Cloud and Virtualization Technologies (with Windows Server component) Pre-Test Questions - 409 Verif

Page 1


Cloud and Virtualization Technologies (with Windows Server component)

Pre-Test Questions

Course Introduction

This course provides a comprehensive introduction to cloud computing concepts and virtualization technologies with a focus on their practical implementation using Windows Server. Students will explore the architecture, deployment, and management of virtual environments, including the use of hypervisors, virtual machines, and storage virtualization. Key topics include cloud service models (IaaS, PaaS, SaaS), networking in the cloud, security best practices, and resource optimization. The hands-on component emphasizes configuring and administering Windows Server features such as Hyper-V, Active Directory, and virtual networking to build scalable and secure cloud-based solutions suitable for modern enterprise needs.

Recommended Textbook

MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by

Available Study Resources on Quizplus

10 Chapters

409 Verified Questions

409 Flashcards

Source URL: https://quizplus.com/study-set/453 Page 2

Darril Gibson

Chapter 1: Designing Active Directory Domain Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8045

Sample Questions

Q1) _________________________ is used when objects are migrated between domains in the same forest.

Answer: Intraforest migration

Q2) The ____ authentication option allows Windows to automatically authenticate any users in another forest to access resources in the local forest.

A) domain-wide

B) tree-wide

C) schema-wide

D) forest-wide

Answer: D

Q3) The ____ authentication option can be used to prevent users in another forest from automatically being authenticated.

A) restricted

B) selective

C) filtered

D) one-way

Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Designing Physical Topology

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8046

Sample Questions

Q1) Describe DFS namespace.

Answer: A DFS namespace is used to group shared folders from different servers into a logically structured namespace. This namespace appears to the user as a single shared folder with nested subfolders. The user can access the namespace and easily access all of the shared folders without knowing (or needing to know) that the folders are located on multiple servers.

Q2) Discuss the merits of the Directory Services Utilities Tool.

Answer: The Directory Services Utilities tool (DSMgmt.exe) is mentioned in some documentation as a method to enable Administrator role separation on the RODC. However, this tool is not recommended because it only stores the data locally on the RODC. Using Active Directory Users and Computers is the preferred method.

Q3) If your organization includes multiple locations, you can add the sites, subnets, and site links using ____.

A) Active Directory Users and Computers

B) Active Directory Site Editor

C) Active Directory Sites and Linkages

D) Active Directory Sites and Services

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Designing and Implementing DNS

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8047

Sample Questions

Q1) A(n) ____________________ name mimics a NetBIOS name.

Answer: single-label

Q2) List and describe a condition that prevents you from hosting an ADI zone.

Answer: When a standard primary zone is hosted on a member server. ADI zones are only supported on DCs. If the DNS server is not hosted on a DC, it cannot support ADI zones.You can only add a secondary standard primary zone, not an ADI zone, to this DNS configuration.

When a standard primary zone is hosted on a domain controller. If DNS is located on a DC, it can still host a standard primary zone (instead of an ADI primary zone). If this is the case, you can only add a secondary standard primary zone.

Q3) DNS zones are indirectly associated with Active Directory.

A)True

B)False

Answer: False

Q4) A(n) ___________________ record is used to find mail servers. Answer: mail exchange (MX) mail exchange

MX

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Designing and Implementing Group Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8048

Sample Questions

Q1) A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization.

A) Domain Policy

B) Security Policy

C) Group Policy

D) Administration Policy

Q2) GPOs can be linked to either the Users container or the Computers container.

A)True

B)False

Q3) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template

B) Starter

C) Reference

D) Instantiated

Q4) The only technical reasons to design OUs are ____.

A) administrative control and software distribution

B) administrative control and well-organized structure

C) to delegate control or manage security policy

D) to delegate control or manage objects using Group Policy

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Designing Remote Access and Terminal

Services Strategies

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8049

Sample Questions

Q1) A full-blown server configured as a router is more efficient than a dedicated hardware router.

A)True

B)False

Q2) ____ enforcement is used with managed switches and wireless access points to control access and ensure that traffic stays within a limited network.

