Top-Rated Free Essay
Preview

This: Windows Server

Satisfactory Essays
7254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
This: Windows Server
CHAPTER 2

1. Your colleague is trying to upgrade from Windows Server 2003, Datacenter Edition to
Windows Server 2008 Standard Edition, but the Setup program won’t allow the upgrade.
Which of the following is the problem?
a. Active Directory is set up on the network, but needs to be configured to identify this computer as running Windows Server 2008 Standard Edition.M
b. The Datacenter Edition had only a three-year license, and it has expired.
C. Windows Server 2003, Datacenter Edition cannot be upgraded to Windows Server
2008 Standard Edition.
d. The DNS server on the network must first be reconfigured to recognize Windows
Server 2008.
2. Your IT director heard about a fast but inexpensive new computer and purchased it to be the new Windows Server 2008 server on the network. When you attempt to install Windows
Server 2008, the operating system won’t install because there seems to be a problem with the
BIOS in the new computer. How might this dilemma have been avoided?
a. The new computer should have been purchased with no BIOS, which is a requirement of Windows Server 2008.
b. The new computer is too fast for Windows Server 2008 and should have been purchased with a CPU restrictor option.
c. The IT director should have first had a system programmer make changes to the BIOS.
D. The IT director should have checked to see if the computer hardware and BIOS were certified for Windows Server 2008.

3. You have installed Windows Server 2008, but when the computer reboots you only see a command-line screen. However, you intended to implement a full version of the operating system with the normal Windows GUI. What has happened?
a. For Windows Server 2008, you need a 1399 cable for the display monitor.
b. You have installed Web Edition, which only has a command-line interface.
c. The Windows Setup program did not properly identify the type of display monitor.
D. During the installation, you selected to install Server Core instead of the full installation.

4. Which of the following are roles that can be implemented in Windows Server 2008?
(Choose all that apply.)
a. Active Directory Printer Spooling Services
B. Application Server
C. Fax Server
D. Terminal Services

5. You have installed Windows Deployment Services, but the installation does not properly work. Which of the following might be the problem? (Choose all that apply.)
a. No DHCP server is present on the network.
B. Active Directory is not installed on a network server.
c. Windows Deployment Services only works with IPv6, but your network is configured for IPv4.
d. No File Services server is present on the network.

6. Before you install Windows Server 2008, the company’s management team has expressed a concern about the Marketing Department using too much disk space on the server, because they don’t regularly delete old files. What feature(s) of NTFS in Windows Server 2008 can be used to help address this concern? (Choose all that apply.)
a. indexing
b. compression
c. journaling
D. disk quotas

7. The maximum length for a Windows Server 2008 computer name is ______63_________.

8. The Active Directory Federation Services server role is used to manage security tokens and security services for a Web-based network.

9. Your company plans to purchase and implement 21 new servers in the next few months and then add 10 more over the next year. You want to make a case for using Windows
Deployment Services. Which of the following do you mention as you make the case?
(Choose all that apply.)
a. lowers installation costs
b. enables consistent deployment and configuration
c. requires the purchase of only one server license, even after the servers are installed
d. enables the servers to be administered together through the help of scripts

10. You have installed Windows Server 2008, but during the installation no screen was provided on which to enter the name of the server computer. What tools enable you to name the server? (Choose all that apply.)
a. Initial Configuration Tasks window
b. Role Manager tool
c. naming command in the Command Prompt window
d. Network Install window

11. When you configure a server to be a member of a domain, at the time of configuration the server checks the network to verify ______Authentication_________.

12. Which of the following must you do shortly after installing Windows Server 2008 to keep the server functions enabled?
a. Activate Windows Server 2008.
b. Install the Server Control role.
c. Click Start and click License Verification.
d. Reenter the Product Key code when you register with Active Directory.

13. The client-side unattended file is needed for an unattended installation via Windows Deployment
Services.

14. The latest service pack has some patches that you need for Windows Server 2008 security.
Your assistant says the only way to get a service pack is to order a CD from Microsoft. Is there a faster way to obtain the service pack? (Choose all that apply.)
a. Purchase it on tape at an office supply retailer.
b. Use Windows Update.
c. Check Microsoft’s Web site for a download of the service pack.
d. Connect the computer to the Internet, insert the Windows Server 2008 installation
DVD, and on the first screen, click Obtain service pack.

