Term
True or False: Implementing partitions and volumes on the disk of a Windows Server 2003 system is a very time-consuming process. |
|
Definition
|
|
Term
True or False: Each partition of a basic disk acts a separate storage unit. |
|
Definition
|
|
Term
True or False: After installing Windows Server 2003, you can convert disks from basic to dynamic. |
|
Definition
|
|
Term
True or False: When basic disks are used, the operating system boots from the primary partition. |
|
Definition
|
|
Term
True or False: If a basic disk contains at least one extended partition, then no primary partitions are necessary. |
|
Definition
|
|
Term
True or False: The read-only file attribute is available regardless of the file system in use. |
|
Definition
|
|
Term
True or False: On a Windows Server 2003 system, file and folder attributes can be viewed using the ATTRIB command. |
|
Definition
|
|
Term
True or False: Any user can modify the read-only attribute of a file stored on a FAT volume. |
|
Definition
|
|
Term
True or False: When the read-only attribute is configured for a folder, the attribute applies directly to the folder itself. |
|
Definition
|
|
Term
True or False: The system attribute is configurable from the General tab in the properties of a file or folder in a manner similar to the read-only and hidden attributes. |
|
Definition
|
|
Term
True or False: The "Show hidden files and folders" options displayed under the View tab of Windows Explorer is selected by default. |
|
Definition
|
|
Term
True or False: Enforcing even very tight GPO restrictions will not interfere with user productivity. |
|
Definition
|
|
Term
True or False: Ensuring that all systems are up-to-date with the latest security fixes and patches as they are released is one of the lesser concerns when performing server and desktop administration. |
|
Definition
|
|
Term
True or False: The advantage of using the MMC is that you can add or remove management tools as necessary and save custom tools for use by authorized administrators. |
|
Definition
|
|
Term
True or False: You cannot use a command prompt to start applications under the administrator account. |
|
Definition
|
|
Term
True or False: It is never difficult to roll back or test a specific step even if a large number of changes have taken place. |
|
Definition
|
|
Term
True or False: If Realtime priority is assigned to a process, that process will completely free up the server's CPU resources. |
|
Definition
|
|
Term
True or False: The information on the Task Manager Networking tab can be an initial warning that something is causing prolonged high network utilization. |
|
Definition
|
|
Term
True or False: Events that occur on a system are tracked and recorded in a single log file. |
|
Definition
|
|
Term
True or False: By default, any user can view the contents of the application and system log. |
|
Definition
|
|
Term
Many manufacturers implement hardware RAID on the _____. |
|
Definition
|
|
Term
The _____ tool provides information on the health of both disks and volumes such that administrators can determine the overall health of the disk subsystem. |
|
Definition
|
|
Term
_____ is a temporary status message that indicates a format operation is currently being carried out on the volume. |
|
Definition
|
|
Term
After a Regenerating operation completes, the status message returns to _____. |
|
Definition
|
|
Term
If a Failed status message appears for a volume, you should _____ |
|
Definition
ensure that the disk is properly connected. |
|
|
Term
If your disk is found to be corrupted in certain portions, you can use the _____ command to try and bring the disk back online. |
|
Definition
|
|
Term
Windows Server 2003 supports the ability to import dynamic disks from all of the following operating systems EXCEPT _____ Windows XP Windows 98 Windows 2000 Windows Server 2003 |
|
Definition
|
|
Term
Which of the following is NOT a disk-related utility supported under Windows Server 2003? Check Disk / CHKDSK Check Sum Disk Defragmenter / DEFRAG Disk Cleanup |
|
Definition
|
|
Term
If you want Windows to repair any errors in the file system that it finds during the disk-checking process, you should select the _____ option of the Check Dsik tool. |
|
Definition
Automatically fix file system errors |
|
|
Term
Which of the following types of volumes will allow attributes configured on it to be secured? FAT NTFS FAT16 FAT32 |
|
Definition
|
|
Term
When attributes are configured on a file stored on an NTFS volume, only users with at least the _____ NTFS permission have the ability to change attributes. |
|
Definition
|
|
Term
Different backup methods will manipulate the _____ attribute as part of different backup schemes. |
|
Definition
|
|
Term
Which of the following commands may be used to manipulate the system attribute of a folder? DIR CIPHER ATTRIB COMPACT |
|
Definition
|
|
Term
The default configuration setting in Windows Server 2003 displays files configures with the _____ attribute using a semi-transparent icon. |
|
Definition
|
|
Term
The system attribute of a file can only be configured from _____ when necessary. |
|
Definition
|
|
Term
_____ are the feature of the ATTRIB command that allows the attributes for multiple files and folders to be changed simultaneously. |
|
Definition
|
|
Term
When the _____ option is configured for a folder, new files saved to this folder (and potentially existing files) are encrypted. |
|
Definition
Encrypt contents to secure data |
|
|
Term
Compression and encryption settings are only applicable to files and folders residing on _____ partitions or volumes. |
