With network-attached print devices, the primary deployment decision that the administrator must make is to decide which computer will function as the print server.
You can mark an existing dynamic disk as active.
Shadow Copies is a file-based fault tolerance mechanism that provides protection against disk failures.
In a pure failover cluster, you can have two instances of an application accessing the same data at the same time. T/F
You can implement Shadow Copies only for an entire volume; you cannot select specific shares, folders, or files. T/F
NTFS - Administrators typically use NTFS permissions to assign privileges on a Windows Server 2008 file server.
Which permissions do administrators typically use to assign storage space as well as modify permissions on a Windows Server 2008 file server?
prevent users from storing unauthorized file types on the server
The most common use of a file screen is to __________.
A replication group can have up to 256 members
A replication group can have up to __________ members.
Each server can be a member of up to __________ replication groups.
the user credentials under which FSRM operates
A collection of settings in a quota template defines all of the following except __________.
print device - A print device is the actual hardware that produces hard-copy documents on paper or other print media.
What hardware actually produces hard-copy documents on paper or other print media?
printer - In Windows, a printer is the software interface through which a computer communicates with a print device.
A computer communicates with a print device through which software interface?
In the default Windows Server 2008 printer-sharing configuration, each client uses its own printer and printer driver.
Which of the following is the default Windows Server 2008 printer-sharing configuration?
Which Print Services role installs the Print Management console for Microsoft Management Console (MMC) that enables administrators to deploy, monitor, and manage printers throughout the enterprise?
To install the Internet Printing role service, you must install the Web (IIS) role as well as the Windows Process Activation Service feature.
You must also install the __________ when installing the Internet Printing role service.
To use a Windows Server 2008 computer as a fax server, you must add the Fax Server role using the Server Manager console.
You must add the __________ role to use a Windows Server 2008 computer as a fax server.
The maximum NTFS file size is 244 bytes (16 terabytes) minus 64 kilobytes.
What is the maximum NTFS file size in Windows Server 2008?
By default, the paging file on a Windows Server 2008 computer is 1.5 times the amount of memory installed in the computer.
By default, the paging file on a Windows Server 2008 computer is __________ time(s) the amount of memory installed in the computer.
Shadow copies can utilize up to 10 percent of a volume by default.
Shadow copies can utilize up to __________ percent of a volume by default.
For a server, 10,000 rpm should be considered the minimum acceptable speed; many higher-end server drives run at 15,000 rpm,
Which of the following options should be considered the minimum acceptable rotational speed for a server?
The newer serial ATA (SATA) standard increases the maximum transmission speed to 300 MB/sec
The newer serial ATA (SATA) standard increases the maximum transmission speed to __________ MB/sec.
Block I/O access is preferable for applications that use large data files, such as databases and email stores.
For applications that use large data files, such as databases and email stores, which access is preferable?
Transmission speeds for Fibre Channel networks range from 133 Mbps to 1 Gbps for copper cables and up to 10 Gbps for fiber optic
What is the maximum transmission speed for fiber optic?
An iSCSI initiator is a hardware or software device running on a computer that accesses the storage devices on the SAN.
Which of the following is a hardware or software device running on a computer that accesses the storage devices on the SAN?
One way of protecting workstation applications and ensuring their continued availability is to run them using Terminal Services.
To protect workstation applications and ensure their continued availability, what feature should be used to run them?
What is the term for the ability of entire servers to be redundant so that if anything goes wrong with one computer, another one can take its place almost immediately?
The recommended hardware environment for a failover cluster calls for duplicate servers, shared storage, and redundant network connections.
Which of the following is part of the recommended hardware environment for a failover cluster?
In the DNS round robin technique, you create multiple resource records using the same name, with a different server IP address in each record.
Which technique creates multiple resource records using the same name, with a different server IP address in each record?
Which RAID level provides the largest percentage of usable disk space?
Fingerprint matching is the oldest of the biometric technologies and is still the most popular.
Which of the following is the most popular biometric technology in use today?
Social engineering is a term used to describe the process of circumventing security barriers by persuading authorized users to provide passwords
What process circumvents security barriers by persuading authorized users to provide passwords or other sensitive information?
A firewall is essentially a series of filters that examines the contents of packets and the traffic patterns to and from the network
Which of the following is essentially a series of filters that examine the contents of packets and traffic patterns to and from the network to determine which packets they should allow to pass through the filter?
The three network profiles that are supported by Windows Server 2008 are domain, public, and private.
Which network profile is not supported by Windows Server 2008?
The firewall is turned off.
Which of the following is not a default configuration of Windows Firewall?
A strong password is one that a user can easily remember but which is also too complex for a stranger to guess.
Which of the following is an example of a strong password?
The default maximum password age is 42 days.
Which of the following is the default maximum password age?
The KDC also stores a cryptographic key known only to the security principal and the KDC.
What is known as the cryptographic key that is used in exchanges between the security principal and the KDC?
In Kerberos Policy Settings, the default value for Maximum Lifetime for User Ticket is 10 hours.
In the Kerberos Policy Settings, what is the default value for Maximum Lifetime for User Ticket?
An ACL is a collection of individual permissions in the form of accesscontrol entries (ACEs).
An ACL is a collection of individual permissions presented in what form?
An individual’s hand geometry is not unique like fingerprints are, so this technique cannot be used for identification, only for verification.
Which of the following biometric authentication mechanisms is suitable for verification but not identification?
Want to see the other 40 Flashcards in Quiz 2?JOIN TODAY FOR FREE!