Вы находитесь на странице: 1из 9

Chapter 4 Solutions Review Questions 1.

Your company has four departments: Marketing and Sales, Manufacturing,Product Research, and Business. Which of the following Active Directory container design plans might you use to best manage the user accounts and network accessneeds of each department?Answer: c. Create four OUs in one domain. 2. Using the example in Question 1, what Active Directory capability can you use to establish different account lockout policies for each of the four departments?Answer: a. fine-grained password policies

3. Your colleague is trying to create a universal security group for the three administrators of the single standalone server in his company. The problemis that he cant find an option to create a universal security group. What is theproblem?Answer: d. He cannot create a universal security group on a standalone server and must instead create a local security group. 4. One of the DCs in your company reports it has an Active Directory errorand you need to fix it as quickly as possible to reduce downtime. Which of thefollowing tools can you use to stop and restart AD DS on that server? (Choose all that apply.)Answer: b. Server Manager 5. Which of the following server operating systems can be used when the domains in Windows Server 2008 Active Directory are set at the Windows Server 2003domain functional level? (Choose all that apply.)Answer: c. Windows Server 2003 and d. Windows Server 2008 6. Domains in a tree are in a _____ relationship.Answer: Kerberos transitive trust relationship 7. Youve installed the AD DS server role, but find that Active Directory isnot fully implemented. What should you do next?Answer: c. Run dcpromo. 8. A _____ is a unique number associated with each object in AD DS.Answer: globally unique identifier (GUID) 9. Your school has a parent object named straton.edu and the child objectnames stratonalum.org and studentarts.org. What kind of namespace is this?Answer: a. disjointed 10. Your companys management has decided that the accounts in all OUs should be set up and managed by the Information Technology departments security specialist. As the AD DS administrator, how can you best give the security specialist this capability? Answer: c. Use the delegate control feature to give her control of all of the OUs that contain user accounts. 11. Name three optional attributes associated with a user account.Answer: Any three of: account description, account holders office number or address, account holders telephone number, account holders e-mail address, account holders Web page (or students can list others from observing the optional propertiesassociated with an account)

12. Which of the following are actions performed by the global catalog? (Choose all that apply.)Answer: a. provides lookup and access to all resources in all domains and d. authenticates users when they log on 13. The business manager in your organization is leaving, but she has been training the new business manager who will take over the day after the old business manager leaves. What AD DS capability can you use to transfer the old business managers account to the new business manager? Note that in this organization, accounts reflect the actual names of users.Answer: d. Disable the old business managers account when she leaves work. As soon as the new business manager takes over, rename the account for the new business manager and then enable the account 14. Your company builds roads and bridges. The home office is located in Ohio. Each time there is a construction project, the company establishes a temporaryoffice at the construction site. The project manager for each project takes along a server set up for the AD DS role to connect remotely to the home office. For the sake of security, what should the remote server be?Answer: b. an RODC 15. Which of the following is true about all trees in a forest? (Choose all that apply.)Answer: a. They all use the same schema and c. They all use the same global catalog. 16. You have set up auditing for modifications to Active Directory. Now you want to monitor the results of the auditing. How do you do this? Answer: c. Periodically view the security log. 17. A site reflects interconnected _____ and is used for DC _____ . Answer: subnets, replication 18. When you create user accounts, you want to set them up so that users do not have access to use their accounts after 7 pm on workdays and on weekends. This is a security measure your companys management wants. From where can you set upthese logon restrictions?Answer: c. You set up these restrictions from the Account tab in the user account properties. 19. To reset a password, you use the _____ tool.Answer: Active Directory Users and Computers 20. What is the scope of a domain local security group?Answer: a. The domain in which the group is created.

