Final Quizes
Final Quizes
Final Quizes
A) DHCP
B) TCP/IP
C) DNS
D) IP
Feedback: In a Windows Server 2008 network, the primary means of identifying network devices and services is through
the use of DNS.
Correct Answer(s): C
2. The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called __________.
A) name resolution
B) address controlling
C) address resolution
D) name controlling
Feedback: The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called name
resolution.
Correct Answer(s): A
3. Which of the following is not a top-level domain name?
A) .aero
B) .coop
C) .museum
D) .corp
Feedback: The available generic top-level domain names include .aero, .biz, .com, .coop, .edu, .gov, .info, .int, .mil,
.museum, .name, .net, .org, and .pro.
Correct Answer(s): D
4. The routing service included with Windows Server 2008 is better suited for __________.
A) a smaller network
B) a larger network
C) a mid-size network
B) subnetting
C) DNS security
D) name resolution
Feedback: IP security through the use of IPSec is an integral part of IPv6, whereas it was an optional feature under IPv4.
Correct Answer(s): A
6. The DHCP relay agent listens for which messages that are broadcast from the client?
A) DHCPDISCOVER
B) DHCPREQUEST
C) DHCPINFORM
A) DNS
C) DHCP
D) VPN Routing
Feedback: The Routing and Remote Access service provides the ability to use a Windows Server 2008 computer as a
router, which passes network traffic from one TCP/IP network to another, as well as for remote access capabilities using
either dial-up or VPN technology.
Correct Answer(s): B
8. Which of the following is not a function of DHCP?
A) DNS namespace
B) DNS zones
A) TRUE
B) FALSE
Correct Answer(s): A
11. DHCP cannot dynamically allocate an IP address from a pool of addresses and then reclaim it when it is no longer
needed.
A) TRUE
B) FALSE
Correct Answer(s): B
12. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet.
A) TRUE
B) FALSE
Correct Answer(s): A
1. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items
except for which of the following?
A) routing method
B) subnet mask
C) default gateway
D) DNS/WINS servers
Feedback: Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration
items, including an IPv4 or IPv6 address, subnet mask, default gateway, and WINS/DNS servers.
Correct Answer(s): A
2. If a system will be a DHCP server, what type of address should you set?
A) automatic private IP address
B) fixed IP address
C) static IP address
A) striped volume
B) simple volume
C) spanned volume
D) mirrored volume
Feedback: A simple volume consists of free space contained on a single physical disk. You can configure all of the
available space on a disk as a simple volume, or you can configure multiple simple volumes using the space on a single
disk.
Correct Answer(s): B
5. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?
A) MBR
B) NTFS
C) FAT
D) GPT
Feedback: The GPT partition style is recommended for disks larger than 2TB or for disks that are used in Itanium
computers.
Correct Answer(s): D
6. A Server Core installation includes which of the following programs?
A) Windows Explorer
B) Outlook Express
C) Windows Notepad
D) Start menu
Feedback: A Server Core computer will allow you to launch the Windows Registry Editor, Notepad, and a number of
Control Panel applets. However, it does not include a Start menu and does not allow you to install or run any of the MMC
consoles, such as Computer Management or Active Directory Users and Computer.
Correct Answer(s): C
7. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?
A) WINS Server
D) Wireless Networking
Feedback: The Windows Server Backup feature allows recovery of operating system state, files, folders, and application
data by periodically creating a snapshot of the full server or selected volumes.
Correct Answer(s): C
9. You can manage disks and partitions in Windows Server 2008 by using which tool?
A) Windows Console
B) Start menu
C) command-line utilities
A) TRUE
B) FALSE
Correct Answer(s): A
1. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run
excluding which option?
A) subnet mask
B) default gateway
C) workstation settings
D) IP address
Feedback: BOOTP, which is still in use today, enables a TCP/IP workstation to retrieve settings for all of the
configuration parameters it needs to run including an IP address, a subnet mask, a default gateway, and Domain Name
System (DNS) server addresses.
