Deck 8: Using a Server

Full screen (f)
exit full mode
Question
The ____ tab of an account set up in Active Directory is used to configure session parameters for a client using terminal services .

A)Sessions
B)Remote control
C)Environment
D)Dial-in
Use Space or
up arrow
down arrow
to flip the card.
Question
UNIX and Linux support file systems compatible with Windows operating systems.
Question
The ____ tab of an account set up in Active Directory provides information about the logon name, domain name, and account options.

A)General
B)Address
C)Profile
D)Account
Question
The ifconfig command in UNIX/Linux displays the amount of free and used memory in the system.
Question
Optimizing performance for the number of users who access a Windows server involves configuring how ____ is used.

A)the CPU
B)memory
C)the keyboard
D)the PCI bus
Question
You can install Fedora as a server system.
Question
A(n)____ script is a text file that contains sequences of UNIX/Linux commands that execute when the script executes.

A)ASP
B)Java
C)shell
D)VB
Question
In the ____ server model, the physical security used for servers may vary widely from server to server and department to department.

A)hierarchical
B)decentralized
C)centralized
D)structured
Question
A ____ is a single computer that offers multiuser access.

A)workstation
B)client
C)server
D)peer
Question
A(n)____ server is one that does not have Active Directory installed.

A)individual
B)stand-alone
C)isolated
D)single
Question
The ____ file is disk space, in the form of a file, for use when memory requirements exceed the available RAM.

A)frame
B)thread
C)handle
D)page
Question
A ____ centralizes control of network resources into a logical grouping of user accounts, computers, printers, and network devices.

A)domain
B)server farm
C)directory
D)console
Question
In a Windows server, the normal priority at which a process runs is set in the program code of the application, which is called the ____ priority class.

A)average
B)normal
C)base
D)standard
Question
The ____ option in the Processes tab of Task Manager is given an extra advantage at +15.

A)Realtime
B)High
C)Normal
D)AboveNormal
Question
The upper limit for peer-to-peer sharing using Windows XP is 20.
Question
You have the option to look up an account password in Active Directory.
Question
____ accounts enable you to manage who accesses resources on one or more servers.

A)Peer
B)Shared
C)Administrator
D)User
Question
____ access services enable users to access a server through a WAN connection, such as through an Internet connection or a direct dial-up connection.

A)Remote
B)Distributed
C)Virtual
D)Distant
Question
____ mode enables secure VPN communications between routers or gateways on two networks or between a server and a client computer on the same or different networks .

A)Connection
B)Virtual
C)Transport
D)Tunnel
Question
The ____ option in the Applications tab of Task Manager takes you into the highlighted program .

A)Bring To Front
B)Switch To
C)Minimize
D)Maximize
Question
What information is provided by the Users tab in Windows Task Manager and what actions may be performed there?
Question
A(n)____________________ is a resource, such as a file, used by a program and having its own identification so the program is able to access it.
Question
The _________________________ is a program on a read-only or flash memory chip that establishes basic communication with components such as the monitor and disk drives .
Question
What is Active Directory and what services does it provide?
Question
What are two options for choosing a computer as a server?
Question
Provide a general description of the Task Manager application in Windows Server 2003.
Question
To monitor who is logged in to a UNIX/Linux systems, use the ____ command.

A)top
B)who
C)free
D)df
Question
The ____________________ command in UNIX/Linux systems displays a listing of the most CPU-intensive tasks, such as the processor state, in real time .
Question
The ____ option of the top command in UNIX/Linux allows the top utility to run in secure mode.

A)-d
B)-p
C)-s
D)-S
Question
____ space is disk space that acts like an extension of memory and is configured when you install the operating system.

A)Swap
B)Exchange
C)Page
D)Frame
Question
A(n)_________________________ ensures that servers remain working when there is a brief power outage, or that there is time to properly shut down a server during a long power outage.
Question
The ____ option of the df command in UNIX/Linux displays information in human readable format.

A)-h
B)-l
C)-m
D)-t
Question
The ____ option of the free command in UNIX/Linux creates totals for RAM and swap memory statistics.

A)-b
B)-m
C)-g
D)-t
Question
Provide five reasons for having a server in a home network.
Question
What are the advantages of a decentralized server model?
Question
What are the four most important server setup tasks?
Question
The ____ option of the who command in UNIX/Linux provides a quick list and total of users logged in.

