Você está na página 1de 21

Hands-on Windows Server 2008 Chapter 1 Solutions

Answers to the Chapter 1 Review Questions

1. The small company where you work needs to implement a second server for its accounting systems, but does not have the funds to purchase another compute r until next year. Which of the following is a solution? Answer: b. Use virtualization. 2. You are consulting for an organization that has UNIX, Linux, and Window s Server 2008 servers. What feature in Windows Server 2008 enables coordination between systems that have different directory services? Answer: c. Microsoft Metadirectory Services

3. You are the administrative assistant for the Psychology Department in y our college and they have assigned you to set up a small server to provide basic file services to faculty, staff, and students in that department. For example, faculty will use the server to post and receive class assignments. Which edition of Windows Server 2008 is most appropriate for this situation? Answer: a. Standard Edition

4. Your company has a Web server and sometimes when the network administra tor uses tools to test the Web server by IP address there is no response from th e server. Which of the following might be the problem? Answer: a. The Web server is set up with dynamic addressing and so its IP addres s changes periodically.

5. _____ enables a Windows Server 2008 system to run more than one program at the same time. Answer: d. Multitasking 6. Which of the following can you accomplish with Windows PowerShell? (Cho ose all that apply.) Answer: a. Set up printing., b. Install software., c. View information about loc al user accounts., and d. View a listing of files in a folder.

7. Your company has many telecommuters who work at home three days a week and in their offices two days a week. In both places they work with a laptop com puter provided by the company. While the management team supports telecommuting, they are concerned about telecommuters who make changes to the security setting

s on their computers that do not match the security policies on the company s netw ork. Which of the following offers a solution for enforcing good security on thi s company s network? Answer: b. Network Access Protection (NAP)

8. _____ is used to enable Windows Server 2008 to support UNIX and Linux c lients. Answer: Subsystem for UNIX-based Applications (SUA)

9. A server administrator can use the _____ tool to view network connectio ns, configure a firewall, and configure storage on a Windows Server 2008 compute r. Answer: Server Manager

10. Your company needs to set up a new print server and that has a small attack s obtaining company secrets. Which of the reduced attack surface? (Choose all that Answer: c. Windows Server Core

server that acts as a general file and surface to reduce the risk of attacker following installation options offer a apply.)

11. The management in your company has a disagreement over which client opera ting system offers the best compatibility with Windows Server 2008 Active Direct ory. Which of the following operating systems do you mention in your report to m anagement to clear up the dispute? Answer: d. Windows Vista

12.

Hyper-V enables Windows Server 2008 to operate as a _____ server.

Answer: virtual

13. One of the managers in your organization has seen older servers crash bec ause of one malfunctioning program. Is there any feature in Windows Server 2008 to help prevent this from happening? Answer: a. privileged mode for the kernel

14. Which of the following is/are network design models used with Windows Ser ver 2008? (Choose all that apply.) Answer: b. server-based and d. peer-to-peer

15. On your small office network there is no DHCP server to lease IP addresse s. What happens when the network connections of all clients and the servers are configured to obtain an IP address automatically? (Choose all that apply.) Answer: a. Each computer assigns itself an IP address. and c. The subnet mask 25 5.255.0.0 is used for all computers.

16.

The physical address of a NIC is its _____ address

Answer: media access control or MAC

17. You are training a new computer support person who does not know how to c onfigure a static TCP/IP network connection. Which of the following elements do you show the support person how to configure? (Choose all that apply.) Answer: a. IP address, c. default gateway, and d. subnet mask

18. .

_____ is the ability to add RAM without powering down Windows Server 2008

Answer: hot-add memory

19. Your IT manager wants you to set up three computers to appear to users as one powerful Windows Server 2008 server. What capability in Windows Server 2008 accomplishes this? Answer: d. clustering

20. Which of the following would you find in the database of Windows Server 2 008 and network information found in Active Directory? (Choose all that apply.) Answer: a. users, b. shared printers, c. groups of users, and d. computers

Chapter 2 Solutions

Review Questions

1.