Correct Answer(s): C
2. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?
A) IP host configuration
D) de-centralized administration
Feedback: DHCP provides four key benefits to those managing and maintaining a TCP/IP network: IP host configuration,
dynamic host configuration, flexibility and scalability, and centralized administration.
Correct Answer(s): D
3. What computer provides DHCP configuration information to multiple clients?
A) DHCP client
B) DHCP server
C) DHCP lease
D) DHCP discover
Feedback: A DHCP server is a computer that provides DHCP configuration information to multiple clients.
Correct Answer(s): B
4. Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest
values for the network address and lease duration?
A) DHCPDECLINE
B) DHCPREQUEST
C) DHCPOFFER
D) DHCPDISCOVER
Feedback: A DHCPDISCOVER message is sent by clients via broadcast to locate a DHCP server. Per RFC 2131, the
DHCPDISCOVER message may include options that suggest values for the network address and lease duration.
Correct Answer(s): D
5. The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP
server that utilizes four messages. Which of the following is not a message that is used?
A) DHCPDISCOVER
B) DHCPOFFER
C) DHCPRELEASE
D) DHCPACK
Feedback: A DHCPRELEASE message is sent by a DHCP client to a DHCP server to relinquish an IP address and
cancel the remaining lease. This message type is sent to the server that provided the lease.
Correct Answer(s): C
6. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will
broadcast __________.
A) DHCPACK
B) DHCPOFFER
C) DHCPNACK
D) DHCPINFORM
Feedback: A DHCPOFFER message is sent by one or more DHCP servers to a DHCP client in response to
DHCPDISCOVER, along with offered configuration parameters.
Correct Answer(s): B
7. The broadcast DHCPREQUEST message contains all of the following information except __________.
C) a list of requested parameters (subnet mask, router, DNS server list, domain name, vendor-specific information,
WINS server list, NetBIOS node type, NetBIOS scope)
C) TCP/IP settings for the adapter are changed, and DHCP remains enabled after these changes.
A) contiguous
C) both A and B
A) server options
B) scope options
C) class options
D) client options
Feedback: Scope options apply to all clients within a scope and are the most frequently used set of options. Scope options
override server options.
Correct Answer(s): B
12. Which of the following is not a database function used to manage the DHCP database?
A) compact
B) reconciliation
C) connect
D) restore
Feedback: Your network is constantly changing. New servers are added, and existing servers are changing roles or are
removed from the network altogether. Therefore, you must both monitor and manage the DHCP service to ensure that it is
meeting the needs of the organization. Specifically, you must manage the DHCP database by performing the following
database functions: backup and restore, reconciliation, compacting the database, and removing the database.
Correct Answer(s): C
13. What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP
scope from the registry?
A) You must restore the DHCP server registry keys, or they must remain intact from previous service operations on
the server computer.
A) 265.265.265.265
B) 225.225.225.225
C) 255.255.255.255
D) 205.205.205.205
Feedback: The client broadcasts a DHCPDISCOVER message to find a DHCP server. Because the client does not
already have an IP address or know the IP address of the DHCP server, the DHCPDISCOVER message is sent as a local
area broadcast, with 0.0.0.0 as the source address and 255.255.255.255 as the destination address. The DHCPDISCOVER
message is a request for the location of a DHCP server and IP addressing information.
Correct Answer(s): C
15. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an
available address pool within the scope.
A) TRUE
B) FALSE
Correct Answer(s): A
1. Which of the following is not considered a top-level domain?
A) .nato
B) .int
C) .coop
D) .com
Feedback: The generic top-level domain names include .aero, .biz, .com, .coop, .edu, .gov, .info, .int, .il, .museum, .name,
.net, .org, and .pro.
Correct Answer(s): A
2. Which of the following is not a forward or reverse lookup zone type?
A) primary
B) secondary
C) integrated
D) stub
Feedback: DNS zones are classified by where they are stored, whether they are writable, and by what information they
receive and return. Each forward lookup zone can be a primary zone, a secondary zone, or a stub zone.
