Anda di halaman 1dari 8

Chapter 1: Introduction to Windows Server 2008

TRUE/FALSE 1. Virtualization offers a way to cut costs by using fewer computers. ANS: T PTS: 1 REF: 3

2. Windows Web Server 2008 can be used to manage directory resources via hosting Active Directory. ANS: F PTS: 1 REF: 5

3. Computers and users in a domain can be managed to determine what resources they can access, such as printers and shared folders. ANS: T PTS: 1 REF: 9

4. The multitasking in Windows Server 2008 is called cooperative multitasking. ANS: F PTS: 1 REF: 16

5. On a peer-to-peer network, workstations are used to share resources such as files and printers and to connect to resources on other computers. ANS: T MULTIPLE CHOICE 1. ____ is the ability to increase the access to server resources and provide fail-safe services by linking two or more discrete computer systems so they appear to function as though they are one. a. Clustering c. Peer-to-peer networking b. Virtualization d. SMP ANS: A PTS: 1 REF: 4 PTS: 1 REF: 17

2. ____ means that a processor can be added to an empty processor slot while the system is running. a. Hot-add memory c. Hot-replace processor b. SMP d. Hot-add processor ANS: D PTS: 1 REF: 5

3. With ____, you can replace a processor in an SMP system without taking the system down. a. hot-add memory c. hot-add processor b. hot-replace processor d. SMP ANS: B PTS: 1 REF: 5

4. A ____ is a grouping of network objects, such as computers, servers, and user accounts, that provides for easier management. a. TCO c. domain b. client d. workstation ANS: C PTS: 1 REF: 9

5. ____ enables the server administrator to manage critical configuration features from inside one tool. a. Server Core c. SMP b. PowerShell d. Server Manager ANS: D PTS: 1 REF: 10

6. ____ is an umbrella of security protection features that monitor and manage a server and its clients. a. SMP c. NAP b. PAP d. TCO ANS: C PTS: 1 REF: 10

7. Windows Server 2008 comes with Microsoft ____ to transform the server into a versatile Web server. a. TCO c. SMP b. IIS d. DNS ANS: B PTS: 1 REF: 11

8. ____ is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers. a. Windows Server Core c. IIS b. PowerShell d. Server Manager ANS: A PTS: 1 REF: 12

9. Windows ____ is a command-line interface that offers a shell. a. IIS c. PowerShell b. Server Core d. Server Manager ANS: C PTS: 1 REF: 12

10. Windows PowerShell offers over 130 command-line tools, also called ____. a. cmdlets c. shells b. cmdshlls d. cmditems ANS: A PTS: 1 REF: 13

11. The operating system kernel runs in ____ mode, which protects it from problems created by a malfunctioning program or process. a. optimized c. monitored b. privileged d. process ANS: B PTS: 1 REF: 14

12. ____ is the ability to run two or more programs at the same time. a. Multithreading c. Clustering b. Multiprocessing d. Multitasking ANS: D PTS: 1 REF: 15

13. ____ is the capability of programs written to run several program code blocks, or threads, at the same time. a. Multithreading c. Multitasking b. Virtualization d. Clustering ANS: A PTS: 1 REF: 15

14. A ____ is a communications system enabling computer users to share computer equipment, application software, and data, voice, and video transmissions. a. domain c. segment b. realm d. network ANS: D PTS: 1 REF: 16

15. ____ networking focuses on spreading network resource administration among server and nonserver members of a network. a. Server-based c. Workstation-oriented b. Peer-to-peer d. Client-based ANS: B PTS: 1 REF: 16

16. ____ networking centralizes the network administration on one or more servers. a. Workstation-oriented c. Server-based b. Client-based d. Peer-to-peer ANS: C PTS: 1 REF: 16

17. On Microsoft networks, a ____ is a number of users who share drive and printer resources. a. domain c. cluster b. segment d. workgroup ANS: D PTS: 1 REF: 18

18. Packets and ____ are units of data transmitted from a sending computer to a receiving computer. a. payloads c. frames b. datagrams d. trails ANS: C PTS: 1 REF: 19

19. A ____ is a network of computers in relatively close proximity, such as on the same floor or in the same building. a. PAN c. MAN b. LAN d. WAN ANS: B PTS: 1 REF: 20