|
Definition
|
|
Term
_____ reduces the amount of disk space that folders and files take up, thus allowing more data to be stored on the volume. |
|
Definition
|
|
Term
When a user accesses a file, it is automatically _____ in a manner completely transparent to the user. |
|
Definition
|
|
Term
Within Windows Explorer, compressed folders and files are displayed in the color _____ by default. |
|
Definition
|
|
Term
Which of the following is the only file system on which you can execute a COMPACT command? FAT16 FAT32 FAT NTFS |
|
Definition
|
|
Term
When a file is configured for encryption, the Encrypting File System encrypts the data using a special session known as a(n) _____ |
|
Definition
|
|
Term
In the event that a user encrypts data and then leaves the company or loses their private key, the _____ can recover the encrypted data. |
|
Definition
|
|
Term
In a domain environment, the _____ is configured as the only data recovery agent by default. |
|
Definition
domain administrator account |
|
|
Term
After a GPO has been created, it needs to be _____ to control specific user or computing settings that should be applied. |
|
Definition
|
|
Term
In Windows Server 2003, configuration of computer startup and shutdown scripts is handled by _____. |
|
Definition
the computer section of a GPO |
|
|
Term
By default, all policy settings for a group are inherited from _____. |
|
Definition
|
|
Term
Which of the following is NOT one of the main phases a company goes through when deploying new software? Software preparation Software removal Software maintenance Software renewal |
|
Definition
|
|
Term
Using Windows Server 2003 Group Policy, applications can be deployed by |
|
Definition
|
|
Term
Users can install published applications by accessing the _____ in Control Panel. |
|
Definition
Add/Remove Programs applet |
|
|
Term
When deploying application patches or upgrades, a(n) _____ can be used to perform the deployment. |
|
Definition
|
|
Term
A(n) _____ automatically replaces the old version of the software with the new version that is being deployed. |
|
Definition
|
|
Term
Redeployment of a package means to force an application to _____ itself everywhere that it is already installed. |
|
Definition
|
|
Term
The logon account that is generally used for non-administrative tasks has _____ rights. |
|
Definition
|
|
Term
Which of the following is a step involved in successful troubleshooting? Identify the solution Document all changes and results Implement a solution to a related problem Gather system information |
|
Definition
Document all changes and results |
|
|
Term
After Terminal Services transmits data to the client, the client then returns _____ back to be processed by the server. |
|
Definition
keyboard and mouse clicks |
|
|
Term
_____ can be used to allow organizations to maintain control over specific applications such as financial applications. |
|
Definition
|
|
Term
To connect to a server by remote access, users need to access the _____ software from their client system. |
|
Definition
Remote Desktop Connection |
|
|
Term
Which of the following is NOT one of the primary tools used for Terminal Services administration? Terminal Services Manager Terminal Services Configuration Terminal Services Maintenance Terminal Services Licensing |
|
Definition
Terminal Services Maintenance |
|
|
Term
The _____ administrative tool stores and tracks Terminal Services client access licenses. |
|
Definition
Terminal Services Licensing |
|
|
Term
The _____ Property tab for a terminal connection configures authentication and encryption. |
|
Definition
|
|
Term
The _____ Property tab for a terminal connection configures a program to run automatically when a user connects. |
|
Definition
|
|
Term
The _____ Property tab for a terminal connection configures the number of simultaneous connections. |
|
Definition
|
|
Term
Authentication can be set to use no authentication when the client is running _____. |
|
Definition
|
|
Term
Installation of the client files is not necessary on _____ because the Remote Desktop Connection software is already installed on these operating systems by default. |
|
Definition
|
|
Term
When Terminal Services is installed, the _____ tab configures a program to automatically run when the user connects to the terminal server. |
|
Definition
|
|
Term
You can use the Task Manager to view applications running on the server by pressing _____ while logged on as Administrator or as a member of the Administrators group. |
|
Definition
|
|
Term
If an application is listed as _____ in the Task Manager Applications tab, you can select that application and press End Task to stop the program. |
|
Definition
|
|
Term
The _____ option in the Task Manager Applications tab takes you to the Processes tab and highlights the main process associated with the program. |
|
Definition
|
|
Term
To determine when, and possibly why, a specific service failed to start, you can examine the contents of the _____. |
|
Definition
|
|
Term
If a(n) _____ is tracking failed logon attempts, an event is written to the security log each time a user is unsuccessful in logging in. |
|
Definition
|
|
Term
A(n) _____ log is included with a server's DNS service, and records events related to the DNS server. |
|
Definition
|
|
Term
The _____ provides an administrator with a description of what occurred and why the event is significant. |
|
Definition
|
|
Term
Using _____, you can define the server components you want to monitor and the type of data you want to collect. |
|
Definition
|
|