Chapter 5 Solutions Review Questions 1. Your company writes software for voting machines and needs to ensure that the software and documentation is carefully protected on its servers. Last week one of the servers was stolen from its machine room, but fortunately that server did not contain sensitive voting machine files. What file security can yourcompany use to protect its information in the future, so that even if a server is stolen its files cannot be accessed?Answer: a. Microsoft Encrypting File System 2. A fellow programmer has set up a shared folder of programs he is working on, but the problem is that several users have discovered the folder and havebeen trying out the programs. What steps can the programmer take to ensure thatonly he can view and access the folder? (Choose all that apply.)Answer: a. Use permissions to secure the shared folder. and c. Place a dollar sign after the name of the shared folder to hide it. 3. Your company has salespeople who use laptop computers for travel. Whenthey go out they need to access marketing files stored on the server. What capability enables them to access these files while they are on the road and cannot connect to the network?Answer: d. offline files 4. The water resources group in your organization asked you to create a shared folder to hold research data. Ten people are in the group; two of them cannot access the file but the other eight can. What can you do to easily determinewhy two people cannot access it?Answer: c. Check the effective permissions for that folder. 5. You have configured a folder for sharing, but users do not see the server on the network. What might be the problem? (Choose all that apply.)Answer: b. Network discovery is disabled. and c. The Windows Firewall is blocking incoming and outgoing access. 6. The _____ can change permissions on a folder.Answer: owner (students might also include administrator, but owner is the best answer) 7. Youve published a folder in Active Directory and now want to test your work by finding it in Active Directory from Windows Server 2008. What steps do you take?Answer: b. Click Start, click Network, and click the Search Active Directory button. 8. Use the _____ tool to publish a shared folder in Active Directory.Answer: Active Directory Users and Computers 9. Your college uses shared folders to make class information and assignments available to students. The shared folders are currently on three different computers, and finding the right folder can be confusing. What is a possible solution to make the folders easier for students to find and use?Answer: d. Set up the shared folders in DFS. 10. The Computer Advisory Committee in your company has been concerned that users store many files on the servers, but arent good about deleting

old files. This has resulted in less free space on the servers disks. What solution do you propose?Answer: d. Set up disk quotas for user accounts. 11. What are the two DFS models?Answer: standalone and domain-based 12. Your company has installed Subsystem for UNIX-based Applications (SUA) ona Windows Server 2008 server. You have copied over a test program from a UNIX computer and try to run it in the SUA environment, but it wont run. What might bethe cause of the problem?Answer: d. You have to recompile the program source file in the SUA environment. 13. Several of your DFS clients complain that it can take some time to accessa DFS shared folder, even though they just recently accessed it. They are expecting faster response. What can you do?Answer: a. Tune the cache duration for the folder. 14. You have a series of older files that you dont access often, but you do need them occasionally. Some of these folders take up large quantities of disk space. What NTFS feature can you use to reduce the disk space they occupy?Answer: b. Use the compress attribute. 15. As the server administrator, you currently own a folder but want to transfer ownership to the user who will now manage that folders contents. How can ownership be transferred to the user?Answer: c. Give the user Full control permissions and then have the user take ownership. 16. Subsystem for UNIX-based Applications is installed as which of the following?Answer: d. feature 17. Your network has Linux, Windows Vista, and Windows Server 2008 computers.Active Directory is also in use through Windows Server 2008. You are tired of managing accounts and groups for both the Linux computers and the Windows computers. To reduce your account and group management workload you can _____?Answer: install Subsystem for UNIX-based Applications and implement Server for Network Information Services. 18. Which of the following can you accomplish using the DFS Management tool?(Choose all that apply.)Answer: a. Create a namespace root., b. Delegate management over a namespace root., c. Create a folder in a namespace root., and d. Tune a namespace root. 19. A set of shared folders copied in DFS to one or more servers is called a _____.Answer: replication group 20. You have created a shared folder for the management team at your company.You need to give each member of the team the ability to add files to the sharedfolder, but also to only change and delete files that the member has placed inthe shared folder. Which of the following share permissions should you allow forthe members of the management team?Answer: c. Contributor

