The maximum amount of system memory supported by Windows 7 enterprise is 192 GB. Lesson 2 1. Windows Easy Transfer supports to types of migrations, called wipe-and-load migration and side-by-side migration. 2. When a serious problem occurs with Windows 7, you might be able to repair it by starting the Windows PE operating system and running diagnostic tools.
__Group nesting__ is the practice of adding one group as a member of another group. Multiple Choice Circle the correct choice. 1. Which special identity group controls anonymous access to resources in Windows Server 2008? a.
What file servers are OWA clients allowed to connect to? Windows file share and Widows SharePoint Services 6. What must an OWA user select at the OWA logon screen to access file shares? Direct File access 7. What two receive connectors are configured by default on IT260Srv## and what purpose do they serve?
__I___ iSNS 8. __E___ Fibre Channel 9. __C___ iSCSI initiator 10. __H____ direct-attached storage A. Enables a database application to access specific records in a database file stored on a SAN drive array B. Identifies specific devices in a drive array C. Installed by default in Windows Server 2008 D. Provided with some SAN drive arrays E. Supports copper and fiber optic media F. Requires redundant drives and redundant host adapters G. Fibre Channel topology H. Hard drive installed inside a computer I.
Joe Smith IT222 Homework 1.1 PG 19 Fill in the Blank 1-10 1) The active directory database is stored on each domain controller in a file called _____. • ntds.dit 2) The active directory _______ is considered the security boundary for an active directory environment. • Forest 3) To provide fault tolerance, active directory utilizes a _______ replication model. • multimaster 4) To create a trust relationship with an NT4 domain, you will configure an ______. • External trust 5) The ______ naming context is replicated across the domain.
Set up your PATH variable so that it causes the shell to search the following directories in order: • /usr/local/bin • /usr/bin/Xl1 • /usr/bin • /bin • /usr/kerberos/bin • Your own bin directory (usually bin or .bin in your home directory) • The working directory b. If a file named doit is in /usr/bin and also in your ~/bin, which one doit will be executed? (Assume that you have execute permission for both of the files.) c. If your PATH variable is not set to search the working directory, how can you execute a program located there? d. Which command can you use to add the directory /user/games to the end of the list of directories in your PATH?
Which of the following allows you to view events from multiple computers using the Event Viewer? A. subscriptions 6. Which command is used to configure a collecting computer to receive an event subscription? B. wecutil qc 7. Which program allows you to stop a running process?
A set of performance counter readings, captured under normal operating conditions, which you can save and compare to readings taken at a later time, is called a (baseline.) 7. The tool in Windows Server 2008 that automatically calculates a stability index is called (Reliability Monitor.) 8. Windows Server 2008 packages information about system activities into individual units called (events.)
* You can use which and whereis to locate the utility and locate to search for files. You can use VIM to create and edit a file. 8. What is the result of giving which utility the name if a command that resides in a directory that is not in your search path? * It will say that this command cannot be found.
The Advanced Security Settings for ConfidentialFiles dialog box is displayed. 5. Click the Auditing tab, click Edit, and then click Add. The Select User, Computer Or Group dialog box is displayed. 6.