Sunteți pe pagina 1din 8

Chapter 3: Configuring the Windows Server 2008 Environment

TRUE/FALSE 1. ServerManagerCmd.exe is executed from the command line through the Command Prompt window. ANS: T PTS: 1 REF: 94

2. PnP eliminates hours of time that server administrators and computer users once spent installing and configuring hardware. ANS: T PTS: 1 REF: 96

3. A computer contains an unlimited number of IRQ lines. ANS: F PTS: 1 REF: 98

4. Device drivers that are unsigned can also be loaded in x64 versions of Windows Server 2008. ANS: F PTS: 1 REF: 100

5. Memory activities performed through virtual memory are as fast as those performed in RAM. ANS: F MULTIPLE CHOICE 1. The File Services role focuses on sharing files from the server or using the server to coordinate and simplify file sharing through ____. a. NFS c. AFS b. NTFS d. DFS ANS: D PTS: 1 REF: 92 PTS: 1 REF: 105

2. In the ____ Services role, the Windows Server 2008 server can be used to manage network printing services and it can offer one or more network printers connected to the network through the server itself. a. File c. Office b. Print d. Fax ANS: B PTS: 1 REF: 92

3. In addition to the Server Manager GUI tool, you can also use the ____ command-line tool for managing server roles. a. ServerManagerCmd.exe c. SvrMngCmd.exe b. ServerMngCmd.exe d. ManagerCmd.exe ANS: A PTS: 1 REF: 93

4. ____ allows you to customize Windows Server 2008 for devices, network connectivity, dial-up capabilities, and many other functions. a. PnP c. Control Panel b. Manager role d. Add Hardware Wizard

ANS: C

PTS: 1

REF: 97

5. ____ provides a graphical view of all hardware currently installed on your computer. a. ServerManagerCmd.exe c. SWC b. Device Manager d. SMP ANS: B PTS: 1 REF: 98

6. ____ is a Windows Server 2008 tool that verifies system and critical files to determine if they have a signature. a. Verif c. Sigverif b. Signature d. SigMngCmd.exe ANS: C PTS: 1 REF: 102

7. ____ allows you to configure how processor resources are allocated to programs. a. Processor scheduling c. SWC b. DEP d. Virtual memory ANS: A PTS: 1 REF: 103

8. Virtual memory works through a technique called ____, whereby blocks of information, called pages, are moved from RAM into virtual memory on disk. a. memoring c. blocking b. segmenting d. paging ANS: D PTS: 1 REF: 105

9. On a typical x86 computer, data is paged in blocks of ____ KB. a. 2 c. 4 b. 3 d. 5 ANS: C PTS: 1 REF: 105

10. Before virtual memory can be used, it must first be allocated for this purpose by tuning the operating system. The area of disk that is allocated for this purpose is called the ____. a. blocking file c. segment file b. memory file d. paging file ANS: D PTS: 1 REF: 105

11. For a server with 2 GB of RAM, the initial paging file size should be at least ____ GB. a. 3 c. 5 b. 4 d. 6 ANS: A PTS: 1 REF: 105

12. When you install Windows Server 2008, it configures IDE/ATA/SATA drives to use the ____ transfer mode by default. a. PIO c. SCSI b. DMA d. SWC ANS: B PTS: 1 REF: 107

13. ____ environment variables are defined by the operating system and apply to any user logged onto the computer.

a. Computer b. User ANS: D PTS: 1

c. Session d. System REF: 108

14. ____ environment variables can be defined on a per-user basis, such as specifying the path where application files are stored. a. Computer c. Session b. User d. System ANS: B PTS: 1 REF: 108

15. Microsoft ____ Protocol is used when the Hyper-V role is installed in Windows Server 2008. a. Virtual Network Switch c. Hyper-V Network b. Hyper-V d. Hyper-V Switch ANS: A PTS: 1 REF: 112

16. Microsoft ____ Protocol enables the use of a software virtual switch between the main operating system and the operating systems on virtual partitions. a. Hyper-V Network c. Virtual Network Switch b. Hyper-V d. Hyper-V Switch ANS: C PTS: 1 REF: 112

17. ____ Protocol is used for multimedia transmissions, such as a combined voice and video transmission to provide user training to multiple people. a. Microsoft Virtual Network Switch c. Reliable P2P b. Reliable Multicast d. IP Multicast ANS: B PTS: 1 REF: 113

