Free Essay

Netw 230 Week 1 – 7 Quizzes

In:

Submitted By arnitaetsitty
Words 1488
Pages 6
NETW 230 Week 1 – 7 quizzes

Click Link Below To Buy:

http://hwaid.com/shop/netw-230-week-1-7-quizzes/

NETW 230 Week 1 quiz

1. Question : (TCO 1) _____ is highly componentized—allowing the installation of specific modules—and is managed via an IIS Manager interface.

DHCP
DNS
Domain
Internet Information Services
Question 2. Question : (TCO 1) _____ service allows point-in-time copies of directly attached or SAN-based storage to provide backups.
Volume Shadow Copy
PowerShell
IIS
Server Manager Question 3. Question : (TCO 1) The _____ tab of the Task Manager allows you to view the network utilization of any connected network. This tab shows a graph of network history usage.
Processor
Memory
Services
Neworking
Question 4. Question : (TCO 1) _____ is used by Windows Server 2008. This is a collection of related files that have some common criteria such as author, file type, or size range.

Partition
Stack
Segment
DFS

Question 5. Question : (TCO 1) Windows Server 2008 installation generates several files containing information about the installation. Which of the following files provides information about set-up actions?

Setuperror.log
Setuperr.log
Setupconfig.log
Setupact.log
Question 6. Question : (TCO 1) The _____ is used to create an answer file for automating Windows Server 2008 installation.
Windows Wizard Installation Kit
Windows Dynamic Installation Kit
Windows Automated Installation Kit
None of the above NETW 230 Week 2 quiz

1. Question : (TCO 1) Parent-child trusts are two-way trusts, which means the parent trusts the child, and the child trusts the parent. These trusts are also _____ in nature.

nontransitional transitional nontransitive transitive Question 2. Question : (TCO 1) The domain trust runs in the _____ direction of the resource requirement. To access a resource in another domain, that resource domain has to trust your domain. opposite virtual hyper None of the above

Question 3. Question : (TCO 1) In Active Directory, a(n) _____ is a fundamental component or container that holds other objects within it.
OU
account server group
Question 4. Question : (TCO 1) The _____ is one or more trees connected at the root by a Kerberos bidirectional transitive trust. domain container site forest

Question 5. Question : (TCO 1) In Active Directory, _____ allow the grouping of objects so that they can be administered using the same group policies, such as security and desktop setup. sites OUs domains forests
Question 6. Question : (TCO 1) A _____ server is a special domain controller that holds a read-only copy of a subset of attributes of every object.
GC
global local local domain

NETW 230 Week 3 quiz

1. Question : (TCO 7) Windows Server 2008 provides the _____ utility, creating both file and directory symbolic links. mklink makelink md link dir /link
Question 2. Question : (TCO 2) If a FAT or FAT32 partition were created, it can be converted to NTFS and maintain its content using the _____ command. chkdsk format convert archive

Question 3. Question : (TCO 3) NTFS has the ability to map free space on the volume. This enables new files to be written contiguously where possible, avoiding _____. fragmentation data corruption defragmentation All of the above
Question 4. Question : (TCO 3) When working with NTFS permissions, the _____ permission can be used to delete and add files to a directory.
Read and Execute
Read
Modify
Write

Question 5. Question : (TCO 3) Along with the various security options on an object, you can _____ permission inheritance from an object’s parent by unselecting the Include Inheritable Permissions from this Object’s Parent check box. allow stop grant flow
Question 6. Question : (TCO 2) EFS uses public and private key encryption and the _____ architecture and can use any symmetric encryption algorithm to encrypt data. It includes support for Microsoft Enhanced and Strong cryptographic service providers.
CryptoAPI
PKI
GPG
PGP

NETW week4 Quiz
1. Question : (TCO 4) The system that contains the printer driver, network spooler, and print queues is called a _____.

print client print server print driver print job
Question 2. Question : (TCO 4) The _____ tab allows ports that the printer operates over to be added, removed, and configured.
Spool
Ports
Driver
Queue

Question 3. Question : (TCO 4) If a printer is not automatically detected, you can use the _____ to install it.
Print Manager tool
Print Wizard
Hardware Manager tool
Add Printer Wizard
Question 4. Question : (TCO 4) Server operators group have the following permission(s).
Printers
Documents
Print
All of the above

Question 5. Question : (TCO 8) The _____ partition is the partition where your computer will look for the startup files, like NTLDR, to start the operating system.

secondary extended active primary Question 6. Question : (TCO 2) When configuring the RAID environment on Windows 2008, one of the options is RAID _____, which uses multiple blocks of contiguous space on at least three physical disks with parity information stored across the disks.
0
1
5
7

