    • C.

      Sharing properties

    • D.

      Shareware

    Correct Answer
    A. Network and sharing center
    Explanation
    The Network and Sharing Center in Windows Server 2008 provides a centralized location for configuring networking and firewall settings. It allows administrators to manage network connections, view network status, set up new connections, and modify advanced sharing settings. By using the Network and Sharing Center, administrators can easily control and configure various networking and firewall configuration tasks on a Windows Server 2008 computer.

    Rate this question:

  • 7. 

    The setting describing the network enviroment, such as home or public network is called:

    • A.

      Network location

    • B.

      Routing address

    • C.

      Network address

    • D.

      File address

    Correct Answer
    A. Network location
    Explanation
    The term "network location" refers to the setting that describes the network environment in which a device is connected, whether it is a home or public network. It helps determine the security settings and permissions that are applied to the device when connected to a specific network. The other options, such as routing address, network address, and file address, do not specifically describe the network environment setting.

    Rate this question:

  • 8. 

    Unsolicited Inbound traffic can be blocked through the use of:

    • A.

      Windows firewall

    • B.

      Windows server

    • C.

      Windows 98

    • D.

      Windows explorer

    Correct Answer
    A. Windows firewall
    Explanation
    Windows Firewall is a security feature in Microsoft Windows operating systems that monitors and controls inbound and outbound network traffic. It can be configured to block unsolicited inbound traffic, which refers to incoming network traffic that is not requested or initiated by the user or system. By blocking such traffic, Windows Firewall helps to protect the system from potential threats and unauthorized access attempts. Windows Server, Windows 98, and Windows Explorer are not specifically designed or commonly used for blocking unsolicited inbound traffic.

    Rate this question:

  • 9. 

    Server computers and other systems that need to be accessed reliably by network clients should be configured with this:

    • A.

      Static IP address

    • B.

      Dynamic IP address

    • C.

      Hyper IP address

    • D.

      Lossy IP address

    Correct Answer
    A. Static IP address
    Explanation
    Server computers and other systems that need to be accessed reliably by network clients should be configured with a static IP address. A static IP address is a fixed address that is manually assigned to a device and remains constant. This is important for servers as it allows them to have a consistent and predictable address, making it easier for clients to connect to them. In contrast, a dynamic IP address is automatically assigned by a DHCP server and can change over time, which can cause connectivity issues for clients trying to access the server. Hyper IP address and lossy IP address are not valid terms in networking.

    Rate this question:

  • 10. 

    Once a disk is converted from a basic disk to this, it can be accessed only by operating systems that support dynamic disks: Windows 2000 Professional, Windows XP Professional, Windows Vista Business, Enterprise or Ultimate, Windows 2000 Server, Windows Server 2003, and Windows Server 2008.

    • A.

      Dynamic disk

    • B.

      Static disk

    • C.

      RAID-0

    • D.

      Generic disk

    Correct Answer
    A. Dynamic disk
    Explanation
    Once a disk is converted from a basic disk to a dynamic disk, it can only be accessed by operating systems that support dynamic disks. This means that only Windows 2000 Professional, Windows XP Professional, Windows Vista Business, Enterprise or Ultimate, Windows 2000 Server, Windows Server 2003, and Windows Server 2008 can access and manage the dynamic disk. Other operating systems may not recognize or be able to work with dynamic disks. Therefore, the correct answer is dynamic disk.

    Rate this question:

  • 11. 

    What type of licence key allows you to host an activation service locally within your own network?

    • A.

      Multiple activation key

    • B.

      Key activation system

    • C.

      Key management system

    • D.

      Multiple management system

    Correct Answer
    C. Key management system
    Explanation
    A key management system is a type of license key that allows you to host an activation service locally within your own network. This means that you have control over the activation process and can manage the licenses within your network without relying on external servers or services. It provides a more secure and customizable solution for managing license keys within an organization.

    Rate this question:

  • 12. 

    What type of Volume uses 50% of available space to provide fault tolerance for the volume?

    • A.

      RAID-0

    • B.

      RAID-5

    • C.

      RAID-6

    • D.

      RAID-1

    Correct Answer
    B. RAID-5
    Explanation
    RAID-5 is the correct answer because it uses 50% of the available space to provide fault tolerance for the volume. In RAID-5, data is striped across multiple disks along with parity information. This allows for the loss of one disk without any data loss, as the parity information can be used to reconstruct the lost data. By using 50% of the available space for parity, RAID-5 provides fault tolerance while still maximizing storage capacity. RAID-0 does not provide fault tolerance, RAID-6 uses more than 50% of the available space for parity, and RAID-1 mirrors the data across multiple disks without striping or parity.

    Rate this question:

  • 13. 

    Which disk formatting option will cause a disk to appear as a folder within an existing volume:

    • A.

      Mount point

    • B.

      Mirrored volume

    • C.

      Striped volume

    • D.