Correct Answer(s): C
3. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?
D) stub zone
Feedback: A standard primary zone hosts a read/write copy of the DNS zone in which resource records are created and
managed. Only one server can host and load the master copy of the zone; no additional primary servers for the zone are
permitted, and only the server hosting the primary zone is allowed to accept dynamic updates and process zone changes.
Correct Answer(s): A
4. Which zone enables a host to determine another host’s name based on its IP address?
D) stub zone
Feedback: Most queries sent to a DNS server are forward queries; that is, they request an IP address based on a DNS
name. DNS also provides a reverse lookup process that enables a host to determine another host’s name based on its IP
address. This is a reverse lookup zone.
Correct Answer(s): C
5. Where are zone transfers initiated?
A) primary server
B) secondary server
C) stub server
D) master server
Feedback: Zone transfers are always initiated at the secondary server for a zone and sent to the server’s configured
master server, which acts as its source for the zone.
Correct Answer(s): B
6. DNS zone file resource records are represented as __________.
A) binary packets
C) form packets
D) text entries
Feedback: Resource records are represented in binary form in packets when queries and responses are made using DNS.
In DNS zone files, however, resource records are represented as text entries.
Correct Answer(s): D
7. Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client
caches this resource record before it is discarded?
A) Owner
B) Class
C) TTL
A) 3 seconds
B) 5 seconds
C) 7 seconds
D) 15 seconds
Feedback: By default, DNS servers use timings for retry intervals and time-out intervals. This includes a recursion time-
out interval of 15 seconds. This is the length of time that the DNS service waits before failing a recursive lookup that has
been retried.
Correct Answer(s): D
9. You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries
except __________.
A) iterative
B) simple
C) recursive
A) TRUE
B) FALSE
Correct Answer(s): A
11. The primary DNS server for a zone is not required to perform an incremental zone transfer.
A) TRUE
B) FALSE
Correct Answer(s): A
12. Scavenging is enabled by default.
A) TRUE
B) FALSE
Correct Answer(s): B
1. For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic
pattern (such as arranged consecutively in a straight line)?
A) 5
B) 7
C) 10
D) 12
Feedback: A static-routed IP environment is best suited to small, single-path, static IP internetworks. By definition,
static-routed networks do not use routing protocols, such as RIP or OSPF, to communicate routing information between
routers. For best results, the internetwork should be limited to fewer than 10 subnets with an easily predicted traffic
pattern (such as arranged consecutively in a straight line). Of course, a static-routed IP environment is appropriate only as
long as the routes in the environment remain the same.
Correct Answer(s): C
2. How can you view the IP routing table?
B) command prompt
C) both A & B
A) first
B) second
C) third
D) fourth
Feedback: The third column indicates the gateway value for each routing table entry. When a particular route or table
entry is applied to a packet, the gateway value determines the next address or hop to which the packet should be sent.
Correct Answer(s): C
4. Which option enables internal clients to connect to the Internet using a single, external IP address?
A) remote access
D) custom configuration
Feedback: The RRAS service also allows you to configure a Windows Server 2008 computer to act as a Network
Address Translation (NAT) device, which allows internal network clients to connect to the Internet using a single shared
IP address.
Correct Answer(s): B
5. What type of connectivity creates a secure point-to-point connection across either a private network or a public
network, such as the Internet?
A) remote access
B) dial-up networking
D) custom configuration
Feedback: VPN connectivity creates a secure point-to-point connection across either a private network or a public
network, such as the Internet.
Correct Answer(s): C
6. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?
A) basic encryption
B) strong encryption
C) strongest encryption
D) no encryption
Feedback: Basic encryption is used for dial-up and PPTP-based VPN connections, and MPPE is used with a 40-bit key.
For L2TP/IPSec VPN connections, 56-bit DES encryption is used.
