The maximum amount of system memory supported by Windows 7 enterprise is 192 GB. Lesson 2 1. Windows Easy Transfer supports to types of migrations, called wipe-and-load migration and side-by-side migration. 2. When a serious problem occurs with Windows 7, you might be able to repair it by starting the Windows PE operating system and running diagnostic tools.
The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called Tracert.exe. 10. The top and bottom layers of the OSI model are called the application and physical. 1. RAID uses two or more drives used in combination to create a fault-tolerant system.
I) Special Identity- placeholder for a collection of users with similar characteristics 5. C) Authentication- confirmation of a user’s identity 6. H) Elevation Prompt- displayed when an administrator requires administrative access 7. J) Mandatory User Profile- a profile that multiple users can run simultaneously 8. D) Secure Desktop- suppresses the operation of all controls except the UAC prompt 9.
Lesson 3 Multiple Choice 1.Which of the following is the primary tool to add or remove server roles? B. Server Manager 2. Which of the following is used to view the Windows logs? D. Event Viewer 3. When you are troubleshooting a problem and decide to use the Event Viewer, which of the following should be used to help you focus on a reduced set of events?
Increase fault tolerance by splitting DHCP scopes. 2. Balance the load on your DHCP server by using the 80/20 rule for scopes 3. Allow remote administration of DHCP servers by comfiguring windows Firewall ports. | Question 4 | What is the name of the computer you are working from?
Explain how Network Access Protection (NAP) creates a security architecture that allows administrators to control access to critical resources and assist users in meeting security requirements. ANSWERS: 1. The function of the following Windows Server 2008 services is as follows: a. Active Directory Federation Services – this is a component in the Windows Server 2008 operating system that provides Web single-sign-on (SSO) technologies to authenticate a user to multiple Web applications over the life of a single online session. b.
/noprofile 5) Which of the following actions can you NOT perform from the Win Firewall control panel? (choose all that apply) A. Allow program through firewall on all three profiles C. Create Firewall exceptions based on Port numbers 6) Which of the following policy modifications would make it harder for intruders to penetrate user passwords by brute force attack? (choose all that apply) B. Enable Password Must Meet Complexity Requirements.
What file servers are OWA clients allowed to connect to? Windows file share and Widows SharePoint Services 6. What must an OWA user select at the OWA logon screen to access file shares? Direct File access 7. What two receive connectors are configured by default on IT260Srv## and what purpose do they serve?