A) DHCP

B) IPSec

C) Terminal

D)802.1x

Q3) If NAP ____ is enabled, the SHV can direct the noncompliant client to enable a specific security solution to ensure that the client becomes compliant.

A) autoremediation

B) remediation

C) autocorrection

D) enforcement

Q4) In organizations that use several RADIUS servers, a RADIUS ____________________ server can be implemented as a central switching or routing point.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Designing and Implementing a PKI

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8050

Sample Questions

Q1) Discuss how certificates issued to network devices can be used.

Q2) AD CS publishes the full CRL once a ____ by default.

A) day

B) week

C) month

D) year

Q3) You can use the ____ to view and manage all of the certificate stores used by the computer, users, or services on a computer.

A) Policies MMC

B) Computer Management MMC

C) System MMC

D) Certificates MMC

Q4) A PKI may appear complex on the surface but is actually rather simple.

A)True

B)False

Q5) A(n) ____ is a complete listing of all certificates revoked by the CA.

A) new CRL

B) delta CRL

C) alpha CRL

D) revocation CRL

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Securing Windows Server 2008 Servers

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8051

Sample Questions

Q1) Discuss using WSUS with branch offices.

Q2) ____ are a group of updates used to target a specific area such as security, or a specific component or application.

A) Service packs

B) Drivers

C) Update rollups

D) Updates

Q3) ____________________ identify resources in one network that can communicate with resources in another network.

Q4) ____ can be used to track the actions of users and record the details of these actions in the Windows Security log.

A) Policy monitoring

B) Scanning

C) Eventlog monitoring

D) Auditing

Q5) The scwcmd command transform is used to roll back the settings of the last applied SCW security policy.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Designing High Availability and Business

Continuity

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8052

Sample Questions

Q1) The ___________________ tools feature in Windows Server Backup includes support for doing backups with Windows PowerShell commands and scripts.

Q2) The ________________________ feature adds the services used for backup and restore, and includes support for both the Windows Server Backup console and the Wbadmin command-line tool.

Q3) The primary tool you'll use to create and configure NLB clusters is the ____.

A) Computer Manager

B) Server Manager

C) Network Load Balancing Manager

D) Networking Center

Q4) Servers within a failover cluster are referred to as ____.

A) units

B) nodes

C) components

D) hosts

Q5) Explain how the network address is assigned in a NLB cluster.

Q6) Explain the results of pausing, stopping and evicting a node.

Q8) Discuss the hardware and shared storage requirements of a failover cluster. Page 10

Q7) ___________________ are commonly used to achieve high availability.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Designing Supporting Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8053

Sample Questions

Q1) The ____ security element of data security is protected using standard methods such as locked doors and cipher locks.

A) secrecy

B) physical

C) operational

D) network

Q2) The command-line tool ____ is used to manage the Server for NFS and Client for NFS components in a UNIX system.

A) Dfsadmin

B) Nfsadmin

C) Nfscfg

D) Nfsmgmt

Q3) ____ is an add-on server product that can assess, deploy, and update large numbers of client computers or servers in an enterprise.

A) Microsoft System Center Operations Manager 2007

B) Microsoft System Center Virtual Machine Manager 2007

C) Microsoft System Center Configuration Manager 2007

D) Microsoft System Center Service Manager 2007

Q4) List two applications through which RMS can be used to protect documents.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Designing Virtualization Strategies

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/8054

Sample Questions

Q1) With application virtualization, terminal services can be used to host entire desktops or applications.

A)True

B)False

Q2) Hyper-V can be added to a virtual server using Microsoft Virtual PC or Windows Virtual PC.

A)True B)False

Q3) List and describe the two primary components of Microsoft Application Virtualization.

Q4) Virtual ___________________ streaming provides only a portion of the application needed by the user to begin working.

Q5) SoftGrid-enabled applications are created or sequenced on a server running the ____.

A) Microsoft Application Sequencer

B) Microsoft Virtualization Sequencer

C) Microsoft Virtual Machine Sequencer

D) Microsoft Application Virtualization Sequencer

Q6) Discuss how a VPC machine can be used to provide access to a legacy application.

Q7) Describe the Microsoft SoftGrid Application Virtualization for Desktops.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.