What program can you use to remove the machine specific settings from a Windows computer prior to creating an image file?
During which configuration pass should an answer file for a Windows Server 2008 installation create the system disk partition?
Which of the following message type is not used during a successful DHCP address assignmet?
Which of the following is not one of the techniques you can use to provide fault tolerance for DHCP servers?
A. splitting scopes
B. using stand-by servers
C. DHCP servers using identical scopes
D. failover clustering
Which of the following DHCP infrastructure designs requires the largest number of DHCP server implementations?
Which of the following is not one of the elements of the DNS?
B. relay agents
C. name servers
D. name space
What would be the correct FQDN for a resource record in a reverse lookup zone, if a computer's IP address is 10.74.143.88?
Which of the following are types of zone transfers supported by the DNS server in Windows Server 2008?
A. network zone transfers
B. full zone transfers
C. incremental zone transfers
D. partial zone transfers
Which of the following network components are typically capable of functioning as DHCP relay agents?
A. Windows Vista computers
D. Windows Server 2008 computers
Which of the following types of DHCP address allocation is the equivalent of a reservation in Windows Server 2008?
A. dynamic allocation
B. automatic allocation
C. manual allocation
D. hybrid allocation
What must at least one DNS server support when running Active Directory on your network?
SRV resource records
What process is used when it is necessary for a computer to convert an IP address into a DNS name?
reverse name resolution
The DNS server receiving a name resolution request can take full responsibility for resolving the name by using what type of query?
Which ID will identify all or part of a specific physical link on the subscriber's network, which will enable subscribers to create as many subnets as needed?
Which ID will identify the ISP that assigns a portion of the address space to a certain subscriber?
Which method is most frequently used for providing fault tolerance to DHCP servers?
The DHCP relay agent capability is built into which role in Windows Server 2008?
Network Policy and Access Sevices
By default, the DHCP Server service in Windows Server 2008 uses dynamic allocation, leasing IP addresses to clients for how many days?
Which of the following is NOT an element of DNS?
B. Name Servers
C. DNS Namespace
D. resource record
Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users?
What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system?
What is the name of the communications protocol called for by the original X.500 standard?
Directory Access Protocol
A site topology consists of 3 Active Directory object types: ______, _____ and _____.
Sites, subnets, site links
To use a Windows Server 2008 computer as a domain controller, you must configure it to use a(n) ____.
static IP address
What is the primary difference between global and universal groups?
Universal groups add more data to the global catalog
Which application role provides an integrated environment for deploying and running server-based business applications?
What is the process of deploying and maintaining multiple instances of an operating system?
Which role services are included in UDDI Services role?
UDDI Services Database and UDDI Services Web Application
When creating a GPO software installation, which option causes the client computer to automatically install the application the next time the user logs on?
Which product is designed for large enterprises and can be used to deploy applications as well as perform a wide variety of other network management tasks?
Micorsoft System Center Configuration Manager 2007
What is one way to simplify the process of deploying applications on a large number of computers?
_____ is a networking protocol that enables communictaion between the terninal server and the client.
Remote Desktop Protocol (RDP)
In Windows Server 2008, which Session ID is always dedicated to the system services running on the computer, which isolates them from applications for security reasons?
In addition to the server's base memory requirements, how many megabytes of memory are required when running Terminal Services on a client machine?
After you install the Terminal Services role, you can install the applications that the terminal server will deploy to your clients. What command do you key in first?
change user /install
What are 3 resources that a well-designed sharing strategy have available to the user?
private storage space
public storage space
access to shared space
Which permissions do administrators typically use to assign storage space as well as modify permissions on a Windows Server 2008 file server?
What console can be used to create multiple shares and exercise more granular over their properties?
Share and Storage management
The most common use of a file screen is to _____.
prevent users from storing unauthorized file types on the server
Which Print Services role enables UNIX clients running LPR program to send their print jobs to Windows printers?
You must also install ____ and the ____ when installing the Internet Printing role service.
Web Server (IIS) role and Windows Process Activation Service feature
What is the maximum dynamic volume size for simple and mirrored volumes in Windows Server 2008?
By default, the paging file on a Windows Server 2008 computer is ____ times the amount of memory installed in the computer.
Which fault tolerance solution uses duplicate host adapters as well as duplicate hard drives?
In what type of configuration does the computer write the same data to identical volumes on two different disks?
For applications that use large data files, such as databases and email store, which access is preferable?
In what type of communication can servers access storage devices over the SAN as if they are connected directly to the computer?
server to storage
Which protocol layer defines the basic transport mechanism of a Fibre Channel network, including the frame format and three service classes?
What is the hardware or software device running on a computer that accesses the storage devices on the SAN?
Regardless of how much space you allocate to the storage area. Windows Server 2008 supports a maximum of ____ show copies for each volume.
To protect workstation applications and ensure their continued availability, what feature should be used to run them?
Which component in Windows Server 2008 enables the system to install software packaged as files with an .msi extension?
Windows Installer 4.0
What is the term for the ability of entire servers to be redundant so that if anything goes wrong with one computer, another one can take its place almost immediately?
Which version of Windows Server 2008 must computers be running to create a failover cluster?
A maximum of ____ nodes can be added to a cluster if computers are running on the x86 or IA64 platform.
Which role service maintains a database of client sessions and enables a disconnected client reconnect to the same terminal server?
Clients connecting to a terminal server farm must run the minimum version of Remote Desktop Connection, which is ____.
Which technique creates multiple records using the same name, with a different server IP adress in each record?
DNS Round Robin
What is the most commonly used high-availability solution for data storage, primarily because it is far more scalable that disk mirroring and enables you to realize more storage space from your hard disks?
Which mechanism allows users to work with copires of files that remain accessible whether the workstation can access the server or not?