20. ____ provides for reliable end-to-end delivery of data by controlling data flow. a. TCP c. IP b. UDP d. SMP ANS: A PTS: 1 REF: 20

21. ____ provides network addressing to ensure data packets quickly reach the correct destination. a. SMP c. IP b. UDP d. TCP ANS: C COMPLETION 1. A multiprocessor computer is known as a(n) ______________________________ computer, which is a computer that uses more than one processor. PTS: 1 REF: 20

ANS: SMP (symmetric multiprocessor) symmetric multiprocessor (SMP) symmetric multiprocessor SMP PTS: 1 REF: 3

2. ____________________ is the ability to add RAM without shutting down the computer or operating system. ANS: Hot-add memory PTS: 1 REF: 4

3. The ______________________________ is the full cost of owning a network, including hardware, software, training, maintenance, and user support costs. ANS: TCO (total cost of ownership) total cost of ownership (TCO) total cost of ownership TCO PTS: 1 REF: 8|9

4. Windows Server 2008 supports UNIX and Linux clients using the ______________________________. ANS: SUA (Subsystem for UNIX-based Applications) Subsystem for UNIX-based Applications (SUA) Subsystem for UNIX-based Applications SUA PTS: 1 REF: 9

5. The ____________________ consists of the core programs and the computer code of the operating system. ANS: kernel PTS: 1 MATCHING Match each item with a statement below: a. Hyper-V b. Fault tolerant memory sync c. Itanium d. Client f. g. h. i. Active Directory Scripts Shell Process REF: 14

e. Workstation 1. a database of computers, users, groups of users, shared printers, shared folders, and other network resources 2. a computer program or portion of a program that is currently running 3. a computer that has its own central processing unit (CPU) and can be used as a stand-alone or network computer 4. enables memory to resynchronize after transient memory problems so there is no interruption to current computing activities 5. enables Windows Server 2008 to offer a virtualization environment 6. a computer that accesses resources on another computer via a network or direct cable connection 7. a 64-bit processor that uses a design different than typical x86 and x64 processors, which allows it to process more instructions per processor cycle 8. a customized environment for executing commands and scripts 9. files that contain commands to be run by a computer operating system 1. 2. 3. 4. 5. 6. 7. 8. 9. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: F I E B A D C H G PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: 9 14 8 4 3 8 5 12 9

SHORT ANSWER 1. What are some of the advantages of clustering? ANS: Clustering is the ability to increase the access to server resources and provide fail-safe services by linking two or more discrete computer systems so they appear to function as though they are one. An immediate advantage of server clustering is the increase in computer speed to complete server tasks faster. Also, server clustering provides more computing power for handling resource-hungry applications. With clustering, as an organization adds more users and requires more demanding applications, one or more computers can be added to the cluster to handle the growth. This is a faster, less-expensive approach than having to purchase a larger computer and transfer users and applications to a new system because the old one is overwhelmed. PTS: 1 REF: 4

2. What are some of the advantages of using Windows Server 2008 and Windows Vista together in a network environment? ANS: In terms of networking advancements, some of the advantages of using Windows Server 2008 and Windows Vista together include the following: * New capabilities to recover from many types of network communications problems * Newly written code for more efficient network communications * More network diagnostic capabilities

* New code for better use of the network communications protocols, IPv4 and IPv6, with special emphasis on IPv6 * Use of Windows PowerShell commands and scripts in both Windows Server 2008 and Vista PTS: 1 REF: 9

3. What are some of the tasks that you can perform with Server Manager? ANS: Server Manager is used to: * View computer configuration information. * Change properties of a system. * View network connections. * Configure Remote Desktop. * Configure security, including the firewall and how to obtain updates. * Configure a multitude of server roles, from a basic file server to advanced network services. * Add and remove features. * Run diagnostics. * Manage storage and backups. PTS: 1 REF: 10

4. What are some of the capabilities of NAP? ANS: NAP has the following capabilities: * Identifies clients and other computers on a network that do not comply with the security policies set through Windows Server 2008 * Limits access by noncompliant computers, such as by not allowing access to resources, not permitting logon, or by quarantining a noncompliant computer to specific resources or portions of a network * Automatically updates or configures a noncompliant computer to match the security policies required for access, such as by changing policy settings on the client or updating the client operating system to have the latest security patches * Continuously checks throughout the entire network and server connection session to ensure that computers remain in compliance, even after they have been given access to the network, server, and resources PTS: 1 REF: 10|11

