1.
Which of the following Windows Server 2008 editions supports the hot-add processor feature?
Correct Answer
D. Datacenter Edition
Explanation
Windows Server 2008 Datacenter Edition supports the hot-add processor feature. This means that administrators can add or remove processors from a running system without having to shut it down. This feature is particularly useful for organizations that require high availability and scalability in their server environments. The Datacenter Edition is specifically designed for large-scale virtualization and high-performance computing, making it the ideal choice for environments that need to dynamically adjust their processing power.
2.
Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes?
Correct Answer
C. 16 nodes
Explanation
Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to 16 nodes. This means that the server can support a cluster of up to 16 individual servers, providing high availability and automatic failover in case of a node failure. This allows for increased scalability and reliability in enterprise environments.
3.
One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site. While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website.
After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem. Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization?
Correct Answer
A. Active Directory Federation Services (AD FS)
Explanation
Active Directory Federation Services (AD FS) allows you to create a trust relationship between your extranet and your partner organization. AD FS enables single sign-on capabilities for the website, eliminating the need for separate logon credentials. It allows users to access critical applications on the extranet's website using their existing credentials from their partner organization's Active Directory. AD FS provides a secure and seamless authentication and authorization process, enhancing the user experience and simplifying access management for both organizations.
4.
What version of Internet Inforamation Services (IIS) is included with Windows Server 2008?
Correct Answer
B. IIS 7.0
Explanation
Windows Server 2008 includes Internet Information Services (IIS) version 7.0.
5.
Which of the following tools is the basic application responsible for loading more useful management related snap-ins?
Correct Answer
A. Microsoft Management Console
Explanation
The Microsoft Management Console (MMC) is the correct answer because it is the basic application responsible for loading more useful management related snap-ins. The MMC provides a framework for hosting and integrating various administrative tools, called snap-ins, which allow users to manage different aspects of their computer or network. It serves as a central management tool for configuring and monitoring system components, such as services, event logs, and device drivers. The other options, Disk Management, Internet Information Services Manager, and Hyper V Manager, are specific tools within the MMC that focus on disk management, web server administration, and virtualization management, respectively.
6.
When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____.
Correct Answer
C. Stand-alone server
Explanation
In a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a stand-alone server. This means that the server operates independently and does not belong to a domain. It does not have the role of a domain controller or a member server, which are terms used in a domain environment. A stand-alone member server is not a correct term in this context.
7.
Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.
Correct Answer
C. Secure HTTP (HTTPS)
Explanation
TS Gateway allows a secure, encrypted connection, and the most suitable protocol for this purpose is Secure HTTP (HTTPS). HTTPS is a combination of HTTP and SSL/TLS protocols, providing secure communication over the internet. It encrypts the data transmitted between the client and the server, ensuring confidentiality and integrity. This makes it an ideal choice for establishing a secure connection in TS Gateway, protecting sensitive information from unauthorized access or tampering.
8.
Windows Server 2008 is activated automatically after several days. However, if it can't be activated, how many days do you have to active Windows Server 2008 before you can no longer log on?
Correct Answer
C. 60 days
Explanation
After installing Windows Server 2008, it is activated automatically within a few days. However, if the automatic activation fails, the user has a grace period of 60 days to manually activate the operating system. If the user fails to activate within this timeframe, they will no longer be able to log on to Windows Server 2008.
9.
Select below a vaild requirement for the installation of Hyper-V:
Correct Answer
B. Your CPU must support virtualization extensions
Explanation
To install Hyper-V, it is necessary for the CPU to support virtualization extensions. This is because Hyper-V relies on hardware virtualization capabilities provided by the CPU to create and manage virtual machines. Without virtualization extensions, the CPU would not be able to efficiently run virtual machines, resulting in poor performance or inability to run them at all. Therefore, ensuring that the CPU supports virtualization extensions is a valid requirement for the installation of Hyper-V.
10.
If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?
Correct Answer
D. User authentication
Explanation
If the correct time zone information is not used and the servers' clocks run at different times, it is most likely that user authentication will have issues on the network. User authentication relies on accurate time synchronization to ensure that authentication tokens and certificates are valid and not expired. If the clocks on the servers are not synchronized, it can lead to authentication failures and access issues for users trying to log in to the network.
11.
