Windows Sever 2008 Network Infrastructure Configuration 70-642

54
1. Question 1 5 out of 5 points 2. The most widely used IP addressing scheme is __ _____. 3. 4. Selected Answer: IPv4 5. Correct Answer: IPv4 6. 7. Question 2 5 out of 5 points 8. The most recent and largest address space IP addressing scheme is ______. 9. 10. Selected Answer: IPv6 11. Correct Answer: IPv6 12. 13. Question 3 0 out of 5 points 14. To distribute IP addresses automatically, a network administrator would configure the ______ service. 15. 16. Selected Answer: DHCP 17. Correct Answer: Dynamic Host Configuration Protocol (DHCP) 18. 19. Question 4 5 out of 5 points 20. The first attempt at breaking up IP address space used _ _ to provide address ranges of differing sizes. 21. 22. Selected Answer: classful addressing 23. Correct Answer: classful addressing

Transcript of Windows Sever 2008 Network Infrastructure Configuration 70-642

1. Question 1      5 out of 5 points  

2.         The most widely used IP addressing scheme is __ _____.                 

3.          

4. Selected Answer:         IPv4

5. Correct Answer:          IPv4

6.                        

7.    Question 2   5 out of 5 points  

8.         The most recent and largest address space IP addressing scheme is

______.                      

9.          

10. Selected Answer:         IPv6

11. Correct Answer:          IPv6

12.                        

13.    Question 3   0 out of 5 points  

14.         To distribute IP addresses automatically, a network administrator would

configure the ______ service.                  

15.          

16. Selected Answer:         DHCP

17. Correct Answer:          Dynamic Host Configuration Protocol (DHCP)

18.                        

19.    Question 4   5 out of 5 points  

20.         The first attempt at breaking up IP address space used _ _ to provide

address ranges of differing sizes.                       

21.          

22. Selected Answer:         classful addressing

23. Correct Answer:          classful addressing

24.                        

25.    Question 5   5 out of 5 points  

26.         Prior to the introduction of the Domain Name System, computers used __

__ to map human-readable named to IP addresses.                 

27.          

28. Selected Answer:         HOSTS files

29. Correct Answer:          HOSTS files

30.                        

31.    Question 6   5 out of 5 points  

32.         A(n) _¬___ is used to separate the host address portion of an IP

address from the network address.                    

33.          

34. Selected Answer:         Subnet Mask

35. Correct Answer:          subnet mask

36.                        

37.    Question 7   0 out of 5 points  

38.         The subnet mask within the TCP/IP configuration is used to distinguish

the ____ from the host address.                 

39.          

40. Selected Answer:         network

41. Correct Answer:          network address

42.                        

43.    Question 8   0 out of 5 points  

44.         In dotted-decimal notation, each IPv4 address is broken up into four

____.                     

45.          

46. Selected Answer:         bytes

47. Correct Answer:          octets

48.                        

49.    Question 9   5 out of 5 points  

50.         Server computers and other systems that need to be accessed reliably by

network clients should be configured with a(n) ____.                   

51.          

52. Selected Answer:         static IP address

53. Correct Answer:          static IP address

54.                        

55.    Question 10  0 out of 5 points  

56.         The method of breaking up IP address space into address ranges of

flexible size is called ___.                 

57.          

58. Selected Answer:         subnetting

59. Correct Answer:          Classless Inter-Domain Routing (CIDR)

60.                        

61.    Question 11  5 out of 5 points  

62.         What must each host on a TCP/IP network be configured with in order to

communicate with other hosts?                   

63.          

64. Selected Answer:            IP address

65. Correct Answer:     IP address

66.                        

67.    Question 12  5 out of 5 points  

68.         What is the process of transmitting TCP/IP traffic from one IP subnet

to another?                      

69.          

70. Selected Answer:            Routing

71. Correct Answer:     Routing

72.                        

73.    Question 13  5 out of 5 points  

74.         An IP network that is formatted such as 192.168.1.0/24 is referred to

as what type of notation?                        

75.          

76. Selected Answer:            CIDR notation

77. Correct Answer:     CIDR notation

78.                        

79.    Question 14  5 out of 5 points  

80.         What is the default network protocol of the Internet and most modern

corporate networks?                       

81.          

82. Selected Answer:            TCP/IP

83. Correct Answer:     TCP/IP

84.                        

85.    Question 15  5 out of 5 points  

86.         What was used by TCP/IP networks to perform name resolution prior to

the introduction of the Domain Name System (DNS)?                 

87.          

88. Selected Answer:            HOSTS files

89. Correct Answer:     HOSTS files

90.                        

91.    Question 16  5 out of 5 points  

92.         What is the process of dividing a large TCP/IP address space into

multiple smaller networks called?                    

93.          

94. Selected Answer:            Subnetting

95. Correct Answer:     Subnetting

96.                        

97.    Question 17  5 out of 5 points  

98.         What technology is used by private network ranges that has extended the

useful life of IPv4 addressing and slowed the adoption rate of IPv6?               

99.          

100. Selected Answer:            NAT

101. Correct Answer:     NAT

102.                        

103.    Question 18  5 out of 5 points  

104.         Which TCP/IP configuration item allows client computers to communicate

with other computers that are located on remote networks?                       

105.          

106. Selected Answer:            Default gateway

107. Correct Answer:     Default gateway

108.                        

109.    Question 19  5 out of 5 points  

110.         On a TCP/IP network that uses the Domain Name System (DNS) for name

resolution, what unique configuration item must each TCP/IP host possess?          

111.          

112. Selected Answer:            Fully qualified domain name

113. Correct Answer:     Fully qualified domain name

114.                        

115.    Question 20  5 out of 5 points  

116.         In what format are IPv4 IP addresses most commonly written?            

117.          

118. Selected Answer:            Dotted-decimal

119. Correct Answer:     Dotted-decimal

120.                        

121.   Question 1    5 out of 5 points  

122.         The ability to use the installation process to fix problems with an

existing Windows Server system is called ___ _______.                      

123.          

124. Selected Answer:         repair mode

125. Correct Answer:          repair mode

126.                        

127.    Question 2   5 out of 5 points  

128.         Installation of just the necessary components for a particular server

role, without the GUI and other software features, is called ____ ______.          

129.          

130. Selected Answer:         server core

131. Correct Answer:          server core

132.                        

133.    Question 3   5 out of 5 points  

134.         The ____ ______ screen appears by default when the Windows Server 2008

operating system is first installed.                    

135.          

