A ______ is used to ensure that any date sent across a public network, such as the Internet, is secure.
B. VPN
The workhorse of a VPN connection is the _____ because it carries the network packet over a wide area network (WAN) link.
B. Remote Access Protocol
____ is the most commonly used transport protocol, and so it is most typically encapsulated in a remote access protocol for transport over a WAN.
B. TCP/IP
_____was the first commercially available server operating system offered by Novell.
A. NetWare
_____ is a set of IP-based secure commenications and encryption standards created throuh the Internet Engineering Task Force.
A. IPsec
_____ was developed by IBP and the National Security Agency in cooperation with the National Bureau of Standards as an encryption technique using a secret key between the communication stations.
A. DES
A _____ server might be used if you plan to set up two or more RAS servers and want to stadardize access policies and authentication, or if you want to use the server's access accounting features.
D. RADIUS
The VPN server properties _____ tab allows you to enable the server as a router and/or a remote access server.
D. General
A ______, popularly called a digital modem, links a computer or a fax to an ISDN line.
D. Terminal Adapter
A _____ is a digital communications device that links a computer (or sometimes a router) to a DSL telecommunications line.
C. DSL Adapter
The _____ authentication type requires encrypted authentication between server and the client, but uses a generic form of password encryption that enables UNIX computers and other non-Microsoft operation systems to connect to a RAS server.
A. CHAP
The _____ authentication type is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication.
C. EAP
____ is the most commonly used transport protocol, and so it is most typically encapsulated in a remote access protocol for transport over a WAN.
D. IAS
A ____ enables clients to run services and software applications on Windows Server 2008 instead of at the client, which means nearly any type of operating system can access Windows Server 2008.
D. Terminal Server
A ____ is a system that has no CPU and that accesses a mainframe computer to perform all program execution and processing on the mainframe.
B. Thin Client
____ client software runs on Windows 2000, Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008 to enable the client to run the Windows graphical user interface, which looks like a regular 32-bit version of Windows.
B. Terminal Server
____ is a new feature that enables a client to run an application
without loading a remote desktop on the client computer.
D. RemoteApp
____ provides a secure way to use Terminal Services over the
Internet, which is vital for security conscious organizations.
B. TS Gateway
____ enables authentication to take place before the Terminal
Services connection is established, which thwarts would-be attackers.
A. Network Level Authentication
Terminal Services client computers can log on using the ____
client.
B. Remote Desktop Connection
Through ____, one resource can be made to appear as many separate resources.
B. virtualization
____ allows the running of multiple workstation operating systems, such as Windows XP, Windows 7, and Linux, on one computer.
C. Workstation or PC virtualization
____ allows the running of single applications in their own
virtual machine environments.
D. Application virtualization
____ can be purchased from Microsoft and has tools to help in porting virtual machines as well as to manage a large number of virtual machines, tune server utilization, manage virtual disks, and set up Windows PowerShell scripts.
C. VMM
The ____ is available as a free download and can be used to make an image of a server and set up that image on a new virtual machine.
B. Virtual server migration toolkit
Two native tools that are automatically available in Hyper-V
Manager when you install Hyper-V are the ____ tools.
D. Import and export
Hyper-V is a role that you install through either the _____ window or Server Manager.
C. Initial Configuration Tasks
The ____ server role enables you to set up a software environment from which to create multiple virtual machines.
A. Hyper-V
You can shut down a virtual machine while in Hyper-V Manager by pressing ____.
D. CTRL+ALT+LEFT ARROW
The key combination CTRL+ALT+LEFT ARROW is called the “____.”
A. mouse release key
In the Connection Window, the ____ menu provides options to exit (close) the connection window and to change settings, such as hardware settings.
D. File
In the Connection Window, the ____ menu includes options such as press the equivalent of CTRL+ALT+DEL and turn off the virtual machine.
D. Action
In the Connection Window, the ____ menu enables you to connect a DVD drive or diskette drive to the virtual machine.
A. Media
In the Connection Window, the ____ menu is used to type clipboard text or capture a screen.
D. Clipboard
In the Connection Window, the ____ menu is used to toggle between the full screen mode and the window mode and to enable the toolbar.
A. View
In the Connection Window, the ____ menu is used to view
documentation for Hyper-V.
D. Help
For each virtual machine in Hyper-V, you can configure one of
three virtual networking options using Hyper-V Manager’s ____.
B. Virtual Network Manager
A(n) ____ binds the network to a NIC in the virtual server, which in effect makes the NIC act like a virtual switch.
B. external virtual network
The option in the Hyper-V Manager, Enable virtual LAN
identification for ____ can be configured to assign a virtual LAN identification number to distinguish that network from others.
C. parent partition
The ____ option in Hyper-V Manager to is used to configure
hardware.
C. Settings
The ____ role is intended for organizations that use customized
software built from Microsoft application development and Web products.
B. application server
A ____ is a library of commonly used applications and application programming interfaces (APIs) that can be reused by programmers in the larger applications that they write.
B. class library
____ relates to how much one module in a program must rely on another.
A. Coupling
The ____ is a specialized language for creating windows, pages, and other visual features.
D. Extensible Application Markup Language
ASP.NET, which is a free download from Microsoft, provides a Web development environment that is built on ____.
B. CLR
____ consists of standards for building software from individual
objects or components.
C. Component Object Model
Net.TCP Port ____ permits several network applications to share incoming communications via one TCP port.
A. Sharing
In TCP, a(n) ____ is like a virtual circuit between two
communicating applications.
B. port
Ports are typically closed via ____.
A. firewalls
____ enables IIS applications that are built using WCF to use IIS features that do not require message-derived activation via HTTP, such as process recycling and rapid fail protection.
D. WAS
A ____ process is an ASP.NET process that runs on its own without using the same memory as IIS.
B. worker
____ is the ability for applications to use messaging and message queuing services between applications.
B. MSMQ
In an application pool, ____ mode means that application requests are processed in an environment that integrates ASP.NET and IIS.
D. integrated
In an application pool, ____ mode means that handling of worker processes is not integrated between ASP.NET and IIS.
D. classic
____ enables a client to run an application from a server on the
client as though the application is actually installed on that client.
B. Microsoft Application Virtualization Configuration
____ is used on the client without loading the remote desktop normally required for Terminal Services.
B. TS RemoteApp
____ protocol is the protocol Microsoft uses for sharing files and folders on a network.
A. Server Message Block
____ is a package of services you can obtain from Microsoft that enables Windows Server 2008 to obtain the latest Microsoft product updates.
B. Windows Server Update Services
The Microsoft System Center Configuration Manager ____ capability provides you with the ability to collect data about how software is used, such as the number of deployed copies, number of licenses needed, if the software is in use, and when the software is used.
A. software metering
The Microsoft System Center Configuration Manager ____ capability is used to determine the level of application compliance on client computers.