Windows Server Answer Bank

Published on April 2017 | Categories: Documents | Downloads: 37 | Comments: 0 | Views: 207
of 113
Download PDF   Embed   Report

Comments

Content

In Windows Server __________, there is no Start menu, no desktop Explorer shell, no MMC console, and virtually no graphical applications. Selected Answer: Core Windows __________ Services is a role included with Windows Server 2008 that enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computers by using network-based boot and installation media. Selected Answer: Deployment The KMS activation __________ is designed to prevent pirated KMS keys from functioning on small networks or individual computers. Selected Answer: threshold __________ clients are minimal computers used in terminal server environments designed only for server communication. Selected Answer: Thin What is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools? Selected Answer: d.Server Manager Response Feedback: Server Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. What role is included with Windows Server 2008 and enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computer by using network-based boot and installation media? Selected Answer: a. Windows Deployment Services Response Feedback: Windows Deployment Services (WDS) is a role included with Windows Server 2008 that enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computers by using networkbased boot and installation media. This means that you can install a new computer with no operating system or local boot device on it by deploying image files stored on a server running Windows Deployment Services. To create unattend files, Microsoft recommends using what tool in the Windows Automated Installation Kit? Selected Answer: d. Windows System Image Manager Response Feedback: To create unattend files, Microsoft recommends using the Windows System Image Manager (Windows SIM) tool in the Windows AIK. What role is essentially a superset of the Web Server (IIS) role that enables IIS to host Web services developed using environments such as Windows Communication Foundation (WCF) and .NET Framework 3.0? Selected Answer: a. Application Server Response Feedback: The Application Server role is essentially a superset of the Web Server (IIS) role that enables IIS to host Web services developed using environments such as Windows Communication Foundation (WCF) and .NET Framework 3.0. What technology enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there? Selected Answer: c. Terminal Services Response Feedback: Windows Server 2008 provides an alternative to individual workstation installations in the form of Terminal Services. Terminal Services is a technology that enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.

A __________ is a complete installation of an operating system that runs in a software environment emulating a physical computer. Selected Answer: a. virtual server Response Feedback: Applications such as Microsoft Virtual Server 2005 and the Windows Server virtualization technology in Windows Server 2008 make it possible for a single computer to host multiple virtual machines, each of which runs in a completely independent environment. The activities performed for network clients by a Windows Server 2008 are known as __________. Selected Answer: c. roles Response Feedback: After you install the Windows Server 2008 operating system, you can use the Add Roles Wizard to assign one or more roles to that computer. What is Microsoft’s program for automating and managing the activation of products obtained using volume licenses? Selected Answer: a. Volume Activation 2.0 Response Feedback: Volume Activation (VA) 2.0 does not alter the terms of your license agreement with Microsoft in any way; it is simply a tool to simplify the activation process. For end users, the activation process is completely transparent, and administrators do not have to supply individual product keys when installing Windows. What capability of the File Services role consists of two role services that allow administrators to create a virtual directory tree consisting of folders stored on different servers and to maintain duplicate copies of that information? Selected Answer: d. Distributed File System Response Feedback: The distributed file system consists of two role services: DFS Namespace, which enables administrators to create a virtual directory tree consisting of folders stored on different servers, and DFS Replication, which maintains duplicate copies of the DFS namespace in remote locations. The Windows Server 2008 installation DVD includes a boot image file, located in the \sources folder, that loads Windows PE 2.1 on the client computer. What is the name of this image file? Answer Selected Answer: b. boot.wim Response Feedback: You can use the boot.wim image file for virtually any operating system deployment without modification. __________ permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system. Selected Answer: NTFS You can use the Net.exe command-line utility with the __________ parameter to map drive letters to folders. Selected Answer: Use A(n) __________ area network is a separate network dedicated solely to storage devices such as drive arrays, magnetic tape autochangers, and optical jukeboxes. Selected Answer: storage A typical Windows Server 2008 installation with the File Services role takes just over 7 GB, but system requirements for Windows Server 2008 recommend __________ GB and state that 80 GB is optimal. Selected Answer: 40

__________ Copies is a Windows Server 2008 mechanism that automatically retains copies of files on a server volume in multiple versions from specific points in time. Selected Answer: Shadow Drive letters can be mapped with logon scripts or with __________. Selected Answer: d. Group Policy Response Feedback: Drive letters can be mapped with login scripts or Group Policy. What is the name of a group of servers that all perform the same function, dividing the client load among them? Selected Answer: c. cluster Response Feedback: A cluster is a group of servers that all perform the same function, dividing the client load among them. Failover clustering provides the ultimate in scalability and fault tolerance. The paging file on a Windows Server 2008 computer is how times the amount of memory installed in the computer by default? Selected Answer: b. 1.5 Response Feedback: By default, the paging file on a Windows Server 2008 computer is 1.5 times the amount of memory installed in the computer. What type of dynamic disk consists of an identical amount of space on two physical disks? Selected Answer: c. mirrored volume Response Feedback: A mirrored volume consists of an identical amount of space on two physical disks, both of which must be dynamic disks. The system performs all read and write operations on both disks simultaneously, so they contain duplicate copies of all data stored on the volume. If one of the disks should fail, the other one continues to provide access to the volume until the failed disk is repaired or replaced. The process of granting users access to file server shares by reading their permissions is called __________. Answer Selected Answer: b. authorization Response Feedback: When a user attempts to access an NTFS file or folder, the system reads the user’s security access token, which contains the SIDs for the user’s account and all of the groups to which the user belongs. The system then compares these SIDs to those stored in the file or folder’s ACEs to determine what access the user should have. This process is called authorization. What mechanism enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations? Selected Answer: c. folder redirection Response Feedback: Folder redirection is a mechanism that enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations. This enables users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server. Because the files in the Documents folder are stored on a server, users can access them from any workstation, and administrators can back up the files easily. What is the name of the combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership? Selected Answer: d. effective permissions

Response Feedback: The combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership, is called the effective permissions for that element. Because a security principal can receive permissions from so many sources, it is not unusual for those permissions to conflict. Therefore, rules define how the permissions combine to form the effective permissions. What Windows Server 2008 feature enables you to maintain previous versions of files on a server? Selected Answer: a. Shadow Copies Response Feedback: Shadow Copies is a Windows Server 2008 mechanism that automatically retains copies of files on a server volume in multiple versions from specific points in time. When users accidentally overwrite or delete files, they can access the shadow copies to restore earlier versions. This feature is designed to prevent administrators from having to load backup media to restore individual files for users. Windows Server 2008 supports two hard disk partition types: MBR and __________. Selected Answer: a. GPT Response Feedback: Two hard disk partition styles can be used in Windows Server 2008: MBR and GPT. What is the maximum basic volume size in Windows Server 2008? Selected Answer: c. 2 TB Response Feedback: The maximum basic volume size in Windows Server 2008 is 2 terabytes. A(n) __________ server functions just like a file server except when a user requests access to a file in the DFS directory tree. Selected Answer: namespace An NFS server exports part of its file system and the NFS client integrates the exported information, a process called “__________,” into its own file system. Selected Answer: mounting __________ Services displays the system services associated with the File Services role, the Status, and Startup Type of each service. Selected Answer: System To install Simple Mail Transfer Protocol (SMTP), you must use __________ Manager. Selected Answer: server What technique duplicates copies of a file that are all updated on a regular basis, no matter which copy changes? Selected Answer: d. multimaster replication Response Feedback: Multimaster replication is a technique in which duplicate copies of a file are all updated on a regular basis, no matter which copy changes. For example, if a file is duplicated on four different servers, a user can access any one of the four copies and modify the file as needed. The replication engine then takes the changes made to the modified copy and uses them to update the other three copies. Windows Server 2008 computers must run which protocol service to send email messages?

Selected Answer: d. Simple Mail Transfer Protocol (SMTP) Response Feedback: A Windows Server 2008 computer must be running the Simple Mail Transfer Protocol (SMTP) service to be able to send email messages. What lookup service maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts? Selected Answer: d. User Name Mapping Response Feedback: The User Name Mapping service was the primary authentication mechanism in previous versions of Windows Services for NFS. It is essentially a lookup service that maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts. The server component of User Name Mapping is not included in Windows Server 2008, but NFS Server still retains the client component that enables it to access an existing User Name Mapping server and perform account lookups. What will the Window’s Server 2008 “Deploying a File Server” default allow you to manage on the server? Selected Answer: d. all of the above Response Feedback: The “Deploying a File Server” default Windows Server 2008 installation includes all of the components needed for a basic file server deployment. You can manage the server’s disk drives, share folders, and map drives and control access to those shares with no additional software installations. What works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection? Selected Answer: b. DFS Replication Response Feedback: DFS Replication works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection. The File Services node provides access to which of the following elements? Selected Answer: d. All of the above Response Feedback: The File Services node provides access to the following elements: Events, System Services, Role Services, Resources and Support, and Share and Storage Management. Which option allows clients to revert to a previously unavailable target when it becomes available again at a lower cost than the present target? Selected Answer: d. Client Failback Response Feedback: Client Failback is the ability of DFS clients to revert to targets that were previously unavailable when they become available again and are of lower cost than the target the client is using. Which role service selection allows you to install the Share and Storage Management console for Microsoft Management Console (MMC)? Selected Answer: a. File Server Response Feedback:

The File Server role service installs the Share and Storage Management console for Microsoft Management Console (MMC). For organizations utilizing Windows and UNIX computers, Windows Server 2008 includes which role service? Selected Answer: a. Services for Network File System Response Feedback: To accommodate organizations that have heterogeneous networks containing both Windows and UNIX computers, Windows Server 2008 includes the Services for Network File System role service that provides NFS Server and NFS Client capabilities. Which console includes several predefined quota templates that can be used to create your own quota template? Answer Selected Answer: d. File Server Resource Manager Response Feedback: The File Server Resource Manager console includes several predefined quota templates that you can use to create your own quota template. Question 1 6.6666 out of 6.6666 points

__________ Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. Answer Selected Answer: Server Question 2 6.6666 out of 6.6666 points

The __________ Printers list shows all of the printers deployed with Group Policy using the console. Answer Selected Answer: deployed Question 3 6.6666 out of 6.6666 points

If you create a filter with the settings Queue Status, Is Exactly, and Error, the filter will show all of the printers currently reporting a(n) __________ condition. Answer Selected Answer: error Question 4 6.6666 out of 6.6666 points

To install the Windows Fax and Scan application, add the __________ Experience feature. Answer Selected Answer: desktop Question 5

6.6666 out of 6.6666 points

Printing in Microsoft Windows involves the following components: print device, printer, print __________, and printer driver. Answer Selected Answer: server Question 6 6.6667 out of 6.6667 points

How many fax job queues can be on a single system? Answer Selected Answer: c. 1 Response Feedback: The Fax printer created by the Fax Server role represents all of the fax devices installed on the computer. If there are multiple devices, the server can distribute outgoing faxes among a group of devices, but there is only one single fax job queue on the system. Question 7 6.6667 out of 6.6667 points

What role does Windows Server 2008 include that enables users to send faxes from and receive them to their desktops? Answer Selected Answer: c. Fax Server Response Feedback: By installing the Fax Server role, you enable a Windows Server 2008 computer to send and receive faxes for clients. Clients send faxes using a standard printer interface, which connects to a fax server on the network as easily as connecting to a local fax modem. Question 8 6.6667 out of 6.6667 points

The device driver that converts the print jobs generated by applications into a string of commands for a specific print device is called a __________. Answer Selected Answer: a. none of the above Response Feedback: A printer driver is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device. Printer drivers are designed for a specific print device and provide applications with access to all of the print device’s features. Question 9 6.6667 out of 6.6667 points

What standardized, highly portable print job format is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems? Answer Selected Answer: a. EMF Response Feedback: Enhanced Metafile (EMF) is a standardized, highly portable print job format that is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems. The printer driver converts the application data into an EMF file, and the printer sends it to the print server, which stores it in the spooler. The spooler then uses the printer driver on the print server to render the job into the final PCL format understood by the print device. Question 10 6.6667 out of 6.6667 points

What tool do printing administrators on large enterprise networks use to keep track of print devices? Answer Selected Answer: c. Print Management console Response Feedback: The Print Management snap-in for MMC, an administrative tool, consolidates the controls for the printing components throughout the enterprise into a single console. With this tool, you can access the print queues and Properties sheets for all network printers in the enterprise, deploy printers to client computers using Group Policy, and create custom views that simplify the process of detecting print devices that need attention due to errors or depleted consumables. Question 11 6.6667 out of 6.6667 points

Windows Server 2008 supports numerous physical interfaces except for which interface? Answer Selected Answer: a. VGA Response Feedback: Windows Server 2008 supports numerous physical interfaces, including Universal Serial bus (USB), IEEE 1394 (FireWire), parallel (LPT), serial (COM), Infrared Data Access (IrDA), Bluetooth ports, and network printing services such as lpr, Internet Printing Protocol (IPP), and standard TCP/IP ports. Question 12 6.6667 out of 6.6667 points

What device driver converts the print jobs generated by applications into an appropriate string of commands for a specific print device? Answer Selected Answer: a. printer driver Response Feedback: A printer driver is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device. Printer drivers are designed for a specific print device and provide applications with access to all of the print device’s features. Question 13

6.6667 out of 6.6667 points

How is a local print device attached to a computer? Answer Selected Answer: b. through computer ports Response Feedback: Windows Server 2008 supports both local print devices, which are directly attached to computer ports, and network interface print devices, which are connected to the network either directly or through another computer. Question 14 6.6667 out of 6.6667 points

Windows Server 2008 includes a Fax Server role that allows users to send faxes from __________. Answer Selected Answer: c. their desktops Response Feedback: Windows Server 2008 includes a Fax Server role that enables users to send faxes from and receive them to their desktops. Question 15 6.6667 out of 6.6667 points

What role must be installed before or with the Fax Server role? Answer Selected Answer: a. Print Services Response Feedback: The Print Services role must be installed before or with the Fax Server role. Question 1 6.6666 out of 6.6666 points

Web browsers typically connect to Web servers using a protocol called __________. Answer Selected Answer: http Question 2 6.6666 out of 6.6666 points

For clients to be able to use server names in their URLs, you must create a(n) __________ record in your DNS domain for each IP address. Answer Selected Answer: host Question 3 6.6666 out of 6.6666 points

__________ uses a modularized architecture that enables you to install only the functions that you need for your Websites. Answer Selected Answer: IIS7 Question 4 6.6666 out of 6.6666 points

The disadvantage of IP hosting is that, for Internet Web servers, each site must have its own registered IP __________, which can be inconvenient to manage and expensive to maintain. Answer Selected Answer: address Question 5 6.6666 out of 6.6666 points

__________ handling in IIS7 captures information about failed requests and provides Failed Request Tracing capabilities. Answer Selected Answer: error Question 6 6.6667 out of 6.6667 points

What application layer protocol enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers. Answer Selected Answer: d. File Transfer Protocol (FTP) Response Feedback: File Transfer Protocol (FTP) is an application layer protocol that enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers. FTP is defined by the RFC 114 document, which the Internet Engineering Task Force (IETF) published in 1971, making it one of the oldest TCP/IP protocols still in use. Question 7 6.6667 out of 6.6667 points

On IIS7, what reduces the application’s attack surface, minimizes the amount of memory and other system resources it needs to run, and simplifies the configuration and maintenance processes? Answer Selected Answer: d. modular installation Response Feedback: Modular installation reduces the application’s attack surface, minimizes the amount of memory and other system resources it needs to run, and simplifies the configuration and maintenance processes. Question 8

6.6667 out of 6.6667 points

What version of IIS is included in Windows Server 2008? Answer Selected Answer: b. 7 Response Feedback: Microsoft has extensively renovated the new version of Internet Information Services included in Windows Server 2008, which is Internet Information Services 7.0. Question 9 6.6667 out of 6.6667 points

When you create additional Websites on an IIS7 server, what server setting is automatically inherited? Answer Selected Answer: b. Default Server Setting Response Feedback: Any additional Websites that you create on an IIS7 server inherit the default server settings unless you modify them manually. Question 11 6.6667 out of 6.6667 points

The original format for FTP directory listings was based on a format used by which operating system? Answer Selected Answer: a. UNIX operating systems Response Feedback: The FTP Directory Browsing feature in FTP7 controls the format that the server uses when sending directory listing information to a client. The original format for FTP directory listings was based on the format used by the UNIX operating systems of the time. Question 12 6.6667 out of 6.6667 points

What controls the format that the server uses when sending directory listing information to a client? Answer Selected Answer: a. FTP Directory Browsing Response Feedback: The FTP Directory Browsing feature in FTP7 controls the format that the server uses when sending directory listing information to a client. The original format for FTP directory listings was based on the format used by the UNIX operating systems of the time. Question 13 6.6667 out of 6.6667 points

What type of interface that is integrated into most browser applications is used most often by FTP clients? Answer Selected Answer: c. graphical interface Response Feedback: Originally implemented as command-line applications, FTP clients now most often use a graphical interface that is integrated into most browser applications, including Internet Explorer. Question 14 6.6667 out of 6.6667 points

Which feature enables you to use a Website to publish files located anywhere on the network? Answer Selected Answer: a. virtual directories Response Feedback: A virtual directory is an alias that points to a folder in another physical location. It is essentially a shortcut that enables you to publish content found on different drives or different computers without copying or moving it. Question 15 6.6667 out of 6.6667 points

Which service enables IIS to respond to a variety of incoming message types and not just HTTP? Answer Selected Answer: c. Windows Process Activation Service (WPAS) Response Feedback: The component that manages the request pipeline, the server’s application pools, and the worker processes running in them is called the Windows Process Activation Service (WPAS) Question 2 6.6666 out of 6.6666 points

SSL for FTP7 eliminates one of the major shortcomings of FTP: the transmission of __________ in clear text. Answer Selected Answer: passwords Question 5 6.6666 out of 6.6666 points

When a client authenticates to an IIS7 server using __________ Authentication, the client transmits its credentials unencrypted, using Base64 encoding, so anyone capturing the network packets can read the user’s credentials. Answer Selected Answer: basic Question 6 6.6667 out of 6.6667 points

What is it that specifies what clients are able to do on a Website after they have been authenticated by the server? Answer Selected Answer: a. authorization rules Response Feedback: Authorization rules specify what clients are able to do on a Website after the server has authenticated them. Question 8 6.6667 out of 6.6667 points

What authentication protocol is ticket-based and is used by Windows computers that are members of an Active Directory domain? Answer Selected Answer: c. Kerberos Response Feedback: Kerberos is a ticket-based authentication protocol used by Windows computers that are members of an Active Directory domain. Question 9 6.6667 out of 6.6667 points

You are establishing an SSL connection with the server when you click a link or key a URL containing the __________ prefix in your browser. Answer Selected Answer: c. https:// Response Feedback: Secure Sockets Layer (SSL) is a security protocol that you can use to encrypt the data exchanged by clients and IIS servers. When you click a link or key a URL containing the prefix https:// in your browser, you are establishing an SSL connection with the server. Question 10 6.6667 out of 6.6667 points

NTFS permissions are realized as access control lists (ACLs), which consist of two basic types of access control entries named __________. Answer Selected Answer: b. Allow and Deny Response Feedback: NTFS permissions are realized as access control lists (ACLs), which consist of two basic types of access control entries (ACEs): Allow and Deny. Question 11 6.6667 out of 6.6667 points

Where is the root directory of the default Website placed when IIS is installed? Answer

Selected Answer: d. C:\inetpub\wwwroot Response Feedback: When you install the Web Server (IIS) role on a Windows Server 2008 computer, IIS7 creates the user and the group and assigns the group the NTFS permissions needed to access the designated root directory of the default Website (C:\inetpub\wwwroot). Question 12 6.6667 out of 6.6667 points

What is a way to configure an ASP.NET application to run in a security context different from the application’s default context? Answer Selected Answer: d. ASP.NET Impersonation Response Feedback: ASP.NET Impersonation is not an authentication protocol in itself, unlike most of the other options in the Authentication pane. Instead, ASP.NET is a way to configure an ASP.NET application to run in a security context different from the application’s default context. Question 13 6.6667 out of 6.6667 points

What module enables you to limit client access to specific file types in several different ways? Answer Selected Answer: a. Handler Mappings Response Feedback: In previous versions of IIS, when you specified the home directory that would form the root of a Website, you could grant clients any combination of read, write, script, and execute permissions for the site. In IIS7, this capability has been moved to a feature called Handler Mappings, which provides additional, more granular, configuration capabilities. Question 14 6.6667 out of 6.6667 points

The anonymous user account in IIS7 is a built-in account called IUSR, which is a member of what group? Answer Selected Answer: a. IIS_IUSRS Response Feedback: The anonymous user account in IIS7 is a built-in account called IUSR, which is a member of a group called IIS_IUSRS. Question 15 6.6667 out of 6.6667 points

What is the only authentication method integrated into IIS7 that IIS7 enables by default? Answer Selected Answer: d. Anonymous Authentication

Response Feedback: Anonymous Authentication is the only authentication method integrated into IIS7 and the only one that IIS7 enables by default. As the name implies, Anonymous Authentication enables any user to access a Website that employs it without supplying an account name or password. This method of authentication is designed primarily for public Websites on the Internet or any internal site that you want to be available to all users. Question 1 6.6666 out of 6.6666 points

Server Side __________ is another relatively old Web server technology that enables HTML pages to contain directives that the server parses and executes. Answer Selected Answer: Includes Question 2 6.6666 out of 6.6666 points

SMTP server is essentially the Windows counterpart to the __________ program used by most UNIX Web servers. Answer Selected Answer: sendmail Question 3 6.6666 out of 6.6666 points

Windows Server 2008 includes a(n) __________ Services role that organizations can use to share information about their Websites and services with clients on an intranet, extranet, or the Internet. Answer Selected Answer: UDDI Question 4 6.6666 out of 6.6666 points

When you create a new Website, IIS7 automatically creates a new application pool with the same name as the site and the same configuration settings as __________. Answer Selected Answer: DefaultAppPool Question 5 6.6666 out of 6.6666 points

__________ files have an .asp extension and function in much the same way as Server Side Includes, with scripting commands embedded in standard HTML code. Answer Selected Answer: ASP Question 6 6.6667 out of 6.6667 points

What was designed to be an alternative to CGI, enabling a Web server to execute applications without spawning a separate process for each incoming request? Answer Selected Answer: b. ISAPI Response Feedback: Internet Server Application Programming Interface (ISAPI) was designed to be an alternative to CGI, enabling a Web server to execute applications without spawning a separate process for each incoming request. Question 7 6.6667 out of 6.6667 points

What host for user-developed application code is responsible for processing requests it receives from the protocol listeners and returning results to the client? Answer Selected Answer: b. worker process Response Feedback: A worker process is a host for user-developed application code that is responsible for processing requests it receives from the protocol listeners and returning results to the client. Question 8 6.6667 out of 6.6667 points

What is another relatively old Web server technology that enables HTML pages to contain directives that the server parses and executes? Answer Selected Answer: a. SSI Response Feedback: Server Side Includes (SSI) is another relatively old Web server technology that enables HTML pages to contain directives that the server parses and executes. SSI forces the Web server to read the text of the pages it is about to transmit to clients and act upon specific commands it finds in that text. Question 9 6.6667 out of 6.6667 points

Which listener enables IIS7 to receive client requests using protocols other than HTTP and ports other than port 80? Answer Selected Answer: d. All of the above Response Feedback: In addition to HTTP.sys, IIS7 also adds three new protocol listeners: NET.TCP, NET.PIPE, and NET.MSMQ. These listeners enable IIS7 to receive client requests using protocols other than HTTP and ports other than port 80. Question 10 6.6667 out of 6.6667 points

Because each application pool occupies its own protected address space, a crashed application cannot affect any process running outside of that pool. This is known as __________. Answer Selected Answer: c. worker process isolation mode Response Feedback: A worker process is a host for user-developed application code that is responsible for processing requests it receives from the protocol listeners and returning results to the client. Because each application pool occupies its own protected address space, a crashed application cannot affect any process running outside of that pool, which is known as worker process isolation mode. Question 11 6.6667 out of 6.6667 points

Where does the UDDI service store information about Websites as well as its configuration settings? Answer Selected Answer: c. UDDI Services Database Response Feedback: The UDDI Services Database is where the service stores information about Websites as well as its configuration settings. Question 12 6.6667 out of 6.6667 points

What is responsible for managing application pools and worker processes? Answer Selected Answer: d. Windows Process Activation Service Response Feedback: The Windows Process Activation Service (WPAS) is responsible for managing application pools and worker processes. Question 13 6.6667 out of 6.6667 points

Which application pool type consists of multiple applications serviced by multiple worker processes? Answer Selected Answer: a. Web garden Response Feedback: The configuration of the application pools, worker processes, and applications is highly flexible in IIS7. A Web garden consists of multiple applications serviced by multiple worker processes. Question 14 6.6667 out of 6.6667 points

What XML-based directory service enables businesses to publish listings about their activities and the services they offer? Answer Selected Answer: c.

