Review-CSS.pdf
Document Details
2024
Tags
Full Transcript
9/23/24 1. When adding the DHCP role in Windows Server 2008 R2, which part lets the user...
9/23/24 1. When adding the DHCP role in Windows Server 2008 R2, which part lets the user REVIEW set the range of IP address to be used later on by the client PCs? QUARTER 1 1ST QUARTER A. IPv4 DNS Settings COMPUTER SYSTEMS SERVICING NC II B. IPv4 WINS Settings C. DHCP Scopes D. DHCP Server Authorization FORT BONIFACIO HIGH SCHOOL - SHS 1 12 2. Your computer’s name is CSS.SIEH and 3. Which of the following describes the you set the workgroup name into SERVER. statement, “The process of installing What will be your new domain name when Windows 7 on the VMware is almost the you configure the AD DS? same as Windows Server 2008 R2.”? A. SERVER.CSS.SIEH A. true B. SERVER1.CSS.SIEH B. false C. SERVER.CSS.SIEH.1 C. It does not matter. D. SERVER.CSS.SIEH.PC1 D. The statement is incomplete. 13 14 1 9/23/24 4. What is the main purpose of Active 5. Which of the following is the recommended practice for managing user Directory Domain Services (AD DS) in account passwords in a Windows Server 2008 Windows Server 2008 R2? R2 environment to enhance security? A. storing passwords in plain text for easy A. File Sharing recovery B. User Authentication and Authorization B. allowing users to choose and set their C. Web Hosting passwords without any restrictions D. Print Services C. enforcing password complexity and regular password changes 15 16 6. Your organization is considering upgrading 7. When setting up user accounts in a its existing Windows Server 2008 Server Operating System (NOS) using infrastructure to Windows Server 2008 R2. VMware, what is the primary purpose of What factors should you analyze before creating distinct user accounts for making this decision? different users? A. hardware compatibility, application compatibility, and licensing costs A. to save disk space on the server B. new features in Windows Server 2008 B. to increase network speed R2, patch management, and network C. to simplify system administration speed D. to improve system security and control C. backup and recovery options, Active access Directory health, and DNS performance 17 18 2 9/23/24 8. When using VMware to manage user and 9. Which of the following describes the administrator accounts in a NOS, what is statement, “You can rename the computer the recommended practice to protect as CLIENT during the process of against unauthorized access? installation in Vmware Workstation.”? A. Share administrator credentials with all users. A. true B. Implement strong password policies B. false and two-factor authentication for administrator accounts. C. It does not matter. C. Use easily guessable passwords for user D. The statement is incomplete. accounts. 19 20 10. Which of the following describes the 11. Which of the following is the best statement, “In VMware, pressing CTRL + G practice for managing user and will bring you back to your physical administrator accounts in VMware? machine.”? A. Grant full access rights to all users. A. true B. Regularly review and update access B. false permissions. C. It does not matter. C. Disable all user accounts by default. D. The statement is incomplete. D. Share administrator passwords openly. 21 22 3 9/23/24 12. Which authentication method is 13. What is the primary purpose of an typically used for accessing administrator administrator account in a NOS hosted on accounts in a Server Operating System VMware? (NOS) on VMware? A. password A. setting up network protocols B. biometric authentication B. accessing and using system resources C. CAPTCHA C. running virtual machines D. none of the above D. managing system configurations 23 24 15. In a NOS on VMware, what should an 14. What is the primary purpose of a user administrator do if they suspect account in a NOS hosted on VMware? unauthorized access to an account? A. running applications A. Delete the account immediately. B. managing system settings and B. Investigate and take appropriate action. configurations C. accessing user data C. Reboot the virtual machine. D. playing video games D. Do nothing; it's likely a false alarm. 25 26 4 9/23/24 16. Which of the following describes the 17. Which of the following describes the statement, “Client/Server is decentralized statement, “One of the advantages of a because resources and data security are peer-to-peer network is security.”? controlled through the server.”? A. true A. true B. false B. false C. It does not matter. C. It does not matter. D. The statement is incomplete. D. The statement is incomplete. 27 28 18. Which of the following describes the 19. Which of the following is NOT a benefit statement, “VMware Workstation Pro can provided by virtualization? be used as NOS in your server.”? A. It allows one computer or server to host multiple operating systems. A. true B. It only adds to our storage space. B. false C. It enables the existence of two or more C. It does not matter. OS in a single device. D. The statement is incomplete. D. It enables communication between multiple computers, virtual machines (VMs), or virtual servers. 