136. Selected Answer:         initial configuration tasks

137. Correct Answer:          Initial Configuration Tasks

138.                        

139.    Question 4   0 out of 5 points  

140.         A(n) ___ _____ offers the best performance of any multi-disk

configuration option within the Disk Management MMC, but does so at the expense of

fault tolerance.                       

141.          

142. Selected Answer:         spanned volume

143. Correct Answer:          striped volume

144.                        

145.    Question 5   5 out of 5 points  

146.         The feature that allows users on different computers to access the

Internet through a single connection is called___ _______.                  

147.          

148. Selected Answer:         internet connection sharing (ICS)

149. Correct Answer:          Internet Connection Sharing

150.                        

151.    Question 6   5 out of 5 points  

152.         The ___ _______ provides a single point of administration to configure

networking and firewall configuration tasks on a Windows Server 2008 computer.      

153.          

154. Selected Answer:         Network and Sharing Center

155. Correct Answer:          Network and Sharing Center

156.                        

157.    Question 7   5 out of 5 points  

158.         The setting describing the network environment, such as home or public

network, is called the ____ ______.                     

159.          

160. Selected Answer:         Network location

161. Correct Answer:          network location

162.                        

163.    Question 8   5 out of 5 points  

164.         Unsolicited inbound traffic can be blocked through the use of the ____

___.                    

165.          

166. Selected Answer:         firewall

167. Correct Answer:          Windows firewall

168.                        

169.    Question 9   5 out of 5 points  

170.         The network location setting controls the behavior of ___ _______.    

171.          

172. Selected Answer:         network discovery

173. Correct Answer:          network discovery

174.                        

175.    Question 10  5 out of 5 points  

176.         Once a disk is converted from a basic disk to a(n) __ _____, it can

only be accessed only by operating systems that support dynamic disks: Windows 2000

Professional, Windows XP Professional, Windows Vista Business, Enterprise or

Ultimate, Windows 2000 Server, Windows Server 2003, and Windows Server 2008.        

177.          

178. Selected Answer:         dynamic disk

179. Correct Answer:          dynamic disk

180.                        

181.    Question 11  5 out of 5 points  

182.         What type of license key allows you to host an activation service

locally within your own network?                     

183.          

184. Selected Answer:            Key Management System (KMS)

185. Correct Answer:     Key Management System (KMS)

186.                        

187.    Question 12  0 out of 5 points  

188.         What type of volume uses 50% of available drive space to provide fault

tolerance for the volume?                       

189.          

190. Selected Answer:            RAID-5

191. Correct Answer:     RAID-1

192.                        

193.    Question 13  5 out of 5 points  

194.         Which disk formatting option will cause a disk to appear as a folder

within an existing volume?                        

195.          

196. Selected Answer:            Mount point

197. Correct Answer:     Mount point

198.                        

199.    Question 14  5 out of 5 points  

200.         Which Windows Server 2008 feature installs and configured wireless

connections and wireless LAN profiles?                      

201.          

202. Selected Answer:            Wireless Networking

203. Correct Answer:     Wireless Networking

204.                        

205.    Question 15  0 out of 5 points  

206.         What was the primary means of name resolution on Windows networks prior

to the introduction of Windows 2000 and Active Directory?                      

207.          

208. Selected Answer:            HOSTS files

209. Correct Answer:     NetBIOS

210.                        

211.    Question 16  5 out of 5 points  

212.         Which feature is used to perform backups and restores of Windows

volumes?                      

213.          

214. Selected Answer:            Windows Server Backup

215. Correct Answer:     Windows Server Backup

216.                        

217.    Question 17  5 out of 5 points  

218.         Which networking service is used to automatically associate NetBIOS

names with IP addresses?                   

219.          

220. Selected Answer:            WINS

221. Correct Answer:     WINS

222.                        

223.    Question 18  5 out of 5 points  

224.         Which disk partition style is recommended for disks larger than 2TB or

disks that are used in Itanium computers?                       

225.          

226. Selected Answer:            GUID Partition Table (GPT)

227. Correct Answer:     GUID Partition Table (GPT)

228.                        

229.    Question 19  5 out of 5 points  

230.         What is used to manage the licensing process for volume licenses of

Windows Vista and Windows Server 2008?                     

231.          

232. Selected Answer:            Volume Activation

233. Correct Answer:     Volume Activation

234.                        

235.    Question 20  5 out of 5 points  

236.         Which volume contains the operating system files on a Windows computer?

237.          

238. Selected Answer:            Boot volume

239. Correct Answer:     Boot volume

240.                        

241.  

242. Question 1      50 out of 50 points  

243.         Match the term in Column 1 to its description in Column 2.             

244.          

245. Question        Correct Match   Selected Match

246. This DHCP message type is sent by a DHCP client when it no longer requires the

use of an IP address that it has leased from a DHCP server.       E. DHCPRELEASE    

E.  DHCPRELEASE

247. You can configure one of these to ensure that a DHCP client always receives the

same IP address from a particular DHCP server.          H. reservation           H.

reservation

248. This is used to ensure that a particular address or block of addresses within a

scope is not assigned to DHCP clients by a DHCP server.          F. exclusion range

F.  exclusion range

249. You must do this to any DHCP server that needs to function within an Active

Directory domain.    A. authorize     A.  authorize

250. A DHCP client will send this message type if it determines that an IP address

offered by a DHCP server is already in use.        D. DHCPDECLINE           D.

DHCPDECLINE

251. This is performed by a DHCP server when corruption is detected within the DHCP

database.         B. automatic restore     B.  automatic restore

252. The DHCP database is based on this database technology   G. Joint Engine

Technology (JET)         G.  Joint Engine Technology (JET)

253. Authorizing DHCP servers in Active Directory is designed to prevent against

these.       I. rogue DHCP server

254.           I.  rogue DHCP server

255.  

256. These provide DHCP parameters to DHCP clients based on vendor or user type.    

C. class options         C.  class options

257. This defaults to 87.5% of the total DHCP lease.          J. T2    J.  T2

258.  

259.                        

260.    Question 2   5 out of 5 points  

261.         Which of the following DHCP message types is sent first in the process

of obtaining an address lease?                  

262.          

263. Selected Answer:            DHCPDISCOVER

264. Correct Answer:     DHCPDISCOVER

265.                        

266.    Question 3   5 out of 5 points  

267.         At which layer of the OSI model does DHCP operate?                     

268.          

269. Selected Answer:            Application layer

270. Correct Answer:     Application layer

271.                        

