Term
In a PKI, each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________. -public key -private packet -private key -shared secret key |
|
Definition
|
|
Term
What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access? -enforcement server -health policy server -health requirement server -remediation server |
|
Definition
|
|
Term
Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas, file screens, and e-mail notifications of user quota activities? -File Server Manager -File Server Resource Manager -File Resource Manager -Server Resource Manager |
|
Definition
File Server Resource Manager |
|
|
Term
Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance? -file-based -index-based -security-based -user-based |
|
Definition
|
|
Term
Shadow Copies of Shared Folders functionality is enabled at which level? -volume -file -user -network |
|
Definition
|
|
Term
What is the minimum amount of space you must allocate to store shadow copies? -200MB -250MB -300MB -350MB |
|
Definition
|
|
Term
A maximum of how many shadow copies can be stored on a particular volume? -32 -64 -96 -128 |
|
Definition
|
|
Term
How can users restore previous versions of files on the selected volumes? -by clicking on the file and selecting Restore previous versions from the Help menu -by clicking on the file and selecting Restore previous versions from the File menu -by double-clicking on the file -by right-clicking on the file and selecting Restore previous versions |
|
Definition
by right-clicking on the file and selecting Restore previous versions |
|
|
Term
Which of the following prohibits users from consuming any disk space beyond the allotted amount? -allotments -allocations -soft quota -hard quota |
|
Definition
|
|
Term
When the restore operation finds files and folders in the recovery location, the restore can do one of three things. Which of the following is not an option? -write -create -overwrite -do not recover |
|
Definition
|
|
Term
What type of backup is supported by Windows Server 2008? -dynamic -automatic -manual -none of the above |
|
Definition
|
|
Term
Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys? -smart card -certificate template -Certificate Revocation List -Certificate Practice Statement |
|
Definition
Certificate Practice Statement |
|
|
Term
What device with a display and a keyboard provides the interface to the mainframe? -directory terminal -infrastructure terminal -network terminal -dumb terminal |
|
Definition
|
|
Term
What component is most likely to be a bottleneck on a terminal server? -processor -scalability -resource allocation -memory |
|
Definition
|
|
Term
What role service provides the functionality that enables users running the RDC client to run full desktop sessions? -File Server Terminal Manager -Terminal Instance Store -Terminal Search Services -Terminal Server |
|
Definition
|
|
Term
What new Terminal Services feature enables clients to run terminal server applications within individual windows? -RemoteNET -RemoteApp -Remote Server -Remote Management |
|
Definition
|
|
Term
What creates an IIS Website that enables users to access Terminal Services desktops and RemoteApp applications without running the RDC client? -TS Web Access -TS Licensing -TS Session Broker -TS Gateway |
|
Definition
|
|
Term
What networking protocol enables communication between the terminal server and the client? -Remote Communication Protocol -Remote Desktop Protocol -Remote Terminal Protocol -Remote Information Protocol |
|
Definition
|
|
Term
What are the advantages of Terminal Services? -reduced client hardware requirements -simplified application deployment -easy configuration and updates -all of the above |
|
Definition
|
|
Term
With RDP, client connection requests arrive over what TCP port? -333 -3303 -3389 -3339 |
|
Definition
|
|
Term
Users must have the appropriate privileges to access a terminal server, and the easiest way to provide those privileges is to add the users to what group? -Terminal Users -Domain Administrators -RDP Users -Remote Desktop Users |
|
Definition
|
|
Term
What confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity? -Network Service Provider (NSP) -Network Level Authentication (NLA) -Network Security Authentication (NSA) -Network Level Protocol (NLP) |
|
Definition
Network Level Authentication (NLA) |
|
|
Term
Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates, as well as store the certificates themselves within the Active Directory database? -standalone -enterprise -subordinate -none of the above |
|
Definition
|
|
Term
What real-time, modular operating system is designed for devices with minimal amounts of memory? -Windows CE -Proprietary OS -Windows XPe -Linux |
|
Definition
|
|
Term
What feature eliminates the need for the printer driver on the terminal server? -Quick Print -Print+ -Easy Print -Print Driver 6.1 |
|
Definition
|
|
Term
What experience option enables the RDC client to duplicate the graphics-rendering capabilities of Windows Vista, most notably the Aero “glass” effect? -font smoothing -desktop smoothing -desktop composition -Aero composition |
|
Definition
|
|
Term
What experience option is also called anti-aliasing and enables the client to display screen fonts without jagged lines? -font smoothing -desktop smoothing -desktop composition -bitmap caching |