29 30 5 9/23/24 20. You want to make a virtual machine running Windows Server 2008 R2. Which 21. Which of the following is NOT an of the following steps is NOT needed when example of server hardware? doing so? A. Install VMware Workstation 12. A. tower server B. Download installer for Microsoft Office. B. print server C. Prepare the Windows ISO file. C. blade server D. Obtain a product key for the Windows installation. D. rack server 31 32 23. Which of the following describes the 22. Which of the following DOES NOT use statement, “Server is a computer program server for clients? that provides a service to another computer programs and their users.”? A. Facebook A. true B. Twitter B. false C. banks C. It does not matter. D. cinemas D. The statement is incomplete. 33 34 6 9/23/24 24. Which of the following describes the 25. In a TCP/IP network, which protocol is statement, “Server are named depending responsible for ensuring reliable data on what they serve.”? delivery? A. true A. UDP B. false B. ICMP C. It does not matter. C. FTP D. The statement is incomplete. D. TCP 35 36 What is the purpose of a router in a What is the purpose of NAT (Network network? Address Translation) in networking? A. to connect devices within the same A. to assign unique MAC addresses to network devices B. to transmit data between devices on B. to translate private IP addresses to a different networks public IP address C. to filter and block incoming network traffic C. to create virtual private networks (VPNs) D. to convert digital data to analog signals D. to prioritize network traffic for transmission over phone lines 37 38 7 9/23/24 You are tasked with setting up a secure wireless A company with multiple branch offices wants network for a small business. Which of the to interconnect them securely over the following security measures should you internet. Which networking technology should implement to protect the network? they use for this purpose? A. MAC address filtering A. LAN B. WEP encryption B. WAN C. WPA3 encryption C. MAN D. disabling SSID broadcasting D. PAN 39 40 A company's network has experienced a security breach, resulting in unauthorized access to sensitive data. What should be the first step in the network administrator's analysis of this 1. What server role provides incident? dynamic IP addressing to your A. Disconnect all network cables to isolate client PCs? the network. B. Notify law enforcement agencies immediately. DHCP C. Identify the entry point and extent of the breach. 41 44 8 9/23/24 2. What mode of network connection do we choose if we 3. What is the most utilized want to replicate the host or network operating system? the computer internet connection into our VM? Windows Server Bridge 45 46 4. What type of IP address is 5. What do you call the software observed when the user that runs the virtual machines manually changes it to any and server? address that he/she wants? Virtualization Software Manual 47 48 9 9/23/24 7. What part of the basic 6. What do you call the central interface of Windows Server storage of all the domain 2008 R2 contains the tools for objects such as user accounts, systems administrators and computer accounts and groups? advanced users? File Storage Server Manager 49 50 8. What part of configuration 9. What server role provides section helps you to schedule technologies that help you automated task that perform manage storage, enable file action on specific time or when replication, and manage shared certain event occurs? folders? Task Scheduler File Services 51 53 10 9/23/24 10. What is the maximum 11. What is the maximum supported RAM for Windows number of processors required Server 2008 R2 Datacenter for Windows Server 2008 R2 Edition? Foundation Edition? 2TB One 54 55 12. Which Windows Server 2008 13. Which server role is used to R2 role is responsible for create certification authorities centrally managing user and related role services that accounts, computer accounts, allow you to issue and manage and security policies within a certificate used in the variety of Windows domain? applications? AD DS AD CS 56 57 11 9/23/24 15. What refers to the 14. Which server role enables simulation of software and/or you to support virtualization? hardware upon which other software runs? Hyper-V Virtualization 58 59 16. What allows one computer 17. What is the other term for or server to host multiple any virtualization software? operating systems? hypervisor Virtual Machine 60 61 12 9/23/24 19. In a NOS running on a virtual machine in VMware, 18. What is the first step when what account typically has the accessing a user account in a highest level of access and NOS using VMware? control over the server? Administrator 62 63 20. What is designed with the 21. What type of NOS allows sole purpose of supporting users to share resources and workstations, database, files located on their computers application, file, and printer and to access shared resources access sharing between multiple found on other computers? computers in a network? Network Operating System Peer-to-peer 64 65 13 9/23/24 22. What is the Internet's 23. What is a computer that is system for converting IP intended for use as a server addresses into alphabetic that is built in an upright names? cabinet that stands alone? DNS Tower server 66 67 24. What is the recommended 25. What should you consider disk space for setting up a MOSTLY if you want to add virtual machine running a many virtual machines in your Windows OS? PC? 100 GB storage 68 69 14