272.    Question 4   5 out of 5 points  

273.         What protocol is used by the Trivial File Transfer Protocol (TFTP)?    

274.          

275. Selected Answer:            User Datagram Protocol (UDP)

276. Correct Answer:     User Datagram Protocol (UDP)

277.                        

278.    Question 5   5 out of 5 points  

279.         A DHCP client first attempts to reacquire its lease at half the lease

time, which is known as:                 

280.          

281. Selected Answer:            T1

282. Correct Answer:     T1

283.                        

284.    Question 6   5 out of 5 points  

285.         The _______ is composed of the remaining addresses within a DHCP scope

once all exclusion ranges have been applied.                    

286.          

287. Selected Answer:            available address pool

288. Correct Answer:     available address pool

289.                        

290.    Question 7   5 out of 5 points  

291.         The following is a lightweight version of FTP that uses the UDP

protocol, which is used by the BOOTP protocol to transmit network configuration

information                    

292.          

293. Selected Answer:            TFTP

294. Correct Answer:     TFTP

295.                        

296.    Question 8   5 out of 5 points  

297.         The following process will populate DHCP client lease information from

the registry to the DHCP database:                      

298.          

299. Selected Answer:            Reconciliation

300. Correct Answer:     Reconciliation

301.                        

302.    Question 9   5 out of 5 points  

303.         The following is an administrative grouping of scopes that is used to

support multiple logical subnets on a single network segment:                    

304.          

305. Selected Answer:            superscope

306. Correct Answer:     superscope

307.                        

308.    Question 10  5 out of 5 points  

309.         This indicates the location of the last information that was

successfully written from transaction logs to a database file, such as a DHCP

database.                   

310.          

311. Selected Answer:            Checkpoint file

312. Correct Answer:     Checkpoint file

313.                        

314.    Question 11  5 out of 5 points  

315.         The following is a hexadecimal address that is uniquely associated with

a specific Network Interface Card (NIC):                       

316.          

317. Selected Answer:            MAC

318. Correct Answer:     MAC

319.                        

320.  Question 1     5 out of 5 points  

321.         A(n) _ _ will transfer all records within a zone from a primary server

to a secondary server.                  

322.          

323. Selected Answer:         full zon transfer (AXFR)

324. Correct Answer:          full zone transfer (AXFR)

325.                        

326.    Question 2   5 out of 5 points  

327.         A(n) _ _ creates an alias for an existing A record.                    

328.          

329. Selected Answer:         CNAME record

330. Correct Answer:          CNAME Record

331.                        

332.    Question 3   5 out of 5 points  

333.         A(n) _ _ is used by e-mail systems such as Microsoft Exchange to locate

mail servers in different networks.                    

334.          

335. Selected Answer:         Mail Exchanger (MX) record

336. Correct Answer:          Mail Exchanger (MX) record

337.                        

338.    Question 4   5 out of 5 points  

339.         The _ _ allows IPv6 hosts to map host names to IP addresses.           

340.          

341. Selected Answer:         ip6.arpa domain

342. Correct Answer:          ip6.arpa domain

343.                        

344.    Question 5   5 out of 5 points  

345.         contoso.com is an example of a(n) _ _ within the .com top-level domain.

346.          

347. Selected Answer:         second-level domain

348. Correct Answer:          second-level domain

349.                        

350.    Question 6   5 out of 5 points  

351.         The _ _ application scope will replicate DNS data to all DNS servers

within a domain.                  

352.          

353. Selected Answer:         DomainDNSZones

354. Correct Answer:          DomainDNSZones

355.                        

356.    Question 7   5 out of 5 points  

357.         A(n) _ _ stores DNS data in a text file on the server hard drive,

rather than as part of Active Directory.                     

358.          

359. Selected Answer:         file-backed zone

360. Correct Answer:          file-backed zone

361.                        

362.    Question 8   5 out of 5 points  

363.         Each DNS record has a(n) _ _ that indicates the maximum time that a

record will be cached by a DNS server before it is discarded.                      

364.          

365. Selected Answer:         (TTL) Time To Live

366. Correct Answer:          Time to Live (TTL)

367.                        

368.    Question 9   5 out of 5 points  

369.         A DNS server is considered _ _ for each zone that it hosts.            

370.          

371. Selected Answer:         authoritative

372. Correct Answer:          authoritative

373.                        

374.    Question 10  5 out of 5 points  

375.         A DNS domain name like .uk or .it is an example of a(n) _ _ domain.    

376.          

377. Selected Answer:         country code

378. Correct Answer:          country code

379.                        

380.    Question 11  5 out of 5 points  

381.         This DNS configuration item will forward DNS queries to different

servers based on the domain name of the query.                       

382.          

383. Selected Answer:            Conditional forwarder

384. Correct Answer:     Conditional forwarder

385.                        

386.    Question 12  5 out of 5 points  

387.         This type of zone takes human-readable FQDNs and translates them into

IP addresses.                    

388.          

389. Selected Answer:            Forward lookup zone

390. Correct Answer:     Forward lookup zone

391.                        

392.    Question 13  5 out of 5 points  

393.         This zone is used in combination with IP addresses to resolve queries

for IPv4 IP addresses:                   

394.          

395. Selected Answer:            in.addr-arpa

396. Correct Answer:     in.addr-arpa

397.                        

398.    Question 14  5 out of 5 points  

399.         The IPv6 DNS host record is referred to as a(n):                       

400.          

401. Selected Answer:            AAAA record

402. Correct Answer:     AAAA record

403.                        

404.    Question 15  5 out of 5 points  

405.         A DNS server that hosts a primary or secondary zone containing a

particular record can issue the following response to a query for that record:      

406.          

407. Selected Answer:            Authoritative answer

408. Correct Answer:     Authoritative answer

409.                        

410.    Question 16  5 out of 5 points  

411.         You can secure an Active Directory-integrated DNS server, zone, or

record by applying the following to it:                     

412.          

413. Selected Answer:            Discretionary Access Control List

414. Correct Answer:     Discretionary Access Control List

415.                        

416.    Question 17  5 out of 5 points  

417.         This zone type contains only SOA, name server, and glue records for the

relevant zone.                 

418.          

419. Selected Answer:            Stub zone

420. Correct Answer:     Stub zone

421.                        

422.    Question 18  5 out of 5 points  

423.         Data from a primary zone is transmitted to secondary zones using the

following:                        

424.          

425. Selected Answer:            Zone transfer

426. Correct Answer:     Zone transfer

427.                        

