Windows Server 98-365 Review Questions

  1. The ______ is a system of interlinked hypertext documents known as web pages that are browsed with a web browser.
    World Wide Web
  2. The predominant markup language for web pages is ______.
    Hypertext Markup Language
  3. Microsoft's web server is known as _____.
    Internet Information Server
  4. In IIS, a _____ is a directory used in a web site that corresponds to a physical directory elsewhere on the server, on another server, or on a web site.
    Virtual Directory
  5. HTTPS uses port ______.
    443
  6. _______ is the most widely used digital certificate.
    X.509
  7. Microsoft's newest virtual machine technology is ______.
    Hyper-V
  8. A _____ is a point in time image of a virtual machine that you can return to.
    Snapshot
  9. You typically use _____ to remotely connect and manage a server, which allows you to run programs directly on the desktop.
    Remote Desktop
  10. _______ is a special mode of Remote Desktop Services that allows you to run an application in its own window.
    RemoteApp
  11. T/F When typing in a URL that does not specify a directory, your browser will always return a 404 error.
    True
  12. T/F If you are using Basic Authentication, you should use digital certificates to encrypt.
    True
  13. T/F To copy a digital certificate that includes the public and private key pair, use CSR.
    True
  14. T/F Today, PTTP is the recommended VPN tunneling protocol.
    False
  15. T/F The .vhd file holds the virtual machine configuration information.
    True
  16. To print to a printer, you need the ________ Permission.
    Print
  17. The NTFS special permission that allows you to move through a folder to reach lower files or folders is ________.
    Traverse Folder
  18. The Windows component that allows you to manage shares and NTFS permission is ________.
    Windows Explorer
  19. Permissions that flow from a parent object to a child object are called ________.
    Inherited Permission
  20. The ________ are the actual permissions when a user logs in and accesses a file folder.
    Effective Permission
  21. The encryption technology included in NTFS is ________.
    EFS
  22. For Windows Server 2008 to be on the network you must enable ________.
    Network Discovery
  23. A(n) ________ share is not seen when browsed.
    Administrative
  24. When someone has removed all users from a folder you can ________ of the folder.
    Take Ownership
  25. The default location of the spool folder is ________?
    c:\Windows\System32\Spool\Printers
  26. T/F If full control is assigned to a parent object for a user, the Full Coontrol permission will overwrite explicitat a child object.
    True
  27. T/F To see who accesses a file over time, you only have to turn on object access audit events.
    False
  28. T/F When you are looking at NTFS permissions that are grayed out, it means that you don't have the permission needed to modify the NTFS permissions.
    False
  29. T/F You can encrypt and compress a file within NTFS at the same time.
    False
  30. T/F When calculating the NTFS and share permissions, you would apply the more restrictive permissions between the share permission.
    True
  31. The file that is used to resolve hostnames to IP addresses is ________.
    Hosts
  32. The resource record used in DNS to resolve IP addresses to hosts names is ________.
    PIR
  33. The ________ Automatically assigns IP addresses and other IP configuration to a host.
    DHCP
  34. ________ is a popular directory service with objects in a logical hierarchical manner.
    LDAP
  35. The ________ are roles that provide certian functions that can only be handled by one domain controller.
    FSMO
  36. A(n) ________ is used to organize the objects within a domain.
    OU
  37. Printers, Users, and computers are examples of ________ found in Active Directory.
    Objects
  38. The local security database found on a member server is known as the ________.
    SAM
  39. A collection or list of users is known as ________.
    Groups
  40. The ________ built-in group as used to create, delete, and modify user accounts and groups.
    Account operators
  41. T/F A collection is two or more trees.
    True
  42. T/F A site and domain controllers are the physical aspects of the network.
    True
  43. T/F A member server is running Active Directory domain services.
    False
  44. T/F Higher domain and forest functional level will enhance the functionality of Active Directory.
    True
  45. T/F Active Directory is closely tied to DNS.
    True
  46. The ________ is the first 512-byte boot sector of a partitioned data storage device such as a hard disk.
    MBR (Master Boot Record)
  47. The ________ is a simple text file that defines which opertaing system to load on Windows XP and Windows Server 2003 systems.
    BOOT.INI
  48. The ________ starts Windows with a minimal set of driver and server.
    Safe Mode
  49. The ________ tool can be used to easily disable individual startup programs.
    System Configuration
  50. In Windows, virtual memory uses a ________ file.
    Paging (Page File)
  51. ________ is the combining of network cards to provide fault tolerance.
    Teaming
  52. A ________ is a group of computers that work together as one virtual computer to provide fault tolerance or increased performance.
    Cluster
  53. The most common failover cluster is the ________ cluster in which only one server is active at a time.
    Active-Passive
  54. In a cluster, an individual computer is known as a ________.
    Node
  55. A ________ is an electrical device to provide temporary power during power outages.
    Uninterruptible Power Supply (UPS)
  56. T/F The best method for data recovery is backup.
    True
  57. T/F Shadow copise are only available under older file systems.
    False
  58. T/F To view Windows log, use the Log Viewer application.
    False
  59. T/F 99.9999 availability means that a system can be down for 4.32 minutes a year.
    False
  60. T/F Clusters nodes will protect against faulty power supplies, faulty processors, and faulty RAM.
    True
Author
RaptureRome
ID
337487
Card Set
Windows Server 98-365 Review Questions
Description
Review questions for 98-365
Updated