Sie sind auf Seite 1von 2

Quiz Chapters 5 and 6 Week 4

Windows Server 2008 has several sets of permissions that operate independently of each other.
Which permissions control access to folders over a network?
share permissions

The __________ service enables the computer to share files with network users and is installed on all
Windows Server 2008 computers by default.
Server

The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role
includes two technologies: DFS Namespaces and __________.
DFS Replication

Assigning permissions to __________ enables you to add new users or move them to other job
assignments without modifying the permissions themselves.
groups

Multiple master __________ is a technique in which duplicate copies of a file are all updated on a
regular basis, no matter which copy changes.
replication

The File Services role and other storage-related features included with Windows Server 2008 provide
tools that enable system administrators to address many problems on a scale appropriate to a large
enterprise network. However, before you implement the role or begin using these tools, what should
you spend some time thinking about?
your users' needs and how these needs affect their file storage and sharing practices

At its simplest, DFS is a virtual __________ technology that enables you to create a single directory
tree that contains references to shared folders located on various file servers, all over the network.
namespace

To create multiple shares and exercise more granular control over their properties, you can use the
__________ Folders snap-in.
Shared

If your organization has branch offices scattered around the world and uses relatively expensive wide
area networking (WAN) links to connect them, it would probably be more economical to install a file
server at each location rather than having all of your users access a single file server using the WAN
links.
True

When preparing a hard disk for use, Windows Server 2008 file servers can use the same settings as
workstations.
False

By default, the Callback Options setting is configured as No Callback.
True

A hub examines the destination and source address of an incoming data frame and forwards the
frame to the appropriate destination port according to the destination address.
False



As a final step in configuring the Network Policy Server to provide authentication, authorization, and
accounting for your remote access clients, you will also need to configure
__________.
accounting

You can view the IP routing table by using the Routing and Remote Access console or the
__________ prompt.
command

By default, the Callback Options setting is configured as __________.
No Callback

An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the
following items?
all of the above - Conditions, Constraints, Settings

Routers are considered components of which layer?
layer 3

The final column in the routing table corresponds to the routing table entry's __________.
metric

One example of an NPS Policy Setting includes IP properties that specify IP address assignment
behavior. Which of the following is not an option?
Client Must Supply an IP Address

What term refers to the device that is seeking access to the network, such as a laptop attempting to
access a wireless access point?
supplicant

Das könnte Ihnen auch gefallen