Quiz 6 (chapters 12 and 13)

Question 1 of 20

Medal-premium 1

The server operating system is exempt from WSRM resource policies and is granted resources last.

Select one of the following:

  • True

  • False

Question 2 of 20

Medal-premium 1

The ____ is a specialized language for creating windows, pages, and other visual features.

Select one of the following:

  • User Interface Markup Language

  • Windows Presentation Framework

  • Extensible Stylesheet Language

  • Extensible Application Markup Language

Question 3 of 20

Medal-premium 1

In an application pool, ____ mode means that application requests are processed in an environment that integrates ASP.NET and IIS.

Select one of the following:

  • classic

  • integrated

  • internal

  • external

Question 4 of 20

Medal-premium 1

If a drive is protected using ____, no one can access information without proper authentication even if the drive has been stolen.

Select one of the following:

  • BitLocker Drive Encryption

  • BitLocker System Encryption

  • BitLocker Volume Encryption

  • BitLocker Drive Vault

Question 5 of 20

Medal-premium 1

In Kerberos security, the permanent ticket, called a ____ ticket, is good for the duration of a logon session.

Select one of the following:

  • granting

  • service

  • session

  • connection

Question 6 of 20

Medal-premium 1

An NLB cluster is a feature that is installed through the NLB Cluster Manager.

Select one of the following:

  • True

  • False

Question 7 of 20

Medal-premium 1

The Microsoft System Center Configuration Manager ____ capability provides you with the ability to collect data about how software is used, such as the number of deployed copies, number of licenses needed, if the software is in use, and when the software is used.

Select one of the following:

  • remote assistance

  • desired configuration management

  • software installation

  • software metering

Question 8 of 20

Medal-premium 1

____ consists of standards for building software from individual objects or components.

Select one of the following:

  • Common Object Model

  • ActiveX

  • Component Object Model

  • Common Language Runtime

Question 9 of 20

Medal-premium 1

In TCP, a(n) ____ is like a virtual circuit between two communicating applications.

Select one of the following:

  • socket

  • handle

  • address

  • port

Question 10 of 20

Medal-premium 1

____ protocol is the protocol Microsoft uses for sharing files and folders on a network.

Select one of the following:

  • Remote Message Block

  • Server Message Block

  • Remote Procedure Call

  • Server Message Channel

Question 11 of 20

Medal-premium 1

For a “strong password” Microsoft recommends a minimum of ____ characters.

Select one of the following:

  • five

  • six

  • seven

  • eight

Question 12 of 20

Medal-premium 1

A ____ is a library of commonly used applications and application programming interfaces (APIs) that can be reused by programmers in the larger applications that they write.

Select one of the following:

  • device library

  • system library

  • type library

  • class library

Question 13 of 20

Medal-premium 1

____ enables a client to run an application from a server on the client as though the application is actually installed on that client.

Select one of the following:

  • Microsoft Application Virtualization Toolkit

  • Microsoft Application Virtualization Configuration

  • Microsoft Application Virtualization Management

  • Microsoft Application Virtualization Wizard

Question 14 of 20

Medal-premium 1

Ports are typically closed via ____.

Select one of the following:

  • routers

  • firewalls

  • proxies

  • gateways

Question 15 of 20

Medal-premium 1

NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.

Select one of the following:

  • False

  • True

Question 16 of 20

Medal-premium 1

NAP cannot work in conjunction with 802.1X.

Select one of the following:

  • False

  • True

Question 17 of 20

Medal-premium 1

UAC means there is little chance that the installation can destabilize the operating system, because the installation takes place only with the proper authorization and in standard user mode.

Select one of the following:

  • False

  • True

Question 18 of 20

Medal-premium 1

A ____ process is an ASP.NET process that runs on its own without using the same memory as IIS.

Select one of the following:

  • master

  • worker

  • primary

  • container

Question 19 of 20

Medal-premium 1

Customized software can enable an organization to shape a specialized business strategy to achieve a unique market niche or soar ahead of the competition.

Select one of the following:

  • True

  • False

Question 20 of 20

Medal-premium 1

Computers in the DMZ generally have more security defenses via routers and firewalls.

Select one of the following:

  • False

  • True

Icon_fullscreen

Quiz 6 (chapters 12 and 13)

Joshua Villy
Quiz by , created over 3 years ago

ACT Year 12 Certificate CSI265 Quiz on Quiz 6 (chapters 12 and 13), created by Joshua Villy on 08/05/2013.

Eye 428
Pin 0
Balloon-left 0
Tags
Joshua Villy
Created by Joshua Villy over 3 years ago
Close