15. You are installing Windows Server 2008, but the Setup program does not find any hard disk drives on the computer. What step or steps are best to take initially? (Choose all that apply.)
a. Abort the installation and immediately turn the computer back into the vendor even though the hard drives are already installed.
b. Stop the installation and then restart it pressing F11 on the first installation window.
c. Press F6 when the installation displays storage device information and provide a driver for the hard disks.
d. Reseat the disk adapters/controllers.

16. The target client computer which is to install an operating system via Windows Deployment
Services should be PXE enabled.
17. Your assistant is about to install the latest service pack for Windows Server 2008 on a production server. What is your advice before he starts? (Choose all that apply.)
a. Put the server in fast mode to make the process go faster.
b. Back up the server before starting.
c. Use Server Manager to turn on Service Pack Enable.
d. First take down the server and reboot it into Update Environment.

18. When you install Windows Server 2008, you enter a password and confirm it for the
_______administrator________ account.

19. You are going to perform a Windows Server 2008 installation early in the morning before a meeting and decide to make yourself a checklist of things to do immediately before you start. Which of the following are on your checklist? (Choose all that apply.)
a. Disconnect any flash drives.
b. Have on hand drivers for new peripherals in the computer.
c. Use the test software disc that came with the computer to verify key hardware elements, such as the CPU.
d. Ensure that all necessary hardware, such as the NIC, is preinstalled.

20. The server you are installing is to be used for the Distributed File System. Which role should be installed on the server?
a. File Services
b. UDDI
c. Active Directory Lightweight Directory Services
d. DHCP

CHAPTER 3

1. You have installed Windows Server 2008 and had to provide a new driver file for the disk drives in your computer. Now it seems like the disk drives are not responding as quickly as advertised. What can you do?
a. Check the disk controllers for a switch you can set for faster disk rotation.
b. Ensure that the DMA transfer mode is configured for the drives.
c. Allocate more RAM for disk transfers.
d. Use the Control Panel Disk applet to double the disk transfer speed.

2. Each time that you access files on a disk, the monitor blinks or goes blank for several seconds. What might be the source of the problem and possible solution?
a. The disk and monitor are connected to the same controller, and you should use Control
Panel to configure a hardware link bridge.
b. This is called a ‘‘RAM pause’’ and you need to use Control Panel to allocate more
RAM specifically for the data bus inside the computer.
c. There is not enough RAM allocated for RAM disk reads, and you need to use Server
Manager to reallocate the RAM.
d. There is an IRQ conflict, and you need to use Device Manager to resolve the problem.

3. You have just used the servermanagercmd command to install two server roles. Which of the following commands can you use now to verify that the roles are installed?
a. servermanagercmd -query
b. roles -d
c. servermanagercmd /r:display
d. role /v
4. You want to confirm how space is allocated on the disk drives installed in your server.
Which of the following tools enables you to do this?
a. Disk Services
b. Storage Monitor
c. Server Manager
d. WMI Control

5. Which of the following can be installed using the Add Hardware Wizard? (Choose all that apply.) a. CD/DVD drive
b. keyboard
c. monitor
d. disk drive

6. You’ve obtained a new driver from the Internet for your server’s NIC. What tool enables you to install the driver?
a. Device Manager
b. SCSI Updater
c. Driver icon in Control Panel
d. Task Manager

7. You have noticed lately that your server is running very slowly, especially when switching between programs. You see that the C: partition is running low on space, limiting the size of your paging file. You have a second partition, D:, that has 100 GB of free space. How can you move the paging file from partition C: onto partition D:?
a. Use Device Manager to drag the paging file from partition C: to partition D:.
b. Move the Paging directory to partition D: via Device Manager.
c. Configure it from the System window opened through Control Panel.
d. Use the Paging file option in Control Panel and access the Size link in the Paging window. 8. A System environment variable is defined by the operating system and is applied to every user when logged on.