What term refers to automatic identification of individuals bsed on physiological characteristics?
What process circumvents security barriers by persuading authorized users to provide passwords or other sensitive information?
What is essentially a series of filters that examin the contents of packets and traffic patterns to and from the network to determine which packets they should allow to pass through the filter?
Which of the following is not an important criterion that firewalls can use in their rules?
A. DNS name *
B. IP addresses
C. protocol numbers
d. port numbers
Which of the following is not a port that Windows uses for network browsing?
B. 8080 *
Which network file is not supported by Windows Server 2008?
B. server *
Which of the following is the only technology included in Windows Server 2008 that can protect data while it is in transit?
C. IPSec *
D. Windows Firewall
Which of the following is not an operation mode in BitLocker?
A. transport operation mode
B. user authentication mode
C. volume encryption mode *
D. USB key mode
For encryption on a data network to be both possible and practical, what form of encryption do computers typically use?
What type of list does SAM enable computers to maintain?
local users and groups that function as a decentralized authentication system
What is known as the cryptographic key that is used in exchanges between the security principal and the KDC?
In the Kerboros Policy Setting, what is the default value for Maximum Lifetime for User Ticket?
Effective permissions for a given resource can be assigned in various ways. Which is not a way?
A. application controlled *
B. group membership
C. explicitly assigned
What biometric authentication mechanism is suitable for verification but not identification?
Which of the following types of connections is established between two computers involved in the tunneling process?
B. PPP *
Secure Socket Tunneling Protocol (SSTP) is supported only on clients running _____.
Windows Vista SP1
What is the strongest authentication protocol supported by Windows Server 2008?
Extensible Authentication Protocol (EAP)
What protocol method enables a server to support authentication with smart cards or other types of digital certificates
What allows designated recovery agents to create public keys that can decode encrypted information?
Which of the following is not a factor that administrators should consider when choosing the length for a certificates lifetime?
A. provider of the certificate *
B. standard industry practice
C. government regulations
D. type of certificate
In Windows Server 2008, a root CA's self-generated certificate defaults to a validity period of ____.
Which of the following is not a role that can be selected when you install Active Directory Certificate Services on a Windows Server 2008 computer?
Which of the following is not a required permission that must be granted to the same user or group for the autoenrollment certificate template permission of function correctly?
A. Allow Autoenrollment
B. Allow Enroll
C. Allow Read
D. Allow Write *
What Windows Server 2008 Certificate template allows user authentication, EFS encryption, secure mail and certificate trust list signing?
Which of the following is not a reason code for revoking a certificate?
A. key compromise
B. CA compromise
C. certificate compromise *
Which window presents a consolidated view of the post-installation task that, in previous Windows Server versions, you had to perform using various interfaces presented during and after the OS setup process?
Initial Configuration Tasks
The Events page in Server Manager Events displays a subset of the computer's System log containing all events related to the role for ____ hours.
In an MMC snap-in, which pane contains a hierachical list of the sbap-ins installed in the console and any subheadings that the snap-ins provide?
In an MMC snap-in, which pane contains links to the tasks most commonly associated with the content appearing in the detail pane?
What MMC console contains a collection of snap-ins that is most commonly used by Windows Server 2008 administrators?
At a minimum, the Remote Desktop condition server must be running the _____ operating system to use Network Level Authentication.
Windows Server 2008
What Windows key combination is equivalent to the Terminal Services key combination ALT+PAGE DOWN and is used to switch to the next program to the left in the task list?
What Terminal Services key combination toggles the client session between a full screen and a window?
Individual permissions exist for each of ____ object types in default Active Directory installation?
How many user can connect to a Windows Server 2008 computer at the same time using Remote Desktop without purchasing additional licenses?
Which log contains events received from other computers on the network via subscriptions?
Which type of event is triggered when there is a service degradation or an occurrance that can potentially cause service degradation in the near future?
Which tool within the Reliability and Performance Monitor console displays hundreds of different statistics?
The number of counters that you can display effectively depends on the ____.
size of your monitor and resolution of your video display
What must you create to capture counter statistics in the Reliability and Performance Monitor console for later review?
data collector set
Which log contains information about events generated by the operating system components, such as services and device drivers?
What type of event warns of a problem that is not likely to affect the performance of the component or process where the problem occured, but could affect the performance of other components or processes on the system?
Which type of log contains events targeted at end-users or administrators that indicate a problem and offer a possible solution?
Which type of log contains events that signify a change on the application or service, such as the addition or removal of a printer?
BY default, at what time interval does the Performance Monitor graph update counter values?
What is not a main criterion to consider when evaluating the suitability of a storage device for backups?
What has become the primary backup medium for home users and small networks in recent years?
hard disk drive
Which single device contains one or more magnetic tape drives as well as a robotic mechanism that inserts tapes into and removes them from the drives?
What type of backup job backs up only the files that have changed since the last full backup and does not reset the archive disks?
What type of backup job backs up only the files that have changed since the last backup job of any kind?
What is the most basic type of backup job and copies the entire set of selected targets to the backup medium?
When files are written to a computer's hard disk for the first time, their archive bits are activated and set to a value of ____.
When using Windows Server Backup, you cannot specify and interval of more than ___ hours between jobs.
When using Windows Server Backup for scheduled backup jobs, which type of drives can you use as a backup?
external hard disk
When Windows Server Backup takes control of a backup disk, it creates new, seperate files for the backup jobs it performs each day. The system retains the files for all of the old jobs until the disk is filled or until ____ jobs are store on the disk.
To perform a full server restore, you must boot the system using a Windows Server 2008 installation disk and access the backup disk using which interface?
To restore the system state from a backup, which command do you use?
wbadmin Start SystemStateRecovery -versionMM/DD/YYYY-HH:MM