The ______ is a system of interlinked hypertext documents known as web pages that are browsed with a web browser.
World Wide Web
The predominant markup language for web pages is ______.
Hypertext Markup Language
Microsoft's web server is known as _____.
Internet Information Server
In IIS, a _____ is a directory used in a web site that corresponds to a physical directory elsewhere on the server, on another server, or on a web site.
Virtual Directory
HTTPS uses port ______.
443
_______ is the most widely used digital certificate.
X.509
Microsoft's newest virtual machine technology is ______.
Hyper-V
A _____ is a point in time image of a virtual machine that you can return to.
Snapshot
You typically use _____ to remotely connect and manage a server, which allows you to run programs directly on the desktop.
Remote Desktop
_______ is a special mode of Remote Desktop Services that allows you to run an application in its own window.
RemoteApp
T/F When typing in a URL that does not specify a directory, your browser will always return a 404 error.
True
T/F If you are using Basic Authentication, you should use digital certificates to encrypt.
True
T/F To copy a digital certificate that includes the public and private key pair, use CSR.
True
T/F Today, PTTP is the recommended VPN tunneling protocol.
False
T/F The .vhd file holds the virtual machine configuration information.
True
To print to a printer, you need the ________ Permission.
Print
The NTFS special permission that allows you to move through a folder to reach lower files or folders is ________.
Traverse Folder
The Windows component that allows you to manage shares and NTFS permission is ________.
Windows Explorer
Permissions that flow from a parent object to a child object are called ________.
Inherited Permission
The ________ are the actual permissions when a user logs in and accesses a file folder.
Effective Permission
The encryption technology included in NTFS is ________.
EFS
For Windows Server 2008 to be on the network you must enable ________.
Network Discovery
A(n) ________ share is not seen when browsed.
Administrative
When someone has removed all users from a folder you can ________ of the folder.
Take Ownership
The default location of the spool folder is ________?
c:\Windows\System32\Spool\Printers
T/F If full control is assigned to a parent object for a user, the Full Coontrol permission will overwrite explicitat a child object.
True
T/F To see who accesses a file over time, you only have to turn on object access audit events.
False
T/F When you are looking at NTFS permissions that are grayed out, it means that you don't have the permission needed to modify the NTFS permissions.
False
T/F You can encrypt and compress a file within NTFS at the same time.
False
T/F When calculating the NTFS and share permissions, you would apply the more restrictive permissions between the share permission.
True
The file that is used to resolve hostnames to IP addresses is ________.
Hosts
The resource record used in DNS to resolve IP addresses to hosts names is ________.
PIR
The ________ Automatically assigns IP addresses and other IP configuration to a host.
DHCP
________ is a popular directory service with objects in a logical hierarchical manner.
LDAP
The ________ are roles that provide certian functions that can only be handled by one domain controller.
FSMO
A(n) ________ is used to organize the objects within a domain.
OU
Printers, Users, and computers are examples of ________ found in Active Directory.
Objects
The local security database found on a member server is known as the ________.
SAM
A collection or list of users is known as ________.
Groups
The ________ built-in group as used to create, delete, and modify user accounts and groups.
Account operators
T/F A collection is two or more trees.
True
T/F A site and domain controllers are the physical aspects of the network.
True
T/F A member server is running Active Directory domain services.
False
T/F Higher domain and forest functional level will enhance the functionality of Active Directory.
True
T/F Active Directory is closely tied to DNS.
True
The ________ is the first 512-byte boot sector of a partitioned data storage device such as a hard disk.
MBR (Master Boot Record)
The ________ is a simple text file that defines which opertaing system to load on Windows XP and Windows Server 2003 systems.
BOOT.INI
The ________ starts Windows with a minimal set of driver and server.
Safe Mode
The ________ tool can be used to easily disable individual startup programs.
System Configuration
In Windows, virtual memory uses a ________ file.
Paging (Page File)
________ is the combining of network cards to provide fault tolerance.
Teaming
A ________ is a group of computers that work together as one virtual computer to provide fault tolerance or increased performance.
Cluster
The most common failover cluster is the ________ cluster in which only one server is active at a time.
Active-Passive
In a cluster, an individual computer is known as a ________.
Node
A ________ is an electrical device to provide temporary power during power outages.
Uninterruptible Power Supply (UPS)
T/F The best method for data recovery is backup.
True
T/F Shadow copise are only available under older file systems.
False
T/F To view Windows log, use the Log Viewer application.
False
T/F 99.9999 availability means that a system can be down for 4.32 minutes a year.
False
T/F Clusters nodes will protect against faulty power supplies, faulty processors, and faulty RAM.