5. Briefly describe clustering and clustering tools for Windows Server 2008. ANS: Clustering is an important feature of Windows Server 2008 because it not only makes a server system more powerful, but it also provides failover capabilities, so that if one server in a cluster fails, its work is automatically taken over by other servers in the cluster. Clustering also enables a large amount of disk storage to be made available to users, with failover for disk storage as well. The power of clustering is only as good as the tools used to configure it. Windows Server 2008 offers tools to: * Test a cluster to ensure it is set up to accomplish the tasks for which it is intended. * Migrate configuration settings from one cluster to another. * Quickly configure a cluster and troubleshoot problems. * Set up storage used in a cluster.

* Create better cluster storage performance and reliability. * Secure a cluster and enable it to use new network capabilities. PTS: 1 REF: 11

6. What are the advantages of using Windows Server Core? ANS: Windows Server Core is best understood not by what it has, but by what it does not have. Windows Server Core is a minimum server configuration, designed to function in a fashion similar to traditional UNIX and Linux servers. One of the advantages of UNIX and Linux systems is that they can be installed with a simple command-line interface and only the minimum services needed to get the job done. This offers three distinct advantages. First, there is no huge overhead from having a graphical interface, which means the CPU can be devoted to accomplishing the essential work of the computer. A second advantage is that less disk space and memory are needed for everyday tasks. The third advantage is that the computer has a much smaller attack surface. Some UNIX and Linux server administrators appreciate the flexibility, simplicity, and power of working at a command line. Now Windows server administrators can install the same type of system. PTS: 1 REF: 12

7. What are some of the capabilities of Hyper-V? ANS: The Hyper-V capabilities include the following: * Compatible with clustering * Able to handle up to a four-processor SMP computer * Can be used with Windows and Linux operating systems, which are commonly implemented for servers * Compatible with different types of disk storage methods * Enables fast migration from one computer to another * Can house 64-bit and 32-bit operating systems PTS: 1 REF: 14

8. Describe typical and protected processes in Windows Server 2008. ANS: Microsoft has introduced typical and protected processes in both Windows Server 2008 and Windows Vista. A process is a computer program or portion of a program that is currently running. One large program might start several smaller programs or processes. A typical process is like one on previous Windows systems in which the process can be influenced by a user or other processes. A protected process is one for which outside influences are restricted. The concept of a protected process is important because some activities shouldnt be interrupted prematurely, such as updating a database. PTS: 1 REF: 14

9. Describe some of the reasons peer-to-peer networks are generally designed for about 10 workstations or less. ANS: Peer-to-peer networks are generally designed for about 10 workstations or less. As the number of workstations surpass this number, this model becomes less effective for the following reasons:

* Peer-to-peer networking offers only moderate network security because user account information must be managed on each workstation. * This model provides no centralized storage of information for account management. As the number of network users grows, so does the need to have a central place to store and manage information. It is much easier to manage files by locating them on a central file server. * Network management becomes more difficult because there is no point of centralized administrative control from which to manage users and critical files, including backing up important files. * Peer-to-peer networks can often experience slow response times because this model is not optimized for multiple users accessing one computer. If many workgroup members decide to access one shared drive or some other shared resource at the same time, all members are likely to experience slow response. PTS: 1 REF: 17|18

10. Explain the use of host names in Windows Server 2008. ANS: Using host names is the preferred method of resolving computer names to IP addresses in Windows Server 2008. In fact, you can turn off NetBIOS on a Windows Server 2008 computer so that host name resolution is the only method of name resolution that is available. The best method in Windows Server 2008 for resolving host names to IP addresses is to use Dynamic Domain Name System (DDNS). DDNS is a modern DNS application that enables client computers to automatically register their IP addresses in DNS without intervention by a user or network administrator. If a DNS server is not available, broadcasts and HOSTS files can also be used to resolve IP addresses to host names. These methods, however, require far more effort to administer. PTS: 1 REF: 27

Anda mungkin juga menyukai