Which of the following Windows Server 2008 editions has no upgrade path?
Correct Answer
D. Web Server Edition
Explanation
The Web Server Edition of Windows Server 2008 has no upgrade path because it is designed specifically for hosting websites and web applications, and does not include some of the features and capabilities found in the other editions. Therefore, it is not possible to upgrade from Web Server Edition to any other edition of Windows Server 2008.
12.
You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance. Pick the technology that best fits this description.
Correct Answer
B. SATA
Explanation
SATA (Serial ATA) is the best technology that fits the description of being inexpensive and offering excellent performance. SATA drives are cost-effective and provide fast data transfer speeds, making them suitable for a small office server that needs to run for 12 hours every day. Additionally, SATA drives are widely available and compatible with most computers, making them a practical choice for a limited budget.
13.
Your intern would like to know which of the following situations would be ideal for a Server Core installation:
Correct Answer
D. You want to install an RODC in a branch office
Explanation
An RODC (Read-Only Domain Controller) is a type of domain controller that holds a read-only copy of the Active Directory database. It is designed for use in branch offices where physical security cannot be guaranteed. Since an RODC does not allow any changes to the Active Directory database, it reduces the risk of compromising sensitive information in case the server is physically accessed by unauthorized individuals. Therefore, installing an RODC in a branch office would be ideal for a Server Core installation.
14.
What can be done to solve the issue of server sprawl?
Correct Answer
B. Consolidate the servers with virtualization
Explanation
Consolidating the servers with virtualization is the most effective solution to solve the issue of server sprawl. By using virtualization technology, multiple virtual servers can be created and run on a single physical server, reducing the number of physical servers required. This helps in optimizing server resources, reducing power consumption, and improving overall efficiency. Additionally, virtualization allows for better management and flexibility in allocating resources to different virtual servers, making it an ideal solution for addressing server sprawl.
15.
Where can you view a list of installed updates?
Correct Answer
C. Programs and Features applet
Explanation
The Programs and Features applet allows you to view a list of installed updates on your computer. This applet provides a comprehensive list of all the programs and features installed on your system, including updates and service packs. By accessing this applet, you can easily manage and uninstall any updates that have been installed on your computer.
16.
Which of the following defines the types of information stored in an Active Directory object?
Correct Answer
C. Schema attributes
Explanation
Schema attributes define the types of information that can be stored in an Active Directory object. These attributes determine the properties and characteristics of the objects, such as their names, data types, and constraints. By defining the schema attributes, administrators can control and manage the structure and content of the Active Directory database.
17.
Under what circumstances are the built-in user accounts no longer local user accounts?
Correct Answer
B. After installing Active Directory
Explanation
After installing Active Directory, the built-in user accounts are no longer local user accounts. Active Directory is a directory service that allows for centralized management of users, groups, and resources in a network environment. Once Active Directory is installed, the built-in user accounts are migrated to the Active Directory domain, making them domain user accounts instead of local user accounts.
18.
Which of the following best describes a directory service?
Correct Answer
B. Similar to a database program but with the capability to manage objects in it
Explanation
A directory service is similar to a database program because it allows for the management of objects within it. It is specifically designed to store and organize information about users, resources, and network devices in a network environment. This information can include user profiles, access permissions, and network resources. By providing a centralized and structured database, a directory service enables efficient management and access control within a network.
19.
A _____ is a different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.
Correct Answer
C. Read-Only Domain Controller
Explanation
A Read-Only Domain Controller (RODC) is a type of domain controller that has limited functionality compared to a normal DC. It cannot be used to update information in Active Directory and it does not replicate to regular DCs. RODCs are typically deployed in remote or branch office locations where physical security cannot be guaranteed. They store a read-only copy of the Active Directory database, allowing users in these locations to authenticate and access resources locally without the need to connect to a central DC. This helps to improve security by reducing the risk of unauthorized changes to the directory.
20.
A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer.
Correct Answer
A. ACL
Explanation
An Access Control List (ACL) is a list of privileges given to an account or security group granting access to an object, such as a shared folder or shared printer. It specifies the permissions or restrictions that determine what actions can be performed on the object by the account or group. ACLs are commonly used in computer systems to enforce security and control access to resources.
21.
When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.
