____ is an encryption method that uses a public key and private key combination.
Answer
Symmetric key
Shared key
Public key
Universal key
Question 2
Question
A processor with Intel VT is used for which of the following?
Answer
for CPU virtualization
for a SATA disk controller implemented with a virtual machine
for a virtual machine NIC that is functioning as a switch
for a RAID connected to a virtual machine
Question 3
Question
The ____ Web site feature is used to configure the accepted file extensions for files that don’t change.
Answer
file mappings
MIME types
application mappings
handler mappings
Question 4
Question
Microsoft Hyper-V is an example of server virtualization software.
Answer
True
False
Question 5
Question
____ is a new feature that enables a client to run an application without loading a remote desktop on the client computer.
Answer
Hyper-V
RemoteApp
TS Gateway
App-V
Question 6
Question
The Terminal Services role and corresponding role services are renamed in Windows Server 2008 Release 2 to “remote desktop services,” to reflect the new functions they serve.
Answer
True
False
Question 7
Question
The ____ feature is used to manage Internet e-mail via e-mail programs that take advantage of the application programming interface, system.net.mail.
Answer
SMTP E-mail Page
SMTP Object Page
Web E-mail Page
HTTP E-mail Page
Question 8
Question
What elements should you plan before you install a virtual machine in Hyper-V using the New Virtual Machine Wizard? (Choose all that apply.)
Answer
the amount of RAM to allocate
the network interface to use
which hypergraphics characteristics to enable for the monitor
which virtual disk to use
Question 9
Question
A VPN user may remotely access the server through a network, the Internet, or a private intranet.
Answer
False
True
Question 10
Question
A(n) ____ is an ASP.NET process that runs on its own without using the same memory space as IIS.
Answer
control process
worker process
master thread
external thread
Question 11
Question
Lists of certificates that have been revoked are known as ____.
Answer
URLs
CAs
RRLs
CRLs
Question 12
Question
The IT director has ordered a 32-bit server with Windows Server 2008 Standard Edition pre-installed. Today he wants you to install Hyper-V and a virtual machine running SUSE Linux Enterprise Server 10 with Service Pack 1 in the 64-bit version. What is your response?
Answer
Hyper-V will not run on a 32-bit computer.
SUSE Linux is only compatible in the 32-bit version.
All of these elements will work fine together.
SUSE Linux is not compatible with Hyper-V.
Question 13
Question
Your company's IT committee to plan virtualization is discussing the issue of portability, because there are several virtual machines that must be ported to larger computers to accommodate the need for more storage and faster CPUs. One of the committee members asks you if there are any tools to help port virtual machines. What is your response? (Choose all that apply.)
Answer
System Center Virtual Machine Manager can be obtained from Microsoft.
Virtual Server Migration Toolkit can be downloaded from Microsoft.
Hyper-V Manager offers tools natively.
Virtual Transport Manager can be obtained as a popular third party tool.
Question 14
Question
____ is used to establish and maintain security for RAS, Internet, and VPN dial-in access, and can be employed with RADIUS.
Answer
ILM
ISA
IIS
IAS
Question 15
Question
____ was developed by IBM and the National Security Agency in cooperation with the National Bureau of Standards as an encryption technique using a secret key between the communicating stations.
Answer
IPSec
SSL
SSTP
DES
Question 16
Question
A ____ is really a physical folder or a redirection to a Uniform Resource Locator (URL) that points to a folder, so that it can be accessed over the Internet, an intranet, or VPN.
Answer
subordinate directory
secondary directory
Web directory
virtual directory
Question 17
Question
A ____ is a digital communications device that links a computer (or sometimes a router) to a DSL telecommunications line.
Answer
network adapter
DSL adapter
terminal station
terminal adapter
Question 18
Question
The certificate manager role is associated with the issue and manage certificates CA security permission.
Answer
True
False
Question 19
Question
A ____ is linking a public key or a combination of public and private keys to a user or network entity to verify that user or entity is trusted.
Answer
public key infrastructure
public key federation
public key structure
public key network
Question 20
Question
The workhorse of a VPN connection is the ____ because it carries the network packets over a wide area network (WAN) link.