Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
____ is a process that blocks a group of tracks and sectors to be used by a particular file system, such as NTFS.
____ is a process that creates a table containing file and folder information for a specific file system in a partition.
Disk ____ is the ability to spread data over multiple disks or volumes.
Disk ____ is the practice of creating a mirror image of all data on an original disk, so that the data is fully copied or mirrored to a backup disk.
A(n) ____ partition is one from which you can boot an operating system, such as Windows Server 2008.
The ____ partition is the partition where your computer will look for the hardware-specific files to start the operating system.
A(n) ____ partition is created from space that is not yet partitioned.
A ____ volume is a portion of a disk or an entire disk that is set up as a dynamic disk.
The process of ____ locates fragmented folders and files and moves them to a location on the physical disk so they are in contiguous order.
Disk mirroring involves creating a shadow copy of data on a backup disk and is RAID ____.
A RAID-5 volume requires a minimum of ____ disk drives.
A ____ is a grouping of storage devices that forms a subnet.
____ is used to enable management of disk volumes in SANs through one interface at a server.
____ provides a means to establish multiple paths between a server and its disk storage.
The ____ DNS resource record spreads the load of DNS lookup requests among multiple DNS servers as a way to provide faster resolution for clients and better network response.
Microsoft DNS is also called ____.
DNS forwarding can be set up so that if the DNS server that receives the forwarded request cannot resolve the name, then the server that originally forwarded the request attempts to resolve it. This is called ____ forwarding.
When DNS forwarding is set so that only the DNS server receiving the request attempts resolution (and not the server that forwarded the request), this is called ____ forwarding.
In exclusive forwarding, the DNS server that initially forwards the request is called a ____ DNS server.
____ automatically registers network clients that use NetBIOS and builds a database that other network clients can query in order to locate a computer.
____ enables a Windows Server 2008 server with DHCP services to detect the presence of a new workstation and assign an IP address to that workstation.
Windows Server 2008 and Windows Vista both enable a network to use ____ for networks that are working to implement IPv6.
The official standard for DHCPv6 is defined in Request for Comment ____.
____ autoconfiguration means that the computer or network device using IPv6 contacts a DHCP server for a leased address.
In ____ autoconfiguration, the computer or network device assigns its own IPv6 address, which is constructed from the MAC address of its NIC combined with the subnet designation obtained from communication with a router.
Microsoft ____ is software included with Windows Server 2008 that enables you to offer a complete Web site.
____ networking, which has been around since before the Internet, means using a telecommunications line and a modem (or other telephony device) to dial into a network or specific computers on a network.
____ uses PPP authentication techniques and create special tunnels over a public network, such as the Internet, that reflect intranets and VPNs.
____ was developed by IBM and the National Security Agency in cooperation with the National Bureau of Standards (now called the National Institute of Standards and Technology) as an encryption technique using a secret key between the communicating stations.
____ encapsulates the data packet in the Hypertext Transfer Protocol (HTTP) used through Web communications.
The ____ technology is a dedicated leased telephone line that can be used for data communications over multiple channels for speeds of up to 400.352 Mbps.
A(n) ____ is a digital communications device that links a computer (or sometimes a router) to a DSL telecommunications line.
A(n) ____, popularly called a digital modem, links a computer or a fax to an ISDN line.
A(n) ____ connection combines or aggregates two or more communications channels so they appear as one large channel.
____ helps ensure that the amount of bandwidth increases to the maximum needed for the aggregated channels and reciprocally contracts as the need becomes less.
____ is used to establish and maintain security for RAS, Internet, and VPN dial-in access, and can be employed with RADIUS.
Microsoft offers ____ for organizations that want a Windows Server 2008 server, but with a much smaller attack surface.
____ is a comprehensive set of security features that monitors and manages a server and its clients.
____ policies are security measures set up in a group policy that applies to all accounts or to all accounts in a container, such as a domain, when Active Directory is installed.
____ can provide security for all TCP/IP-based application and communications protocols, including FTP and HTTP, which are used in Internet transmissions.
____ are security rights developed by Microsoft to provide security for documents, spreadsheets, e-mail, and other types of files created by applications.
RSoP ____ mode generates a report based on the current policies in place and provides the resulting policy settings.
____ can query the existing policies that are in place and then provide reports and the results of policy changes.
When used to protect a hard drive, ____ verifies that the computer to which the hard drive is connected has authority to access that hard drive.
____ encrypts the entire drive, including the operating system, programs, and data files.
To determine compliance, NAP uses a server that is a ____.
With NAP, all network clients must contact the HRA server and submit information about their security policy status and recent upgrades—called a(n) ____.
The ____ Windows Server 2008 service keeps a listing of computers and domain resources to be accessed.
The ____ Windows Server 2008 service enables clients to obtain leased IP addresses.
The ____ Windows Server 2008 service replicates the Active Directory elements on multiple DCs (when Active Directory is installed).
The ____ Windows Server 2008 service enables Kerberos authentication and the server as a center from which to issue Kerberos security keys and tickets.
Windows Server 2008 includes the ____ tool that can be used to monitor applications and processes running on a server.
You can use Task Manager to view applications running on the server by pressing ____ while logged on as Administrator or as a member of the Administrators group.
The ____ tab of the Task Manager lists the processes in use by all running applications.
The ____ process implements logon and security policies that is vital to the server.
The ____ process enables the Task Scheduler to run tasks when scheduled, such as backing up the system at a certain time.
The ____ tab in Task Manager shows the services that are started, stopped, or paused.
The ____ tab in Task Manager enables you to monitor network performance on all NICs installed in the server.
The ____ tab of the Task Manager provides a list of the users currently logged on.
A(n) ____ exists when there are different elements to monitor, such as individual processes when you use the Process object, or when a process contains multiple threads or runs subprocesses under it for the Thread object.
The ____ counter measures the average number of times per second that the CPU is interrupted by devices requesting immediate processing.
The ____ counter for the System object measures the number of execution threads waiting for access to a CPU.
A ____ is a collection of diagnostic and performance information in the form of a report or log.
With the ____ advanced boot option, the system boots using the minimum configuration of devices and drivers, and has network connectivity.
The ____ boot option is used to create a record of devices and drivers that started, so you can check a log for points of failure.
With the ____ boot option, the system boots using the last configuration before any changes to the configuration were made and implemented in the Registry.
If you have Active Directory installed and suspect that it is damaged, or that the SYSVOL shared volumes are corrupted, use the ____ to restore damaged files and folders.
When you set up Active Directory, a domain controller is automatically set up with the ____ shared folder, which contains scripts, group policy objects (GPOs), and software distribution files.
In Windows Server 2003, you can install the ____ to access the command line in situations in which the server would not boot.
When you create a ____ backup using the Windows Server Backup tool, this creates a backup of the data and program files and the system state data.
The ____ Tool is another tool available from the Repair your computer option on the Windows Server 2008 installation DVD. This tool is used to test the RAM in your computer.
The ____ command manages folder and file attributes.
The ____ command lists the contents of a directory (folder).
The ____ command is used to uncompress a file.
The ____ command is used to show a file’s contents one screen at a time.
Windows Server 2008 event logs are divided into three general categories: Windows logs, applications and services logs, and ____ logs.
You can poll the presence of another TCP/IP computer from the Windows Server 2008 or Windows Vista Command Prompt window by typing ____ and the IP address or computer name of the other computer.
Sign up for free and study better.
Get started today!