Correct Answer
B. Edit
Explanation
When configuring folder and file permissions, the "Edit" button on the folder properties Security tab is used to change which groups and users have permissions to a folder. This button allows the user to modify the existing permissions and add or remove groups and users from the access control list of the folder. By clicking on the "Edit" button, the user can make changes to the permissions and determine who can access and modify the folder and its contents.
22.
Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
Correct Answer
D. Auditing
Explanation
In Windows Server 2008, the process of tracking activity on a folder or file, such as read or write activity, can be achieved by setting up auditing. Auditing allows administrators to monitor and record access to folders and files, providing an additional layer of security and accountability. By enabling auditing, administrators can track and review the actions performed on specific folders and files, helping to identify any unauthorized or suspicious activities.
23.
To _____ an object means to make it available for users to access when they view Active Directory contents.
Correct Answer
D. Publish
Explanation
To "publish" an object in Active Directory means to make it available for users to access when they view Active Directory contents. This implies that the object will be visible and accessible to users who have the necessary permissions to view and interact with it.
24.
The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.
Correct Answer
B. Distributed File System
Explanation
Distributed File System enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place. This means that users can access files and folders from different locations on the network without having to know the physical location of the files. The distributed file system manages the mapping between the logical and physical locations of the files, providing a seamless and unified view of the shared folders on the network.
25.
In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform _____, so that one server does not experience more load than others.
Correct Answer
C. Load balancing
Explanation
Load balancing in DFS helps distribute the access to shared folders across multiple servers. This ensures that the workload is evenly distributed among the servers, preventing any single server from becoming overloaded. By distributing the load, the system can handle more requests efficiently, improving performance and preventing any server from being overwhelmed with excessive traffic.
26.
The computer or print server device offering the printer share is the _____.
Correct Answer
A. Network print server
Explanation
The correct answer is "network print server." A network print server refers to a computer or print server device that offers printer sharing. It acts as a central hub that allows multiple users to connect and print to a shared printer over a network. This server manages the print jobs, queues, and ensures efficient printing for all connected clients.
27.
In the Windows environment, a _____ is a group of DLLs, information files, and programs that processes print jobs for printing.
Correct Answer
D. Spooler
Explanation
A spooler in the Windows environment is a collection of DLLs, information files, and programs that are responsible for processing print jobs for printing. It manages the print queue, allowing multiple print jobs to be stored and processed in the background, while the user can continue working on other tasks. The spooler ensures that print jobs are processed in the correct order and sends them to the appropriate printer for output.
28.
When a print job is processed over the Internet or an intranet, _____ must be installed and running in Windows Server 2008.
Correct Answer
B. Internet Information Services (IIS)
Explanation
When a print job is processed over the Internet or an intranet, Internet Information Services (IIS) must be installed and running in Windows Server 2008. IIS is a web server software that enables the hosting of websites, web applications, and services on Windows servers. It provides the necessary infrastructure for processing print jobs over the network. Windows Distribution Services (WDS) is a technology used for deploying Windows operating systems, not related to print job processing. Windows Support Services (WSS) and Web Server Service (WSS) are not valid terms or services in the context of this question.
29.
To take full advantage of Windows Server 2008 to manage shared printers for one location, install the _____ role.
Correct Answer
C. Print Services
Explanation
To take full advantage of Windows Server 2008 to manage shared printers for one location, the Print Services role should be installed. This role allows for the management and administration of printers and print servers, including the ability to install, configure, and monitor printers, as well as manage print queues and print jobs. By installing the Print Services role, the server can effectively handle the printing needs of the location, ensuring efficient and reliable printing services.
30.
The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.
Correct Answer
D. Location and Comment
Explanation
The "Location and Comment" boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network. These notes can include information about the physical location of the printer or any additional comments or instructions that users need to be aware of. This helps in identifying and differentiating the printer in a shared network environment.
31.
The _____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share.
Correct Answer
A. Sharing
Explanation
The correct answer is "Sharing." The Sharing tab is used to enable or disable a printer for sharing and to specify the name of the share. This tab allows users to control the printer's accessibility and set up sharing options for other users on the network.
32.
The _____ tab enables you to specify printer settings that are specific to the printer you have installed, such as printer trays, memory, paper size, fonts, duplexing, and installable options.