NETW 230 Week 5 quiz

1. Question : (TCO 1) The Dynamic Host Configuration Protocol (DHCP) is responsible for allocating _____ to machines on the network.
MX
NS
SOA
IP addresses

Question 2. Question : (TCO 1) The following command renews a lease on an IP address acquired from a DHCP server. ipconfig /renew ipconfig /all ipconfig /extend
None of the above

Question 3. Question : (TCO 1) A _____ zone has only the bare necessities for DNS functions. replication forward lookup stub reverse lookup

Question 4. Question : (TCO 1) New to Windows Server 2008 is the IPv6 node item under the DHCP server in the navigation pane, which allows for IPv6 _____ functionality.
DDHCP
DHCPv2
DHCPv6
Auto-DHCP

Question 5. Question : (TCO 1) DNS is hierarchal, because each part of the name separated by _____ is a level in the DNS space, with the rightmost being the highest level. double quotes (“) a comma (,) a hyphen (-) a dot (.)

Question 6. Question : (TCO 1) The authoritative DNS server is the server that holds a ____copy of the zones data locally, can answer queries about the zone without needing to query other servers, and can be trusted as the final word when trying to resolve a record. read-only partial full None of the above

NETW 230 Week 6 quiz

1. Question : (TCO 9) For servers that need to offer services to the Internet, consider using a _____ zone (DMZ), where computers can exist and communicate with the Internet while staying separated from the internal network by a firewall. demilitarized militarized dynamic militarized data modularized

Question 2. Question : (TCO 9) _____, which is part of digital identity management services (DIMS), allows certificates and private keys to be stored in AD, so no matter where a user logs on, the certificate and private key information is downloaded to the user’s session from AD.
Roaming authentication
Profile roaming
Credential roaming
Local credentials

Question 3. Question : (TCO 9) The _____ command-line utility allows you to configure and analyze security from the command line, including performing analysis of a server compared to a template and applying the settings in a security template. regedt secedit confsec secedt

Question 4. Question : (TCO 9) _____, which maps to the second layer of the OSI model, provides all the same features as PPTP but it can also work on networks other than IP.
IP
L2TP
IPsec
SSL
Question 5. Question : (TCO 9) When using _____, you can configure the Windows 2008 server to act as a router or a VPN server.
RRAS
a firewall
Server Manager
IPsec

Question 6. Question : (TCO 9) The DHCP _____ passes DHCP requests on behalf of clients to the specified DHCP servers; that is, it relays the requests. relay agent relay router relay server relay client
Question 7. Question : (TCO 9) If the VPN server has not been configured to use _____ and it’s a member of a domain, then authentication requests use Active Directory.
DNS
DHCP
RADIUS
NAP

Question 8. Question : (TCO 9) Each computer has a local GPO. However, this is more typically locally managed on the computer and is overwritten by any _____-based policies. administrator firewall
DHCP
domain

Week 7 Quiz

1. Question : (TCO 1) The best way to get a feel for a server’s performance is to establish a(n) and then frequently monitor server performance. 2. Question : (TCO 5) Using Performance Monitor, this counter shows how busy the processor is. 3. Question : (TCO 5) Windows Server 2008 provides two types of high availability: Network Load Balancing (NLB) and . 5) The nodes in the NLB cluster exchange heartbeat messages, and if a

host fails to send a heartbeat for second(s), it is considered to have failed. 5. Question : (TCO 6) Similar to Safe Mode, using the will load a command prompt for the shell instead of starting the Explorer graphical interface. 6. Question : (TCO 6) In the event of a problem disk, you can run the /f < drive>: command to perform a full scan of the disk sectors and recover information from bad clusters.

Similar Documents

Premium Essay

Khan

...This text was adapted by The Saylor Foundation under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License without attribution as requested by the work’s original creator or licensee. Saylor URL: http://www.saylor.org/books Saylor.org 1 Preface Competing books are focused on the academic part of HRM, which is necessary in a university or college setting. However, the goal with this book is not only to provide the necessary academic background information but also to present the material with a practitioner’s focus on both large and small businesses. While the writing style is clear and focused, we don’t feel jargon and ten-dollar words are necessary to making a good textbook. Clear and concise language makes the book interesting and understandable (not to mention more fun to read) to the future HRM professional and manager alike. It is highly likely that anyone in business will have to take on an HRM role at some point in their careers. For example, should you decide to start your own business, many of the topics discussed will apply to your business. This is the goal of this book; it is useful enough for the HRM professional, but the information presented is also applicable to managers, supervisors, and entrepreneurs. Besides these differences, other key differences include the following:   This book utilizes a technology focus and shows how HRM activities can be leveraged using technology. We have also included a chapter on communication and information...

Words: 157258 - Pages: 630