Professional Documents
Culture Documents
2 out of 2 points
When a driver is verified, a unique digital signature is incorporated into it in a process called ____________________.
Answer Selected Answer: Correct Answer: driver signing driver signing 2 out of 2 points
Question 2
Device drivers that are unsigned can also be loaded in x64 versions of Windows Server 2008.
Answer Selected Answer: Correct Answer: False False 2 out of 2 points
Question 3
Question 4
In the ____ Services role, the Windows Server 2008 server can be used to manage network printing services and it can offer one or more network printers connected to the network through the server itself.
Answer Selected Answer:
Print
Correct Answer:
Question 5
2 out of 2 points
Memory activities performed through virtual memory are as fast as those performed in RAM.
Answer
Question 6
PowerShell
Correct Answer:
PowerShell
Question 7
2 out of 2 points
In addition to the Server Manager GUI tool, you can also use the ____ command-line tool for managing server roles.
Answer Selected Answer:
ServerManagerCmd.exe
Correct Answer:
ServerManagerCmd.exe
Question 8
2 out of 2 points
ServerManagerCmd.exe is executed from the command line through the Command Prompt window.
Answer Selected Answer: Correct Answer: True True 2 out of 2 points
Question 9
When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the ____ transfer mode by default.
Answer Selected Answer:
DMA
Correct Answer:
DMA
Question 10
2 out of 2 points
____ is a Windows Server 2008 tool that verifies system and critical files to determine if they have a signature.
Answer Selected Answer:
Sigverif
Correct Answer:
Sigverif
Question 11
2 out of 2 points
____________________ is the ability to automatically detect and configure newly installed hardware devices.
Answer Selected Answer: Correct Answer: Plug and Play PnP (Plug and Play) Plug and Play (PnP) Plug and Play PnP
Question 12
2 out of 2 points
For a server with 2 GB of RAM, the initial paging file size should be at least ____ GB.
Answer Selected Answer:
3
Correct Answer:
Question 13
2 out of 2 points
____ allows you to configure how processor resources are allocated to programs.
Answer
Selected Answer:
Processor scheduling
Correct Answer:
Processor scheduling
Question 14
2 out of 2 points
The File Services role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through ____.
Answer Selected Answer:
DFS
Correct Answer:
DFS
Question 15
2 out of 2 points
Microsoft ____ Protocol enables the use of a software virtual switch between the main operating system and the operating systems on virtual partitions.
Answer Selected Answer:
Question 16
2 out of 2 points
A servers ____________________ include the interrupt request (IRQ) line (which is a channel for communication with the CPU) and other elements such as the I/O address and reserved memory range.
Answer Selected Answer: Correct Answer: resources resources 2 out of 2 points
Question 17
____ Protocol is used for multimedia transmissions, such as a combined voice and video transmission to provide user training to multiple people.
Answer
Selected Answer:
Reliable Multicast
Correct Answer:
Reliable Multicast
Question 18
2 out of 2 points
The Windows Server 2008 ____ is a very complex database containing all information the operating system needs about the entire server.
Answer Selected Answer:
Registry
Correct Answer:
Registry
Question 19
2 out of 2 points
Virtual memory works through a technique called ____, whereby blocks of information, called pages, are moved from RAM into virtual memory on disk.
Answer Selected Answer:
paging
Correct Answer:
paging
Question 20
2 out of 2 points
disks specially set up to increase performance and fault tolerance bypasses the use of CPU memory and writes to and reads directly from RAM a channel for communication with the CPU
RAID-5 volume
H.
RAID-5 volume
H.
DMA
C.
DMA
C.
IRQ line
IRQ line
uses CPU memory registers and RAM during the process of transferring data for disk reads and writes used to tell the operating system where to find certain programs and how to allocate memory to programs, and to control different programs consolidates administrative functions to make a server easier to manage scans system files for integrity
G.
G.
PIO
I.
PIO
I.
Environment variables
A.
Environment variables
A.
Server Manager
E.
Server Manager
E.
System File Checker an open standard that is used in all types of systems and that enables connectivity through networks and network protocols used to check for a resource conflict and to examine other properties associated with a device
B.
UPnP
D.
UPnP
D.
Device Manager
Device Manager
2 out of 2 points
Question 21
____ environment variables are defined by the operating system and apply to any user logged onto the computer.
Answer Selected Answer:
System
Correct Answer:
System
Question 22
2 out of 2 points
When programs are running on the server, ______________________________ monitors how they use memory to ensure they are not causing memory problems.
Answer Selected Answer: Correct Answer: DEP DEP (Data Execution Prevention)
Question 23
2 out of 2 points
Microsoft ____ Protocol is used when the Hyper-V role is installed in Windows Server 2008.
Answer Selected Answer:
Question 24
2 out of 2 points
PnP eliminates hours of time that server administrators and computer users once spent installing and configuring hardware.
Answer Selected Answer: Correct Answer: True True 2 out of 2 points
Question 25
____ provides a graphical view of all hardware currently installed on your computer.
Answer Selected Answer:
Device Manager
Correct Answer:
Device Manager