____ is the most basic server version on which the other versions are based.
B. Windows Server 2008 Standard Edition
Windows Server 2008 Enterprise Edition supports clusters of up to ____ computers.
B. 16
Windows Server 2008 Enterprise Edition has ____, which enables memory to resynchronize after transient memory problems so there is no interruption to current computing
activities.
D. fault tolerant memory sync
____ means that a processor can be added to an empty processor slot while the system is running.
C. Hot-add processor
The design of an Itanium processor enables it to be scaled up to ____ processors.
A. 512
____ is a database of computers, users, groups of users, shared printers, shared folders, and other network resources.
A. Active Directory
____ are files that contain commands to be run by a computer operating system.
B. Scripts
____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers.
C. Windows Server Core
____ is a command-line interface that offers a shell, a customized environment for executing commands and scripts.
A. Windows PowerShell
The ____ addition to Windows Server 2008 provides the ability to run two or more operating systems on a single computer.
B. Hyper-V
A ____ is a computer program or portion of a program that is currently running.
C. process
A(n) ____ is a communications system enabling computer users to share computer equipment, application software, and data, voice, and video transmissions.
B. network
A ____ is a network of computers in relatively close proximity,
such as on the same floor or in the same building.
D. local area network
A ____ is a transmission in which one packet is sent from a server to each client that requests a file or application, such as a video presentation.
A. multicast
A(n) ____ is used for two purposes: to show the class of
addressing used and to divide a network to control network traffic.
C. subnet mask
____ involves assigning a dotted decimal address that becomes each workstation’s permanent, unique IP address.
B. Static addressing
The ____ is the IP address of the router that has a connection to other networks.
A. default gateway
Every NIC has a physical address, or ____ address.
D. MAC
Every computer running Windows Server 2008 has a(n) ____ cache that can include the recently resolved MAC addresses as well as statically assigned values.
D. ARP
The ____ command shows you the MAC addresses along with the corresponding IP addresses that the local computer currently has in its ARP cache.
B. arp -a
The most up-to-date listing of compatible hardware (and software) is the Windows Server Catalog of ____.
A. Tested Products
____ is a process in which a hard disk section or a complete hard disk is prepared for use by an operating system.
D. Creating a partition
When you format a disk, this process divides the disk into small
sections called tracks and ____ for the storage of files by a particular file system.
C. sectors
NTFS follows the ____ standard, which includes case-sensitive
filenames and the use of multiple filenames.
C. POSIX.1
____ by a file system means that it tracks changes to files and keeps a record of these changes in a separate log file.
D. Journaling
Prior to Windows Server 2008, a damaged disk area meant that you had to take down the server and then bring it back up offline to users to run the ____ utility that rebuilt the data in the damaged area.
D. chkdsk
____ is an interim version of Windows Server 2003 developed as a way to offer a newer server version while waiting for Windows Server 2008.
C. R2
One ____ is a license for one workstation to access the server.
A. CAL
When installing Windows Server 2008, you can specify a domain or workgroup on the ____ window that is displayed when the computer reboots after the actual installation process is completed.
C. Initial Configuration Tasks
A ____ is a set of unique identification information that is
typically put at the end of a file, or that is associated with a computer communication.
C. digital certificate
The ____ role is central to implementing Active Directory and
creating one or more domains.
B. Active Directory Domain Services
____ enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers.
C. DFS
____ are directories on one or more computers that users on other computers can access through the network.
B. Shared directories
____ is a TCP/IP application protocol that transfers files in bulk data streams and is commonly used on the Internet.
A. FTP
____ is a protocol in the TCP/IP suite of protocols that is used
to transport document and other data transmissions over networks and the Internet for access by Web browsers.
C. HTTP
The ____ role is designed to enable the installation of Windows operating systems—Windows Vista, Windows 7, and Windows Server 2008—on multiple computers.
A. WDS
In the Initial Configuration Tasks window, you use the ____
section to set the time zone, configure networking, and provide computer name and domain or workgroup information.
B. Provide Computer Information
To install the Active Directory Lightweight Directory Services
role, enter: ____.
C. start /w ocsetup DirectoryServices-ADAM-ServerCore
In Windows Server Core at the command line, enter ____ to view a listing of commands.
C. help
____ are designed to correct things such as security issues as well as problems affecting stability, performance, or the operation of features included with the operating system.
A. Service packs
The ____ role focuses on sharing files from the server or using
the server to coordinate and simplify file sharing through Distributed File System (DFS).
B. File Services
In the ____ role, the Windows Server 2008 server can be used to manage network printing services and it can offer one or more network printers connected to the network through the server itself.
A. Print Services
You can use the ____ command-line tool for managing server roles.
B. ServerManagerCmd.exe
ServerManagerCmd.exe can be used to run the parameters in a(n) ____ on a group of servers to save configuration time and ensure that the servers are configured the same way.
A. XML answer file
ServerManagerCmd.exe is executed from the command line through the ____ window.
B. Command Prompt
The ability to automatically detect and configure newly installed
hardware devices, such as a disk or tape drive is called ____.
C. Plug and Play
When a driver is verified, a unique digital signature is
incorporated into it in a process called ____.
A. driver signing
Windows Server 2008 offers the ____ to scan system files for integrity.
A. System File Checker
After a Sigverif scan is complete, the results are written to a
log file, called ____.
C. sigverif.txt
____ is disk storage used to expand the capacity of the physical RAM installed in the computer.
A. Virtual memory
____ are defined by the operating system and apply to any user
logged onto the computer.
C. User environment variables
____ can be defined on a per-user basis, such as specifying the
path where application files are stored.
D. User environment variables
____ is used for multimedia transmissions, such as a combined
voice and video transmission to provide user training to multiple people.
A. Reliable Multicast Protocol
A ____ is a data parameter associated with a software or hardware characteristic under a key (or subkey).
D. Registry entry
A ____, also called a subtree, is a primary or highest level
category of data contained in the Registry.
C. root key
The ____ root key contains profile information for each user who has logged onto the computer.
B. HKEY_USERS
____ holds information about the monitor type, keyboard, mouse, and other hardware characteristics for the current profile.
A. HKEY_CURRENT_CONFIG
The ____ tool is automatically installed when you install Windows Server 2008 and provides an interactive interface for analyzing and configuring security on a server.
B. Security Configuration Wizard
____ examines the roles a server plays and then tries to adjust
security to match these roles.
A. SCW
The ____ command enables you to configure and modify security settings, as well as convert them to Active Directory Group Policy Objects and to apply them to multiple servers.