9. Your organization has consolidated servers through virtualization and now needs to remove the Windows Deployment Services server role from one of its servers. Which of the following tools enable you to remove a server role? (Choose all that apply.)
a. Control Panel System window
b. Control Panel Server Roles window
c. exclude command-line command
d. ServerManagercmd.exe

10. Driver Signing enables Windows Server 2008 to verify that a device driver is secure.

11. When programs are running in Windows Server 2008, _______________ monitors their use of memory to be sure they do not cause m12. Your server keyboard sometimes hesitates or seems like it is disconnecting from the computer. Which of the following tools enables you to run a quick check on whether the keyboard is working properly?
a. Control Panel Check Components window
b. sysconfig command
c. Device Manager
d. PnP

13. _______________ Protocol is used for combined voice and video transmissions.

14. The purpose of the scwcmd rollback command is to _______________.

15. Your server has a virus with elements of the virus embedded in the Registry. The virus checker has located these elements, but cannot delete them. What tool can you use to delete these virus elements in the Registry?
a. scwcmd
b. regedit
c. sigverif
d. scw

16. You are working in PowerShell and receive a call that users cannot use the print services through the server. What command can you run to quickly determine services that are running or are stopped?
a. core_services
b. get-service
c. scwcmd
d. dir services

17. Which of the following can be accomplished through using the Security Configuration
Wizard? (Choose all that apply.)
a. disable unused services
b. configure firewall rules
c. install a software application using security settings
d. analyze security settings
18. Which of the following are Registry elements? (Choose all that apply.)
a. OUs
b. keys
c. values
d. markers

19. Your server has 4 GB of RAM. What should the initial amount of virtual memory be set to when you manually configure it?
a. 1024 MB
b. 2048 MB
c. 4096 MB
d. 6144 MB
20. Your company is working to save costs by conserving the power consumption of its servers.
Which of the following default power plans should you select for Windows Server 2008 servers? a. high performance
b. miser
c. power saver
d. controlled consumption
CHAPTER 4

1. Your company has four departments:Marketing and Sales,Manufacturing, Product Research, and Business. Which of the following Active Directory container design plans might you use to best manage the user accounts and network access needs of each department?
a. Create four trees.
b. Create four parent domains in one site.
c. Create four OUs in one domain.
d. Create four trees and map them to four domains.

2. Using the example in Question 1, what Active Directory capability can you use to establish different account lockout policies for each of the four departments?
a. fine-grained password policies
b. lightweight group policies
c. password distribution groups
d. shadow password files

3. Your colleague is trying to create a universal security group for the three administrators of the single stand-alone server in his company. The problem is that he can’t find an option to create a universal security group. What is the problem?
a. He must first create the administrators’ personal accounts before it is possible to create a universal group.
b. He needs to put the account creation tool into the Advanced Features mode.
c. He must create a universal distribution group first and then create the universal security group. d. He cannot create a universal security group on a stand-alone server and must instead create a local security group.

4. One of the DCs in your company reports that it has an Active Directory error. You need to fix it as quickly as possible to reduce downtime. Which of the following tools can you use to stop and restart AD DS on that server? (Choose all that apply.)
a. Active Directory Domains and Trusts
b. Server Manager
c. Device Manager
d. Active Directory Users and Computers

5. Which of the following server operating systems can be used when the domains in Windows
Server 2008 Active Directory are set at the Windows Server 2003 domain functional level?
(Choose all that apply.)
a. Windows NT 4.0 Server with 2008 Domain Services installed
b. Windows 2000 Server with Service Pack 4
c. Windows Server 2003
d. Windows Server 2008
6. Domains in a tree are in a transitive trust relationship.
7. You’ve installed the AD DS server role, but find that Active Directory is not fully implemented.
What should you do next?
a. Use Server Manager to create an AD DS partition.
b. Use Server Manager to create an AD DS security database.
c. Run dcpromo.
d. Designate a global AD DS server.

8. A globally unique identifier (GUID) is a unique number associated with each object in AD DS.

9. Your school has a parent object named straton.edu and the child object names stratonalum.org and studentarts.org. What kind of namespace is this?
a. disjointed
b. distributed
c. contiguous
d. coordinated

10. Your company’s management has decided that the accounts in all OUs should be set up and managed by the Information Technology Department’s security specialist. As the AD DS administrator, how can you best give this capability to the security specialist?
a. Give her Full Control rights to AD DS.
b. Make her user account a member of the AD DS Admins local security group.
c. Use the delegate control feature to give her control of all OUs that contain user accounts. d. Give her Accounts Management permissions in AD DS.