428.    Question 19  5 out of 5 points  

429.         These contain the names and IP addresses of the DNS servers

authoritative for the root zone.                   

430.          

431. Selected Answer:            Root Hints

432. Correct Answer:     Root Hints

433.                        

434.    Question 20  5 out of 5 points  

435.         The following feature is available only on Active Directory-integrated

DNS zones:                      

436.          

437. Selected Answer:            Secure dynamic updates

438. Correct Answer:     Secure dynamic updates

439.                        

440.        

441.                                

442.                                

443. Question 2      5 out of 5 points  

444.         The IP address 255.255.255.255 represents ___________ in the IP Routing

table.                 

445.          

446. Selected Answer:            Limited broadcast address

447. Correct Answer:     Limited broadcast address

448.                        

449.    Question 3   5 out of 5 points  

450.         To allow users to specify a call-back number when they connect to a

remote access server via modem, you will enable the following setting:             

451.          

452. Selected Answer:            Set by Caller

453. Correct Answer:     Set by Caller

454.                        

455.    Question 4   5 out of 5 points  

456.         Routing Information Protocol v2 (RIPv2) is an example of a:            

457.          

458. Selected Answer:            Routing protocol

459. Correct Answer:     Routing protocol

460.                        

461.    Question 5   5 out of 5 points  

462.         Windows Server 2008 can provide remote access services through a

Virtual Private Network (VPN) or through:                     

463.          

464. Selected Answer:            Dial-Up Networking (DUN)

465. Correct Answer:     Dial-Up Networking (DUN)

466.                        

467.    Question 6   5 out of 5 points  

468.         When a workstation ends a session with an 802.1X-secured network port,

it sends the following to inform the network access server to set the port back to

an Unauthorized status:                      

469.          

470. Selected Answer:            EAP-Logoff

471. Correct Answer:     EAP-Logoff

472.                        

473.    Question 7   5 out of 5 points  

474.         If an IP Routing Table contains two routes to the same destination

network, the route with the lowest __________ will be selected first.               

475.          

476. Selected Answer:            Metric

477. Correct Answer:     Metric

478.                        

479.    Question 8   5 out of 5 points  

480.         Network information at the Network Layer of the OSI model is organized

into:                   

481.          

482. Selected Answer:            Packets

483. Correct Answer:     Packets

484.                        

485.    Question 9   0 out of 5 points  

486.         In an 802.1X infrastructure, an NPS or RADIUS server performs the role

of the:                 

487.          

488. Selected Answer:            Authenticator

489. Correct Answer:     Authorization Server (AS)

490.                        

491.    Question 10  5 out of 5 points  

492.         The following RRAS service allows multiple computers on an internal

network to share a single public IP address to access the Internet:                

493.          

494. Selected Answer:            Network Address Translation (NAT)

495. Correct Answer:     Network Address Translation (NAT)

496.                        

497.    Question 11  5 out of 5 points  

498.         The following route is used by a computer s default gateway to send

traffic to remote networks:                        

499.          

500. Selected Answer:            Default route

501. Correct Answer:     Default route

502.                        

503.  Question 1 40 out of 50 points    Match the following definitions with the

appropriate term.  

504.  

505. Question        Correct Match   Selected Match

506. This type of router is well-suited for a small organization with low levels of

network traffic utilization.      I. software-based router

507.           I.  software-based router

508.  

509. Network data at the Data Link Layer is organized into these.

510.          B.  frames

511.           B.   frames

512.  

513. This is used as the Windows Server 2008 implementation of a RADIUS server.

514.          F. Network Policy Server (NPS)

515.           F.  Network Policy Server (NPS)

516.  

517. This routing protocol was supported in Windows Server 2003 but is no longer

available with the Routing and Remote Access server role in Windows Server 2008.

518.  

519.          G. Open Shortest Path First (OSPF)

520.           G.  Open Shortest Path First (OSPF)

521.  

522. This address corresponds to the 127.0.0.1 address used for TCP/IP diagnostics

and troubleshooting.

523.          D. loopback address

524.           D.  loopback address

525.  

526.                

527.  

528. Question 1      5 out of 5 points  

529.         The DFS Replication engine uses a form of replication called _ _.      

530.          

531. Selected Answer:         multiple master replication

532. Correct Answer:          multiple master replication

533.                        

534.    Question 2   5 out of 5 points  

535.         In the Distributed File System, the actual shared folders referred to

by the virtual folders in the namespace are known as _ _.                        

536.          

537. Selected Answer:         targets

538. Correct Answer:          targets

539.                        

540.    Question 3   5 out of 5 points  

541.         DFS Replication relies on a protocol called _ _ for file replication.  

542.          

543. Selected Answer:         remote differential compression (RDC)

544. Correct Answer:          Remote Differential Compression (RDC)

545.                        

546.    Question 4   5 out of 5 points  

547.         A DFS replication topology in which every server replicates with every

other server is called a(n) _ Topology.                 

548.          

549. Selected Answer:         full mesh

550. Correct Answer:          full mesh

551.                        

552.    Question 5   5 out of 5 points  

553.         The basic file-sharing capabilities of a Windows server are provided by

the _ _ service.                       

554.          

555. Selected Answer:         server

556. Correct Answer:          Server

557.                        

558.    Question 6   5 out of 5 points  

559.         To keep a DFS folder s multiple targets synchronized, you must create

a(n) _ _.                        

560.          

561. Selected Answer:         replication group

562. Correct Answer:          replication group

563.                        

564.    Question 7   5 out of 5 points  

565.         The __ __ allows you to simplify the view of file shares located across

multiple servers as they appear to your user base.                     

566.          

567. Selected Answer:         distributed file service (DFS)

568. Correct Answer:          Distributed File Service (DFS)

569.                        

570.    Question 8   5 out of 5 points  

571.         A(n) __ __ appears to the operating system as though it is a physically

separate disk and can host an operating system                 

572.          

573. Selected Answer:         primary partition

574. Correct Answer:          primary partition

575.                        

576.    Question 9   5 out of 5 points  

577.         A(n) __ __ enables you to limit DFS replication traffic to specific

pairs of members.                  

578.          

579. Selected Answer:         hub/spoke topology

580. Correct Answer:          hub/spoke topology

581.                        

582.    Question 10  5 out of 5 points  

583.         A DFS __ __ enables you to create a single directory tree that contains

references to shared folders located on multiple separate file servers.            

584.          

585. Selected Answer:         namespace

586. Correct Answer:          namespace

587.                        