Correct Answer(s): A
7. Which mutual authentication method offers encryption of both authentication data and connection data?
A) EAP.TLS
B) MS-CHAPv2
C) MS-CHAPv1
A) TRUE
B) FALSE
Correct Answer(s): A
11. A hub examines the destination and source address of an incoming data frame and forwards the frame to the
appropriate destination port according to the destination address.
A) TRUE
B) FALSE
Correct Answer(s): B
12. A static-routed IP environment is best suited to small, single-path, static IP internetworks.
A) TRUE
B) FALSE
Correct Answer(s): A
1. The File Services role and other storage-related features included with Windows Server 2008 provide tools that enable
system administrators to address many problems on a scale appropriate to a large enterprise network. However, before
you implement the role or begin using these tools, what should you spend some time thinking about?
A) how quickly you can recover from the failure of a hard drive, a server, or an entire facility
B) your users’ needs and how these needs affect their file storage and sharing practices
A) 1
B) 2
C) 3
D) 4
Feedback: A primary partition can be marked as an active partition. You can have only one active partition per hard disk.
The system BIOS looks to the active partition for the boot files it uses to start the operating system.
Correct Answer(s): A
3. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large
volume?
A) simple
B) spanned
C) striped
D) RAID-5
Feedback: A spanned volume is essentially a method for combining the space from multiple dynamic disks into a single
large volume. Windows Server 2008 writes to the spanned volume by filling all of the space on the first disk and then
proceeds to fill each of the additional disks in turn.
Correct Answer(s): B
4. What volume type consists of space on three or more physical disks, all of which must be dynamic disks?
A) simple
B) spanned
C) striped
D) RAID-5
Feedback: A RAID-5 volume consists of space on three or more physical disks, all of which must be dynamic disks. The
system stripes data and parity information across all of the disks so that if one physical disk fails, the missing data can be
recreated using the parity information on the other disks.
Correct Answer(s): D
5. Generally speaking, a well-designed sharing strategy provides each user with all of the following resources except
__________ storage space.
A) public
B) virtual
C) private
D) shared
Feedback: Generally speaking, a well-designed sharing strategy provides each user with three resources: a private storage
space, such as a home folder, to which the user has exclusive access; a public storage space, where each user can store
files that they want colleagues to be able to access; and access to a shared work space for communal and collaborative
documents.
Correct Answer(s): B
6. What file system provides the most granular user access control and also provides other advanced storage features,
including file encryption and compression?
A) NTFS
B) FAT
C) LTP
D) SWAP
Feedback: NTFS not only provides the most granular user access control, it also provides other advanced storage
features, including file encryption and compression.
Correct Answer(s): A
7. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions
control access to folders over a network?
A) share permissions
B) NTFS permissions
C) registry permissions
B) NTFS
C) both A & B
D) registry
Feedback: For network users to be able to access a shared folder on an NTFS drive, you must grant them both share
permissions and NTFS permissions.
Correct Answer(s): C
9. By default, what topology do replication groups use?
A) hub/spoke
B) full mesh
C) partial mesh
D) mesh/spoke
Feedback: The larger the DFS deployment, the more complicated the replication process becomes. By default, replication
groups use a full mesh topology, which means that every member in a group replicates with every other member. For
relatively small DFS deployments, this is a satisfactory solution, but on larger installations, the full mesh topology can
generate a huge amount of network traffic.
Correct Answer(s): B
10. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two
technologies: DFS Namespaces and __________.
A) DFS Remediation
B) DFS Replication
C) DNS Replication
D) DFS Topology
Feedback: The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two
technologies: DFS Namespaces and DFS Replication.
Correct Answer(s): B
11. A period of planning and design is unnecessary before you start implementation of a file server deployment.
A) TRUE
B) FALSE
Correct Answer(s): B
12. You can mark an existing dynamic disk as an active partition.
A) TRUE
B) FALSE
Correct Answer(s): B
1. Printing in Microsoft Windows typically involves all of the following components except a __________.
A) print device
B) print router
C) printer
D) printer driver
Feedback: Printing in Microsoft Windows typically involves the following four components: the print device, printer,
print server, and printer driver.