      GPT point

    Correct Answer
    A. Mount point
    Explanation
    A mount point is a directory in a file system where additional storage devices, such as disks, can be accessed. By assigning a disk as a mount point, it will appear as a folder within an existing volume. This allows for easy access and management of the disk's contents within the file system. Mirrored volume and striped volume are disk configurations that involve combining multiple disks for redundancy or performance, respectively. GPT (GUID Partition Table) is a disk partitioning scheme and is not directly related to the question.

    Rate this question:

  • 14. 

    Which windows serer 2008 feature installs and configured wireless connections and wireless LANs profiles?

    • A.

      Network and sharing center

    • B.

      Windows firewall with advanced security

    • C.

      Network access protection

    • D.

      Wireless networking

    Correct Answer
    D. Wireless networking
    Explanation
    Wireless networking is the correct answer because it is a feature in Windows Server 2008 that allows users to install and configure wireless connections and wireless LAN profiles. This feature enables the server to connect to wireless networks and manage the settings for wireless connectivity, including the ability to set up and manage profiles for different wireless networks. The other options, such as network and sharing center, windows firewall with advanced security, and network access protection, are not specifically designed for installing and configuring wireless connections and profiles.

    Rate this question:

  • 15. 

    What was the primary means of name resolution on Windows networks prior to the introduction of Windows 2000 and active directory?

    • A.

      NetBIOS

    • B.

      AppleTalk

    • C.

      Domain Name System

    • D.

      HOSTS files

    Correct Answer
    A. NetBIOS
    Explanation
    NetBIOS was the primary means of name resolution on Windows networks prior to the introduction of Windows 2000 and active directory. NetBIOS provided a way for computers on the network to communicate and resolve names to IP addresses. It allowed for the identification and communication between devices using unique names. However, with the introduction of Windows 2000 and active directory, the Domain Name System (DNS) became the primary means of name resolution, providing a more scalable and efficient solution for network naming and addressing.

    Rate this question:

  • 16. 

    Which feature is used to perform backups and restores of Windows volumes

    • A.

      NTbackup

    • B.

      Windows backup

    • C.

      Windows server backup

    • D.

      Windows NT backup

    Correct Answer
    C. Windows server backup
    Explanation
    Windows Server Backup is the feature used to perform backups and restores of Windows volumes. It is a built-in feature in Windows Server operating systems that allows users to create full server backups or specific volumes backups, and also enables the restoration of these backups when needed. This feature provides a reliable and efficient way to protect data and ensure business continuity in case of system failures or data loss.

    Rate this question:

  • 17. 

    Which networking service is used to automatically associate NetBIOS names with IP addresses?

    • A.

      DNS

    • B.

      WINS

    • C.

      NetBEUI

    • D.

      AppleTalk

    Correct Answer
    B. WINS
    Explanation
    WINS (Windows Internet Name Service) is the networking service used to automatically associate NetBIOS names with IP addresses. It is a Microsoft proprietary technology that resolves NetBIOS names to IP addresses, allowing for seamless communication between devices on a network. DNS (Domain Name System) is a different networking service used to translate domain names into IP addresses, while NetBEUI (NetBIOS Extended User Interface) and AppleTalk are other networking protocols that are not specifically designed for automatic name-to-IP address resolution.

    Rate this question:

  • 18. 

    Which disk partion style is reccomended for disks larger than 2TB, or disks that are used in Itanium computers?

    • A.

      GUID Partion Table (GPT)

    • B.

      GUID Boot Record (GBR)

    • C.

      Master Boot Record (MBR)

    • D.

      Master Partition Table (MPT)

    Correct Answer
    A. GUID Partion Table (GPT)
    Explanation
    GPT (GUID Partition Table) is recommended for disks larger than 2TB or disks used in Itanium computers. GPT allows for a maximum disk size of 18.4 million TB, compared to MBR (Master Boot Record) which has a maximum size limit of 2TB. GPT also supports more partition entries, provides better data redundancy and integrity, and is required for UEFI (Unified Extensible Firmware Interface) systems. Therefore, GPT is the preferred partition style for larger disks or Itanium computers.

    Rate this question:

  • 19. 

    What is used to manage the licensing process for volume licenses of Windows Vista and Windows Server 2008?

    • A.

      Enterprise agreement

    • B.

      Activation keys

    • C.

      Volume activation

    • D.

      Microsoft select

    Correct Answer
    C. Volume activation
    Explanation
    Volume activation is used to manage the licensing process for volume licenses of Windows Vista and Windows Server 2008. This allows organizations to activate multiple copies of the operating system without the need for individual activation keys for each installation. With volume activation, organizations can easily manage and track their licenses, ensuring compliance and efficient use of their software.

    Rate this question:

  • 20. 

    Which volume contains the operating system files on a Windows computer? 

    • A.

      System volume

    • B.

      Striped volume

    • C.

      Boot volume

    • D.

      Mirrored volume

    Correct Answer
    C. Boot volume
    Explanation
    The boot volume contains the operating system files on a Windows computer. This volume is responsible for starting up the computer and loading the necessary files for the operating system to run. It typically includes the Windows operating system files, boot configuration data, and other essential files required for the system's boot process.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 08, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 27, 2012
    Quiz Created by
    Red.poppy22
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.