Chapter 6 Solutions Review Questions 1. One of the users on your network has called to report that a shared printer on your Windows Server 2008 print server is not printing. Which of the following tools can you use to check the status of the printer?Answer: c. Print Management tool 2. You have a printer that is primarily used to handle large graphics print files. When you configure the port for this printer, which of the following port timeout settings should you use?Answer: d. 120 seconds 3. You own an architectural firm that has two plotters and four laser printers. Your paper costs are very high because people often send print jobs intended for a plotter to a laser printer and vice versa. These errors typically result in page after page of printing with strange characters, wasting money and time. What can you do to address this problem?Answer: b. Configure the printers to hold mismatched documents. 4. You have set up a shared printer for UNIX and Linux clients, but when you test the set up the printer produces strings of control codes or simply hangsup. Which of the following might be the problem?Answer: a. The data type is set to NT EMF and should be RAW. 5. Your companys programmers use one shared printer to print out lines of program code for analysis. They complain that often when they retrieve a printout, ending pages from the last printout or the beginning pages of the next printout are mixed in. This is because many of the printed pages appear very similar atfirst glance and its hard to know where one printout ends and the next begins. What do you propose as a solution?Answer: c. Configure the printer properties to use a separator page. 6. You can install the _____, _____, and _____ services when installing the Print Services role.Answer: Print Server, Internet Printing, and LPD Service 7. Which of the following can you accomplish from the Printers window, which is opened through Control Panel? (Choose all that apply.)Answer: a. Install a printer., b. View what is printing on a printer., and c. Access the printers properties. 8. You can publish a shared printer in Active Directory by accessing the printers properties and using the _____ tab.Answer: Sharing 9. You are configuring a serial printer on a COM port. Which of the following can you configure by using the Configure Port button? (Choose all that apply.)Answer: b. port speed and c. flow control 10. Your associate has configured five shared printers so that print files are sent directly to the printer and printing is done in the foreground. However,when the printers are busy this slows down the CPU on the server managing the print jobs. What should be done to address this problem?Answer: d. Configure every printer to spool the print jobs and to

printin the background. 11. Briefly explain the purpose of the graphics device interface (GDI).Answer: As noted in the text, the GDI integrates information about the print file such as word-processing codes for fonts, colors, and embedded graphics objects with information obtained from the printer driver installed at the client for the target printer, in a process that Microsoft calls rendering 12. You have just set up two shared printers from Windows Server 2008, and you also plan to manage four other network printers from the server. Your plan isto manage all of these printers using the Print Management tool, but the tool does not appear on the Administrative Tools menu. What is the problem?Answer: c. You need to install the Print Services role. 13. Which of the following can you accomplish using the Print Management tool? (Choose all that apply.)Answer: a. Consolidate Windows Server 2008 print servers in one place for management., b. Find out how many jobs are in the print queue of a printer., c. Set upto use special forms for printing., and d. Reconfigure printer ports used withprinters. 14. You have set up a shared printer on a Windows Server 2008 server. Also, you have given Mat Chens user account Manage documents permission so that Mat candelete the print jobs of any user. However, when Mat tries to delete someone elses print job, he doesnt have permission. Mat is a member of two global groups, Supervisors and Marketing. Also, the Supervisors group is a member of the Managersdomain local group, and the Marketing group is a member of the Business domain local group. Which of the following might be a problem?Answer: b. The Business domain local group is denied Manage documents permissionon that printer. 15. You have purchased a printer that has the capability to print in duplex mode so that users can print on both sides of a sheet of paper. However, when users try to use this capability when they send a print job, documents are still printed on only one side. Which of the following might be the problem?Answer: d. The duplex mode needs to be enabled on the Device Settings tab in the printers properties. 16. From where can you stop and restart the Print Spooler service? (Choose all that apply.)Answer: a. Computer Management tool and d. Server Manager 17. A _____ printer can engage in two-way communications between the printerand the print server and requires a(n) _____ cable?Answer: bidirectional; IEEE 1284 18. Your committee has created a 290 page report for management and you decide to print one copy initially. You send the copy to the printer and then remember that you may not have made a correction to the footer material that prints atthe bottom of each page. You pause the printout to check. After you determine all is OK, you decide to continue printing. Which of the following options shouldyou use from the Document menu on the printer window for that printer to continue from where you left off?Answer: b. Resume

19. WinPrint is a _____.Answer: print processor 20. Your department head is in a hurry to print his report for the managers meeting that starts in 20 minutes, but the printer he uses is currently backed upwith 32 print jobs that may take more than 20 minutes to print. You are the print server administrator. How can you help your department head?Answer: d. Open that printers print window and change the priority of the print job to 99 in that print jobs properties.

