Beruflich Dokumente
Kultur Dokumente
Windows Server 2008 has several sets of permissions that operate independently of each other.
Which permissions control access to folders over a network?
share permissions
The __________ service enables the computer to share files with network users and is installed on all
Windows Server 2008 computers by default.
Server
The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role
includes two technologies: DFS Namespaces and __________.
DFS Replication
Assigning permissions to __________ enables you to add new users or move them to other job
assignments without modifying the permissions themselves.
groups
Multiple master __________ is a technique in which duplicate copies of a file are all updated on a
regular basis, no matter which copy changes.
replication
The File Services role and other storage-related features included with Windows Server 2008 provide
tools that enable system administrators to address many problems on a scale appropriate to a large
enterprise network. However, before you implement the role or begin using these tools, what should
you spend some time thinking about?
your users' needs and how these needs affect their file storage and sharing practices
At its simplest, DFS is a virtual __________ technology that enables you to create a single directory
tree that contains references to shared folders located on various file servers, all over the network.
namespace
To create multiple shares and exercise more granular control over their properties, you can use the
__________ Folders snap-in.
Shared
If your organization has branch offices scattered around the world and uses relatively expensive wide
area networking (WAN) links to connect them, it would probably be more economical to install a file
server at each location rather than having all of your users access a single file server using the WAN
links.
True
When preparing a hard disk for use, Windows Server 2008 file servers can use the same settings as
workstations.
False
By default, the Callback Options setting is configured as No Callback.
True
A hub examines the destination and source address of an incoming data frame and forwards the
frame to the appropriate destination port according to the destination address.
False
As a final step in configuring the Network Policy Server to provide authentication, authorization, and
accounting for your remote access clients, you will also need to configure
__________.
accounting
You can view the IP routing table by using the Routing and Remote Access console or the
__________ prompt.
command
By default, the Callback Options setting is configured as __________.
No Callback
An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the
following items?
all of the above - Conditions, Constraints, Settings
Routers are considered components of which layer?
layer 3
The final column in the routing table corresponds to the routing table entry's __________.
metric
One example of an NPS Policy Setting includes IP properties that specify IP address assignment
behavior. Which of the following is not an option?
Client Must Supply an IP Address
What term refers to the device that is seeking access to the network, such as a laptop attempting to
access a wireless access point?
supplicant