Correct Answer(s): B
2. What computer (or standalone device) receives print jobs from clients and sends them to print devices that are either
locally attached or connected to the network?
A) print device
B) print server
C) printer
D) printer driver
Feedback: A print server is a computer (or standalone device) that receives print jobs from clients and sends them to print
devices that are either locally attached or connected to the network.
Correct Answer(s): B
3. What standardized, highly portable print job format is the default format used by the Windows 2000, Windows XP, and
Windows Server 2003 print subsystems?
C) PCL 6
D) PCL 5e
Feedback: Enhanced Metafile (EMF) is a standardized, highly portable print job format that is the default format used by
the Windows 2000, Windows XP, and Windows Server 2003 print subsystems.
Correct Answer(s): B
4. Compared with NTFS permissions, printer permissions are __________.
A) harder to use
B) simpler
C) more complex
D) more granular
Feedback: Printer permissions are much simpler than NTFS permissions. They basically dictate whether users are
allowed to merely use the printer, manage documents submitted to the printer, or manage the properties of the printer
itself.
Correct Answer(s): B
5. Which document management menu command causes the print server to stop sending jobs to the print device until you
resume it by selecting the same menu item again?
A) Internet Printing
B) LPD Service
C) Print Server
D) Printer Pool
Feedback: Print Server is the only role service that is required when you add the Print Services role.
Correct Answer(s): C
8. Which of the following is not an option with the Print Services Management Console?
A) Installing a printer
B) Access the print queues and Properties sheets for all of the network printers in the enterprise
A) networked printers
B) local machine
C) networked computers
D) terminal services
Feedback: By default, the Print Management console displays only the local machine in its list of print servers.
Correct Answer(s): B
11. What is one of the major problems for printing administrators on large enterprise networks?
A) TRUE
B) FALSE
Correct Answer(s): B
1. Which of the following is not a tool that can help you proactively troubleshoot network problems?
A) Reliability and Performance Monitor
B) Performance console
D) Network Monitor
Feedback: A proactive approach to network management is preventative and makes use of tools such as the Performance
and Reliability Monitor, the Event Viewer, and Network Monitor utilities.
Correct Answer(s): B
2. Which of the following is the default view of the Reliability and Performance Monitor?
A) Performance Monitor
B) Reliability Monitor
C) Resource
D) Network
Feedback: Resource view is the default view of the Reliability and Performance Monitor. This view provides a quick
overview of the four major performance components of a Windows server: CPU, Disk, Network, and Memory.
Correct Answer(s): C
3. The Reliability and Performance Monitor is a tool located within the Administrative Tools folder that combines
features that had previously been spread across a number of tools. Which of the following is not a feature?
B) Performance Monitor
D) System Monitor
Feedback: The Reliability and Performance Monitor is a tool located within the Administrative Tools folder that
combines features that had previously been spread across a number of tools: Performance Logs and Alerts, Server
Performance Advisor, and System Monitor. The Reliability and Performance Monitor in Windows Server 2008 allows
you to collect real-time information on your local computer or from a specific computer to which you have permissions.
Correct Answer(s): B
4. Which log should be the first place you look when you suspect a problem with Active Directory?
A) Event Viewer
B) Directory Service
C) Service Monitor
D) Event Monitor
Feedback: The Directory Service log is created when Active Directory is installed. It logs informational events such as
service start and stop messages, errors, and warnings. This log should be the first place you look when you suspect a
problem with Active Directory.
Correct Answer(s): B
5. Which log records events associated with server installation, adding and removing server roles, installing applications,
and so forth?
A) Setup
B) System
C) Forwarded events
D) Security
Feedback: The Setup Log is new to Windows Server 2008 and records events associated with server installation, adding
and removing server roles, installing applications, and so forth.
