The server operating system is exempt from WSRM resource policies and is granted resources last.
The ____ is a specialized language for creating windows, pages, and other visual features.
User Interface Markup Language
Windows Presentation Framework
Extensible Stylesheet Language
Extensible Application Markup Language
In an application pool, ____ mode means that application requests are processed in an environment that integrates ASP.NET and IIS.
If a drive is protected using ____, no one can access information without proper authentication even if the drive has been stolen.
BitLocker Drive Encryption
BitLocker System Encryption
BitLocker Volume Encryption
BitLocker Drive Vault
In Kerberos security, the permanent ticket, called a ____ ticket, is good for the duration of a logon session.
An NLB cluster is a feature that is installed through the NLB Cluster Manager.
The Microsoft System Center Configuration Manager ____ capability provides you with the ability to collect data about how software is used, such as the number of deployed copies, number of licenses needed, if the software is in use, and when the software is used.
desired configuration management
____ consists of standards for building software from individual objects or components.
Common Object Model
Component Object Model
Common Language Runtime
In TCP, a(n) ____ is like a virtual circuit between two communicating applications.
____ protocol is the protocol Microsoft uses for sharing files and folders on a network.
Remote Message Block
Server Message Block
Remote Procedure Call
Server Message Channel
For a “strong password” Microsoft recommends a minimum of ____ characters.
A ____ is a library of commonly used applications and application programming interfaces (APIs) that can be reused by programmers in the larger applications that they write.
____ enables a client to run an application from a server on the client as though the application is actually installed on that client.
Microsoft Application Virtualization Toolkit
Microsoft Application Virtualization Configuration
Microsoft Application Virtualization Management
Microsoft Application Virtualization Wizard
Ports are typically closed via ____.
NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.
NAP cannot work in conjunction with 802.1X.
UAC means there is little chance that the installation can destabilize the operating system, because the installation takes place only with the proper authorization and in standard user mode.
A ____ process is an ASP.NET process that runs on its own without using the same memory as IIS.
Customized software can enable an organization to shape a specialized business strategy to achieve a unique market niche or soar ahead of the competition.
Computers in the DMZ generally have more security defenses via routers and firewalls.