18. The Windows Server 2008 ____ is a very complex database containing all information the operating system needs about the entire server. a. SWC c. Registry b. Active Directory d. Control Panel ANS: C PTS: 1 REF: 114

19. A Registry ____ is a category or division of information within the Registry. a. key c. entry b. subkey d. value ANS: A PTS: 1 REF: 116

20. A Registry ____ is a data parameter associated with a software or hardware characteristic under a key (or subkey). a. subkey c. value b. key d. entry ANS: D PTS: 1 REF: 116

21. Windows ____ is a command-line interface or shell. a. ConsoleShell c. PowerShell b. CommandShell d. Console ANS: C PTS: 1 REF: 124

COMPLETION 1. ____________________ is the ability to automatically detect and configure newly installed hardware devices. ANS: PnP (Plug and Play) Plug and Play (PnP) Plug and Play PnP PTS: 1 REF: 96

2. A servers ____________________ include the interrupt request (IRQ) line (which is a channel for communication with the CPU) and other elements such as the I/O address and reserved memory range. ANS: resources PTS: 1 REF: 98

3. When a driver is verified, a unique digital signature is incorporated into it in a process called ____________________. ANS: driver signing PTS: 1 REF: 100

4. When programs are running on the server, ______________________________ monitors how they use memory to ensure they are not causing memory problems. ANS: DEP (Data Execution Prevention) Data Execution Prevention (DEP) Data Execution Prevention DEP PTS: 1 REF: 103

5. ____________________ is disk storage used to expand the capacity of the physical RAM installed in the computer. ANS: Virtual memory PTS: 1 MATCHING Match each item with a statement below: a. Server Manager b. UPnP c. IRQ line f. RAID-5 volume g. PIO h. DMA REF: 105

d. Device Manager e. System File Checker 1. 2. 3. 4. 5. 6. 7. 8. 9. 1. 2. 3. 4. 5. 6. 7. 8. 9.

i.

Environment variables

disks specially set up to increase performance and fault tolerance bypasses the use of CPU memory and writes to and reads directly from RAM a channel for communication with the CPU uses CPU memory registers and RAM during the process of transferring data for disk reads and writes used to tell the operating system where to find certain programs and how to allocate memory to programs, and to control different programs consolidates administrative functions to make a server easier to manage scans system files for integrity an open standard that is used in all types of systems and that enables connectivity through networks and network protocols used to check for a resource conflict and to examine other properties associated with a device ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: F H C G I A E B D PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: 105 107 98 107 108 88 100 96 98

SHORT ANSWER 1. What are the management areas on the left panel of the Server Manager window? ANS: Server Manager typically has two main panels. The left panel is in a tree format that has the following management areas: * RolesShows the server roles currently installed and enables management of the roles, including adding or removing roles. This management capability can be very deep. For example, if Active Directory is installed, there is access to a huge range of tools for managing Active Directory, including creating new user accounts and user groups. * FeaturesShows the features that are installed on the server, which often are features associated with the roles of the server. Some features include those for managing server policies, message queuing, TCP/IP services, Internet mail and printing services (for a Web-based server), wireless services, printer port monitoring, and many more. * DiagnosticsProvides access to server diagnostic tools, including Event Viewer for monitoring server logs, Reliability and Performance Monitor for monitoring server and network performance, and Device Manager for configuring devices. * ConfigurationEnables configuration of server services, task scheduling, the Windows Firewall and other security features, and Windows Management Instrumentation, which enables management programs to share information. * StorageManages disk storage and can back up the server using any of several backup options. PTS: 1 REF: 88|89

2. What are the sections in the right panel of the Server Manager window?

ANS: The right panel is divided into these sections: * Server SummaryShows basic information about the computer and security information, including firewall, Windows Updates, and Internet Explorer security information * Roles SummaryDisplays the installed server roles with information about the roles, server log information, and the ability to add or remove roles * Features SummaryLists the installed features with options to access wizards for adding or removing features * Resources and SupportShows help and informational resources that are available and includes links to quickly go to a specific type of resource PTS: 1 REF: 89

3. What are some of the management activities you can accomplish with ServerManagerCmd.exe? ANS: The management activities you can accomplish with ServerManagerCmd.exe include the following: * Install a role or feature. * Remove a role or feature. * Query to determine what roles and features are installed. * Use the whatif option to determine which features and services will be installed by a specific role, before actually installing that role. * Restart the computer after installing or removing a role or feature. * Specify particular features or services to install with a role. * Use an XML-based answer file to have ServerManagerCmd.exe install or remove server roles. PTS: 1 REF: 93|94