11. Name three optional attributes associated with a user account. Office Number
Telephone Number
Web Page

12. Which of the following are actions performed by the global catalog? (Choose all that apply.) a. provides lookup and access to all resources in all domains
b. caches IP addresses for all computers in a forest for faster logon
c. stores shared DFS folders and files for centralized shared file access
d. authenticates users when they log on

13. The business manager in your organization is leaving, but she has been training the new business manager who will take over the day after she leaves. What AD DS capability can you use to transfer the old business manager’s account to the new business manager? Note that in this organization, accounts reflect the actual names of users.
a. Use the delete and re-create user account feature in AD DS on the day the new business manager takes over.
b. The only option is to create a new account and then transfer the old business manager’s files to the new account on the day the new business manager takes over.
c. Use the transfer account option in AD DS on the day the new business manager takes over. d. Disable the old business manager’s account when she leaves work. As soon as the new business manager takes over, rename the account for the new business manager and then enable the account.
14. Your company builds roads and bridges. The home office is located in Ohio. For each construction project, the company establishes a temporary office at the construction site. The project manager for each project takes along a server set up for the AD DS role to connect remotely to the home office. For the sake of security, what should the remote server be?
a. a DC
b. an RODC
c. an AD LDS
d. an ACL

15. Which of the following is true about all trees in a forest? (Choose all that apply.)
a. They all use the same schema.
b. They all use the same OUs.
c. They all use the same global catalog.
d. They all use the same groups.

16. You have set up auditing for modifications to Active Directory. Now you want to monitor the results of the auditing. How do you do this?
a. Set up an audit filter in Device Manager.
b. Use the Windows Messaging Service to create a constant audit display on your monitor. c. Periodically view the security log.
d. View the audit results in the Active Directory Domains and Trusts MMC snap-in.

17. A site reflects interconnected subnets and is used for DC replication.

18. When you create user accounts, you want to set them up so that users do not have access to use their accounts after 7:00 p.m. on workdays and on weekends as a security measure.
From where can you set up these logon restrictions?
a. You set these restrictions up when you create trust relationships.
b. These are the default restrictions already set up in AD DS.
c. You set up these restrictions from the Account tab in the user account properties.
d. These are properties you can set up when you create a global security group.

19. To reset a password, you use the active directory users and computers tool.

20. What is the scope of a domain local security group?
a. the domain in which the group is created
b. the OU in which the group is created
c. the share that the group controls access to
d. A domain local group does not have a scope, instead it has a range of control.

CHAPTER 5

1. Your company writes software for voting machines and needs to ensure that the software and documentation is carefully protected on its servers. Last week, one of the servers was stolen from its machine room, but fortunately that server did not contain sensitive voting machine files. What folder and file security can your company use to protect its information in the future, so that even if a server is stolen its files cannot be accessed?
a. Microsoft Encrypting File System
b. the Verify permission
c. scramble key authentication for folders and files
d. Microsoft Distributed Security

2. A fellow programmer has set up a shared folder of programs he is working on, but the problem is that several users have discovered the folder and have been trying out the programs. What steps can the programmer take to ensure that only he can view and access the folder? (Choose all that apply.)
a. Use permissions to secure the shared folder.
b. Remove all attributes to the shared folder.
c. Place a dollar sign after the name of the shared folder to hide it. d. Create a logon list for the shared folder

53. Your company has salespeople who use laptop computers for travel. When they go out they need to access marketing files stored on the server. What capability enables them to access these files while they are on the road and cannot connect to the network?
a. sync files
b. file refresh
c. Clipboard
d. offline files

4. The water resources group in your organization asked you to create a shared folder to hold research data. Ten people are in the group; two of them cannot access the file but the other eight can. What can you do to easily determine why two people cannot access it?
a. Check every group on the server to determine its members.
b. Re-create the accounts for the two users.
c. Check the effective permissions for that folder.
d. Use the Security Configuration Wizard to create new security.

5. You have configured a folder for sharing, but users do not see the server on the network.
What might be the problem? (Choose all that apply.)
a. You did not configure the sharing as network wide on the Sharing tab.
b. Network discovery is disabled.
c. The Windows Firewall is blocking incoming and outgoing access.
d. Folder reciprocation is not turned on.

6. The administrator can change permissions on a folder.

7. You’ve published a folder in Active Directory and now want to test your work by finding it in Active Directory from Windows Server 2008. What steps do you take?
a. Click Start, click Computer, and click the Search Active Directory button.
b. Click Start, click Network, and click the Search Active Directory button.
c. Click Start, point to All Programs, and click Search Network.
d. Click Start, click Run, type adsearch, and click OK.

8. Use the administrative tools tool to publish a shared folder in Active Directory.

9. Your college uses shared folders to make class information and assignments available to students. The shared folders are currently on three different computers, and finding the right folder can be confusing. What is a possible solution to make the folders easier for students to find and use?
a. Move the servers to specific student lab locations.
b. Use UNC for naming the servers.
c. Create a contiguous sharing space.
d. Set up the shared folders in DFS.

10. The Computer Advisory Committee in your company has been concerned that users store many files on the servers, but aren’t good about deleting old files. This has resulted in less free space on the servers’ disks. What solution do you propose?
a. Only store files on member computers and not DCs.
b. Configure the file space attribute on user folders.
c. Use DFS to allocate limited space for users.
d. Set up disk quotas for user accounts.

11. What are the two DFS models? Stand-alone DFS model Domain-based DFS Model
12. Your company has installed Subsystem for UNIX-based Applications (SUA) on a Windows
Server 2008 server. You have copied over a test program from a UNIX computer and try to run it in the SUA environment, but it won’t run. What might be the cause of the problem?
a. You have to first configure SUA for the program mode.
b. UNIX programs will only run if you link them to .dll files first.
c. UNIX programs only run from the Windows shell.
d. You have to recompile the program source file in the SUA environment.

13. Several of your DFS clients complain that it can take some time to access a DFS shared folder, even though they just recently accessed it. They are expecting faster response. What can you do?
a. Tune the cache duration for the folder.
b. Disable polling.
c. Limit the size of shared folders in DFS.
d. Configure a DFS site link.

14. You have a series of older files that you don’t access often, but you do need them occasionally.
Some of these folders take up large quantities of disk space. What NTFS feature can you use to reduce the disk space they occupy?
a. Use the virtual indexing attribute.
b. Use the compress attribute.
c. Use the zip permission.
d. Use the size control permission.

15. As the server administrator, you currently own a folder but want to transfer ownership to the user who will now manage that folder’s contents. How can ownership be transferred to the user?
a. Transfer ownership to the user.
b. Give the user Modify permissions and then transfer ownership to that user.
c. Give the user Full control permissions and then have the user take ownership.
d. Give the user the special permissions, read extended attributes, and full ownership.

16. Subsystem for UNIX-based Applications is installed as which of the following?
a. a DFS component
b. a role
c. a kernel DLL
d. a feature

17. Your network has Linux, Windows Vista, and Windows Server 2008 computers. Active
Directory is also in use through Windows Server 2008. You are tired of managing accounts and groups for both the Linux computers and the Windows computers. To reduce your account and group management workload, you can _______________.

18. Which of the following can you accomplish using the DFS Management tool? (Choose all that apply.)
a. Create a namespace root.
b. Delegate management over a namespace root.
c. Create a folder in a namespace root.
d. Tune a namespace root.

19. A set of shared folders copied in DFS to one or more servers is called a _______________.
20. You have created a shared folder for the management team at your company. You need to give each member of the team the ability to add files to the shared folder, but also to only change and delete files that the member has placed in the shared folder. Which of the following share permissions should you allow for the members of the management team?
a. Co-owner
b. Reader
c. Contributor d. Co-author CHAPTER 6 1. One of the users on your network has called to report that a shared printer on your
Windows Server 2008 print server is not printing. Which of the following tools can you use to check the status of the printer?
a. Server Manager
b. Print Queue Supervisor
c. Print Management tool
d. Shared Printer tool in Control Panel

2. You have a printer that is primarily used to handle large graphics print files. When you configure the port for this printer, which of the following port timeout settings should you use?
a. 10 seconds
b. 40 seconds
c. 75 seconds d. 120 seconds
3. You own an architectural firm that has two plotters and four laser printers. Your paper costs are very high because people often send print jobs intended for a plotter to a laser printer and vice versa. These errors typically result in page after page of printing with strange characters, wasting money and time. What can you do to address this problem?
a. Use smaller spooling files.
b. Configure the printers to hold mismatched documents.
c. Configure printers to print spooled documents after nonspooled documents.
d. Enable the advanced printing features in the properties of all of the printers.

4. You have set up a shared printer for UNIX and Linux clients, but when you test the setup the printer produces strings of control codes or simply hangs up. Which of the following might be the problem?
a. The data type is set to NT EMF and should be RAW.
b. You have not set up a GDI client processor for the print queue.
c. The data configuration is set to ASCII instead of to binary.
d. The port setup is using port 80, which is for HTTP-based printing instead of UNIX and
Linux printing.

5. Your company’s programmers use one shared printer to print out lines of program code for analysis. They complain that often when they retrieve a printout, ending pages from the last printout or the beginning pages of the next printout are mixed in. This is because many of the printed pages appear very similar at first glance and it’s hard to know where one printout ends and the next begins. What do you propose as a solution?
a. Set up the grayscale colors in the printer’s properties so that one printout is printed lighter and the next is printed darker, the next lighter, and so on.
b. Configure a different spooler for each programmer to use.
c. Configure the printer properties to use a separator page.
d. Use a different print processor for each programmer.

6. You can install the print server, internet printing, and LPD services when installing the Print Services role.

7. Which of the following can you accomplish from the Printers window, which is opened through Control Panel? (Choose all that apply.)
a. Install a printer.
b. View what is printing on a printer.
c. Access the printer’s properties.
d. Determine how fast pages are printing on a printer.

8. You can publish a shared printer in Active Directory by accessing the printer’s properties and using the Sharing tab.

9. You are configuring a serial printer on a COM port. Which of the following can you configure by using the Configure Port button? (Choose all that apply.)
a. port timeout
b. port speed
c. flow control d. port cable type
10. Your associate has configured five shared printers so that print files are sent directly to the printer and printing is done in the foreground. However, when the printers are busy this slows down the CPU on the server managing the print jobs. What should be done to address this problem?
a. Deactivate one of the printers because a Windows Server 2008 print server is only intended to manage four printers maximum.
b. In the printers’ properties, configure printing to cycle CPU use.
c. Configure the printers to use zipped spool files.
d. Configure every printer to spool the print jobs and to print in the background.

11. Briefly explain the purpose of the graphics device interface (GDI). The GDI integrates information about the print file such as word-processing codes for fonts, colors, and embedded graphics objects with information obtained from the printer driver installed at the client for the target printer, in a process that Microsoft calls rendering.

12. You have just set up two shared printers from Windows Server 2008, and you also plan to manage four other network printers from the server. Your plan is to manage all of these printers using the Print Management tool, but the tool does not appear on the Administrative
Tools menu. What is the problem?
a. The Print Management tool is only available as an MMC snap-in and is not listed on the Administrative Tools menu until you save it as a console with a customized name.
b. You must first enable use of the Print Management tool in the default domain policy.
c. You need to install the Print Services role.
d. The Print Management tool is only a command-line tool, and you must start it from the
Command Prompt window using the command prnmnt.

13. Which of the following can you accomplish using the Print Management tool? (Choose all that apply.)
a. Consolidate Windows Server 2008 print servers in one place for management.
b. Find out how many jobs are in the print queue of a printer.
c. Set up to use special forms for printing.
d. Reconfigure printer ports used with printers.