588.    Question 11  5 out of 5 points  

589.         An alternative to the multimaster replication model used in DFS is:    

590.          

591. Selected Answer:            Single master replication

592. Correct Answer:     Single master replication

593.                        

594.    Question 12  5 out of 5 points  

595.         A server in a replication group is referred to as a:                   

596.          

597. Selected Answer:            Member

598. Correct Answer:     Member

599.                        

600.    Question 13  5 out of 5 points  

601.         This refers to the ability of DFS clients to revert back to folder

targets that have been unavailable due to server or network outages.                

602.          

603. Selected Answer:            Client failback

604. Correct Answer:     Client failback

605.                        

606.    Question 14  5 out of 5 points  

607.         A disk partition that can hold data but not an operating system is

called a(n):                        

608.          

609. Selected Answer:            Extended partition

610. Correct Answer:     Extended partition

611.                        

612.    Question 15  5 out of 5 points  

613.         This DFS component is responsible for maintaining a list of DFS shared

folders and responding to user requests for those folders.                      

614.          

615. Selected Answer:            Namespace server

616. Correct Answer:     Namespace server

617.                        

618.    Question 16  5 out of 5 points  

619.         A DFS __________ contains a virtual representation of the shared

folders on all DFS target servers.                    

620.          

621. Selected Answer:            Namespace

622. Correct Answer:     Namespace

623.                        

624.    Question 17  5 out of 5 points  

625.         The Distributed File System uses the following replication model to

keep servers in a replication group up to date:                    

626.          

627. Selected Answer:            Multiple Master Replication

628. Correct Answer:     Multiple Master Replication

629.                        

630.    Question 18  5 out of 5 points  

631.         In this topology, every member of a DFS replication group replicates

with every other member, for full replication connectivity.                       

632.          

633. Selected Answer:            Full mesh replication

634. Correct Answer:     Full mesh replication

635.                        

636.    Question 19  5 out of 5 points  

637.         The following service is required on a Windows Server 2008 server in

order to enable file sharing:                     

638.          

639. Selected Answer:            Server Service

640. Correct Answer:     Server Service

641.                        

642.    Question 20  5 out of 5 points  

643.         To enable replication for a DFS folder with multiple folder targets,

you must create the following:                    

644.          

645. Selected Answer:            Replication group

646. Correct Answer:     Replication group

647.                        

648. Question 1      5 out of 5 points  

649.         A(n) __ is the software interface through which a computer communicates

with a print device.                   

650.          

651. Selected Answer:         printer

652. Correct Answer:          printer

653.                        

654.    Question 2   5 out of 5 points  

655.         When you connect a single print server to multiple print devices, you

create what is called a(n) __.                   

656.          

657. Selected Answer:         printer pool

658. Correct Answer:          printer pool

659.                        

660.    Question 3   5 out of 5 points  

661.         By default, all printers assign the Allow Print permission to the __

special identity, which enables all users to access the printer and manage their own

documents.                   

662.          

663. Selected Answer:         everyone

664. Correct Answer:          Everyone

665.                        

666.    Question 4   5 out of 5 points  

667.         Users with the __ permission can go beyond just manipulating queued

documents; they can reconfigure the printer itself.                        

668.          

669. Selected Answer:         manage

670. Correct Answer:          Manage Printers

671.                        

672.    Question 5   5 out of 5 points  

673.         The ____ is the default print format used by the Windows 2000, Windows

XP, and Windows Server 2003 operating systems.                  

674.          

675. Selected Answer:         EMF interim

676. Correct Answer:          Enhanced Metafile Format (EMF)

677.                        

678.    Question 6   5 out of 5 points  

679.         A(n) ____ is a device driver that converts the print jobs generated by

applications into an appropriate string of commands for a specific print device.    

680.          

681. Selected Answer:         printer driver

682. Correct Answer:          printer driver

683.                        

684.    Question 7   5 out of 5 points  

685.         The ____ allows clients to print documents using HTTP traffic over an

intranet or the World Wide Web.                  

686.          

687. Selected Answer:         Internet Printing Protocol (IPP)

688. Correct Answer:          Internet Printing Protocol (IPP)

689.                        

690.    Question 8   5 out of 5 points  

691.         Users with the ____ permission to a printer have the ability to pause,

resume, restart, and cancel their own documents, but not documents created by any

other user.                   

692.          

693. Selected Answer:         print

694. Correct Answer:          Print

695.                        

696.    Question 9   5 out of 5 points  

697.         A(n) ____ print architecture consists of one print device connected to

one computer.                   

698.          

699. Selected Answer:         locally-attached print device

700. Correct Answer:          locally attached print device

701.                        

702.    Question 10  0 out of 5 points  

703.         ____ such as Printer Not Ready are a useful way for administrators to

determine what printers need attention throughout a Windows Server 2008 network.   

704.          

705. Selected Answer:         Default Filters

706. Correct Answer:          Custom filters

707.                        

708.    Question 11  5 out of 5 points  

709.         Which printer permission allows users to pause, resume, restart and

cancel all users' documents, and to control job settings for all documents?        

710.          

711. Selected Answer:            Manage Documents

712. Correct Answer:     Manage Documents

713.                        

714.    Question 12  5 out of 5 points  

715.         What document format is a new, platform-independent format included

with Windows Vista and Windows Server 2008?                        

716.          

717. Selected Answer:            XML Paper Specification (XPS)

718. Correct Answer:     XML Paper Specification (XPS)

719.                        

720.    Question 13  5 out of 5 points  

721.         What kind of device receives print jobs from clients and sends them to

either locally-attached or network-attached printer devices?                    

722.          

723. Selected Answer:            Print server

724. Correct Answer:     Print server

725.                        

726.    Question 14  3 out of 5 points  

727.         What kind of print device is connected to a TCP/IP network, either

directly or through another computer?                       

728.          

729. Selected Answer:            Network-attached print device

730. Correct Answer:     Print server

731.                        

732.    Question 15  5 out of 5 points  

733.         What can you create to connect a single print server to multiple print

devices?                        

734.          

735. Selected Answer:            Printer pool

736. Correct Answer:     Printer pool

737.                        

738.    Question 16  5 out of 5 points  

739.         What permission allows a user to share a printer, delete a printer, and

change a printer's properties?                 

740.          

741. Selected Answer:            Manage Printers

742. Correct Answer:     Manage Printers

743.                        

744.    Question 17  0 out of 5 points  

745.         What kind of printer is directly attached to a single computer,

regardless of the interface it uses to connect?                        

