Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
2.The Security tab in Active Directory Permissions appears automatically in the Properties sheet.
3.For enterprise networks with remote locations, it might be preferable to run a separate WSUS server at each site.
4.WSUS 3.0 SP1 is supplied with the Windows Server 2008 operating system.
6.Which window presents a consolidated view of the post-installation tasks that, in previous Windows Server versions, you had to perform using various interfaces presented during and after the OS setup process?
8.The Events page in Server Manager Events displays a subset of the computer’s System log containing all events related to the role for __________ hours
9.Which of the following is not a primary management tool for Active Directory?
16.Experience features are typically strictly cosmetic, and enabling them can degrade the client’s performance and increase its network bandwidth consumption. Which of the following features is the exception to this?
21.How many snap-ins are integrated into the Server Manager console?
22.Which of the following Microsoft Management Console panes lists the snap-ins installed in the console?
23.Which of the following is the default mode when you create a new MMC console?
24.A single WSUS server can support as many as __________ clients.
25.How many users can connect to a Windows Server 2008 computer at the same time using Remote Desktop without purchasing additional licenses?
32.Which of the following does not have to be installed to run Windows Server Update Services 3.0 SP1?
34.Which of the following Windows Server Update Services architectures are being used less often because of the increasing use of Background Intelligent Transfer Service (BITS) peer-caching?
35.__________ is the practice by which administrators grant other users a subset of the privileges that they themselves possess.
37.The Active Directory __________ is the code that specifies what types of objects can exist in the Active Directory hierarchy.
39.You cannot add an extension snap-in to a console without adding an appropriate __________ snap-in first.
40.Resources and Support displays a list of __________ tasks and suggestions.
51.To manage permissions for an Active Directory object, you can open the object’s Properties sheet or use the __________.
52.The Windows Vista feature that enables computers on the same network to share updates is called __________.
53.The Terminal Services client included with Windows Server 2008 is called __________.
56.What MMC console provides a selection of the most commonly used Windows Server 2008 management tools?
58.When working with standard permissions, which permissions enable a security principal to view and modify the properties of the specified object and all of its subordinate objects?
60.Which program downloads updates from the Microsoft Update Website and stores them for administrative evaluation?
2.Which of the following is a feature unique to enterprise CAs?
3.Which of the following tasks can you not perform on a
4.Which of the follwing CA types requires administrators to manually issue certificates?
5.Which of the following certificate enrollment methods can a client use to request a certificate from either an enterprise or a standalone CA?
6.Which of the following protocols negotiates the authentication method used by a client and a server while establishing a Remote Access connection?
8.You are reviewing enrollment methods and have determined that you will implement three methods for certificate enrollment: Web-based enrollment, the Certificate Enrollment Wizard in the Certificates console, and autoenrollment. Which of the following criteria must you meet if you want a client to use the Certificates console to enroll certificates? (Choose all that apply.)
10.The __________ authentication protocol stores user passwords in clear text.
13.__________ encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol.
14.__________ is a shell protocol that provides a framework for the use of various types of authentication mechanisms.
16.A(n) __________ CA can use Active Directory, but does not require it.
17.The first CA you create in your PKI must be a __________ CA.
18.The default authentication protocol used by Remote Access on a Windows Server 2008 computer is __________.
19.To issue your own certificates, you must install a __________.
31.Specifies the type and length of the public key associated with the certificate.
32.Specifies the location of the certificate revocation list, a document maintained and published by a CA that lists certificates that have been revoked.o.CRL distribution points
33.Specifies the algorithm that the CA used to calculate the certificate’s digital signature.c.Signature algorightm
35.When using a PKI, it is imperative that CAs publish a CRL. What is it? What does it do? What three occurences might lead to its use?
1.Events in component logs are non-administrative, meaning that they are not indicative of problems or errors.
5.The bandwidth of network connections limits the amount of traffic reaching the server through its network interfaces.
7.The Summary of Administrative Events displays the total number of events recorded in all of the following time increments except for the last __________.
8.Which of the following logs contains events received from other computers on the network via subscriptions?
9.Which of the following logs is the primary Windows Server 2008 operational log?
13.Which of the following is not an available view in Performance Monitor?
21.Which type of log contains events targeted at end-users or administrators that indicate a problem and offer a possible solution?
26.The primary function of the Windows Eventing engine is to record information about system activities as they occur and package that information in individual units called __________.
27.When you expand the Microsoft and Windows folders in the Applications and Services Logs folder, you see a long list of Windows components. Each of these components has a pathway, called a(n) __________, to its own separate log.
29.A(n) __________ is simply a set of readings, captured under normal operating conditions, that you can save and compare with readings taken at a later time.
32.The Server: Bytes Total/Sec counter specifies the total number of bytes sent and received by the server over all of its network interfaces. This value should be no more than __________ percent of the total bandwidth capacity of the network interfaces in the server.
34.An inadequate amount of __________ in a server can prevent the computer from caching frequently used data aggressively enough, causing processes to rely on disk reads more than memory reads and slowing down the entire system.
36.What is the operating system component that generates Windows logs?
37.Which log contains events received from other computers on the network via subscriptions?
39.Which snap-in enables you to view system information on a continuous, real-time basis?
41.What new addition to Windows Server 2008 automatically tracks events that can have a negative effect on system stability and uses them to calculate a stability index?
42.Which agent collects data from event logs every hour and updates the Reliability Monitor display every 24 hours?
44.What can administrators do by examining the logs?
ANSWER:They can track the activity of the software, document errors, and extract analytical information.
ANSWER:Component logs are intended for use in troubleshooting long-term problems and for software developers seeking debugging information.
ANSWER:It can help you to determine ways to improve the performance of a computer.
ANSWER:A bottleneck could occur from an increased server load, hardware failure, or changed server roles.
48.What is the importance of a baseline?
ANSWER:By comparing the baseline readings to the server’s current readings at regular intervals, you can discern trends that might eventually affect the computer’s performance.
ANSWER:You should use Page Faults/Sec, Memory: Pages/Sec, Memory: Available Mbytes, Memory: Committed Bytes, and Memory: Pool Non-paged Bytes.
50. In what ways does Windows Server 2008 enhance the auditing capabilities of previous Windows versions?
ANSWER:When auditing Active Directory changes, the system can now log both the old and the new values so that you have a record of the previous values before changes were made. Windows Server 2008 also adds subcategories to the global categories.
Sign up for free and study better.
Get started today!