UDDI Response Feedback: Windows Server 2008 includes a UDDI Services role that organizations can use to share information about their Websites and services with clients on an intranet, extranet, or the Internet. Universal Discovery, Description, and Integration (UDDI) is an XML-based directory service that enables businesses to publish listings about their activities and the services they offer. Question 15 6.6667 out of 6.6667 points

What enables developers to create dynamic Web pages, Web applications, and XML (Extensible Markup Language) Web services by using a wide variety of programming languages and development tools? Answer Selected Answer: d. ASP.NET Response Feedback: Much of IIS7’s application-hosting capability is geared toward the ASP.NET development environment. ASP.NET is the successor to ASP and is still based on server-side scripting, but it is more than just an upgrade. Based on the .NET framework, ASP.NET enables developers to create dynamic Web pages, Web applications, and XML (Extensible Markup Language) Web services by using a wide variety of programming languages and development tools. Question 1 6.6666 out of 6.6666 points Correct __________ is the component that is most likely to be a bottleneck on a terminal server. Answer Selected Answer: Memory Correct Answer: Memory Question 2 6.6666 out of 6.6666 points Correct The TS __________ Access role server creates an IIS Website that enables users to access Terminal Services desktops and RemoteApp applications without running the RDC client. Answer Selected Answer: web Correct Answer: Web Question 3 6.6666 out of 6.6666 points Correct The Remote Desktop Connection __________ establishes a connection to a terminal server using Remote Desktop Protocol (RDP) and displays a session window containing a desktop or application. Answer Selected Answer: client Correct Answer: client Question 4

6.6666 out of 6.6666 points Correct A(n) __________ is a collection of processes that form an individual user environment running on the server. Answer Selected Answer: session Correct Answer: session Question 5 6.6666 out of 6.6666 points Correct __________ Level Authentication confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity. Answer Selected Answer: Network Correct Answer: Network Question 6 6.6667 out of 6.6667 points Correct What role service provides the functionality that enables users running the RDC client to run full desktop sessions? Answer Selected Answer: c. Terminal Server Correct Answer: c. Terminal Server Response Feedback: The Terminal Server role service provides the core Terminal Services functionality that enables users running the RDC client to run full desktop sessions. This role service also includes the RemoteApp feature that enables clients to run individual applications in separate windows. Question 7 6.6667 out of 6.6667 points Correct What performance monitor reports the number of active Terminal Services sessions during the sample time interval? Answer Selected Answer: a. Terminal Services: Active Sessions Correct Answer: a. Terminal Services: Active Sessions Response Feedback: The Terminal Services: Active Sessions performance monitor reports the number of active Terminal Services sessions during the sample time interval. An Active Session indicates that a session is connected and a user is logged on to the server. Question 8 6.6667 out of 6.6667 points Correct

With RDP, client connection requests arrive over what TCP port? Answer Selected Answer: a. 3389 Correct Answer: a. 3389 Response Feedback: TCP port 3389 is the well-known port number for the RDP protocol. Question 9 6.6667 out of 6.6667 points Correct What are the advantages of Terminal Services? Answer Selected Answer: a. all of the above Correct Answer: a. all of the above Response Feedback: Deploying Terminal Services offers several advantages to the network administrator, including the following: Reduced client hardware requirements, simplified application deployment, easy configuration and updates, low network bandwidth consumption, support for thin clients, conservation of licenses, power savings, no client backups, and remote control help and training. Question 10 6.6667 out of 6.6667 points Correct What type of licensing permits one client device, such as a computer, terminal, or handheld, to connect to the terminal server no matter who is using it? Answer Selected Answer: d. Per Device Correct Answer: d. Per Device Response Feedback: The Per Device licensing type permits one client device, such as a computer, terminal, or handheld, to connect to the terminal server no matter who is using it. Question 11 6.6667 out of 6.6667 points Correct Terminal Services has which two operational modes? Answer Selected Answer: d. Execution and Install Correct Answer: d. Execution and Install Response Feedback: Terminal Services has two operational modes: Execution and Install. By default, the Add Roles Wizard leaves newly installed terminal servers in Execution mode.

Question 12 6.6667 out of 6.6667 points Correct What confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity? Answer Selected Answer: b. Network Level Authentication (NLA) Correct Answer: b. Network Level Authentication (NLA) Response Feedback: Network Level Authentication (NLA) confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity. Question 13 6.6667 out of 6.6667 points Correct What component is most likely to be a bottleneck on a terminal server? Answer Selected Answer: d. memory Correct Answer: d. memory Response Feedback: Memory is the component that is mostly likely to be a bottleneck on a terminal server. The server requires additional memory for each client and application you plan to support. Because it is difficult to determine in advance how much memory a terminal server needs, purchase a server with plenty of room for memory upgrades. Question 14 6.6667 out of 6.6667 points Correct Users must have the appropriate privileges to access a terminal server, and the easiest way to provide those privileges is to add the users to what group? Answer Selected Answer: c. Remote Desktop Users Correct Answer: c. Remote Desktop Users Response Feedback: Users must have the appropriate privileges to access a terminal server, and the easiest way to provide those privileges is to add the users to the Remote Desktop Users group. Question 15 6.6667 out of 6.6667 points Correct What role configures the computer to function as a Terminal Services Licensing Server, which enables it to allocate client access licenses (CALs) to clients?

Answer Selected Answer: b. TS Licensing Correct Answer: b. TS Licensing Response Feedback: The TS Licensing role service configures the computer to function as a Terminal Services Licensing Server, which enables it to allocate client access licenses (CALs) to clients. You must have a Licensing Server on your network to use Terminal Services. You can install TS Licensing on the same computer as the other role services or on another computer. Question 1 0 out of 10 points Incorrect In server-side caching, RDC stores screen elements that remain unchanged from one refresh to the next in a cache on the client system. Answer Correct Answer: False Question 2 10 out of 10 points Correct After you have installed the Terminal Services role, you can no longer install the applications that the terminal server will deploy to your clients. Answer Correct Answer: False Question 3 10 out of 10 points Correct What terminal services key combination displays the Windows Security screen? Correct Answer: d. CTRL+ALT+END Question 4 10 out of 10 points Correct What experience option is also called anti-aliasing and enables the client to display screen fonts without jagged lines? Correct Answer: a. font smoothing Question 5 10 out of 10 points Correct What experience option enables the RDC client to duplicate the graphics-rendering capabilities of Windows Vista, most notably the Aero “glass” effect? Correct Answer: c. desktop composition

Question 6 10 out of 10 points Correct Which TS server licensing scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest? Answer Selected Answer: a. Forest Correct Answer: a. Forest Question 7 10 out of 10 points Correct What real-time, modular operating system is designed for devices with minimal amounts of memory? Answer Selected Answer: c. Windows CE Correct Answer: c. Windows CE Question 8 10 out of 10 points Correct What files store Remote Desktop Client settings in a recallable and portable form? Answer Selected Answer: a. RDP files Correct Answer: a. RDP files Question 9 10 out of 10 points Correct What Terminal Services key combination displays the Start menu? Answer Selected Answer: d. ALT+HOME Correct Answer: d. ALT+HOME Question 10 10 out of 10 points Correct What is a more full-featured operating system based on the standard Windows XP kernel? Answer Selected Answer: a.

Windows XPe Correct Answer: Windows XPe Question 1

a.

6.6666 out of 6.6666 points Correct Licensing server __________ mode specifies how the terminal server will locate a TS Licensing server. Answer Selected Answer: discovery Correct Answer: discovery Question 2 6.6666 out of 6.6666 points Correct To use the Terminal Services role for multiple-user connections, you must purchase the appropriate number of Terminal Services __________ access licenses. Answer Selected Answer: client Correct Answer: client Question 3 6.6666 out of 6.6666 points Correct Font __________ is another term for anti-aliasing. Answer Selected Answer: smoothing Correct Answer: smoothing Question 4 6.6666 out of 6.6666 points Correct One of the new features implemented in RDP 6.x is support for __________ color, which enables clients to run graphicintensive applications, such as image editors, with a full color palette. Answer Selected Answer: 32-bit Correct Answer: 32-bit Question 6 6.6667 out of 6.6667 points Correct What experience option is also called anti-aliasing and enables the client to display screen fonts without jagged lines? Answer Selected Answer: c. font smoothing Correct Answer: c. font smoothing Response Feedback:

The font smoothing experience option, also called anti-aliasing, enables the client to display screen fonts without jagged lines. Question 7 6.6667 out of 6.6667 points Correct What option specifies how the terminal server will locate a TS Licensing server? Answer Selected Answer: d. licensing server discovery mode Correct Answer: d. licensing server discovery mode Response Feedback: After you have an operational TS Licensing server on your network, you must configure licensing server discovery mode, which specifies how the terminal server will locate a TS Licensing server. Question 8 6.6667 out of 6.6667 points Correct What is the executable program file for the RDC client? Answer Selected Answer: c. Mstsc.exe Correct Answer: c. Mstsc.exe Response Feedback: The executable program file for the RDC client, Mstsc.exe, is located in the C:\Windows\System32 folder by default. When you run the Mstsc.exe program with no parameters, the Remote Desktop Connection window appears with its default settings intact. Question 9 6.6667 out of 6.6667 points Correct What is a more full-featured operating system based on the standard Windows XP kernel? Answer Selected Answer: c. Windows XPe Correct Answer: c. Windows XPe Response Feedback: Windows XP Embedded is a more full-featured operating system based on the standard Windows XP kernel. Windows XPe terminals include more local computing capabilities than terminals using Windows CE or a proprietary OS, including support for local browsers and Java applications as well as embedded Win32 applications. Question 10 6.6667 out of 6.6667 points Correct What real-time, modular operating system is designed for devices with minimal amounts of memory? Answer

Selected Answer: d. Windows CE Correct Answer: d. Windows CE Response Feedback: Windows CE is a real-time, modular operating system designed for devices with minimal amounts of memory. Windows CE is not based on the NT kernel, but it provides users with a familiar Windows graphical user interface (GUI) and has been adapted to a variety of devices including handhelds, smart phones, and game consoles. Question 11 6.6667 out of 6.6667 points Correct What Mstsc option causes the RDC client to open a terminal session window that occupies the entire virtual desktop of a system with two or more monitors? Answer Selected Answer: a. /span Correct Answer: a. /span Response Feedback: When using Mstsc.exe, the /span option causes the RDC client to open a terminal session window that occupies the entire virtual desktop of a system with two or more monitors. The monitors must be the same size and be placed side by side. Question 12 6.6667 out of 6.6667 points Correct Where is the Mstsc.exe file located? Answer Selected Answer: b. C:\Windows\System32 Correct Answer: b. C:\Windows\System32 Response Feedback: The executable program file for the RDC client, Mstsc.exe, is located in the C:\Windows\System32 folder by default. When you run the Mstsc.exe program with no parameters, the Remote Desktop Connection window appears with its default settings intact. Question 13 6.6667 out of 6.6667 points Correct What files store Remote Desktop Client settings in a recallable and portable form? Answer Selected Answer: b. RDP files Correct Answer: b. RDP files Response Feedback: RDP files store Remote Desktop Client settings in a recallable and portable form. Question 14

6.6667 out of 6.6667 points Correct The process of installing a TS Licensing server and preparing it for use consists of four basic steps. What is the first of these steps? Answer Selected Answer: b. Install the TS Licensing role service. Correct Answer: b. Install the TS Licensing role service. Response Feedback: The process of installing a TS Licensing server and preparing it for use consists of the following basic steps: Install the TS Licensing role service, activate the TS Licensing server, install the TS CALs on the TS Licensing server, and configure the licensing settings on the terminal servers. Question 15 6.6667 out of 6.6667 points Correct What is the default location of the TS Licensing database? Answer Selected Answer: d. C:\Windows\System32\LServer Correct Answer: d. C:\Windows\System32\LServer Response Feedback: The TS Licensing database appears by default in the C:\Windows\System32\LServer folder, but it can be changed. Question 2 6.6666 out of 6.6666 points

The port number that the RDP protocol uses (TCP port 3389) is __________ by default on most firewalls. Answer Selected Answer: blocked Question 3 6.6666 out of 6.6666 points

Terminal Services (TS) __________ Access is a role service that works with Internet Information Services (IIS) 7.0 to create an alternative client interface to your terminal servers. Answer Selected Answer: web Question 4 6.6666 out of 6.6666 points

TS Web Access requires Internet Information Services 7.0 to run. IIS 7, in turn, requires the Windows Process __________ Service. Answer

Selected Answer: Question 5

Activation

6.6666 out of 6.6666 points

In a VPN connection, computers use a technique called __________ that encapsulates an entire client/server session within another protocol. Answer Selected Answer: tunneling Question 6 6.6667 out of 6.6667 points

Which of the following is NOT a Windows Process Activation Service feature that TS Web Access requires? Answer Selected Answer: b. Request Filtering Response Feedback: TS Web Access requires the following Windows Process Activation Service features: Process Model, .NET Environment, and Configuration APIs. Question 7 6.6667 out of 6.6667 points

The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within what protocol? Answer Selected Answer: b. SSL Response Feedback: The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within Secure Sockets Layer (SSL) packets. SSL uses TCP port number 443, which most organizations with an Internet presence leave open in their firewalls so that Internet clients can establish secure connections to their Web servers. Question 8 6.6667 out of 6.6667 points

What new Windows Server 2008 Terminal Services role service enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers? Answer Selected Answer: b. Terminal Services Gateway Response Feedback: Terminal Services Gateway is a new Windows Server 2008 Terminal Services role service that enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers. Question 9 6.6667 out of 6.6667 points

Which of the following is NOT one of the tasks you must perform when deploying a TS Gateway server? Answer Selected Answer: b. Reinstall IIS with special consideration for the TS Gateway role service. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 10 6.6667 out of 6.6667 points

Which of the following operating systems is NOT supported as an Internet client in a TS Gateway deployment? Answer Selected Answer: a. Windows 2000 Response Feedback: TS Gateway supports Windows Vista, Windows XP SP2, and Windows Server 2008. Question 11 6.6667 out of 6.6667 points

What is the final step involved in deploying a TS Gateway server? Answer Selected Answer: a. Configure the client to use the TS Gateway. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 12 6.6667 out of 6.6667 points

A client’s initial connection to the TS Web Access Web page involves a standard HTTP connection using what port? Answer Selected Answer: a. 80 Response Feedback: A client’s initial connection to the TS Web Access Web page does involve a standard HTTP connection using port TCP 80. However, after the user clicks a RemoteApp icon or establishes a Remote Desktop connection, HTTP is no longer involved. Question 13 6.6667 out of 6.6667 points

What port does SSL use?

Answer Selected Answer: b. 443 Response Feedback: SSL uses TCP port number 443. Question 14 6.6667 out of 6.6667 points

For Internet clients to connect to a TS Gateway server using SSL, the server must have issued a __________ by a source that the client computers trust. Answer Selected Answer: c. digital certificate Response Feedback: For Internet clients to connect to a TS Gateway server using SSL, the server must have a digital certificate issued by a source that the client computers trust. If you do not create or select a certificate during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Question 15 6.6667 out of 6.6667 points

What interface is particularly useful with RemoteApp because it enables users to launch applications by double-clicking icons on a Web page? Answer Selected Answer: b. TS Web Access Response Feedback: The Terminal Services (TS) Web Access interface is particularly useful with RemoteApp because it enables users to launch applications by double-clicking icons on a Web page. Instead of creating RDP files and deploying them to clients using Group Policy or some other method, you can simply select a checkbox for the RemoteApp applications you want to deploy using TS Web Access, and the service adds the appropriate icons to its default Web page. Question 1 5 out of 5 points Correct To minimize client hardware requirements, administrators should run all applications not included with the desktop operating system on terminal servers with the sole exception of the RDC client program, which provides desktop users with access to all other applications. Answer Selected Answer: True Correct Answer: True Question 2 5 out of 5 points Correct A Terminal Services deployment needs multiple TS Licensing servers for the entire installation to support the number of terminal servers on a network. Answer

Selected Answer: Correct Answer: Question 3 5 out of 5 points

False False

Correct What files store Remote Desktop Client settings in a recallable and portable form? Answer Selected Answer: a. RDP files Correct Answer: a. RDP files Response Feedback: RDP files store Remote Desktop Client settings in a recallable and portable form. Question 4 5 out of 5 points Correct What Mstsc option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps? Answer Selected Answer: d. /public Correct Answer: d. /public Response Feedback: When using Mstsc.exe, the /public option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps. Question 5 5 out of 5 points Correct Which TS server licensing scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest? Answer Selected Answer: c. Forest Correct Answer: c. Forest Response Feedback: When you install the TS Licensing role service, you must specify the server’s discovery scope. The Forest discovery scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest. Microsoft recommends this scope setting for domain members. Question 6 5 out of 5 points Correct In addition to the Windows versions, what utility can be used to connect to a terminal server from a Macintosh computer?