Correct Answer(s): A
6. Updates that can be deployed via WSUS can include all of the following except __________.
A) security fixes
B) critical updates
D) critical drivers
Feedback: Updates that can be deployed via WSUS can include security fixes, critical updates, and critical drivers. These
updates resolve known security vulnerabilities and stability issues in the Windows XP, Windows Vista, Windows Server
2003, and Windows Server 2008 operating systems.
Correct Answer(s): C
7. Which of the following is not a main component of WSUS?
B) Website hosted on an IIS server that services update requests from Automatic Updates clients
A) TRUE
B) FALSE
Correct Answer(s): A
10. Windows Server 2008 includes a built-in network monitor.
A) TRUE
B) FALSE
Correct Answer(s): B
11. If multiple servers run WSUS, the administrator controls which clients access particular servers that run WSUS.
A) TRUE
B) FALSE
Correct Answer(s): A
12. If Automatic Updates is configured to notify the user of updates that are ready to install, it checks to see whether a
user with administrative privileges is logged on to the computer.
A) TRUE
B) FALSE
Correct Answer(s): A
1. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide
security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is sending or receiving data?
A) IPSec
B) checksum
C) TCP
D) UDP
Feedback: To address this, the IPSec suite of protocols was introduced to provide a series of cryptographic algorithms
that can be used to provide security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is
sending or receiving data.
Correct Answer(s): A
2. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as
membership in a particular Active Directory domain?
A) Tunnel
B) Authentication exemption
C) Isolation
D) Server to server
Feedback: The Isolation rule allows you to restrict inbound and outbound connections based on certain sets of criteria,
such as membership in a particular Active Directory domain.
Correct Answer(s): C
3. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
A) Tunnel
B) Authentication exemption
C) Isolation
D) Server to server
Feedback: The Authentication exemption rule allows you to specify one or more computers that do not need to be
authenticated to pass traffic; for example, defining a DHCP server that should not have an Isolation connection security
rule apply to it.
Correct Answer(s): B
4. Before secure data is sent, what must occur to determine the type of traffic to be secured and how it will be secured?
A) netsh
B) ipsec
C) static
D) dynamic
Feedback: To set the Netsh IPSec context, type netsh at the command prompt, and then press Enter. Key ipsec, and press
Enter. From here, you can enter the word static at the Netsh IPSec prompt. Static mode allows you to create, modify, and
assign policies without affecting the active IPSec policy.
Correct Answer(s): A
6. The command “set config property=ipsecloginterval value=value” can be set to what range of values?
A) 0 7
B) 0, 1
C) 60 – 86,400
D) 0, 1, 2
Feedback: The “set config property=ipsecloginterval value=value” command indicates how frequently in seconds the
IPSec events are sent to the system event log. The range of the value parameter is 60 to 86,400 with a default of 3600.
Correct Answer(s): C
7. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can
only be used in an Active Directory environment?
A) Kerberos v5 protocol
C) preshared key
C) Windows Vista
D) Windows 2000
Feedback: The driving factor behind combining administration of the Windows Firewall with IPSec policies is to
streamline network administration on a Windows Server 2008 computer.
Correct Answer(s): A
9. Which field does the IPSec driver use to match the correct SA with the correct packet?
C) IP Filter field
D) SPI field
Feedback: The IPSec driver uses the SPI field to match the correct SA with the correct packet.
Correct Answer(s): D
10. Each TCP/IP packet protected with IPSec contains a cryptographic checksum in the form of a keyed hash.
A) TRUE
B) FALSE
Correct Answer(s): A
11. Use Tunnel mode when you require packet filtering and end-to-end security.
A) TRUE
B) FALSE
Correct Answer(s): B
12. To identify a specific SA for tracking purposes, a 32-bit number known as the Security Parameters Index (SPI) is
used.
A) TRUE
B) FALSE
Correct Answer(s): A
1. In a PKI, each user/computer possesses a piece of information that is known only to the individual user or computer
that is called a __________.