Correct Answer
B. Device settings
Explanation
The device settings tab allows you to customize the printer settings based on the specific printer you have installed. This includes options such as printer trays, memory, paper size, fonts, duplexing, and installable options. By accessing the device settings tab, you can adjust these settings to optimize the printing experience according to your printer's capabilities and your specific requirements.
33.
When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have _____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.
Correct Answer
A. Hold mismatched documents
Explanation
If the "hold mismatched documents" option is not enabled when a PostScript-formatted document is sent to a non-PostScript printer, the printer might print tens or hundreds of pages with a single control code on each page. Enabling the "hold mismatched documents" option would prevent this from happening by holding the documents that do not match the printer's format, allowing the user to review and correct any issues before printing.
34.
A(n) _____ is like a stack of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.
Correct Answer
B. Print queue
Explanation
A print queue is a list of print jobs that are waiting to be sent from the spooler to the printer. It functions like a stack, where the first job submitted is at the top and the last job is at the bottom. The jobs are processed in the order they were added to the queue, with the oldest job being printed first.
35.
Which of these is not a new GPO in Windows Vista and Server 2008?
Correct Answer
D. Local Computers GPO
Explanation
The Local Computers GPO is not a new GPO in Windows Vista and Server 2008. The other options (Local Administrators GPO, Local Non-Administrators GPO, User-Specific GPO) are all potential new GPOs in these operating systems.
36.
If you make changes to an existing GPO that is already linked in Active Directory, how fast do the policy settings take effect?
Correct Answer
D. As soon as the client downloads them
Explanation
When changes are made to an existing Group Policy Object (GPO) that is already linked in Active Directory, the policy settings take effect as soon as the client downloads them. This means that the client needs to refresh its Group Policy settings by downloading the updated GPO from the domain controller. Once the client receives the updated policy settings, they will be applied immediately. The time it takes for the client to download the updated GPO can vary depending on factors such as network speed and client configuration.
37.
What would you use to prevent GPOs linked to parent containers from affecting child containers?
Correct Answer
D. Inheritance blocking
Explanation
Inheritance blocking is the correct answer because it allows you to prevent Group Policy Objects (GPOs) linked to parent containers from affecting child containers. By blocking inheritance, you can ensure that specific GPOs are not applied to certain containers, giving you more control over the application of policies in your organizational structure.
38.
How can you ensure that a GPO's settings are applied to all child objects, even if a GPO with conflicting settings is linked to a container at a deeper level?
Correct Answer
B. Enforcing inheritance
Explanation
Enforcing inheritance ensures that a GPO's settings are applied to all child objects, regardless of any conflicting settings from a GPO linked to a container at a deeper level. This means that the GPO's settings will take precedence over any conflicting settings and be applied to all objects within the scope of the GPO.
39.
If a software package is assigned to a group of targeted computers via the Computer Configuration node, what happens?
Correct Answer
D. The package installation is mandatory and begins the next time the computer starts
Explanation
The correct answer is that the package installation is mandatory and begins the next time the computer starts. This means that once the software package is assigned to a group of targeted computers via the Computer Configuration node, it will be automatically installed on those computers the next time they are restarted. No user interaction or manual installation is required, making it a convenient and efficient method of deploying software across multiple computers.
40.
Under Password policies, what is the default maximum password age?
Correct Answer
C. 42 days
Explanation
The default maximum password age under password policies is 42 days. This means that after 42 days, users are required to change their passwords. This is a security measure to ensure that passwords are regularly updated and to minimize the risk of unauthorized access to accounts.
41.
What is a major drawback to enabling the auditing of object access?
Correct Answer
D. Involves considerable overhead
Explanation
Enabling the auditing of object access involves considerable overhead. This means that it requires a significant amount of resources and can impact the performance of the system. The process of auditing involves tracking and recording every access to objects, which can result in a large amount of data being logged. This can lead to increased storage requirements and processing time. In highly secure environments, where performance and efficiency are crucial, the overhead involved in auditing may outweigh the benefits and make it less ideal.
42.
What subnode under Security Settings applies to wireless network policies?
Correct Answer
C. Wireless Network (IEEE 802.11) Policies
Explanation
The correct answer is "Wireless Network (IEEE 802.11) Policies". This subnode under Security Settings specifically applies to wireless network policies. It is designed to manage and configure the security settings for wireless networks using the IEEE 802.11 standard. This subnode allows administrators to define security settings such as authentication methods, encryption protocols, and other security parameters for wireless networks.
