

Cloud and Server Virtualization Exam Questions
Course Introduction
Cloud and Server Virtualization introduces students to the foundational concepts and practical skills needed to design, deploy, and manage virtualized environments in modern IT infrastructures. The course covers the principles of virtualization, including hypervisors, virtual machines, storage, and network virtualization, as well as examines cloud computing models such as Infrastructure as a Service (IaaS). Students will explore leading virtualization platforms, learn about resource allocation and optimization, and understand security considerations unique to virtual environments. Hands-on labs and real-world scenarios reinforce building and administering scalable, cost-effective, and resilient solutions in both private data centers and public cloud platforms.
Recommended Textbook
MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson
Available Study Resources on Quizplus
10 Chapters
409 Verified Questions
409 Flashcards
Source URL: https://quizplus.com/study-set/453 Page 2


Chapter 1: Designing Active Directory Domain Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8045
Sample Questions
Q1) Discuss the difference between domain controllers and servers when raising the level to Windows Server 2008.
Answer: One might mistakenly think that all servers must run Windows Server 2008 to raise the level to Windows Server 2008. This is not true. Only the domain controllers must meet the required level. You can run Windows Server 2000 member servers in a domain at the domain functional level of Windows Server 2008.
Q2) _________________________ is used when objects are migrated between domains in the same forest.
Answer: Intraforest migration
Q3) When selective authentication is implemented on a forest trust, you need to grant the ____ permission on each server or computer where access is granted.
A) Allowed to Authenticate
B) Replace Token
C) Run as Service
D) Act as Part of the Operating System
Answer: A
To view all questions and flashcards with answers, click on the resource link above.
Chapter 2: Designing Physical Topology
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8046
Sample Questions
Q1) Discuss the local Administrator's role on an RODC.
Answer: You can implement Administrator role separation on an RODC. In other words, you can enable the local Administrators role on an RODC by adding a user or group to that role. This user will then have the associated permission on the RODC to do regular maintenance, such as adding drivers or performing backups. However, the role membership will not grant the user any administrative rights or permissions in the domain.
When a server is promoted to a domain controller, the local database of users and groups is no longer available in Computer Management. This includes the local Administrators group. Instead, all accounts are managed through Active Directory Users and Computers, and permissions granted here apply to the entire domain. However, it is possible to enable the local Administrators role.
It's worth comparing the Server Operators group with the local Administrators role. You can add users or groups to the Active Directory Server Operators group, and they will have sufficient rights and permissions to administer any domain controllers without permissions to modify Active Directory. Notice the subtlety here: a member of the Server Operators group can administer any domain controller in the domain, while members of the local Administrators role can only administer the single RODC.
To view all questions and flashcards with answers, click on the resource link above.