746.          

747. Selected Answer:            Network-attached printer

748. Correct Answer:     Local printer

749.                        

750.    Question 18  5 out of 5 points  

751.         What protocol allows users to print documents through an IIS server?  

752.          

753. Selected Answer:            IPP

754. Correct Answer:     IPP

755.                        

756.    Question 19  5 out of 5 points  

757.         What describes the actual hardware that produces hard copy documents on

paper or other print media?                    

758.          

759. Selected Answer:            Print device

760. Correct Answer:     Print device

761.                        

762.    Question 20  5 out of 5 points  

763.         What permission allows users to pause, manage and cancel only those

printer documents that they have created?                  

764.          

765. Selected Answer:            Print

766. Correct Answer:     Print

767.                        

768.  

769.  Question 2     5 out of 5 points  

770.         This feature will automatically check for software updates that are

published on a WSUS server.                        

771.          

772. Selected Answer:            Automatic Updates

773. Correct Answer:     Automatic Updates

774.                        

775.    Question 3   5 out of 5 points  

776.         This view of the Windows Event Viewer allows you to configure a Windows

Server 2008 computer to act as a repository for Event Viewer entries from one or

more remote computers.                        

777.          

778. Selected Answer:            Forwarded Events

779. Correct Answer:     Forwarded Events

780.                        

781.    Question 4   5 out of 5 points  

782.         The following user group can view both real-time and historical data

within the Performance Monitor console, but cannot create or modify Data Collector

Sets:                  

783.          

784. Selected Answer:            Performance Monitor Users

785. Correct Answer:     Performance Monitor Users

786.                        

787.    Question 5   5 out of 5 points  

788.         In order to collect events from remote computers that match the

criteria of one or more event filters that you define, you will create one or more

of the following:                   

789.          

790. Selected Answer:            Subscription

791. Correct Answer:     Subscription

792.                        

793.    Question 6   5 out of 5 points  

794.         What protocol does the Windows Event Viewer use to configure event

forwarding?                 

795.          

796. Selected Answer:            WS-Management

797. Correct Answer:     WS-Management

798.                        

799.    Question 7   5 out of 5 points  

800.         This is a new Event Log in Windows Server 2008, used to capture

information regarding operating system and application installations and un-

installations.                     

801.          

802. Selected Answer:            Setup Log

803. Correct Answer:     Setup Log

804.                        

805.    Question 8   5 out of 5 points  

806.         The following service allows you to configure a single server as a

repository of Event Viewer information for multiple computers:                      

807.          

808. Selected Answer:            Windows Event Collector Service

809. Correct Answer:     Windows Event Collector Service

810.                        

811.    Question 9   5 out of 5 points  

812.         The following allows you to display only those packets matching a

particular set of criterion among a larger set of packets that have been captured by

Network Monitor:                        

813.          

814. Selected Answer:            Display Filter

815. Correct Answer:     Display Filter

816.                        

817.    Question 10  5 out of 5 points  

818.         The following user group can view both real-time and historical data

within the Performance Monitor console, and can also create and modify Data

Collector Sets:                       

819.          

820. Selected Answer:            Performance Log Users

821. Correct Answer:     Performance Log Users

822.                        

823.    Question 11  5 out of 5 points  

824.         The following is a server-side component within WSUS that retrieves the

latest critical updates from the Windows Update Web site:                      

825.          

826. Selected Answer:            Content Synchronization Service

827. Correct Answer:     Content Synchronization Service

828.                        

829. Question 1      5 out of 5 points  

830.         The __ __ was configured in Windows 2000, Windows Server 2003, and

Windows XP IPSec policies to ensure that the computer responds to requests for

secure communication.                        

831.          

832. Selected Answer:         default response rule

833. Correct Answer:          default response rule

834.                        

835.    Question 2   5 out of 5 points  

836.         A(n) __ __ attack is one in which a malicious user masquerades as the

legitimate sender or recipient of network traffic.                       

837.          

838. Selected Answer:         identity spoofing

839. Correct Answer:          identity spoofing

840.                        

841.    Question 3   5 out of 5 points  

842.         The strongest form of NT LAN Manager authentication is __ __.          

843.          

844. Selected Answer:         NTVMv2

845. Correct Answer:          NTLMv2 authentication

846.                        

847.    Question 4   0 out of 5 points  

848.         IPSec __ __ is used to provide end-to-end security, in which both hosts

support IPSec using the same authentication protocols.                 

849.          

850. Selected Answer:         policy

851. Correct Answer:          transport mode

852.                        

853.    Question 5   5 out of 5 points  

854.         A(n) __ __ connection security rule allows you to restrict inbound and

outbound connections based on certain sets of criteria, such as membership in a

particular Active Directory domain.                     

855.          

856. Selected Answer:         Isolation

857. Correct Answer:          Isolation

858.                        

859.    Question 6   5 out of 5 points  

860.         Microsoft Network Monitor is an example of a real-world __ __.         

861.          

862. Selected Answer:         packet sniffing

863. Correct Answer:          packet sniffer

864.                        

865.    Question 7   0 out of 5 points  

866.         The Windows Firewall with Advanced Security MMC snap-in allows you to

integrate IPSec into the Windows Firewall by configuring one or more __ __.        

867.          

868. Selected Answer:         features

869. Correct Answer:          Connection Security Rules

870.                        

871.    Question 8   5 out of 5 points  

872.         The default __ __ for IPSec connections in an Active Directory

environment is the Kerberos v5 protocol.                        

873.          

874. Selected Answer:         authentication method

875. Correct Answer:          authentication method

876.                        

877.    Question 9   5 out of 5 points  

878.         Each Windows Firewall exception can be configured with a specific __ __

to control which computers the local computer will accept connections from.        

879.          

880. Selected Answer:         range of IP addresses

881. Correct Answer:          scope

882.                        

883.    Question 10  5 out of 5 points  

884.         A(n) __ __ must occur before secure traffic can be sent, in order to

determine the type of traffic to be secured and how it will be secured              

885.          

886. Selected Answer:         negotiation

887. Correct Answer:          quick mode negotiation

888.                        

889.    Question 11  5 out of 5 points  

890.         This is used to provide gateway-to-gateway protection for site-to-site

communications that cross the Internet (or other public networks).                  

891.          

892. Selected Answer:            Tunnel mode

893. Correct Answer:     Tunnel mode

894.                        

895.    Question 12  5 out of 5 points  

896.         Windows Server 2003 supports the following feature, which is used to

determine new keying material through a new Diffie-Hellman exchange on a regular

basis:                   

897.          