A) public key
B) private packet
C) private key
A) digital signature
B) digital certificate
D) smart card
Feedback: A digital certificate, sometimes called simply a certificate, is a digital document that contains identifying
information about a particular user, computer, service, and so on. The digital certificate contains the certificate holder’s
name and public key and the digital signature of the Certificate Authority that issued the certificate, as well as the
certificate’s expiration date.
Correct Answer(s): B
3. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
C) NAP Agent
B) VPN enforcement
C) 802.1X enforcement
A) self-enrollment
B) recovery agents
C) autoenrollment
D) Web enrollment
Feedback: Self-enrollment enables users to request their own PKI certificates, typically through a Web browser.
Correct Answer(s): A
9. DHCP is the only NAP enforcement method that can be deployed in a non-Active Directory environment.
A) TRUE
B) FALSE
Correct Answer(s): A
10. If a client cannot provide the necessary health certificate, they will still be able to participate in IPSec-secured traffic.
A) TRUE
B) FALSE
Correct Answer(s): B
11. Windows Server 2008, Windows Vista, and Windows XP with Service Pack 3 all have a built-in NAP client, and
third-party vendors can use the NAP API to write additional clients for additional operating systems, such as Macintosh
and Linux computers.
A) TRUE
B) FALSE
Correct Answer(s): A
12. Depending on the configuration item that is being monitored for compliance, autoremediation may not be possible.
A) TRUE
B) FALSE
Correct Answer(s): A
1. What does the Windows Server Backup feature use to perform file and volume-level backups?
A) file-based
B) index-based
C) security-based
D) user-based
Feedback: Shadow Copies is a file-based fault tolerance mechanism that does not provide protection against disk failures,
but does protect against accidental file deletions that inconvenience users and administrators on a regular basis.
Correct Answer(s): A
3. What is the minimum amount of space you must allocate to store shadow copies?
A) 200MB
B) 250MB
C) 300MB
D) 350MB
Feedback: You must allocate a minimum of 300MB of space to store shadow copies.
Correct Answer(s): C
4. Once you have enabled Shadow Copies of Shared Folders for a particular volume, the default schedule will create a
snapshot twice per day, seven days per week, at what times?
A) 32
B) 64
C) 96
D) 128
Feedback: A maximum of 64 shadow copies can be stored on a particular volume.
Correct Answer(s): B
6. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an
option?
A) Open
B) Duplicate
C) Copy
D) Restore
Feedback: From the Previous Versions tab, you have one of three options for any snapshots listed: Open, Copy, and
Restore.
Correct Answer(s): B
7. NTFS quotas are limited to controlling storage on entire volumes on what basis?
A) per user
B) group
C) network
A) Windows PowerShell
A) magnetic tape
B) dynamic volumes
C) DVD
Feedback: Windows Server Backup supports the use of CD and DVD drives as backup destinations, but does not support
magnetic tapes as backup media. Additionally, you cannot perform backups to dynamic volumes.
Correct Answer(s): A
10. When restoring data in Windows Server 2008, what types of restores can you can choose to perform?
A) files/folders
B) files/volumes
C) folders/volumes
D) files/folders/volumes
Feedback:
When restoring data in Windows Server 2008, you can choose to restore data from either a local or a remote server. You
can choose to perform two types of restores
Files and folders - This restore allows you browse to individual files and folders to restore in situations in which you need
to restore only a limited amount of information.
Volumes - This restore will recover an entire volume. This option cannot be selected from the Windows Server Backup
utility if the selected volume contains operating system components.
Correct Answer(s): D
11. When users accidentally overwrite or delete files, they can access the shadow copies to restore earlier versions.
A) TRUE
B) FALSE
Correct Answer(s): A
12. When the storage limit of your Shadow Copies of Shared Folders is reached, older versions of shadow copies will be
deleted without any means of restoring them.
A) TRUE
B) FALSE
Correct Answer(s): A