Answer Selected Answer: c. Microsoft Remote Desktop Connection Client for Mac 2.0 Correct Answer: c. Microsoft Remote Desktop Connection Client for Mac 2.0 Response Feedback: The typical desktop platform for a Terminal Services client is a Windows PC, but RDP client alternatives enable computers running non-Windows operating systems to run terminal server applications. In addition to the Windows versions, Microsoft Remote Desktop Connection Client for Mac 2.0 is available as a free download, and third-party clients are available for Macintosh and UNIX/Linux computers. Question 7 5 out of 5 points Correct The Easy Print driver is based on what document format introduced in Windows Vista and Windows Server 2008? Answer Selected Answer: c. XPS Correct Answer: c. XPS Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. Question 8 5 out of 5 points Correct What terminal services key combination displays the Windows Security screen? Answer Selected Answer: c. CTRL+ALT+END Correct Answer: c. CTRL+ALT+END Response Feedback: Pressing CTRL+ALT+END in a terminal services session will display the Windows Security screen. Question 9 0 out of 5 points Incorrect What is the default location of the TS Licensing database? Correct Answer: d. C:\Windows\System32\LServer Question 10 5 out of 5 points Correct What option specifies how the terminal server will locate a TS Licensing server? Answer

Selected Answer: a. licensing server discovery mode Correct Answer: a. licensing server discovery mode Response Feedback: After you have an operational TS Licensing server on your network, you must configure licensing server discovery mode, which specifies how the terminal server will locate a TS Licensing server. Question 11 5 out of 5 points Correct To access a terminal server on a private network from the Internet using a TS Gateway server, first you must configure Remote Desktop Connection on the client computer. Answer Selected Answer: True Correct Answer: True Question 12 5 out of 5 points Correct CAPs enable you to restrict TS Gateway access to members of specific local or domain user groups. Answer Selected Answer: True Correct Answer: True Question 13 5 out of 5 points Correct What version of Internet Information Services is required for TS Web Access? Answer Selected Answer: a. 7 Correct Answer: a. 7 Response Feedback: TS Web Access requires Internet Information Services 7.0 to run. IIS 7, in turn, requires the Windows Process Activation Service. Question 14 5 out of 5 points Correct Generally, what has been the choice of technology for remote network access in recent years? Answer Selected Answer: b. VPN Correct Answer: b. VPN Response Feedback:

Generally, the technology of choice for remote network access has, in recent years, been virtual private networking (VPN). In a VPN connection, computers use a technique called tunneling that encapsulates an entire client/server session within another protocol. Question 15 5 out of 5 points Correct Which of the following is NOT a Windows Process Activation Service feature that TS Web Access requires? Answer Selected Answer: a. Request Filtering Correct Answer: a. Request Filtering Response Feedback: TS Web Access requires the following Windows Process Activation Service features: Process Model, .NET Environment, and Configuration APIs. Question 16 5 out of 5 points Correct The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within what protocol? Answer Selected Answer: c. SSL Correct Answer: c. SSL Response Feedback: The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within Secure Sockets Layer (SSL) packets. SSL uses TCP port number 443, which most organizations with an Internet presence leave open in their firewalls so that Internet clients can establish secure connections to their Web servers. Question 17 5 out of 5 points Correct Which of the following is NOT one of the tasks you must perform when deploying a TS Gateway server? Answer Selected Answer: a. Reinstall IIS with special consideration for the TS Gateway role service. Correct Answer: a. Reinstall IIS with special consideration for the TS Gateway role service. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 18 5 out of 5 points

Correct Which of the following operating systems is NOT supported as an Internet client in a TS Gateway deployment? Answer Selected Answer: a. Windows 2000 Correct Answer: a. Windows 2000 Response Feedback: TS Gateway supports Windows Vista, Windows XP SP2, and Windows Server 2008. Question 19 5 out of 5 points Correct What new Windows Server 2008 Terminal Services role service enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers? Answer Selected Answer: a. Terminal Services Gateway Correct Answer: a. Terminal Services Gateway Response Feedback: Terminal Services Gateway is a new Windows Server 2008 Terminal Services role service that enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers. Question 20 0 out of 5 points Incorrect What interface is particularly useful with RemoteApp because it enables users to launch applications by double-clicking icons on a Web page? Correct Answer: a. TS Web Access Response Feedback: The Terminal Services (TS) Web Access interface is particularly useful with RemoteApp because it enables users to launch applications by double-clicking icons on a Web page. Instead of creating RDP files and deploying them to clients using Group Policy or some other method, you can simply select a checkbox for the RemoteApp applications you want to deploy using TS Web Access, and the service adds the appropriate icons to its default Web page. Question 1 6.6666 out of 6.6666 points

Media streaming is always a tradeoff between __________ and signal quality. Answer Selected Answer: bandwidth Question 2 6.6666 out of 6.6666 points

An AD RMS __________ is a Windows Server 2008 computer responsible for issuing certificates that enable users and services to assign AD RMS protection to documents by creating publishing licenses.

Answer Selected Answer: Question 3

server

6.6666 out of 6.6666 points

The protection provided by AD RMS is __________, meaning that it remains a part of the document no matter where anyone moves it. Answer Selected Answer: persistent Question 4 6.6666 out of 6.6666 points

Windows __________ Services 3.0 is a database-enabled Web application that runs on an Internet Information Services server. By accessing the site, users can employ browser-based workspaces to share information in a variety of ways such as storing documents, creating calendar appointments and task lists, and contributing to newsgroup-style discussions. Answer Selected Answer: Sharepoint Question 5 6.6666 out of 6.6666 points

__________ Reconnect enables a client to reconnect to a Windows Media Services server and resume an interrupted stream after a temporary network outage. Answer Selected Answer: Fast Question 6 6.6667 out of 6.6667 points

What service allows a server to stream audio and video content to network clients in real time? Answer Selected Answer: c. Windows Media Services Response Feedback: With Windows Media Services, a server can stream audio and video content to network clients in real time. A player on the client computer establishes a direct connection with the server and plays the audio or video content as it arrives. Question 7 6.6667 out of 6.6667 points

When you enable both the RTSP and HTTP protocols on a Windows Media Services server, what process do clients and the server use to negotiate the most efficient protocol they have in common? Answer Selected Answer: d. protocol rollover Response Feedback:

When you enable both the RTSP and HTTP protocols on a Windows Media Services server, the clients and the server use a process called protocol rollover to negotiate the most efficient protocol they have in common. A client establishing a connection to a Windows Media Services server sends information about the protocols it can use, and the server selects the best protocol it is capable of using. Question 8 6.6667 out of 6.6667 points

The Windows Server 2008 version of Windows Media Services uses what protocol to stream multimedia content? Answer Selected Answer: c. Real Time Streaming Protocol (RTSP) Response Feedback: When you add the Windows Media Services role on a Windows Server 2008 computer, the Select Data Transfer Protocols page enables you to select Real Time Streaming Protocol (RTSP), Hypertext Transfer Protocol (HTTP), or both. The Windows Server 2008 version of Windows Media Services uses the RTSP protocol by default. Question 9 6.6667 out of 6.6667 points

What enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information? Answer Selected Answer: c. Digital Rights Management Response Feedback: Digital Rights Management (DRM) enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information. Question 10 6.6667 out of 6.6667 points

Windows SharePoint Services relies on what technology to manage the database that stores user documents and information? Answer Selected Answer: c. Microsoft SQL Server 2005 Response Feedback: Windows SharePoint Services relies on Microsoft SQL Server 2005 technology to manage the database that stores user documents and information. Question 11 6.6667 out of 6.6667 points

To provide users with email capabilities in Windows SharePoint Server, you must install what type of server? Answer Selected Answer: d. SMTP

Response Feedback: Windows SharePoint Services can integrate with email in a variety of ways, enabling users to set up calendar appointments, post announcements, add documents, and contribute to blogs and discussion forums. To provide users with these email capabilities, you must install a Simple Mail Transfer Protocol (SMTP) server and configure the incoming and outgoing email settings in Windows SharePoint Services. Question 12 6.6667 out of 6.6667 points

Which of the following is NOT a step involved in deploying WMRM? Answer Selected Answer: a. testing Response Feedback: At the highest level, the process of deploying content protected with WMRM consists of the following steps: packaging, distribution, licensing, and playback. Question 13 6.6667 out of 6.6667 points

Windows Media Services uses what type of transmissions by default? Answer Selected Answer: d. unicast Response Feedback: The type of transmissions you configure Windows Media Services to use when streaming multimedia content can impact the bandwidth the service consumes. Windows Media Services uses unicast transmissions by default. In a unicast transmission, each client establishes its own connection to the Windows Media Services server and has its own data stream. Question 14 6.6667 out of 6.6667 points

What components do clients use to access specific content streams? Answer Selected Answer: c. publishing points Response Feedback: To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. Question 15 0 out of 6.6667 points

What two types of publishing does Windows Media Services support? Answer Response Feedback:

To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. Windows Media Services supports two types of publishing points: on-demand streams and broadcast streams. Question 1 6.6666 out of 6.6666 points

The __________ performs an extensive battery of tests on the computers you select, enumerating their hardware and software resources and checking their configuration settings. Answer Selected Answer: Validate a Configuration Wizard Question 2 6.6666 out of 6.6666 points

A server with __________ power supplies can continue running if one malfunctions. Answer Selected Answer: redundant Question 3 6.6666 out of 6.6666 points

__________ is a high-speed serial networking technology originally designed for use with supercomputers, but now associated primarily with storage area networking. Answer Selected Answer: Fibre Channel Question 4 6.6666 out of 6.6666 points

SANs typically use the __________ to transmit SCSI traffic over the network. Answer Selected Answer: Fibre Channel Protocol (FCP) Question 5 6.6666 out of 6.6666 points

To be accessible to Storage Manager for SANs, the storage device manufacturer must supply a software component called a(n) __________ that you install on the computer you want to use to manage the device. Answer Selected Answer: VDS Hardware Provider Question 6 6.6667 out of 6.6667 points

The process of deploying Terminal Services with network load balancing consists of which of the following parts?

Answer Selected Answer: a. both a & b Response Feedback: The process of deploying Terminal Services with network load balancing consists of two parts: creating a terminal server farm and creating a network load balancing cluster. Question 7 6.6667 out of 6.6667 points

iSNS consists of all of the following components except iSNS __________. Answer Selected Answer: b. targets Response Feedback: iSNS consists of four components: iSNS server, iSNS database, iSNS clients, and iSNS protocol. Question 8 6.6667 out of 6.6667 points

Which component in iSCSI initiators and targets registers information about itself with an iSNS server and sends queries to the server for information about other clients? Answer Selected Answer: b. iSNS clients Response Feedback: The iSNS clients component in iSCSI initiators and targets registers information about itself with an iSNS server and sends queries to the server for information about other clients. Question 9 6.6667 out of 6.6667 points

All but which option is the recommended hardware environment for a failover cluster? Answer Selected Answer: c. simultaneous network connections Response Feedback: Failover clusters are intended for critical applications that must keep running. If an organization is prepared to incur the time and expense required to deploy a failover cluster, Microsoft assumes that the organization is prepared to take every possible step to ensure the availability of the application. As a result, the recommended hardware environment for a failover cluster calls for an elaborate setup, including the following: duplicate servers, shared storage, and redundant network connections. Question 10 6.6667 out of 6.6667 points

Which of the following is not a node in the Storage Manager for SANs console? Answer Selected Answer: d.

Modules Response Feedback: The Storage Manager for SANs console has three nodes: LUN Management, Subsystems, and Drives. Question 11 6.6667 out of 6.6667 points

What number of virtual instances is included in Windows Server 2008 Standard? Answer Selected Answer: c. 1 Response Feedback: Windows Server 2008 includes one virtual instance. Question 12 6.6667 out of 6.6667 points

What type of signaling does Fibre Channel use? Answer Selected Answer: b. serial Response Feedback: Because Fibre Channel uses serial instead of parallel signaling, it can span much longer distances than a pure SCSI connection—up to 50 kilometers or more, in some cases. Question 13 6.6667 out of 6.6667 points

Cluster servers should use the same software environment, which consists of all of the following elements except __________. Answer Selected Answer: d. disk size Response Feedback: In addition to hardware recommendations, the cluster servers should use the same software environment, which consists of the following elements: operating system, application, updates, and Active Directory. Question 14 6.6667 out of 6.6667 points

A SAN-connected server has a minimum of how many network adapters? Answer Selected Answer: a. 2 Response Feedback: Instead of installing disk drives into servers or connecting them using a SCSI bus, a SAN consists of one or more drive arrays equipped with network interface adapters that you connect to your servers using standard twisted pair or fiber optic network cables. A SAN-connected server, therefore, has a minimum of two network adapters, one for the standard LAN connection and one for the SAN.

Question 15 6.6667 out of 6.6667 points

Using copper cables, what are the transmission speeds for Fibre Channel networks? Answer Selected Answer: c. 133 Mbps (megabits per second) to 1 Gbps (gigabit per second) Response Feedback: Transmission speeds for Fibre Channel networks range from 133 Mbps (megabits per second) to 1 Gbps (gigabit per second) for copper cables and up to 10 Gbps for fiber optic. Question 1 5 out of 5 points Correct Windows SharePoint Services uses incoming email to enable users to contribute content to the site. To do this, you must install a POP3 server on the SharePoint computer. Answer Selected Answer: False Correct Answer: False Question 2 5 out of 5 points Correct To protect your content using WMRM, you must enter into a license agreement with Microsoft and then obtain the Windows Media Rights Manager 10 Software Development Kit (SDK). Answer Selected Answer: True Correct Answer: True Question 3 5 out of 5 points Correct What TCP/IP feature provides one-to-many transmission capabilities? Answer Selected Answer: a. multicast Correct Answer: a. multicast Response Feedback: Multicasting is a TCP/IP (Transmission Control Protocol/Internet Protocol) feature that provides one-to-many transmission capabilities. Question 4 0 out of 5 points Incorrect Windows Media Services uses what type of transmissions by default? Answer

Selected Answer: d. directed broadcast Correct Answer: a. unicast Response Feedback: The type of transmissions you configure Windows Media Services to use when streaming multimedia content can impact the bandwidth the service consumes. Windows Media Services uses unicast transmissions by default. In a unicast transmission, each client establishes its own connection to the Windows Media Services server and has its own data stream. Question 5 5 out of 5 points Correct What Windows Server 2008 role enables you to create usage policies for specific types of information that specify what authorized users can do with that information? Answer Selected Answer: b. Active Directory Rights Management Services Correct Answer: b. Active Directory Rights Management Services Response Feedback: Active Directory Rights Management Services (AD RMS) is a Windows Server 2008 role that enables you to create usage policies for specific types of information that specify what authorized users can do with that information. Question 6 5 out of 5 points Correct What components do clients use to access specific content streams? Answer Selected Answer: a. publishing points Correct Answer: a. publishing points Response Feedback: To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. Question 7 5 out of 5 points Correct What can you create to enable users to access the content you specified when creating a publishing point? Answer Selected Answer: d. announcement Correct Answer: d. announcement Response Feedback: After creating a publishing point, Windows Media Services provides several ways to inform clients of the stream’s existence and provide them with access to it. To enable users to access the content you specified when creating a publishing point, you can provide the URL specified in the publishing point’s Announce tab.

Question 8 5 out of 5 points Correct The Windows Server 2008 version of Windows Media Services uses what protocol to stream multimedia content? Answer Selected Answer: a. Real Time Streaming Protocol (RTSP) Correct Answer: a. Real Time Streaming Protocol (RTSP) Response Feedback: When you add the Windows Media Services role on a Windows Server 2008 computer, the Select Data Transfer Protocols page enables you to select Real Time Streaming Protocol (RTSP), Hypertext Transfer Protocol (HTTP), or both. The Windows Server 2008 version of Windows Media Services uses the RTSP protocol by default. Question 9 5 out of 5 points Correct What Microsoft technology enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content? Answer Selected Answer: b. Windows Media Rights Manager Correct Answer: b. Windows Media Rights Manager Response Feedback: Windows Media Rights Manager (WMRM) is a Microsoft technology that enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content. Question 10 5 out of 5 points Correct AD RMS consists of which of the following components? Answer Selected Answer: c. all of the above Correct Answer: c. all of the above Response Feedback: AD RMS consists of three components: AD RMS server, AD RMS client, and database server. Question 11 5 out of 5 points Correct Storage Manager is part of a feature in Windows Server 2008. Answer Selected Answer: True Correct Answer: True Question 12

5 out of 5 points Correct To create a load balanced terminal server farm, you only need to install the Terminal Services role with the Terminal Server role service on one Windows Server 2008 computer. Answer Selected Answer: False Correct Answer: False Question 13 0 out of 5 points Incorrect Which component in iSCSI initiators and targets registers information about itself with an iSNS server and sends queries to the server for information about other clients? Answer Selected Answer: c. iSNS database Correct Answer: b. iSNS clients Response Feedback: The iSNS clients component in iSCSI initiators and targets registers information about itself with an iSNS server and sends queries to the server for information about other clients. Question 14 5 out of 5 points Correct Which of the following is not a node in the Storage Manager for SANs console? Answer Selected Answer: a. Modules Correct Answer: a. Modules Response Feedback: The Storage Manager for SANs console has three nodes: LUN Management, Subsystems, and Drives. Question 15 5 out of 5 points Correct A SAN-connected server has a minimum of how many network adapters? Answer Selected Answer: a. 2 Correct Answer: a. 2 Response Feedback: Instead of installing disk drives into servers or connecting them using a SCSI bus, a SAN consists of one or more drive arrays equipped with network interface adapters that you connect to your servers using standard twisted pair or fiber optic network cables. A SAN-connected server, therefore, has a minimum of two network adapters, one for the standard LAN connection and one for the SAN.

Question 16 5 out of 5 points Correct Hyper-V uses what type of virtualization? Answer Selected Answer: d. Type 1 Correct Answer: d. Type 1 Response Feedback: The virtualization capability built into Windows Server 2008, called Hyper-V, uses a different type of architecture. HyperV uses Type 1 virtualization, in which the VMM is called a hypervisor, an abstraction layer that interacts directly with the computer’s physical hardware. Question 17 5 out of 5 points Correct Because any device on a SAN can communicate with any other device on the same SAN, high-speed data transfers can occur in which of the following ways? Answer Selected Answer: a. server to storage Correct Answer: a. server to storage Response Feedback: Because any device on a SAN can communicate with any other device on the same SAN, high-speed data transfers can occur in any of the following ways: server to storage, server to server, and storage to storage. Question 18 5 out of 5 points Correct Using copper cables, what are the transmission speeds for Fibre Channel networks? Answer Selected Answer: a. 133 Mbps (megabits per second) to 1 Gbps (gigabit per second) Correct Answer: a. 133 Mbps (megabits per second) to 1 Gbps (gigabit per second) Response Feedback: Transmission speeds for Fibre Channel networks range from 133 Mbps (megabits per second) to 1 Gbps (gigabit per second) for copper cables and up to 10 Gbps for fiber optic. Question 19 5 out of 5 points Correct The process of deploying Terminal Services with network load balancing consists of which of the following parts? Answer Selected Answer: c. both a & b

Correct Answer: c. both a & b Response Feedback: The process of deploying Terminal Services with network load balancing consists of two parts: creating a terminal server farm and creating a network load balancing cluster. Question 20 5 out of 5 points Correct iSNS consists of all of the following components except iSNS __________. Answer Selected Answer: b. targets Correct Answer: b. targets Response Feedback: iSNS consists of four components: iSNS server, iSNS database, iSNS clients, and iSNS protocol. • Question 1 6.6666 out of 6.6666 points The IIS __________ Console provides the ability to manage remote IIS 6 Web servers. Answer Selected Answer: Management

• Question 2 6.6666 out of 6.6666 points __________ Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. Answer Selected Answer: Server

• Question 3 6.6666 out of 6.6666 points The KMS activation __________ is designed to prevent pirated KMS keys from functioning on small networks or individual computers. Answer Selected Answer: threshold

• Question 4 6.6666 out of 6.6666 points Corporate customers must now activate all Windows Vista and Windows Server 2008 computers using __________ license keys. Answer Selected Answer: volume

• Question 5 6.6666 out of 6.6666 points Windows __________ Services is a role included with Windows Server 2008 that enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computers by using networkbased boot and installation media. Answer Selected Answer: Deployment

• Question 6 6.6667 out of 6.6667 points Distributing server roles among several computers has several distinct advantages, including which of the following? Answer Selected Answer: c. all of the above Response Feedback: Distributing server roles among several computers has several distinct advantages including fault tolerance, resource allocation, availability, scalability, security, network traffic, and update management. • Question 7 6.6667 out of 6.6667 points What role is essentially a superset of the Web Server (IIS) role that enables IIS to host Web services developed using environments such as Windows Communication Foundation (WCF) and .NET Framework 3.0?

Answer Selected Answer: d. Application Server Response Feedback: The Application Server role is essentially a superset of the Web Server (IIS) role that enables IIS to host Web services developed using environments such as Windows Communication Foundation (WCF) and .NET Framework 3.0. • Question 8 6.6667 out of 6.6667 points The activities performed for network clients by a Windows Server 2008 are known as __________. Answer Selected Answer: a. roles Response Feedback: After you install the Windows Server 2008 operating system, you can use the Add Roles Wizard to assign one or more roles to that computer. • Question 9 6.6667 out of 6.6667 points What role service of the Print Services role installs the Print Management snap-in for MMC, which provides centralized printer management for an entire enterprise network?

Answer Selected Answer: a. Print Server Response Feedback: The Print Services role includes the Print Server role service that installs the Print Management snap-in for MMC, providing centralized printer management for an entire enterprise network. • Question 10 6.6667 out of 6.6667 points Windows Server 2008 Web Edition does not support what role? Answer Selected Answer: c. UDDI Services Response Feedback: Windows Server 2008 Web Edition does not support the UDDI Services server role. • Question 11 6.6667 out of 6.6667 points When deploying a server using a WDS installation, the client downloads a boot image that loads __________. Answer Selected Answer: a. Windows PE Response Feedback: Instead of booting from a local drive, the computer in a PXE connects to a server on the network and downloads the boot files it needs to run. In the case of a WDS installation, the client downloads a boot image that loads Windows PE (Preinstallation Environment) 2.1, after which it installs the operating system using another image file. • Question 12 6.6667 out of 6.6667 points What Windows Server 2008 role implements Internet Information Services (IIS) 7.0 as its core? Answer Selected Answer: b. Web Server Response Feedback: The Web Server (IIS) role in Windows Server 2008 implements Internet Information Services 7.0 as its core. IIS 7 provides the basic Web server functionality that enables you to publish a standard Website on the Internet or on a private network. • Question 13 6.6667 out of 6.6667 points A __________ is a complete installation of an operating system that runs in a software environment emulating a physical computer. Answer Selected Answer: b. virtual server Response Feedback: Applications such as Microsoft Virtual Server 2005 and the Windows Server virtualization technology in Windows Server 2008 make it possible for a single computer to host multiple virtual machines, each of which runs in a completely independent environment.

• Question 14 6.6667 out of 6.6667 points What is Microsoft’s program for automating and managing the activation of products obtained using volume licenses? Answer Selected Answer: a. Volume Activation 2.0 Response Feedback: Volume Activation (VA) 2.0 does not alter the terms of your license agreement with Microsoft in any way; it is simply a tool to simplify the activation process. For end users, the activation process is completely transparent, and administrators do not have to supply individual product keys when installing Windows. • Question 15 6.6667 out of 6.6667 points What technology enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there? Answer Selected Answer: d. Terminal Services Response Feedback: Windows Server 2008 provides an alternative to individual workstation installations in the form of Terminal Services. Terminal Services is a technology that enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.