43.
GPC replication between domain controllers in the same site occurs at about what interval after a change has been made by default?
Correct Answer
D. 15 seconds
Explanation
By default, GPC (Group Policy Container) replication between domain controllers in the same site occurs at a 15-second interval after a change has been made. This means that any modifications or updates made to the Group Policy settings will be replicated to other domain controllers within the same site every 15 seconds. This ensures that the changes are quickly propagated throughout the network, allowing for consistent and up-to-date Group Policy enforcement across all domain controllers.
44.
You work for the large Example.com corporation. Recently, Example.com has been adding new branch offices at a steady rate. Just last week, a new branch office was created and now you have been put in charge of configuring group policy settings for the branch office. Because this branch office will be fairly large, it will be set up as a separate domain.
Since there are several branch offices with similar GPO requirements, you want to be able to make use of GPOs that have already proven to be useful. What is the easiest way to make the policies in this new branch office similar to those already in place?
Correct Answer
B. Use GPO migration by adding the domains with the policies you want to GPMC, and then copy and paste them.
Explanation
The easiest way to make the policies in the new branch office similar to those already in place is to use GPO migration by adding the domains with the desired policies to the Group Policy Management Console (GPMC) and then copying and pasting them. This allows for a quick and efficient transfer of the proven useful GPO settings to the new domain without the need to manually recreate all the settings or import them via CSVDE. Additionally, backing up and restoring the desired GPOs may not be as straightforward and efficient as using GPO migration.
45.
What is the default location of the ADMX files?
Correct Answer
C. %systemroot%\PolicyDefinitions
Explanation
The default location of the ADMX files is %systemroot%\PolicyDefinitions.
46.
You are troubleshooting a network issue a user is having. After having changed his network adapter to static addressing, he can no longer reach the internet. However, the machine resolves Internet names to IP addresses. Observe the adapter's configuration below, and determine the problem.
IP Address: 172.31.20.103
Subnet: 255.255.255.0
DNS Server: 172.31.20.251
Gateway Address: 172.31.19.254
Correct Answer
A. Gateway is outside of the user's subnet
Explanation
The problem is that the gateway address specified in the network adapter's configuration is outside of the user's subnet. This means that the gateway is not within the range of IP addresses that the user's device can communicate with. As a result, the user is unable to reach the internet even though the machine can still resolve internet names to IP addresses. To resolve this issue, the subnet mask should be changed to 255.255.255.128 so that the gateway falls within the user's subnet.
47.
What does the "Client for Microsoft Networks" item in a network adapter's connection properties provide?
Correct Answer
A. Allows the machine to connect to Windows Shared resources by using Server Message Block (SMB)
Explanation
The "Client for Microsoft Networks" item in a network adapter's connection properties allows the machine to connect to Windows Shared resources by using Server Message Block (SMB). This means that the machine can access files, folders, printers, and other shared resources on a Windows network. Without this client, the machine would not be able to connect to these shared resources and access the information or services they provide.
48.
Which of the following is NOT a reason why some devices can't be placed on the network map?
Correct Answer
D. The device is a domain memmber
Explanation
Devices that are domain members can be placed on the network map, so this is not a reason why some devices can't be placed on the network map.
49.
What protocol provides automatic IP address configuration?
Correct Answer
B. DHCP
Explanation
DHCP (Dynamic Host Configuration Protocol) provides automatic IP address configuration. DHCP allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration settings from a DHCP server. This eliminates the need for manual configuration of IP addresses, making it easier to connect devices to a network. DNS (Domain Name System) is responsible for translating domain names into IP addresses, ARP (Address Resolution Protocol) is used to map IP addresses to MAC addresses, and TCP (Transmission Control Protocol) is a communication protocol used for reliable and ordered delivery of data.
50.
One of the below IP address / subnet mask pairs is invalid; find the invalid answer.
Correct Answer
A. 10.0.239.254/255.0.255.0
Explanation
The given IP address/subnet mask pair 10.0.239.254/255.0.255.0 is invalid because the subnet mask is not in the correct format. Subnet masks should consist of consecutive 1s followed by consecutive 0s, but in this case, there are non-consecutive 0s in the subnet mask.