Your colleague is trying to upgrade from Windows Server 2003 Datacenter

Edition to Windows Server 2008 Standard Edition, but the Setup program won t allo w the upgrade. Which of the following is the problem? Answer: c. Windows Server 2003 Datacenter Edition cannot be upgraded to Windows Server 2008 Standard Edition.

2. Your IT director heard about a fast but inexpensive new computer and pu rchased it to be the new Windows Server 2008 server on the network. When you att empt to install Windows Server 2008 the operating system won t install because the re seems to be a problem with the BIOS in the new computer. How might this dilem ma have been avoided? Answer: d. The IT director should have checked to see if the computer hardware a nd BIOS were certified for Windows Server 2008.

3. You have installed Windows Server 2008, but when the computer reboots y ou only see a command line screen. However, you intended to implement a full ver sion of the operating system with the normal Windows GUI. What has happened? Answer: d. During the installation, you selected to install Server Core instead of the full installation.

4. Which of the following are roles that can be implemented in Windows Ser ver 2008? (Choose all that apply.) Answer: b. Application Server, c. Fax Server, d. Terminal Services

5. You have installed Windows Deployment Services, but the installation do es not properly work. Which of the following might be the problem? (Choose all t hat apply.) Answer: a. There is no DHCP server on the network. and b. Active Directory is no t installed on a network server.

6. Before you install Windows Server 2008, the company s management team has expressed a concern about the Marketing Department using too much disk space on the server, because they aren t good about deleting old files. What feature(s) of NTFS in Windows Server 2008 can be used to help address this concern? (Choose a ll that apply.) Answer: b. compression and d. disk quotas

7.

The maximum length for a Windows Server 2008 computer name is _____. Answer: 63 characters

8. The _____ server role is used to manage security tokens and security se rvices for a Web-based network. Answer: Active Directory Federation Services

9. Your company plans to purchase and implement 21 new servers in the next few months and then add 10 more over the next year. You want to make a case for using Windows Deployment Services. Which of the following do you mention as you make the case? (Choose all that apply.) Answer: a. lowers installation costs, b. enables consistent deployment and confi guration, and d. enables the servers to be administered together through the hel p of scripts

10. You have installed Windows Server 2008, but during the installation there was no screen on which to enter the name of the server computer. What tools ena ble you to name the server? (Choose all that apply.) Answer: a. Initial Configuration Tasks window

11. When you configure a server to be a member of a domain, at the time of co nfiguration the server checks the network to verify _____. Answer: there is such a domain

12. Which of the following must you do shortly after installing Windows Serve r 2008 in order to keep the server functions enabled? a. Activate Windows Server 2008.

13. The _____ file is needed for an unattended installation via Windows Deplo yment Services. Answer: unattend.xml

14. The latest service pack has some patches that you need for Windows Server 2008 security. Your assistant says the only way to get a service pack is to ord er a CD from Microsoft. Is there a faster way to obtain the service pack? (Choos e all that apply.) Answer: b. Use Windows Update. and c. Check Microsoft s Web site for a download of the service pack.

15. You are installing Windows Server 2008, but the Setup program does not fi nd any hard disk drives on the computer. What step or steps are best to take ini tially? (Choose all that apply.)

Answer: c. Press F6 when the installation displays storage device information an d provide a driver for the hard disks. and d. Reseat the disk adapters/controlle rs.

16. The target client computer which is to install an operating system via Wi ndows Deployment Services should be _____ enabled. Answer: pre-boot execution environment (PXE)

17. Your assistant is about to install the latest service pack for Windows Se rver 2008 on a production server. What is your advice before he starts? (Choose all that apply.) Answer: b. Back up the server before starting.

18. When you install Windows Server 2008, you enter a password and confirm it for the _____ account. Answer: Administrator

19. You are going to perform a Windows Server 2008 installation early in the morning before a meeting and decide to make yourself a checklist of things to do immediately before you start. Which of the following are on your checklist? (Ch oose all that apply.) Answer: a. Disconnect any flash als in the computer. c. Use the o verify key hardware elements, y hardware, such as the NIC, is drives. b. Have on hand drivers for new peripher test software disc that came with the computer t such as the CPU. and d. Ensure that all necessar preinstalled.