4. Briefly describe the Add Hardware Wizard. ANS: If Windows Server 2008 does not automatically detect newly installed hardware, or if the device you are installing is non-Plug and Play, you can use the Add Hardware Wizard to manually launch PnP or to manually install the device without PnP. The Add Hardware Wizard is used for the following tasks: * Invoke the operating system to use PnP to detect new hardware. * Install new non-PnP hardware and hardware drivers. * Troubleshoot problems you might be having with existing hardware. The Add Hardware Wizard is started from Control Panel. PTS: 1 REF: 97

5. Briefly describe Windows Server 2008 Device Manager. ANS: You can use Device Manager to check for a resource conflict and to examine other properties associated with a device. Device Manager provides a graphical view of all hardware currently installed on your computer. It can also be used to: * Verify if hardware installed on your computer is working properly. * Update device drivers. * Disable a device.

* Uninstall a device. * Configure the settings for a device. For example, consider a situation in which there is an IRQ line conflict between the network interface card (NIC) and a modem that you have just installed. The conflict is apparent because the NIC will no longer communicate with the network and the modem will not connect through the telephone line you attached to it. The place to go to determine the problem and resolve it is Device Manager. You can start Device Manager either from Control Panel (in various places) or Server Manager. PTS: 1 REF: 98|99

6. Describe driver signing for Windows Server 2008. ANS: When you install a device such as a pointing device or a NIC, Windows Server 2008 checks to make sure that the driver for that device has been verified as secure. When a driver is verified, a unique digital signature is incorporated into it in a process called driver signing. When Windows Server 2008 determines that a device driver is not signed, it gives you a warning, such as Windows cant verify the publisher of this driver software. Another type of warning might indicate that the driver is altered. If you see such a warning, contact the manufacturer of the device to see if they can provide a signed driver. Device drivers that are unsigned cannot be loaded in x64 versions of Windows Server 2008. In x86 versions, the Administrator account has authority to bypass driver signing warnings and install the drivers anyway. However, good security practice is to not load unsigned drivers for devices. PTS: 1 REF: 100

7. How can you use the System File Checker in Windows Server 2008? ANS: If you copy an inappropriate file for a devicesuch as one that is unsigned or outdated or from a different operating systemover a system or driver file, for example a .dll, .exe, or .sys file, Windows Server 2008 offers the System File Checker to scan system files for integrity. You can run this utility to scan all system files to verify integrity, to scan and replace files as needed, or to scan only certain files. When you opt to scan and replace, the System File Checker locates the original system file, which is stored in the Windows\System32 folder, and then copies it over the inappropriate or damaged file. The System File Checker can be manually run from the Command Prompt window. PTS: 1 REF: 100

8. Describe some tips for placement of the paging file. ANS: The location of the paging file is very important. Some tips for placement of the paging file are: * Server performance is better if the paging file is not placed on the boot partition (the one with the \Windows folder) of basic disks or the boot volume of dynamic disks. * If there are multiple disks, performance can be improved by placing a paging file on each disk (but avoid placing the paging file on the boot partition or volume that contains the system files in the \Windows folder). * In a mirrored set or volume, place the paging file on the main disk, and not on the mirrored (backup) disk.

* Do not place the paging file on a stripe set, striped volume, stripe set with parity, or RAID-5 volume because these are all disks specially set up to increase performance and fault tolerance. PTS: 1 REF: 105

9. Explain how to configure startup and recovery options. ANS: Windows Server 2008 enables you to configure parameters that dictate the startup sequence and how the system recovers from errors. You can configure the following system startup options: * Which operating system to boot by default, if more than one operating system is installed * How long to display a list of operating systems from which to boot * How long to display a list of recovery options, if the computer needs to go into recovery mode after a system failure In the event of a system failure, you can configure these options: * Writing information to the system log (hard configured so you cannot change this) * Whether to start automatically after a system failure * How and where to write debugging information PTS: 1 REF: 109

10. What are some of the tasks that you can complete using Windows PowerShell? ANS: Some of the tasks you can complete using Windows PowerShell include the following: * Manage files and folders. * Manage network tasks. * Manage fixed and removable storage. * Configure printing services. * Manage software applications and updates. * Manage Terminal Services. * Manage server services and features. * Manage Web server services. * Work with the Registry. PTS: 1 REF: 124

S-ar putea să vă placă și