A)-b
B)-H
C)-q
D)-u
Question
Identify and briefly describe four options that may be used with the df utility in UNIX/Linux systems.
Question
A(n)____________________ private network uses LAN protocols as well as tunneling protocols to encapsulate the data as it is sent across a public network such as the Internet.
Question
What information is provided by the lower portion of the Networking tab in Windows Task Manager and how is it used?
Question
Match between columns
related to the number of user connections at a given time.
server farm
related to the number of user connections at a given time.
Active Directory
related to the number of user connections at a given time.
Microsoft Management Console (MMC)
related to the number of user connections at a given time.
network connectivity
related to the number of user connections at a given time.
PPTP protocol
related to the number of user connections at a given time.
IPSec
related to the number of user connections at a given time.
thread
related to the number of user connections at a given time.
du utility
related to the number of user connections at a given time.
finger utility
set of secure communications standards used to protect IP networks.
server farm
set of secure communications standards used to protect IP networks.
Active Directory
set of secure communications standards used to protect IP networks.
Microsoft Management Console (MMC)
set of secure communications standards used to protect IP networks.
network connectivity
set of secure communications standards used to protect IP networks.
PPTP protocol
set of secure communications standards used to protect IP networks.
IPSec
set of secure communications standards used to protect IP networks.
thread
set of secure communications standards used to protect IP networks.
du utility
set of secure communications standards used to protect IP networks.
finger utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
server farm
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Active Directory
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Microsoft Management Console (MMC)
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
network connectivity
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
PPTP protocol
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
IPSec
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
thread
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
du utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
finger utility
used to create an encrypted tunnel between a client and a VPN server.
server farm
used to create an encrypted tunnel between a client and a VPN server.
Active Directory
used to create an encrypted tunnel between a client and a VPN server.
Microsoft Management Console (MMC)
used to create an encrypted tunnel between a client and a VPN server.
network connectivity
used to create an encrypted tunnel between a client and a VPN server.
PPTP protocol
used to create an encrypted tunnel between a client and a VPN server.
IPSec
used to create an encrypted tunnel between a client and a VPN server.
thread
used to create an encrypted tunnel between a client and a VPN server.
du utility
used to create an encrypted tunnel between a client and a VPN server.
finger utility
summarizes disk usage in UNIX/Linux systems.
server farm
summarizes disk usage in UNIX/Linux systems.
Active Directory
summarizes disk usage in UNIX/Linux systems.
Microsoft Management Console (MMC)
summarizes disk usage in UNIX/Linux systems.
network connectivity
summarizes disk usage in UNIX/Linux systems.
PPTP protocol
summarizes disk usage in UNIX/Linux systems.
IPSec
summarizes disk usage in UNIX/Linux systems.
thread
summarizes disk usage in UNIX/Linux systems.
du utility
summarizes disk usage in UNIX/Linux systems.
finger utility
block of code within a program.
server farm
block of code within a program.
Active Directory
block of code within a program.
Microsoft Management Console (MMC)
block of code within a program.
network connectivity
block of code within a program.
PPTP protocol
block of code within a program.
IPSec
block of code within a program.
thread
block of code within a program.
du utility
block of code within a program.
finger utility
centralized location for servers, such as a computer room or machine room.
server farm
centralized location for servers, such as a computer room or machine room.
Active Directory
centralized location for servers, such as a computer room or machine room.
Microsoft Management Console (MMC)
centralized location for servers, such as a computer room or machine room.
network connectivity
centralized location for servers, such as a computer room or machine room.
PPTP protocol
centralized location for servers, such as a computer room or machine room.
IPSec
centralized location for servers, such as a computer room or machine room.
thread
centralized location for servers, such as a computer room or machine room.
du utility
centralized location for servers, such as a computer room or machine room.
finger utility
displays information about users in many UNIX/Linux systems.
server farm
displays information about users in many UNIX/Linux systems.
Active Directory
displays information about users in many UNIX/Linux systems.
Microsoft Management Console (MMC)
displays information about users in many UNIX/Linux systems.
network connectivity
displays information about users in many UNIX/Linux systems.
PPTP protocol
displays information about users in many UNIX/Linux systems.
IPSec
displays information about users in many UNIX/Linux systems.
thread
displays information about users in many UNIX/Linux systems.
du utility
displays information about users in many UNIX/Linux systems.
finger utility
directory service that houses information about all network resources .
server farm
directory service that houses information about all network resources .
Active Directory
directory service that houses information about all network resources .
Microsoft Management Console (MMC)
directory service that houses information about all network resources .
network connectivity
directory service that houses information about all network resources .
PPTP protocol
directory service that houses information about all network resources .
IPSec
directory service that houses information about all network resources .
thread
directory service that houses information about all network resources .
du utility
directory service that houses information about all network resources .
finger utility
Question
What is the who command used for in UNIX/Linux systems?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Using a Server
1
The ____ tab of an account set up in Active Directory is used to configure session parameters for a client using terminal services .

