Exam 3: Configuring the Windows Server 2008 Environment
Exam 1: Introduction to Windows Server 200850 Questions
Exam 2: Installing Windows Server 200850 Questions
Exam 3: Configuring the Windows Server 2008 Environment50 Questions
Exam 4: Introduction to Active Directory and Account Management50 Questions
Exam 5: Configuring, managing, and Troubleshooting Resource Access50 Questions
Exam 6: Configuring Windows Server 2008 Printing50 Questions
Exam 7: Configuring and Managing Data Storage50 Questions
Exam 8: Managing Windows Server 2008 Network Services50 Questions
Exam 9: Deploying Iis and Active Directory Certificate Services50 Questions
Exam 10: Configuring Remote Access Services50 Questions
Exam 11: Windows Server 2008 Virtualization50 Questions
Exam 12: Application and Data Provisioning50 Questions
Exam 13: Securing Windows Server 200850 Questions
Exam 14: Server and Network Monitoring50 Questions
Exam 15: Managing System Reliability and Availability50 Questions
Select questions type
Match each term with the correct statement below.
-A file of commands that is run when you run the script
A)cmdlets
B)HKEY_USERS
C)shell
D)HKEY_CLASSES_ROOT
E)SCD
F)HKEY_CURRENT_CONFIG
G)script
H)HKEY_CURRENT_USER
I)SCW
Free
(Short Answer)
4.8/5
(41)
Correct Answer:
G
When the SCW command-line tool is used to analyze security,you can view the results in a(n)____________________ presentation.
Free
(Short Answer)
4.8/5
(30)
Correct Answer:
HTML
The ____ root key contains profile information for each user who has logged onto the computer.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
A
Match each term with the correct statement below.
-Contains profile settings for all users who have logged onto the server
A)cmdlets
B)HKEY_USERS
C)shell
D)HKEY_CLASSES_ROOT
E)SCD
F)HKEY_CURRENT_CONFIG
G)script
H)HKEY_CURRENT_USER
I)SCW
(Short Answer)
4.9/5
(43)
The ____ command enables you to configure and modify security settings,as well as convert them to Active Directory Group Policy Objects and to apply them to multiple servers.
(Multiple Choice)
5.0/5
(31)
Match each term with the correct statement below.
-A group of XML files that establish a security policy
A)cmdlets
B)HKEY_USERS
C)shell
D)HKEY_CLASSES_ROOT
E)SCD
F)HKEY_CURRENT_CONFIG
G)script
H)HKEY_CURRENT_USER
I)SCW
(Short Answer)
4.8/5
(33)
ServerManagerCmd.exe is executed from the command line through the ____ window.
(Multiple Choice)
4.8/5
(33)
Explain the purpose of the Diagnostics management area in Server Manager.
(Essay)
4.7/5
(42)
ServerManagerCmd.exe can be used to run the parameters in a(n)____ on a group of servers to save configuration time and ensure that the servers are configured the same way.
(Multiple Choice)
4.8/5
(35)
When a driver is verified,a unique digital signature is incorporated into it in a process called ____.
(Multiple Choice)
4.7/5
(34)
Windows Server 2008 offers the ____ to scan system files for integrity.
(Multiple Choice)
4.8/5
(32)
The ____ tool is automatically installed when you install Windows Server 2008 and provides an interactive interface for analyzing and configuring security on a server.
(Multiple Choice)
4.8/5
(32)
If you use transform to convert security settings to a Group Policy Object (GPO),then you can use the rollback option to undo the GPO settings.
(True/False)
4.7/5
(41)
Explain why you should not make hardware configuration changes directly from the registry,and identify alternative options for making these changes.
(Essay)
4.9/5
(35)
Match each term with the correct statement below.
-Contains information about the desktop setup for the account presently logged on to the server console
A)cmdlets
B)HKEY_USERS
C)shell
D)HKEY_CLASSES_ROOT
E)SCD
F)HKEY_CURRENT_CONFIG
G)script
H)HKEY_CURRENT_USER
I)SCW
(Short Answer)
4.8/5
(40)
Windows PowerShell is installed by default when you install Windows Server 2008.
(True/False)
4.9/5
(33)
List and describe three command-line options that can be used with scwcmd.
(Essay)
4.8/5
(39)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)