14. You have set up a shared printer on a Windows Server 2008 server. Also, you have given
Mat Chen’s user account Manage documents permission so that Mat can delete the print jobs of any user. However, when Mat tries to delete someone else’s print job, he doesn’t have permission. Mat is a member of two global groups, Supervisors and Marketing. Also, the Supervisors group is a member of the Managers domain local group, and the Marketing group is a member of the Business domain local group. Which of the following might be a problem? a. Global groups cannot be given printer permissions and so they are automatically denied use of printers.
b. The Business domain local group is denied Manage documents permission on that printer.
c. One of the domain local groups to which Mat belongs must be given Print permissions to that printer.
d. The Supervisors global group must also be a member of the Business domain local group.
15. You have purchased a printer that has the capability to print in duplex mode so that users can print on both sides of a sheet of paper. However, when users try to use this capability when they send a print job, documents are still printed on only one side. Which of the following might be the problem?
a. The print timeout is set too low in the printer’s properties Advanced tab, which does not allow enough time for duplexing.
b. No printer driver is installed for the printer, and Windows Server 2008 is using the
Generic Print Mode Driver.
c. The duplex button is not turned to on in the Printers window.
d. The duplex mode needs to be enabled on the Device Settings tab in the printer’s properties.

16. From where can you stop and restart the Print Spooler service? (Choose all that apply.)
a. Computer Management tool
b. Spooler MMC snap-in
c. Properties dialog box for any printer
d. Server Manager

17. A bidirectional printer can engage in two-way communications between the printer and the print server and requires a(n) IEEE 1284 cable.

18. Your committee has created a 290-page report for management and you decide to print one copy initially. You send the copy to the printer and then remember that you might not have made a correction to the footer material that prints at the bottom of each page. You pause the printout to check. After you determine all is OK, you decide to continue printing. Which of the following options should you use from the Document menu on the printer window for that printer to continue from where you left off?
a. Continue
b. Resume
c. Restart
d. Rerun

19. Win Print is a print processor.

20. Your department head is in a hurry to print his report for the managers meeting that starts in 20 minutes, but the printer he uses is currently backed up with 32 print jobs that might take more than 20 minutes to print. You are the print server administrator. How can you help your department head?
a. Delete the 32 print jobs and send a message to users to resubmit them.
b. Pause the printer and then use the Pause option to print a single document by ID number while the other documents are paused.
c. Open that printer’s print window and drag the print job to the top of the print queue.
d. Open that printer’s print window and change the priority of the print job to 99 in that print job’s properties.

Chapter 7 1. You have just installed a new disk on a Windows Server 2008 server. Which of the following do you do first to prepare the disk for use?
a. partition the disk
b. format the disk
c. block release the disk
d. block stripe the disk

2. The boot partition or volume contains the operating system files, such as the files in the \Windows folder.

3. You have just upgraded from Windows Server 2003 to Windows Server 2008. Now you are trying to recover a set of databases that you backed up on DVDs in Windows Server 2003 before you started the upgrade, but the Windows Server Backup tool gives you an error message. What is the problem?
a. You must start the Windows Server Backup tool from the command line using the
/2003 switch.
b. The Windows Server Backup tool only supports recovering Windows Server 2003 files from flash drives or tape backups.
c. The Windows Server Backup tool is not compatible with backups made from the
Windows Server 2003 Backup tool.
d. You must first initialize the DVD in the Windows Server Backup tool before you start the recovery.

4. Your company is considering installing an iSCSI SAN, but one of the department heads mentions that he has heard Windows Server 2008 does not have a management tool for an iSCSI SAN. What is your response?
a. This is true because Windows Server 2008 is only compatible with Fibre Channel.
b. This is true, but you can purchase third-party tools to use an iSCSI SAN with Windows
Server 2008.
c. This is not true because Disk Manager has the NtSCSI.exe plug-in you can download from Microsoft.
d. This is not true because you can install Storage Manager for SANs.

5. You are consulting for a company that has been performing full backups every night for its
Windows Server 2008 servers. A problem they have been experiencing is that the backups are taking longer and longer. What is your recommendation for this company?
a. Perform the full backups in zip mode, which cuts the backup time in half.
b. Use a custom backup that enables you to use a combination of full and incremental backups. c. Use a copy backup, which copies every other folder each time it runs. d. Purchase disk drives with smaller spindles for faster rotation.
6. Dynamic disks support RAID levels _________0______, _________1______, and ________5_______.