A)Sessions
B)Remote control
C)Environment
D)Dial-in
A
2
UNIX and Linux support file systems compatible with Windows operating systems.
True
3
The ____ tab of an account set up in Active Directory provides information about the logon name, domain name, and account options.

A)General
B)Address
C)Profile
D)Account
D
4
The ifconfig command in UNIX/Linux displays the amount of free and used memory in the system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Optimizing performance for the number of users who access a Windows server involves configuring how ____ is used.

A)the CPU
B)memory
C)the keyboard
D)the PCI bus
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
You can install Fedora as a server system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A(n)____ script is a text file that contains sequences of UNIX/Linux commands that execute when the script executes.

A)ASP
B)Java
C)shell
D)VB
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
In the ____ server model, the physical security used for servers may vary widely from server to server and department to department.

A)hierarchical
B)decentralized
C)centralized
D)structured
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
A ____ is a single computer that offers multiuser access.

A)workstation
B)client
C)server
D)peer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)____ server is one that does not have Active Directory installed.

A)individual
B)stand-alone
C)isolated
D)single
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ file is disk space, in the form of a file, for use when memory requirements exceed the available RAM.

A)frame
B)thread
C)handle
D)page
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ centralizes control of network resources into a logical grouping of user accounts, computers, printers, and network devices.

A)domain
B)server farm
C)directory
D)console
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
In a Windows server, the normal priority at which a process runs is set in the program code of the application, which is called the ____ priority class.

A)average
B)normal
C)base
D)standard
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ option in the Processes tab of Task Manager is given an extra advantage at +15.

A)Realtime
B)High
C)Normal
D)AboveNormal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The upper limit for peer-to-peer sharing using Windows XP is 20.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
You have the option to look up an account password in Active Directory.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ accounts enable you to manage who accesses resources on one or more servers.

A)Peer
B)Shared
C)Administrator
D)User
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ access services enable users to access a server through a WAN connection, such as through an Internet connection or a direct dial-up connection.

A)Remote
B)Distributed
C)Virtual
D)Distant
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ mode enables secure VPN communications between routers or gateways on two networks or between a server and a client computer on the same or different networks .

A)Connection
B)Virtual
C)Transport
D)Tunnel
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ option in the Applications tab of Task Manager takes you into the highlighted program .

A)Bring To Front
B)Switch To
C)Minimize
D)Maximize
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What information is provided by the Users tab in Windows Task Manager and what actions may be performed there?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)____________________ is a resource, such as a file, used by a program and having its own identification so the program is able to access it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The _________________________ is a program on a read-only or flash memory chip that establishes basic communication with components such as the monitor and disk drives .
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What is Active Directory and what services does it provide?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are two options for choosing a computer as a server?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Provide a general description of the Task Manager application in Windows Server 2003.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
To monitor who is logged in to a UNIX/Linux systems, use the ____ command.

A)top
B)who
C)free
D)df
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
The ____________________ command in UNIX/Linux systems displays a listing of the most CPU-intensive tasks, such as the processor state, in real time .
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The ____ option of the top command in UNIX/Linux allows the top utility to run in secure mode.

A)-d
B)-p
C)-s
D)-S
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____ space is disk space that acts like an extension of memory and is configured when you install the operating system.

A)Swap
B)Exchange
C)Page
D)Frame
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
A(n)_________________________ ensures that servers remain working when there is a brief power outage, or that there is time to properly shut down a server during a long power outage.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The ____ option of the df command in UNIX/Linux displays information in human readable format.

A)-h
B)-l
C)-m
D)-t
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The ____ option of the free command in UNIX/Linux creates totals for RAM and swap memory statistics.

A)-b
B)-m
C)-g
D)-t
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Provide five reasons for having a server in a home network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the advantages of a decentralized server model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the four most important server setup tasks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ option of the who command in UNIX/Linux provides a quick list and total of users logged in.