20. The server you are installing is to be used for the Distributed File Syst em. Which role should be installed on the server? Answer: a. File Services

Chapter 3 Solutions

Review Questions

1. You have installed Windows Server 2008 and had to provide a new driver file for the disk drives in your computer. Now it seems like the disk drives are not responding as quickly as advertised. What can you do? Answer: b. Ensure that the DMA transfer mode is configured for the drives.

2. Each time that you access files on a disk, the monitor blinks or goes b lank for several seconds. What might be the source of the problem and possible s olution? Answer: d. There is an IRQ conflict and you need to use Device Manager to resolv e the problem.

3. You have just used the servermanagercmd command to install two server r oles. Which of the following commands can you use now to verify that the roles a re installed? Answer: a. servermanagercmd -query

4. You want to confirm how space is allocated on the disk drives installed in your server. Which of the following tools enables you to do this? Answer: c. Server Manager

5. Which of the following can be installed using the Add Hardware Wizard? (Choose all that apply.) Answer: a. CD/DVD drive, b. keyboard, c. monitor, and d. disk drive

6. You ve obtained a new driver from the Internet for your server s NIC. What tool enables you to install the driver? Answer: a. Device Manager

7. You have noticed lately that your server is running very slowly, especi ally when switching between programs. You see that the C: partition is running l ow on space, limiting the size of your paging file. You have a second partition, D:, that has 100 GB of free space. How can you move the paging file from partit ion C: onto partition D:? Answer: c. Configure it from the System window opened through Control Pa nel.

8. A _____ variable is defined by the operating system and is applied to e very user when logged on.

Answer: system environment

9. Your organization has consolidated servers through virtualization and n ow needs to remove the Windows Deployment Services server role from one of its s ervers. Which of the following tools enable you to remove a server role? (Choose all that apply.) Answer: d. ServerManagercmd.exe

10. e.

_____ enables Windows Server 2008 to verify that a device driver is secur

Answer: Driver signing

11. When programs are running in Windows Server 2008, _____ monitors their us e of memory to be sure they do not cause memory problems. Answer: Data Execution Prevention (DEP)

12. Your server keyboard sometimes hesitates or seems like it is disconnectin g from the computer. Which of the following tools enables you to run a quick che ck on whether the keyboard is working properly? Answer: c. Device Manager

13.

_____ Protocol is used for combined voice and video transmissions. Answer: Reliable Multicast

14.

The purpose of the scwcmd rollback command is to _____.

Answer: roll back the most recent changes to the Security Configuration Database

15. Your server has a virus with elements of the virus embedded in the Regist ry. The virus checker has located these elements, but cannot delete them. What t ool can you use to delete these virus elements in the Registry? Answer: b. regedit

16. You are working in PowerShell and receive a call that users cannot use th e print services through the server. What command can you run to quickly determi ne services that are running or are stopped?

Answer: b. get-service

17. Which of the following be accomplished through using the Security Configu ration Wizard? (Choose all that apply.) Answer: a. disable unused services, b. configure firewall rules, and d. analyze security settings

18.

Which of the following are Registry elements? (Choose all that apply.) Answer: b. keys and c. values

19. Your server has 4 GB of RAM. What should the initial amount of virtual me mory be set to? Answer: d. 6144 MB

20. Your company is working to save costs by conserving the power consumption of its servers. Which of the following default power plans should you select fo r Windows Server 2008 servers? Answer: c. power saver

Chapter 4 Solutions

Review Questions

1. Your company has four departments: Marketing and Sales, Manufacturing, Product Research, and Business. Which of the following Active Directory containe r design plans might you use to best manage the user accounts and network access needs of each department? Answer: c. Create four OUs in one domain.

2. Using the example in Question 1, what Active Directory capability can y ou use to establish different account lockout policies for each of the four depa rtments? Answer: a. fine-grained password policies

3. Your colleague is trying to create a universal security group for the t hree administrators of the single standalone server in his company. The problem is that he can t find an option to create a universal security group. What is the problem? Answer: d. He cannot create a universal security group on a standalone server an d must instead create a local security group.