• Question 1 6.6666 out of 6.6666 points A(n) __________ area network is a separate network dedicated solely to storage devices such as drive arrays, magnetic tape autochangers, and optical jukeboxes. Answer Selected Answer: storage

• Question 2 0 out of 6.6666 points A(n) __________ volume is essentially a method for combining the space from multiple dynamic disks into a single large volume. Answer Selected Answer: disk

• Question 3 6.6666 out of 6.6666 points When you assign a __________ permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects. Answer

Selected Answer:

Deny

• Question 4 6.6666 out of 6.6666 points Folder __________ asks users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server. Answer Selected Answer: redirection

• Question 5 6.6666 out of 6.6666 points __________ permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system. Answer Selected Answer: NTFS • Question 6 6.6667 out of 6.6667 points What is the underlying disk drive structure that enables you to store information on your computer? Answer Selected Answer: c. file system Response Feedback: To organize and store data or programs on a hard drive, you must install a file system. You install file systems by formatting a partition or volume on the hard disk. • Question 7 6.6667 out of 6.6667 points What is the name of a group of servers that all perform the same function, dividing the client load among them? Answer Selected Answer: c. cluster Response Feedback: A cluster is a group of servers that all perform the same function, dividing the client load among them. Failover clustering provides the ultimate in scalability and fault tolerance. • Question 8 6.6667 out of 6.6667 points What type of dynamic disk consists of an identical amount of space on two physical disks? Answer Selected Answer: c. mirrored volume Response Feedback: A mirrored volume consists of an identical amount of space on two physical disks, both of which must be dynamic disks. The system performs all read and write operations on both disks simultaneously, so they contain

duplicate copies of all data stored on the volume. If one of the disks should fail, the other one continues to provide access to the volume until the failed disk is repaired or replaced. • Question 9 6.6667 out of 6.6667 points What is the primary interface you use to initialize, partition, and format disks? Answer Selected Answer: b. Disk Management Response Feedback: The Disk Management snap-in is the primary interface you use to initialize, partition, and format disks. • Question 10 6.6667 out of 6.6667 points Windows Server 2008 supports two hard disk partition types: MBR and __________. Answer Selected Answer: GPT Response Feedback: c.

Two hard disk partition styles can be used in Windows Server 2008: MBR and GPT.

• Question 11 6.6667 out of 6.6667 points What is the name of the combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership? Answer Selected Answer: b. effective permissions Response Feedback: The combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership, is called the effective permissions for that element. Because a security principal can receive permissions from so many sources, it is not unusual for those permissions to conflict. Therefore, rules define how the permissions combine to form the effective permissions. • Question 12 6.6667 out of 6.6667 points What type of permissions control access to folders over a network? Answer Selected Answer: b. share permissions Response Feedback: Share permissions control access to folders over a network. To access a file over a network, a user must have appropriate share permissions (and appropriate NTFS permissions, if the shared folder is on an NTFS volume). • Question 13 6.6667 out of 6.6667 points

What mechanism enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations? Answer Selected Answer: b. folder redirection Response Feedback: Folder redirection is a mechanism that enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations. This enables users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server. Because the files in the Documents folder are stored on a server, users can access them from any workstation, and administrators can back up the files easily. • Question 14 6.6667 out of 6.6667 points What command-line utility along with the Use parameter can be used to map drive letters to folders in logon scripts? Answer Selected Answer: d. Net.exe Response Feedback: Another way to automate the drive-mapping process is to create batch files and use them as logon scripts for your users. You can use the Net.exe command-line utility with the Use parameter to map drive letters to folders, so your logon scripts need only contain certain commands. • Question 15 6.6667 out of 6.6667 points NTFS permissions are located on what tab of a file or folder’s properties? Answer Selected Answer: a. Security Response Feedback: Share permissions are typically found on a Share Permissions tab, and NTFS permissions are located on a Security tab. All Windows permission systems use the same interface, although the permissions themselves differ.

• Question 1 6.6666 out of 6.6666 points __________ Services displays the system services associated with the File Services role, the Status, and Startup Type of each service. Answer Selected Answer: System

• Question 2 6.6666 out of 6.6666 points To install Simple Mail Transfer Protocol (SMTP), you must use __________ Manager.

Answer Selected Answer: Server

• Question 3 0 out of 6.6666 points The Services for NFS implementation in Windows Server 2008 is substantially __________ than its predecessor Windows server 2003. Answer Selected Answer: [None Given]

• Question 4 0 out of 6.6666 points Network File System (NFS) servers are said to be __________. Answer Selected Answer: ncp

• Question 5 0 out of 6.6666 points A(n) __________ server functions just like a file server except when a user requests access to a file in the DFS directory tree. Answer Selected Answer: [None Given]

• Question 6 6.6667 out of 6.6667 points What will the Window’s Server 2008 “Deploying a File Server” default allow you to manage on the server? Answer Selected Answer: d. all of the above Response Feedback: The “Deploying a File Server” default Windows Server 2008 installation includes all of the components needed for a basic file server deployment. You can manage the server’s disk drives, share folders, and map drives and control access to those shares with no additional software installations. • Question 7 6.6667 out of 6.6667 points Replication groups use which topology to limit the replication traffic to specific pairs of members? Answer Selected Answer: d. hub/spoke topology Response Feedback: By default, replication groups use a full mesh topology, which means that every member in a group replicates with every other member. This is a satisfactory solution for relatively small DFS deployments, but on

larger installations, the full mesh topology can generate a huge amount of network traffic. In such cases, you might want to opt for a hub/spoke topology that enables you to limit the replication traffic to specific pairs of members. • Question 8 6.6667 out of 6.6667 points What technique duplicates copies of a file that are all updated on a regular basis, no matter which copy changes? Answer Selected Answer: a. multimaster replication Response Feedback: Multimaster replication is a technique in which duplicate copies of a file are all updated on a regular basis, no matter which copy changes. For example, if a file is duplicated on four different servers, a user can access any one of the four copies and modify the file as needed. The replication engine then takes the changes made to the modified copy and uses them to update the other three copies. • Question 9 6.6667 out of 6.6667 points What works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection? Answer Selected Answer: c. DFS Replication Response Feedback: DFS Replication works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection. • Question 10 6.6667 out of 6.6667 points What protocol conserves network bandwidth by detecting changes in files and transmitting only the modified data to the destination? Answer Selected Answer: a. Remote Differential Compressions Response Feedback: Windows Server 2008 DFS uses Remote Differential Compression (RDC), a protocol that conserves network bandwidth by detecting changes in files and transmitting only the modified data to the destination. This conserves bandwidth and greatly reduces the time needed for the replication process. • Question 11 6.6667 out of 6.6667 points Windows Server 2008 computers must run which protocol service to send email messages? Answer Selected Answer: c. Simple Mail Transfer Protocol (SMTP) Response Feedback: A Windows Server 2008 computer must be running the Simple Mail Transfer Protocol (SMTP) service to be able to send email messages.

• Question 12 6.6667 out of 6.6667 points What lookup service maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts? Answer Selected Answer: c. User Name Mapping Response Feedback: The User Name Mapping service was the primary authentication mechanism in previous versions of Windows Services for NFS. It is essentially a lookup service that maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts. The server component of User Name Mapping is not included in Windows Server 2008, but NFS Server still retains the client component that enables it to access an existing User Name Mapping server and perform account lookups. • Question 13 6.6667 out of 6.6667 points The File Services node provides access to which of the following elements? Answer Selected Answer: b. All of the above Response Feedback: The File Services node provides access to the following elements: Events, System Services, Role Services, Resources and Support, and Share and Storage Management. • Question 14 6.6667 out of 6.6667 points Which role service selection allows you to install the Share and Storage Management console for Microsoft Management Console (MMC)? Answer Selected Answer: d. File Server Response Feedback: The File Server role service installs the Share and Storage Management console for Microsoft Management Console (MMC). • Question 15 6.6667 out of 6.6667 points Which system simplifies the process of locating files and folders on network servers? Answer Selected Answer: d. Distributed File System Response Feedback: The Distributed File System simplifies the process of locating files and folders on network servers. For administrators, DFS facilitates traffic control and network backups.

• Question 1 6.6666 out of 6.6666 points

Fax Server creates a Fax printer and installs the Fax __________ Manager console. Answer Selected Answer: Service

• Question 2 6.6666 out of 6.6666 points To install the Windows Fax and Scan application, add the __________ Experience feature. Answer Selected Answer: Desktop

• Question 3 0 out of 6.6666 points The most common misuse of Windows terms is the confusion of print device and __________. Answer Selected Answer: [None Given]

• Question 4 6.6666 out of 6.6666 points The printer processes a print job and stores the job in a print queue or __________. Answer Selected Answer: spooler

• Question 5 6.6666 out of 6.6666 points __________ Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. Answer Selected Answer: Server

• Question 6 6.6667 out of 6.6667 points What role must be installed before or with the Fax Server role? Answer Selected Answer: a. Print Services Response Feedback: The Print Services role must be installed before or with the Fax Server role. • Question 7 6.6667 out of 6.6667 points

Before you can share a printer on a Windows Server 2008 computer, you must enable what setting in the Network and Sharing Center? Answer Selected Answer: d. Printer Sharing Response Feedback: Before you can share a printer on a Windows Server 2008 computer, you must enable the Printer Sharing setting in the Network and Sharing Center, just as you must enable File Sharing to share files and folders. • Question 8 6.6667 out of 6.6667 points What increases the production capability of a single printer by connecting it to multiple print devices? Answer Selected Answer: a. printer pool Response Feedback: A printer pool increases the production capability of a single printer by connecting it to multiple print devices. When you create a printer pool, the print server sends each incoming job to the first print device it finds that is not busy. This effectively distributes the jobs among the available print devices, providing users with more rapid service. • Question 9 6.6667 out of 6.6667 points What role does Windows Server 2008 include that enables users to send faxes from and receive them to their desktops? Answer Selected Answer: d. Fax Server Response Feedback: By installing the Fax Server role, you enable a Windows Server 2008 computer to send and receive faxes for clients. Clients send faxes using a standard printer interface, which connects to a fax server on the network as easily as connecting to a local fax modem. • Question 10 6.6667 out of 6.6667 points What is the actual hardware that produces hard copy documents on paper or other print media? Answer Selected Answer: b. print device Response Feedback: A print device is the actual hardware that produces hard-copy documents on paper or other print media. Windows Server 2008 supports both local print devices, which are directly attached to computer ports, and network interface print devices, which are connected to the network either directly or through another computer. • Question 11 6.6667 out of 6.6667 points Windows Fax and Scan is packaged as part of a single feature called __________. Answer

Selected Answer: a. Desktop Experience Response Feedback: Windows Fax and Scan is included with Windows Server 2008, but it is not installed by default. With other nonessential elements, such as desktop themes and Windows Media Player, Windows Fax and Scan is packaged as part of a single feature called Desktop Experience. • Question 12 6.6667 out of 6.6667 points Windows Server 2008 includes a Fax Server role that allows users to send faxes from __________. Answer Selected Answer: c. their desktops Response Feedback: Windows Server 2008 includes a Fax Server role that enables users to send faxes from and receive them to their desktops. • Question 13 6.6667 out of 6.6667 points After the printer processes a print job, it stores the job in a print queue that is known as a __________. Answer Selected Answer: spooler Response Feedback: a.

After the printer processes a print job, it stores the job in a print queue, known as a spooler.

• Question 14 6.6667 out of 6.6667 points What does PCL stand for? Answer Selected Answer: a. printer control language Response Feedback: The printer is associated with a printer driver that takes the commands generated by the application and converts them into a printer control language (PCL), a language understood by the printer. PCLs can be standardized, like the PostScript language, or they can be proprietary languages developed by the print device manufacturer. • Question 15 6.6667 out of 6.6667 points Users accessing the fax server must have an account created on what console? Answer Selected Answer: a. Fax Service Manager Response Feedback: Users accessing the fax server must have an account created on the Fax Service Manager console.

• Question 1 0 out of 6.6666 points __________ uses a modularized architecture that enables you to install only the functions that you need for your Websites. Answer Selected Answer: ISS7 • Question 2 6.6666 out of 6.6666 points __________ directories hide the actual locations of your files from Web clients, which helps to secure your server. Answer Selected Answer: virtual

• Question 3 6.6666 out of 6.6666 points You can assign __________ IP addresses to a single network connection on the Web server and use a different address for each site hosted by IIS7. Answer Selected Answer: Multiple

• Question 4 6.6666 out of 6.6666 points Web browsers typically connect to Web servers using a protocol called __________. Answer Selected Answer: http

• Question 5 6.6666 out of 6.6666 points For clients to be able to use server names in their URLs, you must create a(n) __________ record in your DNS domain for each IP address. Answer Selected Answer: host

• Question 6 6.6667 out of 6.6667 points On IIS7, what reduces the application’s attack surface, minimizes the amount of memory and other system resources it needs to run, and simplifies the configuration and maintenance processes? Answer Selected Answer: modular installation b.

Response Feedback: Modular installation reduces the application’s attack surface, minimizes the amount of memory and other system resources it needs to run, and simplifies the configuration and maintenance processes. • Question 7 6.6667 out of 6.6667 points Which service enables IIS to respond to a variety of incoming message types and not just HTTP? Answer Selected Answer: c. Windows Process Activation Service (WPAS) Response Feedback: The component that manages the request pipeline, the server’s application pools, and the worker processes running in them is called the Windows Process Activation Service (WPAS). • Question 8 6.6667 out of 6.6667 points What type of interface that is integrated into most browser applications is used most often by FTP clients? Answer Selected Answer: b. graphical interface Response Feedback: Originally implemented as command-line applications, FTP clients now most often use a graphical interface that is integrated into most browser applications, including Internet Explorer. • Question 9 6.6667 out of 6.6667 points What application layer protocol enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers. Answer Selected Answer: d. File Transfer Protocol (FTP) Response Feedback: File Transfer Protocol (FTP) is an application layer protocol that enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers. FTP is defined by the RFC 114 document, which the Internet Engineering Task Force (IETF) published in 1971, making it one of the oldest TCP/IP protocols still in use. • Question 10 6.6667 out of 6.6667 points IIS7 supports which HTTP binding options? Answer Selected Answer: b. all of the above Response Feedback: IIS7 supports three HTTP binding options. These are by IP address, port number, and host header. • Question 11 6.6667 out of 6.6667 points

What allows a company to host the same documents on several different Websites without copying the documents to each content folder? Answer Selected Answer: b. virtual directory Response Feedback: A virtual directory is an alias that points to a folder in another physical location. It is essentially a shortcut that enables you to publish content found on different drives or different computers, without copying or moving it. • Question 12 6.6667 out of 6.6667 points Which of the following is a new feature in FTP7? Answer Selected Answer: a. all of the above Response Feedback: Some of the new features in FTP7 are IIS7 integration, FTP over Secure Sockets Layer (SSL), combined FTP and Web hosting, virtual host naming, and improved logging and error handling. • Question 13 6.6667 out of 6.6667 points What version of IIS is included in Windows Server 2008? Answer Selected Answer: c. 7 Response Feedback: Microsoft has extensively renovated the new version of Internet Information Services included in Windows Server 2008, which is Internet Information Services 7.0. • Question 14 6.6667 out of 6.6667 points Which role service does not ship with Windows Server 2008, but is available as a free download? Answer Selected Answer: c. FTP7 Response Feedback: FTP7 does not ship with Windows Server 2008, but it is available as a free download. • Question 15 6.6667 out of 6.6667 points What feature enables IIS7 to log additional diagnostic information and details on reasons for failures? Answer Selected Answer: b. Failed Request Tracing Response Feedback: The IIS log file format includes new error subcodes that provide more detailed reasons for a failure. Failed Request Tracing capabilities enable IIS7 to log additional diagnostic information when an application meets specified status code, time elapsed, or error type conditions.

• Question 1 0 out of 6.6666 points You must configure a DNS server to perform reverse name resolutions by creating a reverse lookup zone and creating __________ records for the addresses you want the server to resolve. Answer Selected Answer: Name Resolution

• Question 2 6.6666 out of 6.6666 points Clients attempting to connect to a site using __________ Authentication are redirected to an alternative Web page containing a logon interface. Answer Selected Answer: forms

• Question 3 6.6666 out of 6.6666 points Of the three traditional challenge/response authentication methods supported by IIS7, __________ Authentication is the most secure. Answer Selected Answer: Windows

• Question 4 0 out of 6.6666 points To protect a Website using SSL, you must have a server certificate and an https __________. Answer Selected Answer: ://

• Question 5 0 out of 6.6666 points A(n) __________ is simply an entity that issues certificates that are trusted by both parties involved in the encrypted communications. Answer Selected Answer: CA

• Question 6 0 out of 6.6667 points When you install the Web Server (IIS) role on a Windows Server 2008 computer, what user account does IIS7 create?

Answer Selected Answer: b. IUSR Response Feedback: The anonymous user account in IIS7 is a built-in account called IUSR, which is a member of a group called IIS_IUSRS. When you install the Web Server (IIS) role on a Windows Server 2008 computer, IIS7 creates the user. • Question 7 6.6667 out of 6.6667 points What is the only authentication method integrated into IIS7 that IIS7 enables by default? Answer Selected Answer: b. Anonymous Authentication Response Feedback: Anonymous Authentication is the only authentication method integrated into IIS7 and the only one that IIS7 enables by default. As the name implies, Anonymous Authentication enables any user to access a Website that employs it without supplying an account name or password. This method of authentication is designed primarily for public Websites on the Internet or any internal site that you want to be available to all users. • Question 8 6.6667 out of 6.6667 points A digital certificate is an electronic credential issued by a __________. Answer Selected Answer: a. certification authority Response Feedback: A digital certificate is an electronic credential, issued by a certification authority (CA), that confirms the identity of the party to which it is issued. For example, a digital certificate issued to a user contains identifying information about the individual as well as a public key, which enables the user to participate in encrypted communications and prove his or her identity. A certificate issued to a server enables clients to verify that this really is the server it claims to be. • Question 9 6.6667 out of 6.6667 points What tasks must you complete to install SSL on an IIS server? Answer Selected Answer: c. All of the above Response Feedback: To use SSL on an IIS7 server, you must complete the following tasks: obtain and install a server certificate, create an SSL binding for your Website(s), and configure the Website or FTP7 site to use SSL. • Question 10 6.6667 out of 6.6667 points What is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate? Answer Selected Answer: a.

authentication Response Feedback: Authentication is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. • Question 11 6.6667 out of 6.6667 points What is a way to configure an ASP.NET application to run in a security context different from the application’s default context? Answer Selected Answer: b. ASP.NET Impersonation Response Feedback: ASP.NET Impersonation is not an authentication protocol in itself, unlike most of the other options in the Authentication pane. Instead, ASP.NET is a way to configure an ASP.NET application to run in a security context different from the application’s default context. • Question 12 6.6667 out of 6.6667 points Participants in what type of infrastructure are issued two keys, one public and one private? Answer Selected Answer: c. public key Response Feedback: Participants in a public key infrastructure are issued two keys, one public and one private. The participant keeps the private key secret, while the public key is freely available in the digital certificate. Data encrypted with the private key can only be decrypted using the public key, and data encrypted with the public key can only be decrypted using the private key. • Question 13 6.6667 out of 6.6667 points What module enables you to limit client access to specific file types in several different ways? Answer Selected Answer: c. Handler Mappings Response Feedback: In previous versions of IIS, when you specified the home directory that would form the root of a Website, you could grant clients any combination of read, write, script, and execute permissions for the site. In IIS7, this capability has been moved to a feature called Handler Mappings, which provides additional, more granular, configuration capabilities. • Question 14 6.6667 out of 6.6667 points You are establishing an SSL connection with the server when you click a link or key a URL containing the __________ prefix in your browser. Answer Selected Answer: https:// c.

Response Feedback: Secure Sockets Layer (SSL) is a security protocol that you can use to encrypt the data exchanged by clients and IIS servers. When you click a link or key a URL containing the prefix https:// in your browser, you are establishing an SSL connection with the server. • Question 15 6.6667 out of 6.6667 points What authentication protocol is ticket-based and is used by Windows computers that are members of an Active Directory domain? Answer Selected Answer: d. Kerberos Response Feedback: Kerberos is a ticket-based authentication protocol used by Windows computers that are members of an Active Directory domain.

• Question 1 6.6666 out of 6.6666 points The ISAPI implementation in IIS6 virtually eliminates the need for ISAPI __________ because it can run ISAPI extensions more efficiently in their place. Answer Selected Answer: filters

• Question 2 6.6666 out of 6.6666 points SMTP server is essentially the Windows counterpart to the __________ program used by most UNIX Web servers. Answer Selected Answer: sendmail

• Question 3 6.6666 out of 6.6666 points An application __________ is an operational division within IIS7 that consists of a request queue and one or more worker processes. Answer Selected Answer: pool

• Question 4 6.6666 out of 6.6666 points A(n) __________ process is a host for user-developed application code that is responsible for processing requests it receives from the protocol listeners and returning results to the client. Answer Selected Answer: worker

• Question 5 6.6666 out of 6.6666 points Server Side __________ is another relatively old Web server technology that enables HTML pages to contain directives that the server parses and executes. Answer Selected Answer: Includes

• Question 6 6.6667 out of 6.6667 points Which application pool type consists of multiple applications serviced by multiple worker processes? Answer Selected Answer: c. Web garden Response Feedback: The configuration of the application pools, worker processes, and applications is highly flexible in IIS7. A Web garden consists of multiple applications serviced by multiple worker processes. • Question 7 6.6667 out of 6.6667 points Where does the UDDI service store information about Websites as well as its configuration settings? Answer Selected Answer: c. UDDI Services Database Response Feedback: The UDDI Services Database is where the service stores information about Websites as well as its configuration settings. • Question 8 6.6667 out of 6.6667 points What is responsible for managing application pools and worker processes? Answer Selected Answer: a. Windows Process Activation Service Response Feedback: The Windows Process Activation Service (WPAS) is responsible for managing application pools and worker processes. • Question 9 6.6667 out of 6.6667 points What operational division within IIS7 consists of a request queue and one or more worker processes? Answer Selected Answer: a. application pool Response Feedback: An application pool is an operational division within IIS7 that consists of a request queue and one or more worker processes.

