__I___ iSNS 8. __E___ Fibre Channel 9. __C___ iSCSI initiator 10. __H____ direct-attached storage A. Enables a database application to access specific records in a database file stored on a SAN drive array B. Identifies specific devices in a drive array C. Installed by default in Windows Server 2008 D. Provided with some SAN drive arrays E. Supports copper and fiber optic media F. Requires redundant drives and redundant host adapters G. Fibre Channel topology H. Hard drive installed inside a computer I.
JOHN CROZIER NT1230 CLIENT-SERVER NETWORKING UNIT 3 PROBLEM SET 1 MR T. PIERCE FILL IN THE BLANK 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. Answer: Firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Answer: Network and Sharing Center 3.
The maximum amount of system memory supported by Windows 7 enterprise is 192 GB. Lesson 2 1. Windows Easy Transfer supports to types of migrations, called wipe-and-load migration and side-by-side migration. 2. When a serious problem occurs with Windows 7, you might be able to repair it by starting the Windows PE operating system and running diagnostic tools.
C:\inetpub\wwwroot 3. What device driver converts the print jobs generated by applications into an appropriate string of commands for a specific print device? Printer driver 4. What must you do before you can share a printer on a Windows Server 2008 computer? Enable network discovery 5.
It uses a series of echo requests, and the networking device receiving the echo request responds with a series of echo replies to test a network connection. 28. What is the purpose of a class D IP address. Multicasting 32. How many network bits are in each of the following classes.
Which of the following filters is used with Network Monitor when you want to capture all DHCP packets that pass between a client computer called PC1 (MAC address 00-20-C4-15-22-C1) and a DHCP server called Server1 (MAC address 00-18-31-C3-23-CD and IP address of 192.168.1.1)? D. Ethernet.Address == 0020C41522C1 && DHCP 3. You just opened a capture file with Network Monitor. You want to show mnemonic host names instead of IP addresses. Which of the following actions should you perform?
b a. Information b. Admin c. Warning d. Critical 2. Which of the following logs from the Applications and Services Logs folder in the Event Viewer console are disabled and hidden by default? a,c a. Analytic b. Admin c. Debug
Are the computers in the same network? *Yes they are in the same network 14. List all the possible routes from Router B to Router D in the network shown in # 13. *B-A-E-D & B-E-D 16. List the subnets attached to Router C in Figure 6-21.
| Backup | Make a copy of all information stored on a disk | Backup data. | Internet Connectivity and Web Services Table SERVICE | VENDOR | REQUIREMENTS MET
a. Monitor b. Hardware c. Software d. Printer23.Internet explorer use for ______________. a. System Manager b.