Exam 2: Installing Windows Server 2008
Exam 1: Introduction to Windows Server 200842 Questions
Exam 2: Installing Windows Server 200842 Questions
Exam 3: Networking with Windows Server 200842 Questions
Exam 4: Installing and Configuring the Dynamic Host Configuration Protocol42 Questions
Exam 5: Introduction to DNS in Windows Server 200842 Questions
Exam 6: Managing and Administering DNS in Windows Server 200842 Questions
Exam 7: Configuring File Services in Windows Server 200842 Questions
Exam 8: Introduction to Printers in a Windows Server 2008 Network42 Questions
Exam 9: Network Policy and Access Services in Windows Server 200842 Questions
Exam 10: Securing Windows Server 200843 Questions
Exam 11: Managing and Monitoring a Windows Server 2008 Network41 Questions
Select questions type
The ____ is the protocol used for transferring images across the network.
(Multiple Choice)
4.9/5
(30)
____ is a tool you use to manage the imaging process on a network. Imaging allows you to capture a customized Windows image that you can reuse throughout an organization.
(Multiple Choice)
4.8/5
(39)
KMS works by counting the number of physical client computers requesting activation and then storing information on these computers in a table based on ________________________________________ numbers, which are unique client IDs stored in the KMS database.
(Short Answer)
4.9/5
(45)
Under what circumstances would you opt for a clean installation of Windows Server 2008?
(Essay)
4.9/5
(36)
____________________ installations allow you to install Windows Server 2008 over an existing installation of Windows Server 2003.
(Short Answer)
4.7/5
(39)
A ____ is a collection of products used to identify the type of MAK or KMS key required to install specific operating system editions.
(Multiple Choice)
4.9/5
(38)
____ require you to create a customized image that is applied to each computer you are deploying.
(Multiple Choice)
4.9/5
(25)
Clean installations do not transfer settings from previous operating systems that might be installed on a server.
(True/False)
4.8/5
(27)
____ validates licensed software products by creating a unique installation ID based on a hashed hardware serial numbers and a product key.
(Multiple Choice)
4.8/5
(34)
____ removes all the SIDs, unique characteristics, and applications from an operating system..
(Multiple Choice)
4.7/5
(39)
TFTP traffic is connectionless in nature, meaning that the sequencing of data packets, or datagrams, is not guaranteed.
(True/False)
4.9/5
(34)
Windows PE is a limited 32-bit operating system based on the Windows Server 2008 and Windows Vista SP1 ____, which is the programmatic logic in the central components of Windows operating systems.
(Multiple Choice)
4.8/5
(37)
Discuss the requirements that should be met by your environment prior to the installation and use of EDS.
(Essay)
4.8/5
(37)
____ provides an internal service for activating all computers in an enterprise network without requiring the computers to contact Microsoft.
(Multiple Choice)
4.8/5
(30)
____ prepares an installation of Windows for imaging and deployment by modifying a system to create a new SID and other unique information the next time it starts.
(Multiple Choice)
4.9/5
(41)
____ allows multiple computers to receive communication simultaneously.
(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)