4. One of the DCs in your company reports it has an Active Directory error and you need to fix it as quickly as possible to reduce downtime. Which of the following tools can you use to stop and restart AD DS on that server? (Choose al l that apply.) Answer: b. Server Manager

5. Which of the following server operating systems can be used when the do mains in Windows Server 2008 Active Directory are set at the Windows Server 2003 domain functional level? (Choose all that apply.) Answer: c. Windows Server 2003 and d. Windows Server 2008

6.

Domains in a tree are in a _____ relationship. Answer: Kerberos transitive trust relationship

7. You ve installed the AD DS server role, but find that Active Directory is not fully implemented. What should you do next? Answer: c. Run dcpromo.

8.

A _____ is a unique number associated with each object in AD DS. Answer: globally unique identifier (GUID)

9. Your school has a parent object named straton.edu and the child object names stratonalum.org and studentarts.org. What kind of namespace is this? Answer: a. disjointed

10. Your company s management has decided that the accounts in all OUs should b e set up and managed by the Information Technology department s security specialis t. As the AD DS administrator, how can you best give the security specialist thi s capability?

Answer: c. Use the delegate control feature to give her control of all of the OU s that contain user accounts.

11.

Name three optional attributes associated with a user account.

Answer: Any three of: account description, account holder s office number or addre ss, account holder s telephone number, account holder s e-mail address, account hold er s Web page (or students can list others from observing the optional properties associated with an account)

12. Which of the following are actions performed by the global catalog? (Choo se all that apply.) Answer: a. provides lookup and access to all resources in all domains an d d. authenticates users when they log on

13. The business manager in your organization is leaving, but she has been t raining the new business manager who will take over the day after the old busine ss manager leaves. What AD DS capability can you use to transfer the old busines s manager s account to the new business manager? Note that in this organization, a ccounts reflect the actual names of users. Answer: d. Disable the old business manager s account when she leaves work. As soo n as the new business manager takes over, rename the account for the new busines s manager and then enable the account

14. Your company builds roads and bridges. The home office is located in Ohio . Each time there is a construction project, the company establishes a temporary office at the construction site. The project manager for each project takes alo ng a server set up for the AD DS role to connect remotely to the home office. Fo r the sake of security, what should the remote server be? Answer: b. an RODC

15. Which of the following is true about all trees in a forest? (Choose all t hat apply.) Answer: a. They all use the same schema and c. They all use the same global cata log.

16. You have set up auditing for modifications to Active Directory. Now you w ant to monitor the results of the auditing. How do you do this? Answer: c. Periodically view the security log.

17.

A site reflects interconnected _____ and is used for DC _____ .

Answer: subnets, replication

18. When you create user accounts, you want to set them up so that users do n ot have access to use their accounts after 7 pm on workdays and on weekends. Thi s is a security measure your company s management wants. From where can you set up these logon restrictions? Answer: c. You set up these restrictions from the Account tab in the use r account properties.

19.

To reset a password, you use the _____ tool.

Answer: Active Directory Users and Computers

20.

What is the scope of a domain local security group? Answer: a. The domain in which the group is created.

Chapter 5 Solutions

Review Questions

1. Your company writes software for voting machines and needs to ensure th at the software and documentation is carefully protected on its servers. Last we ek one of the servers was stolen from its machine room, but fortunately that ser ver did not contain sensitive voting machine files. What file security can your company use to protect its information in the future, so that even if a server i s stolen its files cannot be accessed? Answer: a. Microsoft Encrypting File System

2. A fellow programmer has set up a shared folder of programs he is workin g on, but the problem is that several users have discovered the folder and have been trying out the programs. What steps can the programmer take to ensure that only he can view and access the folder? (Choose all that apply.) Answer: a. Use permissions to secure the shared folder. and c. Place a dollar s ign after the name of the shared folder to hide it.

3. Your company has salespeople who use laptop computers for travel. When they go out they need to access marketing files stored on the server. What capab ility enables them to access these files while they are on the road and cannot c onnect to the network? Answer: d. offline files

4. The water resources group in your organization asked you to create a sh ared folder to hold research data. Ten people are in the group; two of them cann ot access the file but the other eight can. What can you do to easily determine why two people cannot access it? Answer: c. Check the effective permissions for that folder.