• Question 10 6.6667 out of 6.6667 points What is another relatively old Web server technology that enables HTML pages to contain directives that the server parses and executes? Answer Selected Answer: c. SSI Response Feedback: Server Side Includes (SSI) is another relatively old Web server technology that enables HTML pages to contain directives that the server parses and executes. SSI forces the Web server to read the text of the pages it is about to transmit to clients and act upon specific commands it finds in that text. • Question 11 6.6667 out of 6.6667 points ASP.NET files have what file extension? Answer Selected Answer: c. .ASPX Response Feedback: ASP.NET files have the extension .aspx and can contain HTML code, XML code, or scripting code for execution by the server. • Question 12 6.6667 out of 6.6667 points Which listener enables IIS7 to receive client requests using protocols other than HTTP and ports other than port 80? Answer Selected Answer: c. All of the above Response Feedback: In addition to HTTP.sys, IIS7 also adds three new protocol listeners: NET.TCP, NET.PIPE, and NET.MSMQ. These listeners enable IIS7 to receive client requests using protocols other than HTTP and ports other than port 80. • Question 13 6.6667 out of 6.6667 points What is one of the earliest mechanisms designed to provide Web servers with application-hosting capabilities? Answer Selected Answer: a. CGI Response Feedback: The Common Gateway Interface (CGI) is one of the earliest mechanisms designed to provide Web servers with application-hosting capabilities. CGI is essentially a protocol that enables a Web server to run an application specified in a client request and pass the request to that application for processing. The Web server then receives the output from the application and packages it as a reply to the client in the form of a Web page. • Question 14 6.6667 out of 6.6667 points

What fully realized, in-process applications can generate dynamic HTML pages using information from a database or supplied by the client using a form? Answer Selected Answer: b. ISAPI extensions Response Feedback: An ISAPI extension is a fully realized, in-process application that can generate dynamic HTML pages using information from a database or supplied by the client using a form. • Question 15 6.6667 out of 6.6667 points In what application pool mode does IIS7 use the new, generic request pipeline for all protocol listeners and application development environments? Answer Selected Answer: d. Integrated Response Feedback: Integrated application pool mode IIS7 uses the new, generic request pipeline for all protocol listeners and application development environments.

• Question 1 6.6666 out of 6.6666 points A fast __________ with a lot of cache benefits a terminal server and is the least likely component to be a performance bottleneck. Answer Selected Answer: processor

• Question 2 6.6666 out of 6.6666 points __________ Level Authentication confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity. Answer Selected Answer: Network

• Question 3 6.6666 out of 6.6666 points __________ is a new Terminal Services feature that enables clients to run terminal server applications within individual windows. Answer Selected Answer: RemoteApp



Question 4

6.6666 out of 6.6666 points __________ is the component that is most likely to be a bottleneck on a terminal server. Answer Selected Answer: Memory

• Question 5 6.6666 out of 6.6666 points The TS __________ Access role server creates an IIS Website that enables users to access Terminal Services desktops and RemoteApp applications without running the RDC client. Answer Selected Answer: Web

• Question 6 6.6667 out of 6.6667 points With RDP, client connection requests arrive over what TCP port? Answer Selected Answer: c. 3389 Response Feedback: TCP port 3389 is the well-known port number for the RDP protocol. • Question 7 6.6667 out of 6.6667 points What is the modern equivalent of mainframe computing in which servers perform most of the processing and clients are relatively simple devices that provide the user interface? Answer Selected Answer: b. Terminal Services Response Feedback: Terminal Services is the modern equivalent of mainframe computing in which servers perform most of the processing and clients are relatively simple devices that provide the user interface. With Terminal Services, client computers can connect to a server and run individual applications or an entire desktop environment. • Question 8 6.6667 out of 6.6667 points Terminal Services has which two operational modes? Answer Selected Answer: b. Execution and Install Response Feedback: Terminal Services has two operational modes: Execution and Install. By default, the Add Roles Wizard leaves newly installed terminal servers in Execution mode. • Question 9 6.6667 out of 6.6667 points

What component is most likely to be a bottleneck on a terminal server? Answer Selected Answer: d. memory Response Feedback: Memory is the component that is mostly likely to be a bottleneck on a terminal server. The server requires additional memory for each client and application you plan to support. Because it is difficult to determine in advance how much memory a terminal server needs, purchase a server with plenty of room for memory upgrades. • Question 10 0 out of 6.6667 points Users must have the appropriate privileges to access a terminal server, and the easiest way to provide those privileges is to add the users to what group? Answer Selected Answer: b. RDP Users Response Feedback: Users must have the appropriate privileges to access a terminal server, and the easiest way to provide those privileges is to add the users to the Remote Desktop Users group. • Question 11 6.6667 out of 6.6667 points What is the name of the unique identifier that the terminal server assigns to each session to keep the client processes for individual sessions separate? Answer Selected Answer: c. Session ID Response Feedback: To keep the client processes for individual sessions separate, the terminal server assigns each session a unique identifier called a Session ID. In Windows Server 2008, Session ID 0 is always dedicated to the system services running on the computer, which isolates them from applications for security reasons. The system then assigns Session IDs, starting with number 1, to each interactive user logging on to the computer from the local console or a remote system. • Question 12 6.6667 out of 6.6667 points What new Terminal Services feature enables clients to run terminal server applications within individual windows? Answer Selected Answer: a. RemoteApp Response Feedback: RemoteApp is a new Terminal Services feature that enables clients to run terminal server applications within individual windows. The windows are resizable; they have standard taskbar buttons and are not constrained by a Terminal Services desktop. In fact, a RemoteApp window is, in most cases, indistinguishable from a window containing a local application. • Question 13 0 out of 6.6667 points

What type of licensing permits one user to connect to the terminal server no matter what device the user is running? Answer Selected Answer: d. Per Device Response Feedback: The Per User licensing type permits one user to connect to the terminal server no matter what device the user is running. • Question 14 6.6667 out of 6.6667 points What role service balances the client load among multiple terminal servers and saves session state information so that clients can reconnect to the same session from which they disconnected? Answer Selected Answer: d. TS Session Broker Response Feedback: The TS Session Broker role service balances the client load among multiple terminal servers and saves session state information so that clients can reconnect to the same session from which they disconnected. • Question 15 6.6667 out of 6.6667 points What confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity? Answer Selected Answer: d. Network Level Authentication (NLA) Response Feedback: Network Level Authentication (NLA) confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity.

• Question 1 6.6666 out of 6.6666 points After you configure the settings in the RDC client, you can save them as a file with an __________ extension. Answer Selected Answer: rdp

• Question 2 6.6666 out of 6.6666 points The __________ argument causes the RDC client to open a terminal session window that occupies the entire virtual desktop of a system with two or more monitors. Answer

Selected Answer:

/span

• Question 3 0 out of 6.6666 points On the Programs tab, to configure a program to load __________, select the Start the following program on connection checkbox and, in the Program path and filename text box, key the full path to the program’s executable in the terminal session. Answer Selected Answer: [None Given]

• Question 4 0 out of 6.6666 points To use the Terminal Services role for multiple-user connections, you must purchase the appropriate number of Terminal Services __________ access licenses. Answer Selected Answer: CAL

• Question 5 6.6666 out of 6.6666 points __________ is the wild card entry in the terminal operating system category because it can fulfill any of the roles performed by proprietary OSs, Windows CE, and Windows XPe. Answer Selected Answer: linux

• Question 6 6.6667 out of 6.6667 points What Mstsc option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps? Answer Selected Answer: a. /public Response Feedback: When using Mstsc.exe, the /public option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps. • Question 7 6.6667 out of 6.6667 points Where is the Mstsc.exe file located? Answer Selected Answer: C:\Windows\System32 c.

Response Feedback: The executable program file for the RDC client, Mstsc.exe, is located in the C:\Windows\System32 folder by default. When you run the Mstsc.exe program with no parameters, the Remote Desktop Connection window appears with its default settings intact. • Question 8 6.6667 out of 6.6667 points Which TS server licensing scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest? Answer Selected Answer: b. Forest Response Feedback: When you install the TS Licensing role service, you must specify the server’s discovery scope. The Forest discovery scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest. Microsoft recommends this scope setting for domain members. • Question 9 6.6667 out of 6.6667 points What files store Remote Desktop Client settings in a recallable and portable form? Answer Selected Answer: b. RDP files Response Feedback: RDP files store Remote Desktop Client settings in a recallable and portable form. • Question 10 6.6667 out of 6.6667 points What terminal services key combination displays the Windows Security screen? Answer Selected Answer: a. CTRL+ALT+END Response Feedback: Pressing CTRL+ALT+END in a terminal services session will display the Windows Security screen. • Question 11 6.6667 out of 6.6667 points What experience option enables the RDC client to duplicate the graphics-rendering capabilities of Windows Vista, most notably the Aero “glass” effect? Answer Selected Answer: b. desktop composition Response Feedback: The desktop composition experience option enables the RDC client to duplicate the graphicsrendering capabilities of Windows Vista, most notably the Aero “glass” effect. • Question 12 6.6667 out of 6.6667 points

What feature eliminates the need for the printer driver on the terminal server? Answer Selected Answer: d. Easy Print Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. • Question 13 6.6667 out of 6.6667 points What real-time, modular operating system is designed for devices with minimal amounts of memory? Answer Selected Answer: a. Windows CE Response Feedback: Windows CE is a real-time, modular operating system designed for devices with minimal amounts of memory. Windows CE is not based on the NT kernel, but it provides users with a familiar Windows graphical user interface (GUI) and has been adapted to a variety of devices including handhelds, smart phones, and game consoles. • Question 14 6.6667 out of 6.6667 points In addition to the Windows versions, what utility can be used to connect to a terminal server from a Macintosh computer? Answer Selected Answer: b. Microsoft Remote Desktop Connection Client for Mac 2.0 Response Feedback: The typical desktop platform for a Terminal Services client is a Windows PC, but RDP client alternatives enable computers running non-Windows operating systems to run terminal server applications. In addition to the Windows versions, Microsoft Remote Desktop Connection Client for Mac 2.0 is available as a free download, and third-party clients are available for Macintosh and UNIX/Linux computers. • Question 15 6.6667 out of 6.6667 points What is the default location of the TS Licensing database? Answer Selected Answer: d. C:\Windows\System32\LServer Response Feedback: The TS Licensing database appears by default in the C:\Windows\System32\LServer folder, but it can be changed.

• Question 1 6.6666 out of 6.6666 points

TS Web Access requires Internet Information Services 7.0 to run. IIS 7, in turn, requires the Windows Process __________ Service. Answer Selected Answer: activation

• Question 2 6.6666 out of 6.6666 points If you do not create or select a(n) __________ during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Answer Selected Answer: certificate

• Question 3 6.6666 out of 6.6666 points When you deploy a TS Gateway server on your network, you want to make sure that only the clients you select can access your terminal servers through the __________. Answer Selected Answer: gateway

• Question 4 0 out of 6.6666 points TS Web Access enables you to publish terminal server desktops and __________ programs on Web pages. Answer Selected Answer: [None Given]

• Question 5 6.6666 out of 6.6666 points RAPs enable you to restrict __________ connecting to a TS Gateway server to specific terminal servers on the private network. Answer Selected Answer: clients

• Question 6 0 out of 6.6667 points What specifies the terminal servers on the private network that users are permitted to access? Answer Selected Answer: a. connection authorization policies Response Feedback: RAPs enable you to restrict clients connecting to a TS Gateway server to specific terminal servers on the private network. • Question 7

6.6667 out of 6.6667 points What specifies which Internet users are allowed to use a terminal server? Answer Selected Answer: d. connection authorization policies Response Feedback: CAPs enable you to restrict TS Gateway access to members of specific local or domain user groups. You can also specify the authentication method that clients must use and limit client device redirection. • Question 8 0 out of 6.6667 points Which of the following operating systems is NOT supported as an Internet client in a TS Gateway deployment? Answer Selected Answer: d. None of the above Response Feedback: TS Gateway supports Windows Vista, Windows XP SP2, and Windows Server 2008. • Question 9 6.6667 out of 6.6667 points In addition to installing the dependent IIS 7 role services and features, the Add Roles Wizard creates an IIS Web application for TS Web Access, adds it to the Default Website, and assigns to it to what default URL? Answer Selected Answer: b. http://servername/ts Response Feedback: In addition to installing the dependent IIS 7 role services and features, the Add Roles Wizard creates an IIS Web application for TS Web Access, adds it to the Default Website, and assigns to it the http://servername/ts URL. This application generates a default Web page containing the controls that enable users to access terminal server features. • Question 10 0 out of 6.6667 points What is the final step involved in deploying a TS Gateway server? Answer Selected Answer: b. Obtain and install a certificate for the TS Gateway server. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. • Question 11 0 out of 6.6667 points What area of dual accessibility on an enterprise network provides access both to the Internet and to your internal network? Answer

Selected Answer: c. VPN Response Feedback: TS Gateway must run on a computer that is accessible to the Internet and to your internal network. This area of dual accessibility is called a perimeter network. • Question 12 6.6667 out of 6.6667 points What interface is particularly useful with RemoteApp because it enables users to launch applications by doubleclicking icons on a Web page? Answer Selected Answer: c. TS Web Access Response Feedback: The Terminal Services (TS) Web Access interface is particularly useful with RemoteApp because it enables users to launch applications by double-clicking icons on a Web page. Instead of creating RDP files and deploying them to clients using Group Policy or some other method, you can simply select a checkbox for the RemoteApp applications you want to deploy using TS Web Access, and the service adds the appropriate icons to its default Web page. • Question 13 6.6667 out of 6.6667 points A client’s initial connection to the TS Web Access Web page involves a standard HTTP connection using what port? Answer Selected Answer: c. 80 Response Feedback: A client’s initial connection to the TS Web Access Web page does involve a standard HTTP connection using port TCP 80. However, after the user clicks a RemoteApp icon or establishes a Remote Desktop connection, HTTP is no longer involved. • Question 14 0 out of 6.6667 points After you import your certificate into the TS Gateway computer’s Certificates store, what must you do so that the gateway can use it? Answer Selected Answer: c. All of the above Response Feedback: After you import your certificate into the TS Gateway computer’s Certificates store, you must map the certificate to the TS Gateway server so that the gateway can use it. • Question 15 6.6667 out of 6.6667 points When you obtain a certificate from an external CA, either public or local, which of these tasks must you complete? Answer Selected Answer: a.

Install the certificate on the TS Gateway server. Response Feedback: When you obtain a certificate from an external CA, either public or local, you must complete the following tasks: Install the certificate on the TS Gateway server and map the certificate to the TS Gateway server.

• Question 1 0 out of 6.6666 points The Media __________ client and the Media Services server establish a connection that enables the server to transmit content data to the client and the client to play the content as the data arrives. Answer Selected Answer: services

• Question 2 6.6666 out of 6.6666 points Windows __________ Services 3.0 is a database-enabled Web application that runs on an Internet Information Services server. By accessing the site, users can employ browser-based workspaces to share information in a variety of ways such as storing documents, creating calendar appointments and task lists, and contributing to newsgroup-style discussions. Answer Selected Answer: sharepoint

• Question 3 6.6666 out of 6.6666 points The protection provided by AD RMS is __________, meaning that it remains a part of the document no matter where anyone moves it. Answer Selected Answer: persistent

• Question 4 6.6666 out of 6.6666 points An AD RMS __________ is a Windows Server 2008 computer responsible for issuing certificates that enable users and services to assign AD RMS protection to documents by creating publishing licenses. Answer Selected Answer: server

• Question 5 6.6666 out of 6.6666 points __________ is a Microsoft technology that enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content. Answer Selected Answer: WMRM

• Question 6 6.6667 out of 6.6667 points Which of the following is NOT a step involved in deploying WMRM? Answer Selected Answer: c. testing Response Feedback: At the highest level, the process of deploying content protected with WMRM consists of the following steps: packaging, distribution, licensing, and playback. • Question 7 6.6667 out of 6.6667 points In what step of WMRM deployment does the user request a license for the content by establishing contact with your server running Windows Media Rights Manager? Answer Selected Answer: a. licensing Response Feedback: During the licensing phase of a WMRM deployment, the user requests a license for the content by establishing contact with your server running Windows Media Rights Manager. The license acquisition process can begin either when users attempt to obtain the content or after they obtain it when they attempt to open the content file in Windows Media Player. • Question 8 6.6667 out of 6.6667 points To provide users with email capabilities in Windows SharePoint Server, you must install what type of server? Answer Selected Answer: b. SMTP Response Feedback: Windows SharePoint Services can integrate with email in a variety of ways, enabling users to set up calendar appointments, post announcements, add documents, and contribute to blogs and discussion forums. To provide users with these email capabilities, you must install a Simple Mail Transfer Protocol (SMTP) server and configure the incoming and outgoing email settings in Windows SharePoint Services. • Question 9 6.6667 out of 6.6667 points What service allows a server to stream audio and video content to network clients in real time? Answer Selected Answer: c. Windows Media Services Response Feedback: With Windows Media Services, a server can stream audio and video content to network clients in real time. A player on the client computer establishes a direct connection with the server and plays the audio or video content as it arrives. • Question 10 6.6667 out of 6.6667 points

What enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information? Answer Selected Answer: c. Digital Rights Management Response Feedback: Digital Rights Management (DRM) enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information. • Question 11 6.6667 out of 6.6667 points What TCP/IP feature provides one-to-many transmission capabilities? Answer Selected Answer: d. multicast Response Feedback: Multicasting is a TCP/IP (Transmission Control Protocol/Internet Protocol) feature that provides one-to-many transmission capabilities. • Question 12 0 out of 6.6667 points What two types of publishing does Windows Media Services support? Answer Selected Answer: b. on-demand streams and broadcast streams Response Feedback: To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. Windows Media Services supports two types of publishing points: on-demand streams and broadcast streams. • Question 13 6.6667 out of 6.6667 points Windows Media Services uses what type of transmissions by default? Answer Selected Answer: a. unicast Response Feedback: The type of transmissions you configure Windows Media Services to use when streaming multimedia content can impact the bandwidth the service consumes. Windows Media Services uses unicast transmissions by default. In a unicast transmission, each client establishes its own connection to the Windows Media Services server and has its own data stream. • Question 14 6.6667 out of 6.6667 points Windows SharePoint Services relies on what technology to manage the database that stores user documents and information? Answer

Selected Answer: c. Microsoft SQL Server 2005 Response Feedback: Windows SharePoint Services relies on Microsoft SQL Server 2005 technology to manage the database that stores user documents and information. • Question 15 0 out of 6.6667 points What can you create to enable users to access the content you specified when creating a publishing point? Answer Selected Answer: c. pop-up Response Feedback: After creating a publishing point, Windows Media Services provides several ways to inform clients of the stream’s existence and provide them with access to it. To enable users to access the content you specified when creating a publishing point, you can provide the URL specified in the publishing point’s Announce tab.

• Question 1 0 out of 6.6666 points In most cases, SANs use __________ access. Answer Selected Answer: [None Given]

• Question 2 0 out of 6.6666 points SANs typically use the __________ to transmit SCSI traffic over the network. Answer Selected Answer: • Question 3 0 out of 6.6666 points The __________ registers the presence of initiators and targets on a SAN and responds to queries from iSNS clients. Answer Selected Answer: [None Given] FCP

• Question 4 0 out of 6.6666 points Because of its relatively low cost and simplicity, __________ has come to dominate the SAN industry. Answer Selected Answer: [None Given]

• Question 5 0 out of 6.6666 points

A server with __________ power supplies can continue running if one malfunctions. Answer Selected Answer: Dual

• Question 6 6.6667 out of 6.6667 points Since 2007, which option has become the more popular Fibre Channel solution? Answer Selected Answer: c. switched fabric (FC-SW) Response Feedback: Until recently, FC-AL was the most popular of the three topologies because few SANs require more than 127 connections and the arbitrated loop eliminates the need for expensive switches. However, as of 2007, the prices of Fibre Channel switches have dropped considerably (perhaps due to competition from low-cost iSCSI components), and FC-SW has become the more popular Fibre Channel solution. • Question 7 6.6667 out of 6.6667 points The process of deploying Terminal Services with network load balancing consists of which of the following parts? Answer Selected Answer: d. both a & b Response Feedback: The process of deploying Terminal Services with network load balancing consists of two parts: creating a terminal server farm and creating a network load balancing cluster. • Question 8 6.6667 out of 6.6667 points Which component registers and locates iSCSI initiators and targets? Answer Selected Answer: a. Internet Storage Name Server Response Feedback: The Internet Storage Name Server component registers and locates iSCSI initiators and targets. • Question 9 6.6667 out of 6.6667 points A SAN-connected server has a minimum of how many network adapters? Answer Selected Answer: b. 2 Response Feedback: Instead of installing disk drives into servers or connecting them using a SCSI bus, a SAN consists of one or more drive arrays equipped with network interface adapters that you connect to your servers using standard twisted pair or fiber optic network cables. A SAN-connected server, therefore, has a minimum of two network adapters, one for the standard LAN connection and one for the SAN.

• Question 10 6.6667 out of 6.6667 points What type of signaling does Fibre Channel use? Answer Selected Answer: b. serial Response Feedback: Because Fibre Channel uses serial instead of parallel signaling, it can span much longer distances than a pure SCSI connection—up to 50 kilometers or more, in some cases. • Question 11 6.6667 out of 6.6667 points What number of virtual instances is included in Windows Server 2008 Standard? Answer Selected Answer: 1 Response Feedback: b.

Windows Server 2008 includes one virtual instance.