Chapter 7 Solutions Review Questions

1. You have just installed a new disk on a Windows Server 2008 server. Which of the following do you do first to prepare the disk for use?Answer: a. partition the disk 2. The _____ partition or volume contains the operating system files, suchas the files in the \Windows folder.Answer: boot 3. You have just upgraded from Windows Server 2003 to Windows Server 2008.Now you are trying to recover a set of databases that you backed up on DVDs inWindows Server 2003 before you started the upgrade, but the Windows Server Backup tool gives you an error message. What is the problem?Answer: c. The Windows Server Backup tool is not compatible with backups made from the Windows Server 2003 Backup tool. 4. Your company is considering installing an iSCSI SAN, but one of the department heads mentions that he has heard Windows Server 2008 does not have a management tool for an iSCSI SAN. What is your response?Answer: d. This is not true because you can install Storage Manager for SANs. 5. You are consulting for a company that has been performing full backupsevery night for its Windows Server 2008 servers. A problem they have been experiencing is that the backups are taking longer and longer. What is your recommendation for this company?Answer: b. Use a custom backup that enables you to use a combination of full andincremental backups. 6. Dynamic disks support RAID levels _____, _____, and _____.Answer: 0, 1, and 5. 7. You are consulting for an organization that has chosen to use disk striping as a way to extend the life of their four hard disks. Now one of the diskshas failed and they call you for help. What do you advise them?Answer: d. Install a new disk and perform a full restore on all four disks. 8. RAID level 5 requires a minimum of _____ hard disks.Answer: 3 9. As the IT director for a large investment company, you are always looking for ways to build in better fault tolerance for your computer systems. As youconsider your present hard disk storage situation, you have a large SAN connected to the main network through a high speed switch. What else can you do to assure fault tolerance for your

SAN?Answer: a. Create additional paths to the SAN, such as through one or more additional switches and take advantage of Multipath I/O. 10. Which of the following can you restore from the Windows Server Backup tool? (Choose all that apply.)Answer: a. the backup catalog, b. volumes, c. folders, and d. the operating system 11. How much free space must you have on a basic disk to convert it to a dynamic disk?Answer: At least 1 MB of free space is needed. 12. You have decided to shrink a 250 GB disk to change 130 GB of that disk tounallocated space. However, the shrinking process only results in 98 GB of unallocated space. What would have caused the smaller portion of unallocated space?Answer: c. The shrinking process encountered a file that cannot be moved and hadto stop early. 13. You have spent the morning archiving old files to DVDs and then deleting those files as a way to get back some disk space. Also, youve recovered some archived financial files to prepare for the auditors visit. After you finish, you notice that the server seems to run slower. What should you doAnswer: b. Start the Disk Defragmenter to defrag your disks. 14. Which of the following can you accomplish with the Disk Management tool?(Choose all that apply.)Answer: c. Create a simple volume and d. Convert a basic disk to a dynamic disk.

15. Your new IT colleague is trying to determine the location of a mounted drive on the server, because he is not sure what a mounted drive is. Which of thefollowing do you tell him?Answer: b. A mounted drive is located in a folder. 16. Which of the following must be true to boot from a disk in Windows Server2008? (Choose all that apply.)Answer: a. It is an active partition. and d. It is a primary partition. 17. Briefly explain the concept of a spanned volume.Answer: A spanned volume contains 2 to 32 dynamic disks that are treated as onevolume. 18. Which of the following is checked by the chkdsk utility? (Choose all thatapply.)Answer: a. indexes, b. disk allocation units, and d. sectors 19. Explain disk duplexing.Answer: In disk duplexing the information on a main disk is shadowed or mirroredon a second disk. If the main disk fails, the mirrored disk is used. Disk duplexing is different than disk mirroring, however because it places the backup diskon a different controller or adapter than is used by the main disk which provides better fault tolerance. 20. You have configured a RAID-5 volume using five 250 GB disks. How much disk space is actually available for storage of folders and files?Answer: c. 1000 GB

Вам также может понравиться