5. You have configured a folder for sharing, but users do not see the serv er on the network. What might be the problem? (Choose all that apply.) Answer: b. Network discovery is disabled. and c. The Windows Firewall is blockin g incoming and outgoing access.

6.

The _____ can change permissions on a folder.

Answer: owner (students might also include administrator, but owner is t he best answer)

7. You ve published a folder in Active Directory and now want to test your w ork by finding it in Active Directory from Windows Server 2008. Wha t steps do you take? Answer: b. Click Start, click Network, and click the Search Active Direc tory button.

8.

Use the _____ tool to publish a shared folder in Active Directory. Answer: Active Directory Users and Computers

9. Your college uses shared folders to make class information and assignme nts available to students. The shared folders are currently on three different c omputers, and finding the right folder can be confusing. What is a possible solu tion to make the folders easier for students to find and use? Answer: d. Set up the shared folders in DFS.

10. The Computer Advisory Committee in your company has been concerned that u sers store many files on the servers, but aren t good about deleting old files. Th is has resulted in less free space on the servers disks. What solution do you pro

pose? Answer: d. Set up disk quotas for user accounts.

11.

What are the two DFS models?

Answer: standalone and domain-based

12. Your company has installed Subsystem for UNIX-based Applications (SUA) on a Windows Server 2008 server. You have copied over a test program from a UNIX c omputer and try to run it in the SUA environment, but it won t run. What might be the cause of the problem? Answer: d. You have to recompile the program source file in the SUA envi ronment.

13. Several of your DFS clients complain that it can take some time to access a DFS shared folder, even though they just recently accessed it. They are expec ting faster response. What can you do? Answer: a. Tune the cache duration for the folder.

14. You have a series of older files that you don t access often, but you do ne ed them occasionally. Some of these folders take up large quantities of disk spa ce. What NTFS feature can you use to reduce the disk space they occupy? Answer: b. Use the compress attribute.

15. As the server administrator, you currently own a folder but want to trans fer ownership to the user who will now manage that folder s contents. How can owne rship be transferred to the user? Answer: c. Give the user Full control permissions and then have the user take ow nership.

16. ing?

Subsystem for UNIX-based Applications is installed as which of the follow

Answer: d. feature

17. Your network has Linux, Windows Vista, and Windows Server 2008 computers. Active Directory is also in use through Windows Server 2008. You are tired of m anaging accounts and groups for both the Linux computers and the Windows compute rs. To reduce your account and group management workload you can _____? Answer: install Subsystem for UNIX-based Applications and implement Server for N

etwork Information Services.

18. Which of the following can you accomplish using the DFS Management tool? (Choose all that apply.) Answer: a. Create a namespace root., b. Delegate management over a namespace roo t., c. Create a folder in a namespace root., and d. Tune a namespace root.

19. A set of shared folders copied in DFS to one or more servers is called a _____. Answer: replication group

20. You have created a shared folder for the management team at your company. You need to give each member of the team the ability to add files to the shared folder, but also to only change and delete files that the member has placed in the shared folder. Which of the following share permissions should you allow for the members of the management team? Answer: c. Contributor

Chapter 6 Solutions

Review Questions

1. One of the users on your network has called to report that a shared pri nter on your Windows Server 2008 print server is not printing. Which of the foll owing tools can you use to check the status of the printer? Answer: c. Print Management tool

2. You have a printer that is primarily used to handle large graphics prin t files. When you configure the port for this printer, which of the following po rt timeout settings should you use? Answer: d. 120 seconds

3. You own an architectural firm that has two plotters and four laser prin ters. Your paper costs are very high because people often send print jobs intend ed for a plotter to a laser printer and vice versa. These errors typically resul t in page after page of printing with strange characters, wasting money and time . What can you do to address this problem? Answer: b. Configure the printers to hold mismatched documents.