• Question 12 6.6667 out of 6.6667 points All but which option is the recommended hardware environment for a failover cluster? Answer Selected Answer: a. simultaneous network connections Response Feedback: Failover clusters are intended for critical applications that must keep running. If an organization is prepared to incur the time and expense required to deploy a failover cluster, Microsoft assumes that the organization is prepared to take every possible step to ensure the availability of the application. As a result, the recommended hardware environment for a failover cluster calls for an elaborate setup, including the following: duplicate servers, shared storage, and redundant network connections. • Question 13 6.6667 out of 6.6667 points Which is the most critical layer in the operation of a SAN? Answer Selected Answer: b. FC4 Response Feedback: FC4 defines the upper-layer protocol mapping rules that enable Fibre Channel networks to carry SCSI and other types of application layer traffic. • Question 14 6.6667 out of 6.6667 points Which of the following defines a collection of common services often required by applications using Fibre Channel networks including data striping, multicasting, and multiport hunt groups? Answer

Selected Answer: a. FC3 Response Feedback: FC3 defines a collection of common services often required by applications using Fibre Channel networks including data striping, multicasting, and multiport hunt groups. • Question 15 6.6667 out of 6.6667 points Storage devices on a SAN are nearly always drive arrays, not individual drives, and can include all of the following except __________. Answer Selected Answer: a. none of the above Response Feedback: Storage devices on a SAN are nearly always drive arrays, not individual drives, and can include hard disks, optical jukeboxes, tape libraries, or any other type of storage.
Question 8 6.6667 out of 6.6667 points What role service of the Print Services role installs the Print Management snap-in for MMC, which provides centralized printer management for an entire enterprise network? Answer Selected Answer: a. Print Server Response Feedback: The Print Services role includes the Print Server role service that installs the Print Management snap-in for MMC, providing centralized printer management for an entire enterprise network. Question 9 6.6667 out of 6.6667 points What is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools? Answer Selected Answer: b. Server Manager Response Feedback: Server Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. Question 13 6.6667 out of 6.6667 points What role is included with Windows Server 2008 and enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computer by using network-based boot and installation media? Answer Selected Answer: a. Windows Deployment Services Response Feedback: Windows Deployment Services (WDS) is a role included with Windows Server 2008 that enables you to perform unattended installations of Windows Server 2008 and other operating systems on remote computers by using network-based boot and installation media. This means that you can install a new computer with no operating system or local boot device on it by deploying image files stored on a server running Windows Deployment Services. Question 14 6.6667 out of 6.6667 points What role enables an application server to provide digital audio and video content to network clients in real time by using HTTP or the Real Time Streaming Protocol (RTSP)? Answer Selected Answer: d. Streaming Media Services Response Feedback: The Streaming Media Services role enables an application server to provide digital audio and video content to network clients in real time by using HTTP or the Real Time Streaming Protocol (RTSP). The clients run a media player application that processes the content as they receive it from the server. Question 15 6.6667 out of 6.6667 points What capability of the File Services role consists of two role services that allow administrators to create a virtual directory tree consisting of folders stored on different servers and to maintain duplicate copies of that information? Answer Selected Answer: b. Distributed File System

Response Feedback: The distributed file system consists of two role services: DFS Namespace, which enables administrators to create a virtual directory tree consisting of folders stored on different servers, and DFS Replication, which maintains duplicate copies of the DFS namespace in remote locations. Question 1 6.6666 out of 6.6666 points In Windows Server __________, there is no Start menu, no desktop Explorer shell, no MMC console, and virtually no graphical applications. Answer Selected Answer: core Question 2 6.6666 out of 6.6666 points __________ Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. Answer Selected Answer: Server Question 3 6.6666 out of 6.6666 points Corporate customers must now activate all Windows Vista and Windows Server 2008 computers using __________ license keys. Answer Selected Answer: volume Question 4 6.6666 out of 6.6666 points The KMS activation __________ is designed to prevent pirated KMS keys from functioning on small networks or individual computers. Answer Selected Answer: threshold Question 1 0 out of 5 points Windows SharePoint Services relies on Microsoft SQL Server 2005 technology to manage the database that stores user documents and information. Answer Selected Answer: [None Given] Correct Answer: True Question 2 0 out of 5 points Windows SharePoint Services uses incoming email to enable users to contribute content to the site. To do this, you must install a POP3 server on the SharePoint computer. Answer Selected Answer: [None Given] Correct Answer: False Question 3 0 out of 5 points What components do clients use to access specific content streams? Answer Selected Answer: [None Given] Correct Answer: a. publishing points Response Feedback: To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. Question 4 0 out of 5 points What Microsoft technology enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content? Answer Selected Answer: [None Given] Correct Answer: b. Windows Media Rights Manager Response Feedback: Windows Media Rights Manager (WMRM) is a Microsoft technology that enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content. Question 5 0 out of 5 points AD RMS consists of which of the following components? Answer Selected Answer: [None Given]

Correct Answer: d. all of the above Response Feedback: AD RMS consists of three components: AD RMS server, AD RMS client, and database server. Question 6 0 out of 5 points What can you create to enable users to access the content you specified when creating a publishing point? Answer Selected Answer: [None Given] Correct Answer: a. announcement Response Feedback: After creating a publishing point, Windows Media Services provides several ways to inform clients of the stream’s existence and provide them with access to it. To enable users to access the content you specified when creating a publishing point, you can provide the URL specified in the publishing point’s Announce tab. Question 7 0 out of 5 points The Windows Server 2008 version of Windows Media Services uses what protocol to stream multimedia content? Answer Selected Answer: [None Given] Correct Answer: d. Real Time Streaming Protocol (RTSP) Response Feedback: When you add the Windows Media Services role on a Windows Server 2008 computer, the Select Data Transfer Protocols page enables you to select Real Time Streaming Protocol (RTSP), Hypertext Transfer Protocol (HTTP), or both. The Windows Server 2008 version of Windows Media Services uses the RTSP protocol by default. Question 8 0 out of 5 points Users can employ browser-based workspaces to share information in a variety of ways such as storing documents, creating calendar appointments and task lists, and contributing to newsgroup-style discussions by accessing what type of site? Answer Selected Answer: [None Given] Correct Answer: a. Windows SharePoint Services Response Feedback: By accessing the Windows SharePoint Services 3.0 site, users can employ browser-based workspaces to share information in a variety of ways such as storing documents, creating calendar appointments and task lists, and contributing to newsgroup-style discussions. You can create individual Websites for specific projects, departments, or workgroups that contain some or all of these features. Question 9 0 out of 5 points When you enable both the RTSP and HTTP protocols on a Windows Media Services server, what process do clients and the server use to negotiate the most efficient protocol they have in common? Answer Selected Answer: [None Given] Correct Answer: b. protocol rollover Response Feedback: When you enable both the RTSP and HTTP protocols on a Windows Media Services server, the clients and the server use a process called protocol rollover to negotiate the most efficient protocol they have in common. A client establishing a connection to a Windows Media Services server sends information about the protocols it can use, and the server selects the best protocol it is capable of using. Question 10 0 out of 5 points What Windows Server 2008 role enables you to create usage policies for specific types of information that specify what authorized users can do with that information? Answer Selected Answer: [None Given] Correct Answer: a. Active Directory Rights Management Services Response Feedback: Active Directory Rights Management Services (AD RMS) is a Windows Server 2008 role that enables you to create usage policies for specific types of information that specify what authorized users can do with that information. Question 11 0 out of 5 points Storage Manager for SANs is a required tool. Answer Selected Answer: [None Given] Correct Answer: False Question 12 0 out of 5 points Windows Server 2008 does not include iSCSI target capabilities. Answer Selected Answer: [None Given] Correct Answer: True

Question 13 0 out of 5 points A SAN-connected server has a minimum of how many network adapters? Answer Selected Answer: [None Given] Correct Answer: c. 2 Response Feedback: Instead of installing disk drives into servers or connecting them using a SCSI bus, a SAN consists of one or more drive arrays equipped with network interface adapters that you connect to your servers using standard twisted pair or fiber optic network cables. A SAN-connected server, therefore, has a minimum of two network adapters, one for the standard LAN connection and one for the SAN. Question 14 0 out of 5 points Hyper-V uses what type of virtualization? Answer Selected Answer: [None Given] Correct Answer: b. Type 1 Response Feedback: The virtualization capability built into Windows Server 2008, called Hyper-V, uses a different type of architecture. Hyper-V uses Type 1 virtualization, in which the VMM is called a hypervisor, an abstraction layer that interacts directly with the computer’s physical hardware. Question 15 0 out of 5 points The process of deploying Terminal Services with network load balancing consists of which of the following parts? Answer Selected Answer: [None Given] Correct Answer: c. both a & b Response Feedback: The process of deploying Terminal Services with network load balancing consists of two parts: creating a terminal server farm and creating a network load balancing cluster. Question 16 0 out of 5 points iSNS consists of all of the following components except iSNS __________. Answer Selected Answer: [None Given] Correct Answer: c. targets Response Feedback: iSNS consists of four components: iSNS server, iSNS database, iSNS clients, and iSNS protocol. Question 17 0 out of 5 points What does RAID stand for? Answer Selected Answer: [None Given] Correct Answer: a. Redundant Array of Independent Disks Response Feedback: RAID (Redundant Array of Independent Disks) is one of the most basic and commonly used high-availability technologies. Question 18 0 out of 5 points Which of the following is not a node in the Storage Manager for SANs console? Answer Selected Answer: [None Given] Correct Answer: d. Modules Response Feedback: The Storage Manager for SANs console has three nodes: LUN Management, Subsystems, and Drives. Question 19 0 out of 5 points Since 2007, which option has become the more popular Fibre Channel solution? Answer Selected Answer: [None Given] Correct Answer: d. switched fabric (FC-SW) Response Feedback: Until recently, FC-AL was the most popular of the three topologies because few SANs require more than 127 connections and the arbitrated loop eliminates the need for expensive switches. However, as of 2007, the prices of Fibre Channel switches have dropped considerably (perhaps due to competition from low-cost iSCSI components), and FC-SW has become the more popular Fibre Channel solution. Question 20 0 out of 5 points What type of signaling does Fibre Channel use? Answer Selected Answer: [None Given]

Correct Answer: b. serial Response Feedback: Because Fibre Channel uses serial instead of parallel signaling, it can span much longer distances than a pure SCSI connection— up to 50 kilometers or more, in some cases. Question 1 .6.6666 out of 6.6666 points The Remote Desktop Connection __________ client included with all versions of Windows Server 2008 supports all of the new Terminal Services features in Windows Server 2008. Answer Selected Answer: 6.1 Correct Answer: 6.1

. Question 2 .6.6666 out of 6.6666 points The __________ argument causes the RDC client to open a terminal session window that occupies the entire virtual desktop of a system with two or more monitors. Answer Selected Answer: /span Correct Answer: /span

. Question 3 .6.6666 out of 6.6666 points After you configure the settings in the RDC client, you can save them as a file with an __________ extension. Answer Selected Answer: rdp Correct Answer: rdp

. Question 4 .6.6666 out of 6.6666 points Font __________ is another term for anti-aliasing. Answer Selected Answer: smoothing Correct Answer: smoothing

. Question 5 .6.6666 out of 6.6666 points On the Programs tab, to configure a program to load __________, select the Start the following program on connection checkbox and, in the Program path and filename text box, key the full path to the program’s executable in the terminal session. Answer Selected Answer: automatically Correct Answer: automatically

. Question 6 .6.6667 out of 6.6667 points Which TS server licensing scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest? Answer Selected Answer: b. Forest Correct Answer: b. Forest Response Feedback: When you install the TS Licensing role service, you must specify the server’s discovery scope. The Forest discovery scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest. Microsoft recommends this scope setting for domain members. . Question 7 .6.6667 out of 6.6667 points What feature eliminates the need for the printer driver on the terminal server? Answer Selected Answer: c. Easy Print Correct Answer: c. Easy Print Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008.

. Question 8 .6.6667 out of 6.6667 points What terminal services key combination displays the Windows Security screen? Answer Selected Answer: b. CTRL+ALT+END Correct Answer: b. CTRL+ALT+END Response Feedback: Pressing CTRL+ALT+END in a terminal services session will display the Windows Security screen. . Question 9 .6.6667 out of 6.6667 points What option specifies how the terminal server will locate a TS Licensing server? Answer Selected Answer: a. licensing server discovery mode Correct Answer: a. licensing server discovery mode Response Feedback: After you have an operational TS Licensing server on your network, you must configure licensing server discovery mode, which specifies how the terminal server will locate a TS Licensing server. . Question 10 .6.6667 out of 6.6667 points What is a more full-featured operating system based on the standard Windows XP kernel? Answer Selected Answer: c. Windows XPe Correct Answer: c. Windows XPe Response Feedback: Windows XP Embedded is a more full-featured operating system based on the standard Windows XP kernel. Windows XPe terminals include more local computing capabilities than terminals using Windows CE or a proprietary OS, including support for local browsers and Java applications as well as embedded Win32 applications. . Question 11 .6.6667 out of 6.6667 points What experience option enables the RDC client to duplicate the graphics-rendering capabilities of Windows Vista, most notably the Aero “glass” effect? Answer Selected Answer: a. desktop composition Correct Answer: a. desktop composition Response Feedback: The desktop composition experience option enables the RDC client to duplicate the graphics-rendering capabilities of Windows Vista, most notably the Aero “glass” effect. . Question 12 .6.6667 out of 6.6667 points What Mstsc option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps? Answer Selected Answer: b. /public Correct Answer: b. /public Response Feedback: When using Mstsc.exe, the /public option establishes a connection to the specified terminal server in a mode suitable for use on a computer in a public place that does not cache passwords or bitmaps. . Question 13 .6.6667 out of 6.6667 points In addition to the Windows versions, what utility can be used to connect to a terminal server from a Macintosh computer? Answer Selected Answer: d. Microsoft Remote Desktop Connection Client for Mac 2.0 Correct Answer: d. Microsoft Remote Desktop Connection Client for Mac 2.0 Response Feedback: The typical desktop platform for a Terminal Services client is a Windows PC, but RDP client alternatives enable computers running non-Windows operating systems to run terminal server applications. In addition to the Windows versions, Microsoft Remote Desktop Connection Client for Mac 2.0 is available as a free download, and third-party clients are available for Macintosh and UNIX/Linux computers. . Question 14 .6.6667 out of 6.6667 points What files store Remote Desktop Client settings in a recallable and portable form? Answer

Selected Answer: b. RDP files Correct Answer: b. RDP files Response Feedback: RDP files store Remote Desktop Client settings in a recallable and portable form. . Question 15 .6.6667 out of 6.6667 points The Easy Print driver is based on what document format introduced in Windows Vista and Windows Server 2008? Answer Selected Answer: a. XPS Correct Answer: a. XPS Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. 0 out of 6.6666 points

RAPs enable you to restrict __________ connecting to a TS Gateway server to specific terminal servers on the private network. Answer Selected Answer: users Question 2 6.6666 out of 6.6666 points

The port number that the RDP protocol uses (TCP port 3389) is __________ by default on most firewalls. Answer Selected Answer: blocked Question 3 6.6666 out of 6.6666 points

Terminal Services (TS) __________ Access is a role service that works with Internet Information Services (IIS) 7.0 to create an alternative client interface to your terminal servers. Answer Selected Answer: web Question 4 6.6666 out of 6.6666 points

TS Web Access requires Internet Information Services 7.0 to run. IIS 7, in turn, requires the Windows Process __________ Service. Answer Selected Answer: Activation Question 5 6.6666 out of 6.6666 points

In a VPN connection, computers use a technique called __________ that encapsulates an entire client/server session within another protocol. Answer Selected Answer: tunneling Question 6 6.6667 out of 6.6667 points

Which of the following is NOT a Windows Process Activation Service feature that TS Web Access requires? Answer Selected Answer: b. Request Filtering Response Feedback: TS Web Access requires the following Windows Process Activation Service features: Process Model, .NET Environment, and Configuration APIs. Question 7 6.6667 out of 6.6667 points

The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within what protocol? Answer Selected Answer: b. SSL Response Feedback: The TS Gateway role service enables Terminal Services to support Internet clients securely using the same tunneling concept as a VPN connection except, in this case, the computers encapsulate RDP traffic within Secure Sockets Layer (SSL) packets. SSL uses TCP port number 443, which most organizations with an Internet presence leave open in their firewalls so that Internet clients can establish secure connections to their Web servers. Question 8 6.6667 out of 6.6667 points

What new Windows Server 2008 Terminal Services role service enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers? Answer Selected Answer: b. Terminal Services Gateway Response Feedback: Terminal Services Gateway is a new Windows Server 2008 Terminal Services role service that enables Internet users to access terminal servers on private networks despite intervening firewalls and network access translation (NAT) servers. Question 9 6.6667 out of 6.6667 points

Which of the following is NOT one of the tasks you must perform when deploying a TS Gateway server? Answer Selected Answer: b. Reinstall IIS with special consideration for the TS Gateway role service. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 10 6.6667 out of 6.6667 points

Which of the following operating systems is NOT supported as an Internet client in a TS Gateway deployment? Answer Selected Answer: a. Windows 2000 Response Feedback: TS Gateway supports Windows Vista, Windows XP SP2, and Windows Server 2008. Question 11 6.6667 out of 6.6667 points

What is the final step involved in deploying a TS Gateway server? Answer Selected Answer: a. Configure the client to use the TS Gateway. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 12 6.6667 out of 6.6667 points

A client’s initial connection to the TS Web Access Web page involves a standard HTTP connection using what port? Answer Selected Answer: a. 80 Response Feedback:

A client’s initial connection to the TS Web Access Web page does involve a standard HTTP connection using port TCP 80. However, after the user clicks a RemoteApp icon or establishes a Remote Desktop connection, HTTP is no longer involved. Question 13 6.6667 out of 6.6667 points

What port does SSL use? Answer Selected Answer: b. 443 Response Feedback: SSL uses TCP port number 443. Question 14 6.6667 out of 6.6667 points

For Internet clients to connect to a TS Gateway server using SSL, the server must have issued a __________ by a source that the client computers trust. Answer Selected Answer: c. digital certificate Response Feedback: For Internet clients to connect to a TS Gateway server using SSL, the server must have a digital certificate issued by a source that the client computers trust. If you do not create or select a certificate during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Question 15 6.6667 out of 6.6667 points

What interface is particularly useful with RemoteApp because it enables users to launch applications by double-clicking icons on a Web page? Answer Selected Answer: b. TS Web Access Response Feedback: The Terminal Services (TS) Web Access interface is particularly useful with RemoteApp because it enables users to launch applications by doubleclicking icons on a Web page. Instead of creating RDP files and deploying them to clients using Group Policy or some other method, you can simply select a checkbox for the RemoteApp applications you want to deploy using TS Web Access, and the service adds the appropriate icons to its default Web page. Question 1 .6.6666 out of 6.6666 points Media streaming is always a tradeoff between __________ and signal quality. Answer Selected Answer: bandwidth . Question 2 .6.6666 out of 6.6666 points An AD RMS __________ is a Windows Server 2008 computer responsible for issuing certificates that enable users and services to assign AD RMS protection to documents by creating publishing licenses. Answer Selected Answer: server . Question 3 .6.6666 out of 6.6666 points The protection provided by AD RMS is __________, meaning that it remains a part of the document no matter where anyone moves it. Answer Selected Answer: persistent . Question 4 .6.6666 out of 6.6666 points Windows __________ Services 3.0 is a database-enabled Web application that runs on an Internet Information Services server. By accessing the site, users can employ browser-based workspaces to share information in a variety of ways such as storing documents, creating calendar appointments and task lists, and contributing to newsgroup-style discussions. Answer Selected Answer: Sharepoint

. Question 5 .6.6666 out of 6.6666 points __________ Reconnect enables a client to reconnect to a Windows Media Services server and resume an interrupted stream after a temporary network outage. Answer Selected Answer: Fast . Question 6 .6.6667 out of 6.6667 points What service allows a server to stream audio and video content to network clients in real time? Answer Selected Answer: c. Windows Media Services Response Feedback: With Windows Media Services, a server can stream audio and video content to network clients in real time. A player on the client computer establishes a direct connection with the server and plays the audio or video content as it arrives. . Question 7 .6.6667 out of 6.6667 points When you enable both the RTSP and HTTP protocols on a Windows Media Services server, what process do clients and the server use to negotiate the most efficient protocol they have in common? Answer Selected Answer: d. protocol rollover Response Feedback: When you enable both the RTSP and HTTP protocols on a Windows Media Services server, the clients and the server use a process called protocol rollover to negotiate the most efficient protocol they have in common. A client establishing a connection to a Windows Media Services server sends information about the protocols it can use, and the server selects the best protocol it is capable of using. . Question 8 .6.6667 out of 6.6667 points The Windows Server 2008 version of Windows Media Services uses what protocol to stream multimedia content? Answer Selected Answer: c. Real Time Streaming Protocol (RTSP) Response Feedback: When you add the Windows Media Services role on a Windows Server 2008 computer, the Select Data Transfer Protocols page enables you to select Real Time Streaming Protocol (RTSP), Hypertext Transfer Protocol (HTTP), or both. The Windows Server 2008 version of Windows Media Services uses the RTSP protocol by default. . Question 9 .6.6667 out of 6.6667 points What enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information? Answer Selected Answer: c. Digital Rights Management Response Feedback: Digital Rights Management (DRM) enables administrators to protect specific types of information from unauthorized consumption and distribution, even by users who have the appropriate credentials and permissions to access the information. . Question 10 .6.6667 out of 6.6667 points Windows SharePoint Services relies on what technology to manage the database that stores user documents and information? Answer Selected Answer: c. Microsoft SQL Server 2005 Response Feedback: Windows SharePoint Services relies on Microsoft SQL Server 2005 technology to manage the database that stores user documents and information. . Question 11 .6.6667 out of 6.6667 points To provide users with email capabilities in Windows SharePoint Server, you must install what type of server? Answer Selected Answer: d. SMTP Response Feedback: Windows SharePoint Services can integrate with email in a variety of ways, enabling users to set up calendar appointments, post announcements, add documents, and contribute to blogs and discussion forums. To provide users with these email capabilities, you must install a Simple Mail Transfer Protocol (SMTP) server and configure the incoming and outgoing email settings in Windows SharePoint Services. . Question 12 .6.6667 out of 6.6667 points

