Lesson 5: Planning File and Print Services Flashcards

1
Q
  1. A well-designed sharing strategy provides each user with three resources. Which of the following is not a provided resource?
    a) private storage space, such as a home folder, to which the user has exclusive access
    b) public storage space where each user can store files that they want colleagues to be able to access
    c) access to a shared work space for communal and collaborative documents
    d) access to a thawspace for temporary storage
A

d) access to a thawspace for temporary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which permissions do administrators typically use to assign storage space as well as modify permissions on a Windows Server 2008 file server?
    a) FAT
    b) NTFS
    c) DHCP
    d) DNS
A

b) NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. To whom should you always assign security permissions?
    a) individuals
    b) groups
    c) domains
    d) forests
A

b) groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which console can be used to create multiple shares and exercise more granular control over their properties?
    a) Computer Management
    b) Share and Storage Management
    c) Active Directory Domains and Trusts
    d) System Management
A

b) Share and Storage Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. The most common use of a file screen is to __________.
    a) prevent users from storing unauthorized file types on the server
    b) protect unauthorized access to files
    c) prevent users from consuming too much storage space on network server drives
    d) report users’ file access
A

c) prevent users from consuming too much storage space on network server drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A replication group can have up to __________ members.
    a) 128
    b) 256
    c) 512
    d) unlimited
A

b) 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Each server can be a member of up to __________ replication groups.
    a) 128
    b) 256
    c) 512
    d) unlimited
A

b) 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A collection of settings in a quota template defines all of the following except __________.
    a) what actions FSRM should take when a user reaches a threshold
    b) the user credentials under which FSRM operates
    c) what thresholds FSRM should apply to the quota
    d) whether a quota should be hard or soft
A

b) the user credentials under which FSRM operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. To send email messages, what service does a Windows Server 2008 computer need to be running?
    a) SMB
    b) POP
    c) Simple Mail Transfer Protocol
    d) File Sharing and Transfer
A

c) Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following statements is not true regarding FSRM quotas?
    a) They can be configured to execute commands.
    b) They can be configured to generate reports.
    c) They can be configured to create event log entries only.
    d) They can be configured to send email notifications.
A

c) They can be configured to create event log entries only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What hardware actually produces hard-copy documents on paper or other print media?
    a) printer driver
    b) print server
    c) printer
    d) print device
A

d) print device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A computer communicates with a print device through which software interface?
    a) printer driver
    b) print server
    c) printer
    d) print spooler
A

c) printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What converts the print jobs generated by applications into an appropriate string of commands for a specific print device?
    a) printer spooler
    b) print server
    c) printer
    d) print device
A

a) printer spooler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. The simplest print architecture consists of one print device that is connected to one computer. This print device is also known as a __________.
    a) printer
    b) locally attached print device
    c) print driver
    d) print server
A

b) locally attached print device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following is the default Windows Server 2008 printer-sharing configuration?
    a) Each client uses a print server.
    b) Print resources are shared between the server and client.
    c) Each client uses its own printer and printer driver.
    d) Each client uses its own printer and a shared print driver.
A

c) Each client uses its own printer and printer driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which Print Services role enables UNIX clients running the LPR (line printer remote) program to send their print jobs to Windows printers?
    a) Print Server
    b) LPD Service
    c) Internet Printing
    d) Spooler
A

b) LPD Service

17
Q
  1. Which Print Services role installs the Print Management console for Microsoft Management Console (MMC) that enables administrators to deploy, monitor, and manage printers throughout the enterprise?
    a) Print Server
    b) LPD Service
    c) Internet Printing
    d) Spooler
A

a) Print Server

18
Q
  1. __________ is the only role service that is required when you add the Print Services role.
    a) Print Server
    b) LPD Service
    c) Internet Printing
    d) Spooler
A

a) Print Server

19
Q
  1. You must also install the __________ when installing the Internet Printing role service.
    a) Web Server (IIS) role
    b) Windows Process Activation Service feature
    c) Both a & b
    d) None of the above
A

c) Both a & b

20
Q
  1. You must add the __________ role to use a Windows Server 2008 computer as a fax server.
    a) Fax Server
    b) Fax Service
    c) Print Services
    d) Windows Fax and Scan
A

a) Fax Server

21
Q
  1. What is the first step in designing a file-sharing strategy?
    a) Deciding how many shares to create and where to create them
    b) Determining usernames and passwords
    c) Deciding on security measures
    d) Projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
A

d) Projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs

22
Q
  1. What tool is shipped with Windows Server 2008 to initiate a migration of SYSVOL replication from FRS to the DFS Replication service?
    a) dfsrmig.exe
    b) DFS Management console
    c) Namespace management console
    d) Disk Management console
A

a) dfsrmig.exe

23
Q
  1. Which term best describes the technology that lists only those files that you have permission to view when accessing a file list through a shared folder?
    a) WAN acceleration
    b) accessed-based enumeration
    c) SMB2
    d) DFS
A

b) accessed-based enumeration

24
Q
  1. By default, what topology do replication groups use?
    a) hub and /spoke
    b) full mesh
    c) partial mesh
    d) mesh/spoke
A

b) full mesh

25
Q
  1. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
    a) DFS Remediation
    b) DFS Replication
    c) DNS Replication
    d) DFS Topology
A

b) DFS Replication

26
Q
  1. Which server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
    a) DFS server
    b) DNS server
    c) namespace server
    d) replication server
A

c) namespace server