4. You have set up a shared printer for UNIX and Linux clients, but when y ou test the set up the printer produces strings of control codes or simply hangs up. Which of the following might be the problem? Answer: a. The data type is set to NT EMF and should be RAW.

5. Your company s programmers use one shared printer to print out lines of p rogram code for analysis. They complain that often when they retrieve a printout , ending pages from the last printout or the beginning pages of the next printou t are mixed in. This is because many of the printed pages appear very similar at first glance and it s hard to know where one printout ends and the next begins. W hat do you propose as a solution? Answer: c. Configure the printer properties to use a separator page.

6. You can install the _____, _____, and _____ services when installing th e Print Services role. Answer: Print Server, Internet Printing, and LPD Service

7. Which of the following can you accomplish from the Printers window, whi ch is opened through Control Panel? (Choose all that apply.) Answer: a. Install a printer., b. View what is printing on a printer., and c. Ac cess the printer s properties.

8. You can publish a shared printer in Active Directory by accessing the p rinter s properties and using the _____ tab. Answer: Sharing

9. You are configuring a serial printer on a COM port. Which of the follow ing can you configure by using the Configure Port button? (Choose all that apply .) Answer: b. port speed and c. flow control

10. Your associate has configured five shared printers so that print files ar e sent directly to the printer and printing is done in the foreground. However, when the printers are busy this slows down the CPU on the server managing the pr int jobs. What should be done to address this problem? Answer: d. Configure every printer to spool the print jobs and to print in the background.

11.

Briefly explain the purpose of the graphics device interface (GDI).

Answer: As noted in the text, the GDI integrates information about the print fil e such as word-processing codes for fonts, colors, and embedded graphics objects wit h information obtained from the printer driver installed at the client for the t arget printer, in a process that Microsoft calls rendering

12. You have just set up two shared printers from Windows Server 2008, and yo u also plan to manage four other network printers from the server. Your plan is to manage all of these printers using the Print Management tool, but the tool do es not appear on the Administrative Tools menu. What is the problem? Answer: c. You need to install the Print Services role.

13. Which of the following can you accomplish using the Print Management tool ? (Choose all that apply.) Answer: a. Consolidate Windows Server 2008 print servers in one place for manage ment., b. Find out how many jobs are in the print queue of a printer., c. Set up to use special forms for printing., and d. Reconfigure printer ports used with printers.

14. You have set up a shared printer on a Windows Server 2008 server. Also, y ou have given Mat Chen s user account Manage documents permission so that Mat can delete the print jobs of any user. However, when Mat tries to delete someone els e s print job, he doesn t have permission. Mat is a member of two global groups, Sup ervisors and Marketing. Also, the Supervisors group is a member of the Managers domain local group, and the Marketing group is a member of the Business domain l ocal group. Which of the following might be a problem? Answer: b. The Business domain local group is denied Manage documents permission on that printer.

15. You have purchased a printer that has the capability to print in duplex m ode so that users can print on both sides of a sheet of paper. However, when use rs try to use this capability when they send a print job, documents are still pr inted on only one side. Which of the following might be the problem? Answer: d. The duplex mode needs to be enabled on the Device Settings tab in the printer s properties.

16. From where can you stop and restart the Print Spooler service? (Choose al l that apply.) Answer: a. Computer Management tool and d. Server Manager

17. A _____ printer can engage in two-way communications between the printer and the print server and requires a(n) _____ cable? Answer: bidirectional; IEEE 1284

18. Your committee has created a 290 page report for management and you decid e to print one copy initially. You send the copy to the printer and then remembe r that you may not have made a correction to the footer material that prints at the bottom of each page. You pause the printout to check. After you determine al l is OK, you decide to continue printing. Which of the following options should you use from the Document menu on the printer window for that printer to continu e from where you left off? Answer: b. Resume

19.

WinPrint is a _____.

Answer: print processor

20. Your department head is in a hurry to print his report for the managers m eeting that starts in 20 minutes, but the printer he uses is currently backed up with 32 print jobs that may take more than 20 minutes to print. You are the pri nt server administrator. How can you help your department head? Answer: d. Open that printer s print window and change the priority of the print j ob to 99 in that print job s properties.