Page 4
Chapter 3: Designing and Implementing DNS
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8047
Sample Questions
Q1) Stub zones are most commonly used to store information about a child zone associated with a child domain to reduce administrative effort.
A)True
B)False
Answer: True
Q2) List and describe the two types of computer names used in networks.
Answer: NetBIOS names. A NetBIOS name is 16 bytes long. The first 15 bytes are readable characters and the 16th is a hidden byte that identifies a service running on the system. Host names. A host name can be up to 255 characters, all of which are readable. When the host name is combined with the domain name, it becomes a fully qualified domain name (FQDN). As an example, a computer with a host name of DC1 in a domain named Cengage.com has an FQDN of dc1.cengage.com. Host names are used on any TCP/IP network, including the Internet.
Q3) DNS is the only type of name resolution in use.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Designing and Implementing Group Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8048
Sample Questions
Q1) Describe the Kerberos policy within Group Policy.
Q2) Discuss two ways that the GPO can be filtered.
Q3) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.
A) Template
B) Starter
C) Reference
D) Instantiated
Q4) The acceptable values for the PSO "mustHave" attribute msDS-PasswordSettingsPrecedence are ____.
A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
Q5) Discuss reasons to use OUs.
Q6) The _________________________ design is a simple OU design based on the structure of the organization.
Q7) Because users see OUs, the OUs must follow a structure understood by the users.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Designing Remote Access and Terminal Services Strategies
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8049
Sample Questions
Q1) Terminal Services includes technologies that allow users to run applications or full-blown desktops on terminal servers.
A)True
B)False
Q2) Terminal Services Gateway allows clients to remotely connect to TS servers using the ____.
A) RemoteApp
B) Remote Desktop Protocol
C) Independent Computing Architecture
D) Thinstation Access Protocol
Q3) ____ is used to provide end users with access to individual applications or full desktop operating systems from almost any mobile device.
A) Remote Services (RS)
B) Terminal Interactive Services (TIS)
C) Terminal Services (TS)
D) Remote Interactive Services (RIS)
Q4) Describe a NAP client.
Q5) The ____________________ of a policy determine if the policy will be used.
Q6) Explain the meaning of the term "client" with respect to RADIUS servers.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Designing and Implementing a PKI
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8050
Sample Questions
Q1) A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.
A) smart card
B) token
C) trusted computing base
D) trusted computing module
Q2) List the four steps required to complete the configuration of the online responder.
Q3) The ____ is the first CA in the hierarchy.
A) basis CA
B) original CA
C) root CA
D) subordinate CA
Q4) Discuss how certificates issued to network devices can be used.
Q5) After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.
A)True
B)False
Q6) Explain automatic certificate enrollment.
To view all questions and flashcards with answers, click on the resource link above. Page 8
Chapter 7: Securing Windows Server 2008 Servers
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8051
Sample Questions
Q1) List and explain one concern when considering adding WSUS to a network.
Q2) ____ provides updates for all supported versions of Windows operating systems.
A) Windows Update
B) Microsoft Update
C) Windows Control
D) Software Update
Q3) Describe the purpose of the WSUS statistics server.
Q4) ____ can be used to track the actions of users and record the details of these actions in the Windows Security log.
A) Policy monitoring
B) Scanning
C) Eventlog monitoring
D) Auditing
Q5) A perimeter network is provided by using two firewalls; this arrangement is often referred to as a(n) ____.
A) restricted zone
B) internal zone
C) demilitarized zone
D) buffer zone
Q6) Explain how to install WSUS.

Page 9
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Designing High Availability and Business
Continuity
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8052
Sample Questions
Q1) How can load balancing and fault tolerance be achieved?
Q2) When using NLB, you should obtain a certificate using the ____ of the cluster as the common name in the certificate.
A) IP Address
B) distinguished name
C) fully qualified domain name
D) domain name
Q3) When performing an authoritative restore with NTDSUtil, you use the ____ of the object.
A) common name
B) distinguished name
C) fully qualified domain name
D) short host name
Q4) If you want to back up only system state data using the Wbadmin command-line tool, you can use the following command:
A) Wbadmin delete systemstatebackup -backuptarget:x:
B) Wbadmin start systemstatebackup -backuptarget:x:
C) Wbadmin start sysrecovery -backuptarget:x:
D) Wbadmin start systemstaterecovery -backuptarget:x:
Q5) List and describe the steps to perform a non-authoritative restore.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Designing Supporting Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8053
Sample Questions
Q1) ____ can be used to copy and synchronize the content of DFS namespace folders from one DFS server to another.
A) DFS replication
B) DFS merging
C) DFS synchronization
D) DFS collaboration
Q2) ____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).
A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
Q3) A(n) ______________________________ is a microchip that is usually installed on the system motherboard.It provides the security-related functions for BitLocker, including the storage and encryption of different encryption keys.
Q4) Identify and describe a primary benefit that BitLocker provides.
Q5) List two applications through which RMS can be used to protect documents.
Q6) Provide an overview of how SCOM is used.
Q7) List and describe two WSS tools that can be used for collaboration.
Page 11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Designing Virtualization Strategies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/8054
Sample Questions
Q1) ____ is called Intel VT for Intel-based systems and AMD-V for AMD-based systems.
A) Hardware-assisted virtualization
B) Hardware application manager
C) Hardware-assisted manager
D) Virtual application manager
Q2) Imagine that you have five physical servers (HV1 through HV5), each hosting virtual machines, and you're preparing to migrate another physical server to a virtual environment.Explain how the Virtual Machine Deployment wizard can be used to help you select the best server for migration.
Q3) The ____ setting in the Virtual Network Manager ensures that the virtual machines remain completely isolated.
A) internal only
B) external
C) host only
D) NAT
Q4) What does a company need when they transition to multiple physical servers hosting multiple virtual servers?
Q5) List and describe the two primary components of Microsoft Application Virtualization.
To view all questions and flashcards with answers, click on the resource link above. Page 12