1. What is responsible for managing application pools and worker processes? A) UDDI B) Windows Process Activation Mode C) Windows Process Activation Service D) Worker Process Activation Service Feedback: The Windows Process Activation Service (WPAS) is responsible for managing application pools and worker processes. Table for Individual Question FeedbackPoints Earned:1.0/1.0Correct Answer(s):C 2. What is one of the earliest mechanisms designed to provide Web servers with application-hosting capabilities?
Explain Server Manager, the new role-based management tool for Windows Server 2008, and describe the tools it was designed to replace. 3. Define the Windows System Resource Manager (WSRM) and how it gives the administrator greater control over the allocation of system resources. 4. Explain how Network Access Protection (NAP) creates a security architecture that allows administrators to control access to critical resources and assist users in meeting security requirements.
5. You can use the __LDIFDE__ command-line utility to create and modify Active Directory objects. 6. When users log on to Active Directory, they receive a(n) _access token_ consisting of all of their security group memberships. 7.
Why is 64-bit architecture an advantage? 4. Explain the new features of Windows Server 2008, such as server core, Virtualization, and PowerShell. What is the role of these features and how will they improve efficiency in administrative Windows? 5.
The IPX (internet packet exchange) shows up in the third layer of the model. In which is if a device that needs to have communication to it or in a different network then the IPX takes that information and sends it the designation throughout the network. The SPX (Sequenced Packet Exchange) protocol which as the same as IPX is also on layer three so the network is more reliable, datagram connection. The network core Protocol (NCP) is a server routine that is degned to process application requests from Netware (WIKIPEDIA.com). Some of the things that NCP does include file access, printer access, security.
The direct data packet generated by Network Layer using information that is stored in a table known as routing table. Routing table is a list available destination which enables the network layer to work with logical
Chapters 7-9 70-643 Chapter 7 Matching A. Application hosting technology that launches a separate for each request is Common Gateway Interface (CGI.) B. The Internet Server Application Programing Interface(ISAPI) provides the interface between IIS and ASP.NET in IIS7’s Classic mode. C. The first Web technology to enable servers to process code in HTML files is Server Side Includes (SSI).
What numeric range is commonly referred to as well-known ports? * 0-1023 9. What numeric port range is commonly used by clients in a client-server communication session? * 49152–65535 10. What do you believe would be the result of installing and configuring a web server to “listen” on ports other than 80 and 443?
The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe. 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called Nslookup.exe. 8. Most networks use Dynamic Host Configuration Protocol to dynamically assign addresses and configure computers to use them.
For security, a constrained delegation must be impersonated in a Windows Server 2003 or higher domain functional level running Kerberos. The forest functional level must be in a Windows Server 2003 or higher as well. The commands adprep / rodcprep must be run once to update the forest permissions on all DNS application directory partitions. In a RODC the changes need to be performed in the Main Domain Controller. The RODC absorb this information and updates its database.