Chapter 7 Solutions

Review Questions

1.

You have just installed a new disk on a Windows Server 2008 server. Whi

ch of the following do you do first to prepare the disk for use? Answer: a. partition the disk

2. The _____ partition or volume contains the operating system files, such as the files in the \Windows folder. Answer: boot

3. You have just upgraded from Windows Server 2003 to Windows Server 2008. Now you are trying to recover a set of databases that you backed up on DVDs in Windows Server 2003 before you started the upgrade, but the Windows Server Backu p tool gives you an error message. What is the problem? Answer: c. The Windows Server Backup tool is not compatible with backups made fr om the Windows Server 2003 Backup tool.

4. Your company is considering installing an iSCSI SAN, but one of the dep artment heads mentions that he has heard Windows Server 2008 does not have a man agement tool for an iSCSI SAN. What is your response? Answer: d. This is not true because you can install Storage Manager for SANs.

5. You are consulting for a company that has been performing full backups every night for its Windows Server 2008 servers. A problem they have been experi encing is that the backups are taking longer and longer. What is your recommenda tion for this company? Answer: b. Use a custom backup that enables you to use a combination of full and incremental backups.

6.

Dynamic disks support RAID levels _____, _____, and _____. Answer: 0, 1, and 5.

7. You are consulting for an organization that has chosen to use disk stri ping as a way to extend the life of their four hard disks. Now one of the disks has failed and they call you for help. What do you advise them? Answer: d. Install a new disk and perform a full restore on all four disks.

8. Answer: 3

RAID level 5 requires a minimum of _____ hard disks.

9. As the IT director for a large investment company, you are always looki ng for ways to build in better fault tolerance for your computer systems. As you consider your present hard disk storage situation, you have a large SAN connect ed to the main network through a high speed switch. What else can you do to assu re fault tolerance for your SAN? Answer: a. Create additional paths to the SAN, such as through one or more addit ional switches and take advantage of Multipath I/O.

10. Which of the following can you restore from the Windows Server Backup too l? (Choose all that apply.) Answer: a. the backup catalog, b. volumes, c. folders, and d. th e operating system

11. How much free space must you have on a basic disk to convert it to a dyna mic disk? Answer: At least 1 MB of free space is needed.

12. You have decided to shrink a 250 GB disk to change 130 GB of that disk to unallocated space. However, the shrinking process only results in 98 GB of unal located space. What would have caused the smaller portion of unallocated space? Answer: c. The shrinking process encountered a file that cannot be moved and had to stop early.

13. You have spent the morning archiving old files to DVDs and then deleting those files as a way to get back some disk space. Also, you ve recovered some arch ived financial files to prepare for the auditor s visit. After you finish, you not ice that the server seems to run slower. What should you do Answer: b. Start the Disk Defragmenter to defrag your disks.

14. Which of the following can you accomplish with the Disk Management tool? (Choose all that apply.) Answer: c. Create a simple volume and d. Convert a basic disk to a dynamic disk.

15. Your new IT colleague is trying to determine the location of a mounted dr ive on the server, because he is not sure what a mounted drive is. Which of the following do you tell him? Answer: b. A mounted drive is located in a folder.

16. Which of the following must be true to boot from a disk in Windows Server 2008? (Choose all that apply.) Answer: a. It is an active partition. and d. It is a primary partition.

17.

Briefly explain the concept of a spanned volume.

Answer: A spanned volume contains 2 to 32 dynamic disks that are treated as one volume.

18. Which of the following is checked by the chkdsk utility? (Choose all that apply.) Answer: a. indexes, b. disk allocation units, and d. sectors

19.

Explain disk duplexing.

Answer: In disk duplexing the information on a main disk is shadowed or mirrored on a second disk. If the main disk fails, the mirrored disk is used. Disk duple xing is different than disk mirroring, however because it places the backup disk on a different controller or adapter than is used by the main disk which provid es better fault tolerance.

20. You have configured a RAID-5 volume using five 250 GB disks. How much dis k space is actually available for storage of folders and files? Answer: c. 1000 GB

Você também pode gostar