Which of the following is NOT a step involved in deploying WMRM? Answer Selected Answer: a. testing Response Feedback: At the highest level, the process of deploying content protected with WMRM consists of the following steps: packaging, distribution, licensing, and playback. . Question 13 .6.6667 out of 6.6667 points Windows Media Services uses what type of transmissions by default? Answer Selected Answer: d. unicast Response Feedback: The type of transmissions you configure Windows Media Services to use when streaming multimedia content can impact the bandwidth the service consumes. Windows Media Services uses unicast transmissions by default. In a unicast transmission, each client establishes its own connection to the Windows Media Services server and has its own data stream. . Question 14 .6.6667 out of 6.6667 points What components do clients use to access specific content streams? Answer Selected Answer: c. publishing points Response Feedback: To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. . Question 15 .0 out of 6.6667 points What two types of publishing does Windows Media Services support? Answer Selected Answer: b. on-demand streams and broadcast streams Response Feedback: To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. Windows Media Services supports two types of publishing points: on-demand streams and broadcast streams. Question 1 0 out of 5 points Any client computer running Windows Media Player 6 or later can use RTSP to stream multimedia content, with either TCP or UDP (User Datagram Protocol) at the transport layer. Answer Selected Answer: True Correct Answer: False Question 2 5 out of 5 points To protect your content using WMRM, you must enter into a license agreement with Microsoft and then obtain the Windows Media Rights Manager 10 Software Development Kit (SDK). Answer Selected Answer: True Correct Answer: True Question 3 5 out of 5 points What Microsoft technology enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content? Answer Selected Answer: b. Windows Media Rights Manager Correct Answer: b. Windows Media Rights Manager Response Feedback: Windows Media Rights Manager (WMRM) is a Microsoft technology that enables you to package your content in a secure form and issue licenses that provide authorized users with limited access to the content. Question 4 5 out of 5 points You can access the administration interface for Windows SharePoint Services by selecting what from the Administrative Tools program group? Answer Selected Answer: b. SharePoint 3.0 Central Administration Correct Answer: b. SharePoint 3.0 Central Administration Response Feedback: After you install and configure Windows SharePoint Services, you can access the administration interface by selecting SharePoint

3.0 Central Administration from the Administrative Tools program group. Question 5 0 out of 5 points What Windows Server 2008 role enables you to create usage policies for specific types of information that specify what authorized users can do with that information? Answer Selected Answer: c. Windows Media Rights Manager Correct Answer: b. Active Directory Rights Management Services Response Feedback: Active Directory Rights Management Services (AD RMS) is a Windows Server 2008 role that enables you to create usage policies for specific types of information that specify what authorized users can do with that information. Question 6 5 out of 5 points What service allows a server to stream audio and video content to network clients in real time? Answer Selected Answer: b. Windows Media Services Correct Answer: b. Windows Media Services Response Feedback: With Windows Media Services, a server can stream audio and video content to network clients in real time. A player on the client computer establishes a direct connection with the server and plays the audio or video content as it arrives. Question 7 5 out of 5 points Which of the following is NOT a step involved in deploying WMRM? Answer Selected Answer: b. testing Correct Answer: b. testing Response Feedback: At the highest level, the process of deploying content protected with WMRM consists of the following steps: packaging, distribution, licensing, and playback. Question 8 5 out of 5 points To provide users with email capabilities in Windows SharePoint Server, you must install what type of server? Answer Selected Answer: a. SMTP Correct Answer: a. SMTP Response Feedback: Windows SharePoint Services can integrate with email in a variety of ways, enabling users to set up calendar appointments, post announcements, add documents, and contribute to blogs and discussion forums. To provide users with these email capabilities, you must install a Simple Mail Transfer Protocol (SMTP) server and configure the incoming and outgoing email settings in Windows SharePoint Services. Question 9 0 out of 5 points AD RMS consists of which of the following components? Answer Selected Answer: b. database server Correct Answer: c. all of the above Response Feedback: AD RMS consists of three components: AD RMS server, AD RMS client, and database server. Question 10 0 out of 5 points When you enable both the RTSP and HTTP protocols on a Windows Media Services server, what process do clients and the server use to negotiate the most efficient protocol they have in common? Answer Selected Answer: c. multicast Correct Answer: d. protocol rollover Response Feedback: When you enable both the RTSP and HTTP protocols on a Windows Media Services server, the clients and the server use a process called protocol rollover to negotiate the most efficient protocol they have in common. A client establishing a connection to a Windows Media Services server sends information about the protocols it can use, and the server selects the best protocol it is capable of using. Question 11 0 out of 5 points Although a SAN is not in itself a high-availability technology, you can make it into one by connecting redundant servers to the same network. Answer Selected Answer: False Correct Answer: True Question 12 0 out of 5 points

To create a load balanced terminal server farm, you only need to install the Terminal Services role with the Terminal Server role service on one Windows Server 2008 computer. Answer Selected Answer: True Correct Answer: False Question 13 5 out of 5 points Storage devices on a SAN are nearly always drive arrays, not individual drives, and can include all of the following except __________. Answer Selected Answer: c. none of the above Correct Answer: c. none of the above Response Feedback: Storage devices on a SAN are nearly always drive arrays, not individual drives, and can include hard disks, optical jukeboxes, tape libraries, or any other type of storage. Question 14 5 out of 5 points The process of deploying Terminal Services with network load balancing consists of which of the following parts? Answer Selected Answer: b. both a & b Correct Answer: b. both a & b Response Feedback: The process of deploying Terminal Services with network load balancing consists of two parts: creating a terminal server farm and creating a network load balancing cluster. Question 15 0 out of 5 points Which component in iSCSI initiators and targets registers information about itself with an iSNS server and sends queries to the server for information about other clients? Answer Selected Answer: b. iSNS database Correct Answer: a. iSNS clients Response Feedback: The iSNS clients component in iSCSI initiators and targets registers information about itself with an iSNS server and sends queries to the server for information about other clients. Question 16 5 out of 5 points Which is the most critical layer in the operation of a SAN? Answer Selected Answer: d. FC4 Correct Answer: d. FC4 Response Feedback: FC4 defines the upper-layer protocol mapping rules that enable Fibre Channel networks to carry SCSI and other types of application layer traffic. Question 17 0 out of 5 points Because any device on a SAN can communicate with any other device on the same SAN, high-speed data transfers can occur in which of the following ways? Answer Selected Answer: d. client to storage Correct Answer: a. server to storage Response Feedback: Because any device on a SAN can communicate with any other device on the same SAN, high-speed data transfers can occur in any of the following ways: server to storage, server to server, and storage to storage. Question 18 5 out of 5 points Which component registers and locates iSCSI initiators and targets? Answer Selected Answer: d. Internet Storage Name Server Correct Answer: d. Internet Storage Name Server Response Feedback: The Internet Storage Name Server component registers and locates iSCSI initiators and targets. Question 19 0 out of 5 points iSNS consists of all of the following components except iSNS __________. Answer Selected Answer: c. server Correct Answer: b. targets Response Feedback: iSNS consists of four components: iSNS server, iSNS database, iSNS clients, and iSNS protocol.

Question 20 0 out of 5 points Cluster servers should use the same software environment, which consists of all of the following elements except __________. Answer Selected Answer: d. updates Correct Answer: b. disk size Response Feedback: In addition to hardware recommendations, the cluster servers should use the same software environment, which consists of the following elements: operating system, application, updates, and Active Directory. chapter 10 hatfield Question 1 .6.6666 out of 6.6666 points The port number that the RDP protocol uses (TCP port 3389) is __________ by default on most firewalls. Answer Selected Answer: blocked . Question 2 .6.6666 out of 6.6666 points TS Web Access enables you to publish terminal server desktops and __________ programs on Web pages. Answer Selected Answer: RemoteApp . Question 3 .0 out of 6.6666 points When you deploy a TS Gateway server on your network, you want to make sure that only the clients you select can access your terminal servers through the __________. Answer Selected Answer: firewall . Question 4 .6.6666 out of 6.6666 points If you do not create or select a(n) __________ during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Answer Selected Answer: certificate . Question 5 .6.6666 out of 6.6666 points To deploy a TS Gateway server, you must first __________ the TS Gateway role service. Answer Selected Answer: install . Question 6 .6.6667 out of 6.6667 points What port number does the RDP protocol use by default? Answer Selected Answer: a. 3389 Response Feedback: The RDP protocol uses TCP port 3389 by default. Question 1 6.6666 out of 6.6666 points The __________ argument causes the RDC client to open a terminal session window that occupies the entire virtual desktop of a system with two or more monitors. Answer Selected Answer: /span Correct Answer: /span Question 2 0 out of 6.6666 points One of the new features implemented in RDP 6.x is support for __________ color, which enables clients to run graphic-intensive applications, such as image editors, with a full color palette. Answer Selected Answer: desktop composition Correct Answer: 32-bit Question 3 6.6666 out of 6.6666 points

After you configure the settings in the RDC client, you can save them as a file with an __________ extension. Answer Selected Answer: rdp Correct Answer: rdp Question 4 6.6666 out of 6.6666 points The Remote Desktop Connection __________ client included with all versions of Windows Server 2008 supports all of the new Terminal Services features in Windows Server 2008. Answer Selected Answer: 6.1 Correct Answer: 6.1 Question 5 0 out of 6.6666 points The Terminal Services key configuration __________ displays the system menu for the current active window. Answer Selected Answer: manager Correct Answer: ALT+DELETE Question 6 0 out of 6.6667 points When configuring audio redirection, what setting must be selected to suppress all sounds on the client computer and the server generated by the applications running in the client session on the terminal server? Answer Selected Answer: d. None of the above Correct Answer: c. Do not play Response Feedback: In the Remote computer sound box, select Bring to this computer to cause all sounds generated by the applications running in the client session on the terminal server to play on the client computer and suppress those sounds on the terminal server. Question 7 6.6667 out of 6.6667 points What files store Remote Desktop Client settings in a recallable and portable form? Answer Selected Answer: b. RDP files Correct Answer: b. RDP files Response Feedback: RDP files store Remote Desktop Client settings in a recallable and portable form. Question 8 6.6667 out of 6.6667 points What feature eliminates the need for the printer driver on the terminal server? Answer Selected Answer: b. Easy Print Correct Answer: b. Easy Print Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. Question 9 6.6667 out of 6.6667 points Which TS server licensing scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest? Answer Selected Answer: a. Forest Correct Answer: a. Forest Response Feedback: When you install the TS Licensing role service, you must specify the server’s discovery scope. The Forest discovery scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest. Microsoft recommends this scope setting for domain members. Question 10 6.6667 out of 6.6667 points What is the executable program file for the RDC client? Answer Selected Answer: d. Mstsc.exe Correct Answer: d. Mstsc.exe Response Feedback: The executable program file for the RDC client, Mstsc.exe, is located in the C:\Windows\System32 folder by default. When you run the Mstsc.exe program with no parameters, the Remote Desktop Connection window appears with its default settings intact. Question 11

6.6667 out of 6.6667 points The Easy Print driver is based on what document format introduced in Windows Vista and Windows Server 2008? Answer Selected Answer: b. XPS Correct Answer: b. XPS Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. Question 12 0 out of 6.6667 points What real-time, modular operating system is designed for devices with minimal amounts of memory? Answer Selected Answer: c. Linux Correct Answer: d. Windows CE Response Feedback: Windows CE is a real-time, modular operating system designed for devices with minimal amounts of memory. Windows CE is not based on the NT kernel, but it provides users with a familiar Windows graphical user interface (GUI) and has been adapted to a variety of devices including handhelds, smart phones, and game consoles. Question 13 6.6667 out of 6.6667 points What is the default location of the TS Licensing database? Answer Selected Answer: c. C:\Windows\System32\LServer Correct Answer: c. C:\Windows\System32\LServer Response Feedback: The TS Licensing database appears by default in the C:\Windows\System32\LServer folder, but it can be changed. Question 14 6.6667 out of 6.6667 points What terminal services key combination displays the Windows Security screen? Answer Selected Answer: d. CTRL+ALT+END Correct Answer: d. CTRL+ALT+END Response Feedback: Pressing CTRL+ALT+END in a terminal services session will display the Windows Security screen. Question 15 6.6667 out of 6.6667 points What experience option is also called anti-aliasing and enables the client to display screen fonts without jagged lines? Answer Selected Answer: c. font smoothing Correct Answer: c. font smoothing Response Feedback: The font smoothing experience option, also called anti-aliasing, enables the client to display screen fonts without jagged lines. Question 1 6.6666 out of 6.6666 points The port number that the RDP protocol uses (TCP port 3389) is __________ by default on most firewalls. Answer Selected Answer: blocked Question 2 6.6666 out of 6.6666 points If you do not create or select a(n) __________ during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Answer Selected Answer: certificate Question 3 6.6666 out of 6.6666 points In a VPN connection, computers use a technique called __________ that encapsulates an entire client/server session within another protocol. Answer Selected Answer: tunneling Question 4 0 out of 6.6666 points When you deploy a TS Gateway server on your network, you want to make sure that only the clients you select can access your terminal servers through the __________.

Answer Selected Answer: VPN Question 5 6.6666 out of 6.6666 points TS Web Access enables you to publish terminal server desktops and __________ programs on Web pages. Answer Selected Answer: RemoteApp Question 6 6.6667 out of 6.6667 points What area of dual accessibility on an enterprise network provides access both to the Internet and to your internal network? Answer Selected Answer: c. perimeter network Response Feedback: TS Gateway must run on a computer that is accessible to the Internet and to your internal network. This area of dual accessibility is called a perimeter network. Question 7 0 out of 6.6667 points In addition to installing the dependent IIS 7 role services and features, the Add Roles Wizard creates an IIS Web application for TS Web Access, adds it to the Default Website, and assigns to it to what default URL? Answer Selected Answer: c. http://servername/ts Response Feedback: In addition to installing the dependent IIS 7 role services and features, the Add Roles Wizard creates an IIS Web application for TS Web Access, adds it to the Default Website, and assigns to it the http://servername/ts URL. This application generates a default Web page containing the controls that enable users to access terminal server features. Question 8 6.6667 out of 6.6667 points What port does SSL use? Answer Selected Answer: c. 443 Response Feedback: Question 9 0 out of 6.6667 points

SSL uses TCP port number 443.

After you import your certificate into the TS Gateway computer’s Certificates store, what must you do so that the gateway can use it? Answer Selected Answer: d. you must map the certificate to the TS Gateway server Response Feedback: After you import your certificate into the TS Gateway computer’s Certificates store, you must map the certificate to the TS Gateway server so that the gateway can use it. Question 10 6.6667 out of 6.6667 points Which of the following is NOT one of the tasks you must perform when deploying a TS Gateway server? Answer Selected Answer: b. Reinstall IIS with special consideration for the TS Gateway role service. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 11 6.6667 out of 6.6667 points Which of the following is NOT a Windows Process Activation Service feature that TS Web Access requires? Answer Selected Answer: b. Request Filtering Response Feedback: TS Web Access requires the following Windows Process Activation Service features: Process Model, .NET Environment, and Configuration APIs. Question 12 6.6667 out of 6.6667 points A client’s initial connection to the TS Web Access Web page involves a standard HTTP connection using what port? Answer Selected Answer: b. 80 Response Feedback: A client’s initial connection to the TS Web Access Web page does involve a standard HTTP connection using port TCP 80. However, after the user clicks a RemoteApp icon or establishes a Remote Desktop connection, HTTP is no longer involved. Question 13 6.6667 out of 6.6667 points

For Internet clients to connect to a TS Gateway server using SSL, the server must have issued a __________ by a source that the client computers trust. Answer Selected Answer: a. digital certificate Response Feedback: For Internet clients to connect to a TS Gateway server using SSL, the server must have a digital certificate issued by a source that the client computers trust. If you do not create or select a certificate during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Question 14 6.6667 out of 6.6667 points What is the final step involved in deploying a TS Gateway server? Answer Selected Answer: d. Configure the client to use the TS Gateway. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 15 6.6667 out of 6.6667 points Generally, what has been the choice of technology for remote network access in recent years? Answer Selected Answer: a. VPN Response Feedback: Generally, the technology of choice for remote network access has, in recent years, been virtual private networking (VPN). In a VPN connection, computers use a technique called tunneling that encapsulates an entire client/server session within another protocol. Question 1 6.6666 out of 6.6666 points __________ links that are connected to remote sites are usually owned by third-party providers. Answer Selected Answer: WAN Question 2 6.6666 out of 6.6666 points __________ can warn administrators of excessive storage utilization trends or apply hard restrictions to user accounts. Answer Selected Answer: quotas Question 3 6.6666 out of 6.6666 points An NFS server exports part of its file system and the NFS client integrates the exported information, a process called “__________,” into its own file system. Answer Selected Answer: mounting Question 7 6.6667 out of 6.6667 points What works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection? Answer Selected Answer: c. DFS Replication Response Feedback: DFS Replication works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection. Question 8 6.6667 out of 6.6667 points What will the Window’s Server 2008 “Deploying a File Server” default allow you to manage on the server? Answer Selected Answer: c. all of the above Response Feedback: The “Deploying a File Server” default Windows Server 2008 installation includes all of the components needed for a basic file server deployment. You can manage the server’s disk drives, share folders, and map drives and control access to those shares with no additional software installations. Question 9 6.6667 out of 6.6667 points Network File System (NFS) places the bulk of the file-sharing process on the __________. Answer Selected Answer: d. client

Response Feedback: In NFS, the bulk of the file-sharing process rests on the client. Compared with the Windows SMB file-sharing system, NFS servers are relatively simple and, in technical terms, dumb. NFS servers simply respond to file access requests from clients; they do not maintain any information about the client connections or the files that individual clients have open. Question 10 6.6667 out of 6.6667 points Which Windows operating system protocol is used for file sharing? Answer Selected Answer: c. Server Message Blocks (SMB) Response Feedback: Windows operating systems rely on a protocol called Server Message Blocks (SMB) for their file sharing. However, in the UNIX world, the standard is the Network File System (NFS). Question 11 6.6667 out of 6.6667 points Replication groups use which topology to limit the replication traffic to specific pairs of members? Answer Selected Answer: c. hub/spoke topology Response Feedback: By default, replication groups use a full mesh topology, which means that every member in a group replicates with every other member. This is a satisfactory solution for relatively small DFS deployments, but on larger installations, the full mesh topology can generate a huge amount of network traffic. In such cases, you might want to opt for a hub/spoke topology that enables you to limit the replication traffic to specific pairs of members. Question 12 6.6667 out of 6.6667 points DFS can distribute access requests by using what feature, thus preventing any one server from shouldering the entire traffic load? Answer Selected Answer: a. load balancing Response Feedback: A DFS namespace by itself can simplify the process by which users locate the files they need. However, if people all over the network need access to the same file, the requests are still directed to the same file server, which can cause a performance bottleneck in the computer itself or on the subnet where the file server is located. By replicating shared folders to multiple servers, DFS can distribute the access requests, thus preventing any one server from shouldering the entire traffic load. This is called load balancing. Question 13 6.6667 out of 6.6667 points Which system can warn administrators of excessive storage utilization trends or apply hard restrictions to user accounts? Answer Selected Answer: c. quotas Response Feedback: In Windows Server 2008, a quota is simply a limit on the disk space a user is permitted to consume in a particular volume or folder. Quotas can warn administrators of excessive storage utilization trends or apply hard restrictions to user accounts. Question 14 6.6667 out of 6.6667 points Which of the following items allows administrators to monitor and regulate the storage consumed by network users? Answer Selected Answer: d. File Server Resource Manager Response Feedback: File Server Resource Manager enables administrators to monitor and regulate the storage consumed by network users. Question 15 6.6667 out of 6.6667 points For organizations utilizing Windows and UNIX computers, Windows Server 2008 includes which role service? Answer Selected Answer: b. Services for Network File System Response Feedback: To accommodate organizations that have heterogeneous networks containing both Windows and UNIX computers, Windows Server 2008 includes the Services for Network File System role service that provides NFS Server and NFS Client capabilities. Question 4 6.6666 out of 6.6666 points Web browsers typically connect to Web servers using a protocol called __________. Answer Selected Answer: HTTP Question 6 6.6667 out of 6.6667 points What does the Internet Information Services (IIS) Manager in Windows Server 2008 use to configure individual modules rather than tabbed dialog boxes? Answer Selected Answer: c. icons

Response Feedback: The Internet Information Services (IIS) Manager in Windows Server 2008 uses icons to configure individual modules rather than tabbed dialog boxes. Question 7 6.6667 out of 6.6667 points Which of the following is a new feature in FTP7? Answer Selected Answer: d. all of the above Response Feedback: Some of the new features in FTP7 are IIS7 integration, FTP over Secure Sockets Layer (SSL), combined FTP and Web hosting, virtual host naming, and improved logging and error handling. Question 8 6.6667 out of 6.6667 points The original format for FTP directory listings was based on a format used by which operating system? Answer Selected Answer: c. UNIX operating systems Response Feedback: The FTP Directory Browsing feature in FTP7 controls the format that the server uses when sending directory listing information to a client. The original format for FTP directory listings was based on the format used by the UNIX operating systems of the time. Question 9 6.6667 out of 6.6667 points IIS7 supports which HTTP binding options? Answer Selected Answer: d. all of the above Response Feedback: IIS7 supports three HTTP binding options. These are by IP address, port number, and host header. Question 10 6.6667 out of 6.6667 points What allows a company to host the same documents on several different Websites without copying the documents to each content folder? Answer Selected Answer: a. virtual directory Response Feedback: A virtual directory is an alias that points to a folder in another physical location. It is essentially a shortcut that enables you to publish content found on different drives or different computers, without copying or moving it. Question 11 6.6667 out of 6.6667 points What application layer protocol enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers. Answer Selected Answer: c. File Transfer Protocol (FTP) Response Feedback: File Transfer Protocol (FTP) is an application layer protocol that enables a client to connect to a remote server, perform rudimentary file management tasks, and copy files in either direction between the two computers. FTP is defined by the RFC 114 document, which the Internet Engineering Task Force (IETF) published in 1971, making it one of the oldest TCP/IP protocols still in use. Question 12 6.6667 out of 6.6667 points What type of interface that is integrated into most browser applications is used most often by FTP clients? Answer Selected Answer: c. graphical interface Response Feedback: Originally implemented as command-line applications, FTP clients now most often use a graphical interface that is integrated into most browser applications, including Internet Explorer. Question 13 6.6667 out of 6.6667 points On IIS7, what reduces the application’s attack surface, minimizes the amount of memory and other system resources it needs to run, and simplifies the configuration and maintenance processes? Answer Selected Answer: b. modular installation Response Feedback: Modular installation reduces the application’s attack surface, minimizes the amount of memory and other system resources it needs to run, and simplifies the configuration and maintenance processes. Question 15 6.6667 out of 6.6667 points How many different Websites can be configured in IIS? Answer: c. unlimited Response Feedback: There is no limit to how many different Websites you can configure in IIS. Question 1 6.6666 out of 6.6666 points