898. Selected Answer:            Dynamic rekeying

899. Correct Answer:     Dynamic rekeying

900.                        

901.    Question 13  5 out of 5 points  

902.         The following protocol provides confidentiality (in addition to

authentication, integrity, and anti-replay) for the IP payload:                    

903.          

904. Selected Answer:            Encapsulating Security Payload (ESP)

905. Correct Answer:     Encapsulating Security Payload (ESP)

906.                        

907.    Question 14  5 out of 5 points  

908.         This suite of protocols was introduced to provide a series of

cryptographic algorithms that can be used to provide security for all TCP/IP hosts

at the Internet layer, regardless of the actual application that is sending or

receiving data.                        

909.          

910. Selected Answer:            IPSec

911. Correct Answer:     IPSec

912.                        

913.    Question 15  5 out of 5 points  

914.         The following is a value contained in a received IKE message that is

used to help identify the corresponding main mode SA:                     

915.          

916. Selected Answer:            Cookie

917. Correct Answer:     Cookie

918.                        

919.    Question 16  5 out of 5 points  

920.         This Connection Security Rule allows you to specify one or more

computers that do not need to be authenticated in order to pass traffic.           

921.          

922. Selected Answer:            Authentication exemption

923. Correct Answer:     Authentication exemption

924.                        

925.    Question 17  5 out of 5 points  

926.         You can configure the Windows Firewall to allow one or more inbound

connections based on any of the following that you configure:                      

927.          

928. Selected Answer:            Exception

929. Correct Answer:     Exception

930.                        

931.    Question 18  5 out of 5 points  

932.         An IP Filter in which traffic that is defined in one direction will

also be defined in the opposite direction is said to be:                   

933.          

934. Selected Answer:            Mirrored

935. Correct Answer:     Mirrored

936.                        

937.    Question 19  5 out of 5 points  

938.         The following NTLM Authentication type is disabled by default in

Windows Server 2003 and Windows Server 2008 servers; it should not be used in a

production environment as it is weak and can be easily hacked by malicious users:  

939.          

940. Selected Answer:            LM authentication

941. Correct Answer:     LM authentication

942.                        

943.    Question 20  5 out of 5 points  

944.         This is a mathematical value that is used to provide an integrity check

for a TCP or UDP packet.                       

945.          

946. Selected Answer:            Checksum

947. Correct Answer:     Checksum

948.                        

949.  

950. Question 1      5 out of 5 points  

951.         A(n) _ _ is a CA that integrates with Active Directory and allows for

auto-enrollment of user and computer certificates through the use of Group Policy

and certificate templates.                     

952.          

953. Selected Answer:         enterprise CA

954. Correct Answer:          enterprise CA

955.                        

956.    Question 2   5 out of 5 points  

957.         The top-level CA in any PKI hierarchy is the _ _.                      

958.          

959. Selected Answer:         root CA

960. Correct Answer:          root CA

961.                        

962.    Question 3   0 out of 5 points  

963.         One alternative to using public key cryptography is by using a(n) _ _.

964.          

965. Selected Answer:         certificate authority

966. Correct Answer:          shared secret key

967.                        

968.    Question 4   5 out of 5 points  

969.         Each PKI certificate consists of a public key that is widely known, and

a(n) _ _ that is known only to the user or computer who holds the certificate.     

970.          

971. Selected Answer:         private key

972. Correct Answer:          private key

973.                        

974.    Question 5   0 out of 5 points  

975.         Users can request certificates via the web using the _ _ service.      

976.          

977. Selected Answer:         online responder

978. Correct Answer:          Certification Authority Web Enrollment

979.                        

980.    Question 6   0 out of 5 points  

981.         A __ __ obtains PKI health certificates from client computers when the

IPSec NAP enforcement method is used.                   

982.          

983. Selected Answer:         internet protocol security (IPSe) enforcement

984. Correct Answer:          Health Registration Authority (HRA)

985.                        

986.    Question 7   0 out of 5 points  

987.         The __ __ method is the only NAP enforcement agent that can be deployed

in the absence of an Active Directory domain.                  

988.          

989. Selected Answer:         DHCP

990. Correct Answer:          DHCP enforcement

991.                        

992.    Question 8   5 out of 5 points  

993.         __ __ provide continuous monitoring of system compliance on all NAP

clients.                   

994.          

995. Selected Answer:         System Health Agents (SHAs)

996. Correct Answer:          System Health Agents (SHAs)

997.                        

998.    Question 9   0 out of 5 points  

999.         The __ __ distributes Statement of Health information to the

appropriate System Health Validators.                     

1000.          

1001. Selected Answer:         NAP agent

1002. Correct Answer:          NAP administration server

1003.                        

1004.    Question 10  0 out of 5 points  

1005.         Each System Health Agent provides a __ __ regarding its health status.

1006.          

1007. Selected Answer:         System Statement of Health (SSCH)

1008. Correct Answer:          Statement of Health (SOH)

1009.                        

1010.    Question 11  5 out of 5 points  

1011.         Each server that functions as a CA must be configured with a(n):      

1012.          

1013. Selected Answer:            Revocation configuration

1014. Correct Answer:     Revocation configuration

1015.                        

1016.    Question 12  5 out of 5 points  

1017.         An organization can have one or more of these to distribute the load of

issuing certificates in a geographically dispersed organization:                   

1018.          

1019. Selected Answer:            Intermediate CA

1020. Correct Answer:     Intermediate CA

1021.                        

1022.    Question 13  5 out of 5 points  

1023.         In order to authenticate using a smart card that has been configured

for their use, a user must have the following installed at their workstation:       

1024.          

1025. Selected Answer:            smart card reader

1026. Correct Answer:     smart card reader

1027.                        

1028.    Question 14  5 out of 5 points  

1029.         Which component of Active Directory Certificate Services uses the

Online Certificate Status Protocol to respond to client requests?                  

1030.          

1031. Selected Answer:            Online Responder

1032. Correct Answer:     Online Responder

1033.                        

1034.    Question 15  5 out of 5 points  

1035.         The IPSec NAP Enforcement method relies on this type of PKI certificate

to perform its enforcements:                   

1036.          

1037. Selected Answer:            health certificate

1038. Correct Answer:     health certificate

1039.                        

1040.    Question 16  5 out of 5 points  

1041.         A server that operates the NAP Enforcement Server components is

referred to as a(n):                   

1042.          