7. You are consulting for an organization that has chosen to use disk striping as a way to extend the life of their four hard disks. Now one of the disks has failed and they call you for help. What do you advise them?
a. Take the failed disk offline and let the other three disks rebuild the data from the failed disk automatically.
b. Download the failed disk’s folder header information to the second disk in the series and let it rebuild the data that was on the failed disk.
c. Install a new disk and download the backup cache from the failed disk to restore files to the new disk.
d. Install a new disk and perform a full restore on all four disks.

8. RAID level 5 requires a minimum of ______3_________ hard disks.

9. As the IT director for a large investment company, you are always looking for ways to build in better fault tolerance for your computer systems. As you consider your present hard disk storage situation, you have a large SAN connected to the main network through a highspeed switch. What else can you do to ensure fault tolerance for your SAN?
a. Create additional paths to the SAN, such as through one or more additional switches, and take advantage of Multipath I/O.
b. Use X-on/X-off flow control for protection against viruses at the SAN and on the
Windows Server 2008 servers connecting to the SAN.
c. Create phantom LUNs for the SAN and on Windows Server 2008 so these can be activated if the currently active LUNs are corrupted.
d. Replace the optical interface at the switch with a wireless fault-tolerant interface containing its own battery backup.

10. Which of the following can you restore from the Windows Server Backup tool? (Choose all that apply.)
a. the backup catalog
b. volumes
c. folders
d. the operating system

11. How much free space must you have on a basic disk to convert it to a dynamic disk? At least 1 MB of free space is needed.

12. You have decided to shrink a 250 GB disk to change 130 GB of that disk to unallocated space. However, the shrinking process only results in 98 GB of unallocated space. What would have caused the smaller portion of unallocated space?
a. You cannot shrink more than half of a disk.
b. The shrinking process encountered a full disk cluster and had to stop early.
c. The shrinking process encountered a file that cannot be moved and had to stop early. d. You cannot shrink more than 100 GB on any size disk.
13. You have spent the morning archiving old files to DVDs and then deleting those files as a way to get back some disk space. Also, you’ve recovered some archived financial files to prepare for the auditor’s visit. After you finish, you notice that the server seems to run slower. What should you do?
a. Perform a full backup. Reformat the disk and then perform a recovery from your backup. b. Start the Disk Defragmenter to defrag your disks.
c. Use the Disk Check tool to retrieve contiguous disk space.
d. Use Device Manager to perform a disk verification.

14. Which of the following can you accomplish with the Disk Management tool? (Choose all that apply.)
a. set up LUNs
b. reacquire a SAN after it has been taken offline
c. create a simple volume
d. convert a basic disk to a dynamic disk

15. Your new IT colleague is trying to determine the location of a mounted drive on the server because he is not sure what a mounted drive is. Which of the following do you tell him?
a. A mounted drive is always a DVD mounted in the DVD drive.
b. A mounted drive is located in a folder.
c. Because Windows Server 2008 does not support floppy drives, a mounted drive is always drive A.
d. A mounted drive is always a drive used by UNIX and Linux clients for sharing folders and files on Windows Server 2008 and is designated as drive U.

16. Which of the following must be true to boot from a basic disk in Windows Server 2008?
(Choose all that apply.)
a. It is an active partition.
b. It does not have a disk quota set for users.
c. It is a RAID-0 volume.
d. It is a primary partition.

17. Briefly explain the concept of a spanned volume. Spanned Volume contains 2 to 32 dynamic disks that are treated as one volume.

18. Which of the following is checked by the chkdsk utility? (Choose all that apply.)
a. indexes
b. disk allocation units
c. log markers
d. sectors

19. Explain disk duplexing. In disk duplexing the information on a main disk is shadowed or mirrored on a second disk. If the main disk fails, the mirrored disk is used. Disk Duplexing is different than disk mirroring, however because it places the backup disk on a different controller or adapter than is used by the main disk – which provides better fault tolerance.

20. You have configured a RAID-5 volume using five 250 GB disks. How much disk space is actually available for storage of folders and files?
a. 875 GB
b. 934.5 GB
c. 1000 GB d. 1993.75 GB

You May Also Find These Documents Helpful