When a client authenticates to an IIS7 server using __________ Authentication, the client transmits its credentials unencrypted, using Base64 encoding, so anyone capturing the network packets can read the user’s credentials. Answer Selected Answer: Basic Question 2 6.6666 out of 6.6666 points __________ is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. Answer Selected Answer: Authentication Question 3 6.6666 out of 6.6666 points Of the three traditional challenge/response authentication methods supported by IIS7, __________ Authentication is the most secure. Answer Selected Answer: Windows Question 7 6.6667 out of 6.6667 points A digital certificate is an electronic credential issued by a __________. Answer Selected Answer: a. certification authority Response Feedback: A digital certificate is an electronic credential, issued by a certification authority (CA), that confirms the identity of the party to which it is issued. For example, a digital certificate issued to a user contains identifying information about the individual as well as a public key, which enables the user to participate in encrypted communications and prove his or her identity. A certificate issued to a server enables clients to verify that this really is the server it claims to be. Question 8 6.6667 out of 6.6667 points What is a way to configure an ASP.NET application to run in a security context different from the application’s default context? Answer Selected Answer: c. ASP.NET Impersonation Response Feedback: ASP.NET Impersonation is not an authentication protocol in itself, unlike most of the other options in the Authentication pane. Instead, ASP.NET is a way to configure an ASP.NET application to run in a security context different from the application’s default context. Question 10 6.6667 out of 6.6667 points You are establishing an SSL connection with the server when you click a link or key a URL containing the __________ prefix in your browser. Answer Selected Answer: a. https:// Response Feedback: Secure Sockets Layer (SSL) is a security protocol that you can use to encrypt the data exchanged by clients and IIS servers. When you click a link or key a URL containing the prefix https:// in your browser, you are establishing an SSL connection with the server. Question 12 6.6667 out of 6.6667 points Where is the root directory of the default Website placed when IIS is installed? Answer Selected Answer: a. C:\inetpub\wwwroot Response Feedback: When you install the Web Server (IIS) role on a Windows Server 2008 computer, IIS7 creates the user and the group and assigns the group the NTFS permissions needed to access the designated root directory of the default Website (C:\inetpub\wwwroot). Question 13 6.6667 out of 6.6667 points Permissions tend to run down through a hierarchy, which is called __________. Answer Selected Answer: b. permission inheritance Response Feedback: Permissions tend to run down through a hierarchy, which is called permission inheritance. Question 14 6.6667 out of 6.6667 points What is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate? Answer Selected Answer: d. authentication Response Feedback: Authentication is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. Question 15 6.6667 out of 6.6667 points

What tasks must you complete to install SSL on an IIS server? Answer Selected Answer: c. All of the above Response Feedback: To use SSL on an IIS7 server, you must complete the following tasks: obtain and install a server certificate, create an SSL binding for your Website(s), and configure the Website or FTP7 site to use SSL. Question 1 6.6666 out of 6.6666 points Terminal Services Session:__________ Count provides the number of threads currently active on the Terminal Server. Answer Selected Answer: Thread Correct Answer: Thread Question 2 6.6666 out of 6.6666 points The Remote Desktop Connection __________ establishes a connection to a terminal server using Remote Desktop Protocol (RDP) and displays a session window containing a desktop or application. Answer Selected Answer: client Correct Answer: client Question 3 6.6666 out of 6.6666 points __________ Level Authentication confirms the user’s identity with the Credential Security Service Provider (CredSSP) protocol before the client and server establish the Terminal Services connection, eliminating that potentially dangerous window of opportunity. Answer Selected Answer: Network Correct Answer: Network Question 4 6.6666 out of 6.6666 points Remote Desktop __________ 6.0 is based on the T.120 protocol standards published by the International Telecommunications Union (ITU) and provides multi-channel communication between Terminal Services clients and servers. Answer Selected Answer: Protocol Correct Answer: Protocol Question 5 6.6666 out of 6.6666 points A(n) __________ is a collection of processes that form an individual user environment running on the server. Answer Selected Answer: Session Correct Answer: session Question 6 6.6667 out of 6.6667 points What networking protocol enables communication between the terminal server and the client? Answer Selected Answer: c. Remote Desktop Protocol Correct Answer: c. Remote Desktop Protocol Response Feedback: The Remote Desktop Protocol (RDP) is a networking protocol that enables communication between the terminal server and the client. Question 7 6.6667 out of 6.6667 points What role service provides the functionality that enables users running the RDC client to run full desktop sessions? Answer Selected Answer: b. Terminal Server Correct Answer: b. Terminal Server Response Feedback: The Terminal Server role service provides the core Terminal Services functionality that enables users running the RDC client to run full desktop sessions. This role service also includes the RemoteApp feature that enables clients to run individual applications in separate windows. Question 8 6.6667 out of 6.6667 points What is the name of the unique identifier that the terminal server assigns to each session to keep the client processes for individual sessions separate? Answer Selected Answer: c. Session ID

Correct Answer: c. Session ID Response Feedback: To keep the client processes for individual sessions separate, the terminal server assigns each session a unique identifier called a Session ID. In Windows Server 2008, Session ID 0 is always dedicated to the system services running on the computer, which isolates them from applications for security reasons. The system then assigns Session IDs, starting with number 1, to each interactive user logging on to the computer from the local console or a remote system. Question 9 6.6667 out of 6.6667 points What role configures the computer to function as a Terminal Services Licensing Server, which enables it to allocate client access licenses (CALs) to clients? Answer Selected Answer: b. TS Licensing Correct Answer: b. TS Licensing Response Feedback: The TS Licensing role service configures the computer to function as a Terminal Services Licensing Server, which enables it to allocate client access licenses (CALs) to clients. You must have a Licensing Server on your network to use Terminal Services. You can install TS Licensing on the same computer as the other role services or on another computer. Question 10 6.6667 out of 6.6667 points What device with a display and a keyboard provides the interface to the mainframe? Answer Selected Answer: a. dumb terminal Correct Answer: a. dumb terminal Response Feedback: In the early days of computing, applications ran on a mainframe computer and users accessed those applications from terminals. A terminal is a device with a display and a keyboard that provides the interface to the mainframe. Often called dumb terminals back then, these devices did no computing themselves; they simply sent the user’s keystrokes to the mainframe and displayed the data that they received from it. Question 11 6.6667 out of 6.6667 points What new Terminal Services feature enables clients to run terminal server applications within individual windows? Answer Selected Answer: a. RemoteApp Correct Answer: a. RemoteApp Response Feedback: RemoteApp is a new Terminal Services feature that enables clients to run terminal server applications within individual windows. The windows are resizable; they have standard taskbar buttons and are not constrained by a Terminal Services desktop. In fact, a RemoteApp window is, in most cases, indistinguishable from a window containing a local application. Question 12 6.6667 out of 6.6667 points What are the advantages of Terminal Services? Answer Selected Answer: b. all of the above Correct Answer: b. all of the above Response Feedback: Deploying Terminal Services offers several advantages to the network administrator, including the following: Reduced client hardware requirements, simplified application deployment, easy configuration and updates, low network bandwidth consumption, support for thin clients, conservation of licenses, power savings, no client backups, and remote control help and training. Question 13 6.6667 out of 6.6667 points What performance monitor reports the number of active Terminal Services sessions during the sample time interval? Answer Selected Answer: b. Terminal Services: Active Sessions Correct Answer: b. Terminal Services: Active Sessions Response Feedback: The Terminal Services: Active Sessions performance monitor reports the number of active Terminal Services sessions during the sample time interval. An Active Session indicates that a session is connected and a user is logged on to the server. Question 14 6.6667 out of 6.6667 points What role service balances the client load among multiple terminal servers and saves session state information so that clients can reconnect to the same session from which they disconnected? Answer Selected Answer: a. TS Session Broker Correct Answer: a. TS Session Broker Response Feedback: The TS Session Broker role service balances the client load among multiple terminal servers and saves session state information so that clients can reconnect to the same session from which they disconnected. Question 15 6.6667 out of 6.6667 points

What is the modern equivalent of mainframe computing in which servers perform most of the processing and clients are relatively simple devices that provide the user interface? Answer Selected Answer: c. Terminal Services Correct Answer: c. Terminal Services Response Feedback: Terminal Services is the modern equivalent of mainframe computing in which servers perform most of the processing and clients are relatively simple devices that provide the user interface. With Terminal Services, client computers can connect to a server and run individual applications or an entire desktop environment. Question 1 6.6666 out of 6.6666 points The __________ argument causes the RDC client to open a terminal session window that occupies the entire virtual desktop of a system with two or more monitors. Answer Selected Answer: /span Correct Answer: /span Question 2 0 out of 6.6666 points One of the new features implemented in RDP 6.x is support for __________ color, which enables clients to run graphic-intensive applications, such as image editors, with a full color palette. Answer Selected Answer: desktop composition Correct Answer: 32-bit Question 3 6.6666 out of 6.6666 points After you configure the settings in the RDC client, you can save them as a file with an __________ extension. Answer Selected Answer: rdp Correct Answer: rdp Question 4 6.6666 out of 6.6666 points The Remote Desktop Connection __________ client included with all versions of Windows Server 2008 supports all of the new Terminal Services features in Windows Server 2008. Answer Selected Answer: 6.1 Correct Answer: 6.1 Question 5 0 out of 6.6666 points The Terminal Services key configuration __________ displays the system menu for the current active window. Answer Selected Answer: manager Correct Answer: ALT+DELETE Question 6 0 out of 6.6667 points When configuring audio redirection, what setting must be selected to suppress all sounds on the client computer and the server generated by the applications running in the client session on the terminal server? Answer Selected Answer: d. None of the above Correct Answer: c. Do not play Response Feedback: In the Remote computer sound box, select Bring to this computer to cause all sounds generated by the applications running in the client session on the terminal server to play on the client computer and suppress those sounds on the terminal server. Question 7 6.6667 out of 6.6667 points What files store Remote Desktop Client settings in a recallable and portable form? Answer Selected Answer: b. RDP files Correct Answer: b. RDP files Response Feedback: RDP files store Remote Desktop Client settings in a recallable and portable form. Question 8 6.6667 out of 6.6667 points What feature eliminates the need for the printer driver on the terminal server?

Answer Selected Answer: b. Easy Print Correct Answer: b. Easy Print Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. Question 9 6.6667 out of 6.6667 points Which TS server licensing scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest? Answer Selected Answer: a. Forest Correct Answer: a. Forest Response Feedback: When you install the TS Licensing role service, you must specify the server’s discovery scope. The Forest discovery scope publishes license server information in the Active Directory database, enabling terminal servers to discover licensing servers running on any computer in the same forest. Microsoft recommends this scope setting for domain members. Question 10 6.6667 out of 6.6667 points What is the executable program file for the RDC client? Answer Selected Answer: d. Mstsc.exe Correct Answer: d. Mstsc.exe Response Feedback: The executable program file for the RDC client, Mstsc.exe, is located in the C:\Windows\System32 folder by default. When you run the Mstsc.exe program with no parameters, the Remote Desktop Connection window appears with its default settings intact. Question 11 6.6667 out of 6.6667 points The Easy Print driver is based on what document format introduced in Windows Vista and Windows Server 2008? Answer Selected Answer: b. XPS Correct Answer: b. XPS Response Feedback: In Windows Server 2008 Terminal Services, a new feature called Easy Print eliminates the need for the printer driver on the terminal server. Instead, the terminal server has a generic Easy Print driver based on the XML Paper Specification (XPS) document format introduced in Windows Vista and Windows Server 2008. Question 12 0 out of 6.6667 points What real-time, modular operating system is designed for devices with minimal amounts of memory? Answer Selected Answer: c. Linux Correct Answer: d. Windows CE Response Feedback: Windows CE is a real-time, modular operating system designed for devices with minimal amounts of memory. Windows CE is not based on the NT kernel, but it provides users with a familiar Windows graphical user interface (GUI) and has been adapted to a variety of devices including handhelds, smart phones, and game consoles. Question 13 6.6667 out of 6.6667 points What is the default location of the TS Licensing database? Answer Selected Answer: c. C:\Windows\System32\LServer Correct Answer: c. C:\Windows\System32\LServer Response Feedback: The TS Licensing database appears by default in the C:\Windows\System32\LServer folder, but it can be changed. Question 14 6.6667 out of 6.6667 points What terminal services key combination displays the Windows Security screen? Answer Selected Answer: d. CTRL+ALT+END Correct Answer: d. CTRL+ALT+END Response Feedback: Pressing CTRL+ALT+END in a terminal services session will display the Windows Security screen. Question 15 6.6667 out of 6.6667 points What experience option is also called anti-aliasing and enables the client to display screen fonts without jagged lines? Answer Selected Answer: c. font smoothing

Correct Answer: c. font smoothing Response Feedback: The font smoothing experience option, also called anti-aliasing, enables the client to display screen fonts without jagged lines. Question 1 6.6666 out of 6.6666 points The port number that the RDP protocol uses (TCP port 3389) is __________ by default on most firewalls. Answer Selected Answer: blocked Question 2 6.6666 out of 6.6666 points If you do not create or select a(n) __________ during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Answer Selected Answer: certificate Question 3 6.6666 out of 6.6666 points In a VPN connection, computers use a technique called __________ that encapsulates an entire client/server session within another protocol. Answer Selected Answer: tunneling Question 5 6.6666 out of 6.6666 points TS Web Access enables you to publish terminal server desktops and __________ programs on Web pages. Answer Selected Answer: RemoteApp Question 6 6.6667 out of 6.6667 points What area of dual accessibility on an enterprise network provides access both to the Internet and to your internal network? Answer Selected Answer: c. perimeter network Response Feedback: TS Gateway must run on a computer that is accessible to the Internet and to your internal network. This area of dual accessibility is called a perimeter network. Question 8 6.6667 out of 6.6667 points What port does SSL use? Answer Selected Answer: c. 443 Response Feedback: Question 10 6.6667 out of 6.6667 points

SSL uses TCP port number 443.

Which of the following is NOT one of the tasks you must perform when deploying a TS Gateway server? Answer Selected Answer: b. Reinstall IIS with special consideration for the TS Gateway role service. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 11 6.6667 out of 6.6667 points Which of the following is NOT a Windows Process Activation Service feature that TS Web Access requires? Answer Selected Answer: b. Request Filtering Response Feedback: TS Web Access requires the following Windows Process Activation Service features: Process Model, .NET Environment, and Configuration APIs. Question 12 6.6667 out of 6.6667 points A client’s initial connection to the TS Web Access Web page involves a standard HTTP connection using what port? Answer Selected Answer: b. 80 Response Feedback: A client’s initial connection to the TS Web Access Web page does involve a standard HTTP connection using port TCP 80. However, after the user clicks a RemoteApp icon or establishes a Remote Desktop connection, HTTP is no longer involved.

Question 13 6.6667 out of 6.6667 points For Internet clients to connect to a TS Gateway server using SSL, the server must have issued a __________ by a source that the client computers trust. Answer Selected Answer: a. digital certificate Response Feedback: For Internet clients to connect to a TS Gateway server using SSL, the server must have a digital certificate issued by a source that the client computers trust. If you do not create or select a certificate during the TS Gateway installation process, you will find critical event messages to that effect in the computer’s event logs. Question 14 6.6667 out of 6.6667 points What is the final step involved in deploying a TS Gateway server? Answer Selected Answer: d. Configure the client to use the TS Gateway. Response Feedback: To deploy a TS Gateway server, you must perform the following tasks: Install the TS Gateway role service, obtain and install a certificate for the TS Gateway server, create connection authorization policies, create resource authorization policies, and configure the client to use the TS Gateway. Question 15 6.6667 out of 6.6667 points Generally, what has been the choice of technology for remote network access in recent years? Answer Selected Answer: a. VPN Response Feedback: Generally, the technology of choice for remote network access has, in recent years, been virtual private networking (VPN). In a VPN connection, computers use a technique called tunneling that encapsulates an entire client/server session within another protocol.

Chapter 11 &12 To protect your content using WMRM, you must enter into a license agreement with Microsoft and then obtain the Windows Media Rights Manager 10 Software Development Kit (SDK). Correct Answer: True . Question 2 . Any client computer running Windows Media Player 6 or later can use RTSP to stream multimedia content, with either TCP or UDP (User Datagram Protocol) at the transport layer. Correct Answer: False . Question 3 AD RMS consists of which of the following components? Correct Answer: b. all of the above Response Feedback: AD RMS consists of three components: AD RMS server, AD RMS client, and database server. . Question 4 Which of the following is NOT a step involved in deploying WMRM? Correct Answer: b. testing Response Feedback: At the highest level, the process of deploying content protected with WMRM consists of the following steps: packaging, distribution, licensing, and playback. . Question 5 . What two types of publishing does Windows Media Services support? Correct Answer: c. analog and digital streams Response Feedback: To publish content on a Windows Media Services server, you create publishing points, which are the components through which clients access specific content streams. Windows Media Services supports two types of publishing points: on-demand streams and broadcast streams. .

Question 6 In what step of WMRM deployment does the user request a license for the content by establishing contact with your server running Windows Media Rights Manager? Correct Answer: b. licensing Response Feedback: During the licensing phase of a WMRM deployment, the user requests a license for the content by establishing contact with your server running Windows Media Rights Manager. The license acquisition process can begin either when users attempt to obtain the content or after they obtain it when they attempt to open the content file in Windows Media Player. . Question 7 . What TCP/IP feature provides one-to-many transmission capabilities? Correct Answer: d. multicast Response Feedback: Multicasting is a TCP/IP (Transmission Control Protocol/Internet Protocol) feature that provides one-to-many transmission capabilities. . Question 8 . The Windows Server 2008 version of Windows Media Services uses what protocol to stream multimedia content? Correct Answer: d. Real Time Streaming Protocol (RTSP) Response Feedback: When you add the Windows Media Services role on a Windows Server 2008 computer, the Select Data Transfer Protocols page enables you to select Real Time Streaming Protocol (RTSP), Hypertext Transfer Protocol (HTTP), or both. The Windows Server 2008 version of Windows Media Services uses the RTSP protocol by default. . Question 9 What can you create to enable users to access the content you specified when creating a publishing point? Correct Answer: b. announcement Response Feedback: After creating a publishing point, Windows Media Services provides several ways to inform clients of the stream’s existence and provide them with access to it. To enable users to access the content you specified when creating a publishing point, you can provide the URL specified in the publishing point’s Announce tab. . Question 10 Windows Media Services uses what type of transmissions by default? Correct Answer: c. unicast Response Feedback: The type of transmissions you configure Windows Media Services to use when streaming multimedia content can impact the bandwidth the service consumes. Windows Media Services uses unicast transmissions by default. In a unicast transmission, each client establishes its own connection to the Windows Media Services server and has its own data stream. . Question 11 . Windows Server 2008 does not include iSCSI target capabilities. Correct Answer: True . Question 12 Storage Manager is part of a feature in Windows Server 2008. Correct Answer: True . Question 13 Because any device on a SAN can communicate with any other device on the same SAN, high-speed data transfers can occur in which of the following ways? Correct Answer: a. server to storage

Response Feedback: Because any device on a SAN can communicate with any other device on the same SAN, highspeed data transfers can occur in any of the following ways: server to storage, server to server, and storage to storage. . Question 14 iSNS consists of all of the following components except iSNS __________. Correct Answer: c. targets Response Feedback: iSNS consists of four components: iSNS server, iSNS database, iSNS clients, and iSNS protocol.

. Question 15 Which component registers and locates iSCSI initiators and targets? Correct Answer: b. Internet Storage Name Server Response Feedback: The Internet Storage Name Server component registers and locates iSCSI initiators and targets. . Question 16 . Cluster servers should use the same software environment, which consists of all of the following elements except __________. Correct Answer: c. disk size Response Feedback: In addition to hardware recommendations, the cluster servers should use the same software environment, which consists of the following elements: operating system, application, updates, and Active Directory. . Question 17 What type of signaling does Fibre Channel use Correct Answer: a. serial Response Feedback: Because Fibre Channel uses serial instead of parallel signaling, it can span much longer distances than a pure SCSI connection—up to 50 kilometers or more, in some cases. . Question 18 . The process of deploying Terminal Services with network load balancing consists of which of the following parts? Correct Answer: a. both a & b Response Feedback: The process of deploying Terminal Services with network load balancing consists of two parts: creating a terminal server farm and creating a network load balancing cluster. . Question 19 Storage devices on a SAN are nearly always drive arrays, not individual drives, and can include all of the following except __________. Correct Answer: c. none of the above Response Feedback: Storage devices on a SAN are nearly always drive arrays, not individual drives, and can include hard disks, optical jukeboxes, tape libraries, or any other type of storage. . Question 20 A SAN-connected server has a minimum of how many network adapters? Correct Answer: b. 2 Response Feedback: Instead of installing disk drives into servers or connecting them using a SCSI bus, a SAN consists of one or more drive arrays equipped with network interface adapters that you connect to your servers using standard twisted pair or fiber optic network cables. A SAN-connected server, therefore, has a minimum of two network adapters, one for the standard LAN connection and one for the SAN.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close