|
Definition
|
|
Term
What experience option enables the client to store display information in a cache in local memory so that the server does not have to repeatedly transmit the same data? -font smoothing -desktop smoothing -desktop composition -bitmap caching |
|
Definition
|
|
Term
What files store Remote Desktop Client settings in a recallable and portable form? -RDC files -RDP files -RDP packages -RDC packages |
|
Definition
|
|
Term
What Terminal Services key combination displays the Start menu? -ALT+HOME -CTRL+ALT+BREAK -ALT+INSERT -ALT+DELETE |
|
Definition
|
|
Term
What is the executable program file for the RDC client? -Mstsc.exe -rdp.exe -msrdp.exe -msrdcc.exe |
|
Definition
|
|
Term
What Mstsc option causes the RDC client to open a terminal session window that occupies the entire virtual desktop of a system with two or more monitors? -admin -/f -span -migrate |
|
Definition
|
|
Term
What is the default location of the TS Licensing database? -C:\Windows\LServer -C:\Windows\System\LServer -LServer -C:\Windows\System32\LServer |
|
Definition
C:\Windows\System32\LServer |
|
|
Term
Certificate templates can be used to automate the deployment of PKI certificates by controlling the -security settings associated with each template -user settings associated with each template -configuration settings associated with each template -networking settings associated with each template |
|
Definition
security settings associated with each template |
|
|
Term
What option specifies how the terminal server will locate a TS Licensing server? -terminal server discovery mode -licensing server discovery mode -licensing server licensing mode -Terminal Services licensing mode |
|
Definition
licensing server discovery mode |
|
|
Term
In addition to the Windows versions, what utility can be used to connect to a terminal server from a Macintosh computer? -Microsoft Remote Desktop Connection Client for Mac 1.0 -Microsoft Remote Desktop Connection Client for Mac 2.0 -Microsoft Remote Desktop Connection Client for Mac 3.0 -Microsoft Remote Desktop Connection Client for Mac 4.0 |
|
Definition
Microsoft Remote Desktop Connection Client for Mac 2.0 |
|
|
Term
Windows SharePoint Services relies on what technology to manage the database that stores user documents and information? -Microsoft Server Update Services -Microsoft SQL Server 2005 -Microsoft Internet Information Services -Microsoft Access |
|
Definition
Microsoft SQL Server 2005 |
|
|
Term
What Microsoft technology enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content? -Digital Rights Management -Windows SharePoint Services -Windows Media Rights Manager -Windows Server Update Services |
|
Definition
Windows Media Rights Manager |
|
|
Term
Which of the following is NOT a step involved in deploying WMRM? -packaging -testing -distribution -playback |
|
Definition
|
|
Term
AD RMS consists of which of the following components? -AD RMS server -AD RMS client -database server - |
|
Definition
|
|
Term
To provide users with email capabilities in Windows SharePoint Server, you must install what type of server? -POP -HTTP -SMTP -PHP |
|
Definition
|
|
Term
Which is the most critical layer in the operation of a SAN? -FC1 -FC2 -FC3 -FC4 |
|
Definition
|
|
Term
iSNS consists of all of the following components except iSNS __________. -targets -database -clients -server |
|
Definition
|
|
Term
Which component registers and locates iSCSI initiators and targets? -iSCSI Initiator -Internet Storage Name Server -Storage Manager for SANs -Storage Explorer |
|
Definition
Internet Storage Name Server |
|
|
Term
Which of the following is not a privilege granted to certificate managers? -modify Certificate Revocation List (CRL) publication schedules -recover archived keys -issue, approve, deny, revoke, reactivate, and renew certificates -read records and configuration information in the CA database |
|
Definition
modify Certificate Revocation List (CRL) publication schedules |
|
|
Term
The process of deploying Terminal Services with network load balancing consists of which of the following parts? -creating a network load balancing cluster -creating a terminal server farm -both a & b -none of the above |
|
Definition
|
|
Term
To indicate the health status of a particular SHA, each SHA creates what kind of statement that it transmits to the NAP Agent? -System Health Agent -Statement of Health -Statewide Statement of Health -System Statement of Health |
|
Definition
|
|
Term
Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents? -Health Registration Authority -System Health Agent -NAP Agent -System Health Validator |
|
Definition
|
|
Term
A server that operates the NAP Enforcement Server components is referred to as a NAP __________. -Agent -enforcement point -enforcement server -none of the above |
|
Definition
|
|
Term
Depending on the enforcement method in use, a NAP enforcement point can take a number of different forms, such as what? -802.1X-capable Wireless Access Point for 802.1X enforcement -Health Registration Authority (HRA) that can obtain health certificates from client computers when the IPSec enforcement method is used -Windows Server 2008 DHCP server for the DHCP enforcement method -All of the above |
|
Definition
|
|