A)-b
B)-H
C)-q
D)-u
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Identify and briefly describe four options that may be used with the df utility in UNIX/Linux systems.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)____________________ private network uses LAN protocols as well as tunneling protocols to encapsulate the data as it is sent across a public network such as the Internet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What information is provided by the lower portion of the Networking tab in Windows Task Manager and how is it used?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
related to the number of user connections at a given time.
server farm
related to the number of user connections at a given time.
Active Directory
related to the number of user connections at a given time.
Microsoft Management Console (MMC)
related to the number of user connections at a given time.
network connectivity
related to the number of user connections at a given time.
PPTP protocol
related to the number of user connections at a given time.
IPSec
related to the number of user connections at a given time.
thread
related to the number of user connections at a given time.
du utility
related to the number of user connections at a given time.
finger utility
set of secure communications standards used to protect IP networks.
server farm
set of secure communications standards used to protect IP networks.
Active Directory
set of secure communications standards used to protect IP networks.
Microsoft Management Console (MMC)
set of secure communications standards used to protect IP networks.
network connectivity
set of secure communications standards used to protect IP networks.
PPTP protocol
set of secure communications standards used to protect IP networks.
IPSec
set of secure communications standards used to protect IP networks.
thread
set of secure communications standards used to protect IP networks.
du utility
set of secure communications standards used to protect IP networks.
finger utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
server farm
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Active Directory
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
Microsoft Management Console (MMC)
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
network connectivity
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
PPTP protocol
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
IPSec
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
thread
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
du utility
a tool that you can customize by adding modules called "snap-ins" to manage different server functions .
finger utility
used to create an encrypted tunnel between a client and a VPN server.
server farm
used to create an encrypted tunnel between a client and a VPN server.
Active Directory
used to create an encrypted tunnel between a client and a VPN server.
Microsoft Management Console (MMC)
used to create an encrypted tunnel between a client and a VPN server.
network connectivity
used to create an encrypted tunnel between a client and a VPN server.
PPTP protocol
used to create an encrypted tunnel between a client and a VPN server.
IPSec
used to create an encrypted tunnel between a client and a VPN server.
thread
used to create an encrypted tunnel between a client and a VPN server.
du utility
used to create an encrypted tunnel between a client and a VPN server.
finger utility
summarizes disk usage in UNIX/Linux systems.
server farm
summarizes disk usage in UNIX/Linux systems.
Active Directory
summarizes disk usage in UNIX/Linux systems.
Microsoft Management Console (MMC)
summarizes disk usage in UNIX/Linux systems.
network connectivity
summarizes disk usage in UNIX/Linux systems.
PPTP protocol
summarizes disk usage in UNIX/Linux systems.
IPSec
summarizes disk usage in UNIX/Linux systems.
thread
summarizes disk usage in UNIX/Linux systems.
du utility
summarizes disk usage in UNIX/Linux systems.
finger utility
block of code within a program.
server farm
block of code within a program.
Active Directory
block of code within a program.
Microsoft Management Console (MMC)
block of code within a program.
network connectivity
block of code within a program.
PPTP protocol
block of code within a program.
IPSec
block of code within a program.
thread
block of code within a program.
du utility
block of code within a program.
finger utility
centralized location for servers, such as a computer room or machine room.
server farm
centralized location for servers, such as a computer room or machine room.
Active Directory
centralized location for servers, such as a computer room or machine room.
Microsoft Management Console (MMC)
centralized location for servers, such as a computer room or machine room.
network connectivity
centralized location for servers, such as a computer room or machine room.
PPTP protocol
centralized location for servers, such as a computer room or machine room.
IPSec
centralized location for servers, such as a computer room or machine room.
thread
centralized location for servers, such as a computer room or machine room.
du utility
centralized location for servers, such as a computer room or machine room.
finger utility
displays information about users in many UNIX/Linux systems.
server farm
displays information about users in many UNIX/Linux systems.
Active Directory
displays information about users in many UNIX/Linux systems.
Microsoft Management Console (MMC)
displays information about users in many UNIX/Linux systems.
network connectivity
displays information about users in many UNIX/Linux systems.
PPTP protocol
displays information about users in many UNIX/Linux systems.
IPSec
displays information about users in many UNIX/Linux systems.
thread
displays information about users in many UNIX/Linux systems.
du utility
displays information about users in many UNIX/Linux systems.
finger utility
directory service that houses information about all network resources .
server farm
directory service that houses information about all network resources .
Active Directory
directory service that houses information about all network resources .
Microsoft Management Console (MMC)
directory service that houses information about all network resources .
network connectivity
directory service that houses information about all network resources .
PPTP protocol
directory service that houses information about all network resources .
IPSec
directory service that houses information about all network resources .
thread
directory service that houses information about all network resources .
du utility
directory service that houses information about all network resources .
finger utility
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What is the who command used for in UNIX/Linux systems?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.