1043. Selected Answer:            enforcement point

1044. Correct Answer:     enforcement point

1045.                        

1046.    Question 17  5 out of 5 points  

1047.         The Network Device Enrollment Service (NDES) uses the following

protocol to enroll network devices for PKI certificates:                       

1048.          

1049. Selected Answer:            Simple Certificate Enrollment Protocol

1050. Correct Answer:     Simple Certificate Enrollment Protocol

1051.                        

1052.    Question 18  0 out of 5 points  

1053.         Statements of Health from each SHA are combined to create a:           

1054.          

1055. Selected Answer:            System Statement of Health Response

1056. Correct Answer:     System Statement of Health

1057.                        

1058.    Question 19  5 out of 5 points  

1059.         The following NAP component transmits information between the NAP

Enforcement Clients and the System Health Agents:                    

1060.          

1061. Selected Answer:            NAP Agent

1062. Correct Answer:     NAP Agent

1063.                        

1064.    Question 20  5 out of 5 points  

1065.         This provides a detailed explanation of how a particular Certification

Authority manages certificates and keys                 

1066.          

1067. Selected Answer:            Certificate Practice Statement

1068. Correct Answer:     Certificate Practice Statement

1069.                        

1070. Question 2      5 out of 5 points  

1071.         This type of backup will completely reformat the target drive that

hosts the backup files.                     

1072.          

1073. Selected Answer:            Scheduled backup

1074. Correct Answer:     Scheduled backup

1075.                        

1076.    Question 3   5 out of 5 points  

1077.         This type of disk quota allows the user to access storage space beyond

the allotted amount and simply sends an email notification when the quota has been

exceeded.                    

1078.          

1079. Selected Answer:            soft quota

1080. Correct Answer:     soft quota

1081.                        

1082.    Question 4   5 out of 5 points  

1083.         This type of restore can be used to recover an entire server after it

has experienced a hardware failure or other disaster recovery scenario.            

1084.          

1085. Selected Answer:            bare-metal restore

1086. Correct Answer:     bare-metal restore

1087.                        

1088.    Question 5   5 out of 5 points  

1089.         This backup type will retain the Application log files on the local

server after the backup is completed.                      

1090.          

1091. Selected Answer:            Copy backup

1092. Correct Answer:     Copy backup

1093.                        

1094.    Question 6   5 out of 5 points  

1095.         This quota type prohibits users from consuming any disk space beyond

what has been defined within the quota.                   

1096.          

1097. Selected Answer:            hard quota

1098. Correct Answer:     hard quota

1099.                        

1100.    Question 7   5 out of 5 points  

1101.         This is the only type of quota available on servers that do not have

the File Server Resource Manager role service installed.                  

1102.          

1103. Selected Answer:            NTFS quota

1104. Correct Answer:     NTFS quota

1105.                        

1106.    Question 8   5 out of 5 points  

1107.         All Windows disk quotas are based on the following to determine the

amount of space being used by a particular user.                   

1108.          

1109. Selected Answer:            file ownership

1110. Correct Answer:     file ownership

1111.                        

1112.    Question 9   5 out of 5 points  

1113.         This backup type will update the server s backup history and will clear

the Application Log files on the server.                       

1114.          

1115. Selected Answer:            VSS full backup

1116. Correct Answer:     VSS full backup

1117.                        

1118.    Question 10  5 out of 5 points  

1119.         This collection of disk quota settings can be used to create numerous

quota assignments all containing consistent configuration settings.                

1120.          

1121. Selected Answer:            quota template

1122. Correct Answer:     quota template

1123.                        

1124.    Question 11  5 out of 5 points  

1125.         This backup technology was introduced by Windows Server 2008 and relies

on the Volume Shadow Copy Service (VSS).                       

1126.          

1127. Selected Answer:            Windows Server Backup

1128. Correct Answer:     Windows Server Backup

1129.                        

1130.  

1131. Administrators can specify these to dictate the percentage of available disk

space at which actions associated with disk quotas will take effect.

1132.  

1133.  F.  threshold

1134.  

1135.   F.   threshold

1136.  

1137. This is a new command-line and task-based scripting technology that is included

with Windows Server 2008.

1138.  

1139.  I. Windows Powershell

1140.  

1141.   I.  Windows Powershell

1142.  

1143. This is a limit that is placed on the disk space a user is permitted to consume

in a particular volume or folder.

1144.  

1145.  A. disk quota

1146. disk quota

1147. This controls what types of traffic will be recorded by Network Monitor when

you press F10.

1148.  D.

1149.  Capture Filter

1150.  

1151.   D.  

1152.  Capture Filter

1153.  

1154.  

1155. This right must be granted to Performance Log Users to allow them to create and

manage Data Collector Sets.

1156.  

1157.  H.

1158.  Log on as a batch user

1159.  

1160.   H.  

1161.  Log on as a batch user

1162.  

1163.  

1164. This custom view in the Event Viewer collects Critical, Error, and Warning

events from all logs on a particular server.

1165.  

1166.  A. Administrative Events

1167.  

1168.   A.  Administrative Events

1169.  

1170. This capture mode enables Network Monitor to listen to all traffic that is

being passed on a particular network segment.

1171.  

1172.  J. promiscuous mode   J.  promiscuous mode

1173. This service is used by WSUS to optimize network traffic while downloading

updates.

1174.  

1175.  C.

1176.  Background Intelligent Transfer Service (BITS)

1177.  

1178.   C.  

1179.  Background Intelligent Transfer Service (BITS)

1180.  

1181.  

1182. This type of forwarded event is initiated by the server acting as the event

repository.

1183.  

1184.  E.

1185.  collector initiated

1186.  

1187.   E.  

1188.  collector initiated

1189.  

1190.  

1191. This is the command-line method of launching the Performance Monitor MMC snap-

in.

1192.  

1193.  I.

1194.  perfmon

1195.   I.  

1196.  perfmon

1197. This log provides a view of events related to software that has been installed

on a Windows server computer.

1198.  

1199.  B.

1200.  Application Log

1201.  

1202.   B.  

1203.  Application Log

1204.  

1205.  

1206. This is collected to provide a real-time view into the behavior and performance

of a server and its applications.

1207.  

1208.  G.

1209.  event trace data

1210.  

1211.   G.  

1212.  event trace data

1213.  

1214. This allows you to organize a set of performance counters, event traces, and

system configuration data into a single reusable configuration item.  F.

1215.  Data Collector Set

1216.  

1217.   F.  

1218.  Data Collector Set