Deck 9: Designing Supporting Services
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 9: Designing Supporting Services
1
An important element to monitor on an SQL Server is the state of the ____ log.
A) transaction
C) access
B) database
D) interface
A) transaction
C) access
B) database
D) interface
A
2
Before you can add DFS role services, you must add the DFS namespaces, which are part of the File Services role.
False
3
DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.
False
4
SCOM builds on the basic philosophy that an administrator wants to know about problems before they happen.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ can be used to copy and synchronize the content of DFS namespace folders from one DFS server to another.
A) DFS replication
C) DFS synchronization
B) DFS merging
D) DFS collaboration
A) DFS replication
C) DFS synchronization
B) DFS merging
D) DFS collaboration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ is an add-on server product that can be used to monitor servers and client computers in an enterprise.
A) Microsoft System Center Configuration Manager 2007
B) Microsoft Enterprise Operation Center 2007
C) Microsoft System Center Virtual Machine Manager 2007
D) Microsoft System Center Operations Manager 2007
A) Microsoft System Center Configuration Manager 2007
B) Microsoft Enterprise Operation Center 2007
C) Microsoft System Center Virtual Machine Manager 2007
D) Microsoft System Center Operations Manager 2007
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ security element of data security is protected using standard methods such as locked doors and cipher locks.
A) secrecy
C) operational
B) physical
D) network
A) secrecy
C) operational
B) physical
D) network
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
SCOM includes the ____ Shell, which is a customized interface of Windows PowerShell.
A) Administration
C) Configuration
B) Command
D) Management
A) Administration
C) Configuration
B) Command
D) Management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ are groups of servers that participate in DFS replication and hold copies of the data.
A) Replication units
C) Replication folders
B) Replication partners
D) Replication groups
A) Replication units
C) Replication folders
B) Replication partners
D) Replication groups
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The implementation of AD FS is complex and detailed, but the result is that users in a separate forest can access the SharePoint server with SSO.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ namespace would be created when the Windows Server 2008 server is not in a domain.
A) domain-based
C) forest-based
B) stand-alone
D) directory-based
A) domain-based
C) forest-based
B) stand-alone
D) directory-based
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ gives UNIX client computers that do not support SMB communications access to files on a Windows Server 2008 server, and allows Windows Server 2008 servers to access data stored with the Network File System (NFS) on UNIX systems.
A) Services for Non-windows
C) POSIX
B) Services for UNIX
D) Services for Network File System
A) Services for Non-windows
C) POSIX
B) Services for UNIX
D) Services for Network File System
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
With SCOM, administrators can use a single centralized server to monitor all servers in the organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
HTTP uses port ____ by default.
A) 10
C) 80
B) 43
D) 101
A) 10
C) 80
B) 43
D) 101
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ is a group of folders from different servers that presents itself to clients as a single folder tree.
A) DFS sharespace
C) DFS path
B) DFS virtual folder
D) DFS namespace
A) DFS sharespace
C) DFS path
B) DFS virtual folder
D) DFS namespace
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ is the top-level folder for the DFS namespace.
A) DFS Graphics folder
C) DFS root
B) DFS forest
D) DFS Project folder
A) DFS Graphics folder
C) DFS root
B) DFS forest
D) DFS Project folder
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ mode provides full support by encrypting entire hard drives and performing a system validation check.
A) BitLocker with a TPM
B) BitLocker with TPM and a PIN
C) BitLocker with TPM and a startup key
D) BitLocker with a startup key (but without TPM)
A) BitLocker with a TPM
B) BitLocker with TPM and a PIN
C) BitLocker with TPM and a startup key
D) BitLocker with a startup key (but without TPM)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).
A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is an add-on server product that can assess, deploy, and update large numbers of client computers or servers in an enterprise.
A) Microsoft System Center Operations Manager 2007
B) Microsoft System Center Virtual Machine Manager 2007
C) Microsoft System Center Configuration Manager 2007
D) Microsoft System Center Service Manager 2007
A) Microsoft System Center Operations Manager 2007
B) Microsoft System Center Virtual Machine Manager 2007
C) Microsoft System Center Configuration Manager 2007
D) Microsoft System Center Service Manager 2007
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ is a group of folders replicated to all domain controllers in the domain.
A) NTDS
C) SYSROOT
B) SYSVOL
D) DFS Root
A) NTDS
C) SYSROOT
B) SYSVOL
D) DFS Root
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ folders are folders that are replicated to all members in the replication group.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
AD RMS works by ____ a document and embedding the usage rights within the document
Itself.
A) sealing
C) decrypting
B) encrypting
D) copying
Itself.
A) sealing
C) decrypting
B) encrypting
D) copying
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The command-line tool ____ is used to manage the Server for NFS and Client for NFS components in a UNIX system.
A) Dfsadmin
C) Nfscfg
B) Nfsadmin
D) Nfsmgmt
A) Dfsadmin
C) Nfscfg
B) Nfsadmin
D) Nfsmgmt
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
List and describe two events or actions that can cause a BitLocker drive to enter recovery mode.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The command-line tool ____ shows statistics for calls or requests to the Server for NFS component in a UNIX system.
A) Nfsstat
C) Nfscfg
B) Nfsadmin
D) Nfslist
A) Nfsstat
C) Nfscfg
B) Nfsadmin
D) Nfslist
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List and describe a method of configuring DFS namespaces.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____________________________________________________________ can allow Active Directory-enabled applications to store and retrieve data in Active Directory using the same resources as AD DS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Identify and describe a primary benefit that BitLocker provides.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
List and describe two benefits SCCM provides for an organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Provide an overview of how SCOM is used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ allows users to authenticate once and then use this authentication for all access.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
List two problems that loss of data can cause for a company.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The command-line tool ____ removes NFS-mounted drives on UNIX systems.
A) dismount
C) unmount
B) remount
D) mount
A) dismount
C) unmount
B) remount
D) mount
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ can be used as a digital rights management (DRM) technology to protect access to documents created in various Microsoft applications.
A) AD DMS
C) AD RMD
B) AD NRS
D) AD RMS
A) AD DMS
C) AD RMD
B) AD NRS
D) AD RMS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
List and describe two WSS tools that can be used for collaboration.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Microsoft ____________________ is a full range of supporting server products designed to enhance and automate the administration of large networks within an enterprise.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ is most commonly used to support single sign-on with Web-based applications.
A) AD RMS
C) AD LDS
B) AD FS
D) ADSI
A) AD RMS
C) AD LDS
B) AD FS
D) ADSI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) ______________________________ is a microchip that is usually installed on the system motherboard.It provides the security-related functions for BitLocker, including the storage and encryption of different encryption keys.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
List and describe two benefits AD LDS provides for Active Directory-enabled applications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List two applications through which RMS can be used to protect documents.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck