You are on page 1of 11

does not use traditional partitioning Dynamic disk 11.

11% Dynamic disk


two or more disks that are combined like a volume set, but that are Stripe set 11.11% Stripe set
striped for RAID level 0 or RAID level 5
a server folder that is associated with a user’s account and that is a Home directory 11.11% Home directory
designated workspace for the user to store files
contains information about each partition created, such as the type of Partition table 11.11% Partition table
partition on MBR Disks, size, and location
the partition that contains the hardware-specific files needed to load the System 11.11% System
operating system partition partition
a set of standards for lengthening disk life and preventing data loss RAID 11.11% RAID
located in the first sector and track of the hard disk and has startup MBR 11.11% MBR
information about partitions and how to access the disk
tool that provides a central location for viewing disk information and Disk 11.11% Disk
performing tasks such as creating and deleting partitions and volumes Management Management
uses traditional disk management techniques and contains primary Basic disk 11.12% Basic disk
partitions, extended partitions, and logical drives
Score: 5/5
 

____ is a process that blocks a group of tracks and sectors to be used by a particular file system, such as NTFS.
Student
  Value Correct Answer Feedback
Response
1. Formatting    
2. Fragmenting    
3. Defragmenting    
4. Partitioning 100%    
Score: 2/2
 

____ volumes are often referred to as RAID-0.


Student
  Value Correct Answer Feedback
Response
1. Simple    
2. Striped 100%    
3. Mirrored    
4. Spanned    
Score: 2/2
 

The process of ____ locates fragmented folders and files and moves them to a location on the physical disk so
they are in contiguous order.
Student
  Value Correct Answer Feedback
Response
1. partitioning    
2. formatting    
3. fragmenting    
4. defragmenting 100%    
Score: 2/2
 

Disk ____ is a fault-tolerance method that prevents data loss by duplicating data from a main disk to a backup
disk.
Student
  Value Correct Answer Feedback
Response
1. mirroring 100%    
2. duplexing    
3. stripping    
4. spanning    
Score: 2/2
 

Disk mirroring involves creating a shadow copy of data on a backup disk and is RAID ____.
Student
  Value Correct Answer Feedback
Response
1. Mirror    
2. Shadow    
3. level 0    
4. level 1 100%    
Score: 2/2
 

A RAID-5 volume requires a minimum of ____ disk drives.


Student
  Value Correct Answer Feedback
Response
1. five    
2. four    
3. two    
4. three 100%    
Score: 2/2
 

____ RAID implements fault tolerance through the server’s operating system.
Student
  Value Correct Answer Feedback
Response
1. Physical    
2. Virtual    
3. Software 100%    
4. Hardware    
Score: 2/2
 

____ is a process that creates a table containing file and folder information for a specific file system in a
partition.
Student
  Value Correct Answer Feedback
Response
1. Defragmenting    
2. Partitioning    
3. Fragmenting    
4. Formatting 100%    
Score: 2/2
 

A(n) ____ backup only backs up files that are new or that have been updated.
Student
  Value Correct Answer Feedback
Response
1. custom    
2. full    
3. network    
4. incremental 100%    
Score: 2/2
 

Disk ____ is the ability to spread data over multiple disks or volumes.
Student
  Value Correct Answer Feedback
Response
1. mirroring    
2. formatting    
3. striping 100%    
4. partitioning    
Score: 2/2
 

The ____ partition is the partition where your computer will look for the hardware-specific files to start the
operating system.
Student
  Value Correct Answer Feedback
Response
1. extended    
2. secondary    
3. primary    
4. active 100%    
Score: 2/2
 

A(n) ____ partition is created from space that is not yet partitioned.
Student
  Value Correct Answer Feedback
Response
1. active    
2. secondary    
3. extended 100%    
4. primary    
Score: 2/2
 

A ____ volume is a portion of a disk or an entire disk that is set up as a dynamic disk.
Student
  Value Correct Answer Feedback
Response
1. striped    
2. simple 100%    
3. mirrored    
4. spanned    
Score: 2/2
 

A ____ volume is stored on 2 to 32 dynamic disks that are treated as one volume.
Student
  Value Correct Answer Feedback
Response
1. spanned 100%    
2. mirrored    
3. simple    
4. striped    
Score: 2/2
 

DNS name resolution is enabled through the use of tables of information that link computer names and IP
addresses. The tables are associated with partitions in a DNS server that are called ____ and that contain resource
records.
Student
  Value Correct Answer Feedback
Response
1. regions    
2. zones 100%    
3. segments    
4. blocks    
Score: 2/2
 

In exclusive forwarding, the DNS server that initially forwards the request is called a ____ DNS server.
Student
  Value Correct Answer Feedback
Response
1. master    
2. secondary    
3. root    
4. slave 100%    
Score: 2/2
 

____ automatically registers network clients that use NetBIOS and builds a database that other network clients
can query in order to locate a computer.
Student
  Value Correct Answer Feedback
Response
1. NetBEUI    
2. DDNS    
3. DNS    
4. WINS 100%    
Score: 2/2
 

The WINS ____ registers the IP addresses and names of its client computers by writing them to the WINS
database.
Student
  Value Correct Answer Feedback
Response
1. cache    
2. server 100%    
3. zone    
4. record    
Score: 2/2
 
A(n) ____ is a DNS resource record that links a computer or network host name to its IP address.
Student
  Value Correct Answer Feedback
Response
1. load share    
2. canonical    
name
(CNAME)
3. host (A) 100%    
4. MX    
Score: 2/2
 

____ is a dual-key encryption standard for communication between a server and a client and is also used by
Microsoft Internet Explorer.
Student
  Value Correct Answer Feedback
Response
1. WINS    
2. DDNS    
3. SSL 100%    
4. NetBIOS    
Score: 2/2
 

The ____ is a DNS resource record that associates a particular TCP/IP service to a server along with the domain
of the server and its protocol.
Student
  Value Correct Answer Feedback
Response
1. SOA    
2. SRV 100%    
3. CNAME    
4. NS    
Score: 2/2
 

Microsoft DNS is also called ____.


Student
  Value Correct Answer Feedback
Response
1. Dynamic 100%    
DNS
(DDNS)
2. Secure DNS    
(SDNS)
3. Active DNS    
(ADNS)
4. Modern    
DNS
(MDNS)
Score: 2/2
 

DNS servers on a network fall into two broad categories: ____ and secondary.
Student
  Value Correct Answer Feedback
Response
1. home    
2. primary 100%    
3. root    
4. active    
Score: 2/2
 

A(n) ____ DNS server contains a copy of the primary DNS server’s zone database, but is not used for
administration (is not authoritative).
Student
  Value Correct Answer Feedback
Response
1. virtual    
2. extended    
3. logical    
4. secondary 100%    
Score: 2/2
 

A ____ zone has only the bare necessities for DNS functions.
Student
  Value Correct Answer Feedback
Response
1. forward    
lookup
2. stub 100%    
3. replication    
4. reverse    
lookup
Score: 2/2
 

____ networking, which has been around since before the Internet, means using a telecommunications line and a
modem (or other telephony device) to dial into a network or specific computers on a network.
Student
  Value Correct Answer Feedback
Response
1. SLIP    
2. Dial-up 100%    
3. VPN    
4. RRAS    
Score: 2/2
 

____ translates IP addresses on an internal network so that the actual IP addresses cannot be determined on the
Internet, because each address is seen externally on the Internet as one or more decoy addresses.
Student
  Value Correct Answer Feedback
Response
1. ISDN    
2. X.25    
3. NAT 100%    
4. DSL    
Score: 2/2
 

The ____ of a remote access policy are a set of attributes that are compared with the attributes of the connection
attempt.
Student
  Value Correct Answer Feedback
Response
1. conditions 100%    
2. constraints    
3. access    
permissions
4. settings    
Score: 2/2
 

____ encapsulates the data packet in the Hypertext Transfer Protocol (HTTP) used through Web
communications.
Student
  Value Correct Answer Feedback
Response
1. L2TP    
2. PPTP    
3. SSTP    
4. PPP 0%    
Score: 0/2
 

____ is a commonly used form of security for communications and transactions over the Web and can be used by
all Web browsers.
Student
  Value Correct Answer Feedback
Response
1. SSL 100%    
2. SLIP    
3. PPTP    
4. SSTP    
Score: 2/2
 

A(n) ____ is a modem from which communications occur in discrete units, and in which the start of a unit is
signaled by a start bit at the front, and a stop bit at the back signals the end of the unit.
Student
  Value Correct Answer Feedback
Response
1. cable modem    
2. synchronous    
modem
3. DSL modem    
4. asynchronous 100%    
modem
Score: 2/2

__ is a WAN communications technology that relies on packet switching and virtual connection techniques to
transmit at rates from 56 Kbps to 45 Mbps.
Student
  Value Correct Answer Feedback
Response
1. DSL    
2. T-carrier    
3. Frame relay 100%    
4. ISDN    
Score: 2/2
 

Statement Response Value Correct Match


a set of IP-based secure communications and encryption IPsec 20.0% IPsec
standards created through the Internet Engineering Task Force
(IETF)
the standard deployed by the U.S. federal government and is AES 20.0% AES
intended to be more secure than DES
an Active Directory object that contains group policy settings (a GPO 20.0% GPO
set of group policies) for a site, domain, OU, or local computer
a way to bring consistent security and other management to Group policy 20.0% Group policy
Windows Server 2008 and to clients connecting to a server
prevents an intruder from bypassing ACL file and folder BitLocker Drive 20.0% BitLocker Drive
protections Encryption Encryption
Score: 3/3
 

____ is a relatively new security measure for protecting hard drives.


Student
  Value Correct Answer Feedback
Response
1. SSL    
2. DES    
3. AES    
4. BitLocker 100%    
Drive
Encryption
Score: 2/2
 

____ policies are security measures set up in a group policy that applies to all accounts or to all accounts in a
container, such as a domain, when Active Directory is installed.
Student
  Value Correct Answer Feedback
Response
1. Audit    
2. Security    
Options
3. User Rights    
4. Account 100%    
Score: 2/2
 
____ enable an account or group to perform predefined tasks.
Student
  Value Correct Answer Feedback
Response
1. Account    
locks
2. Account    
logs
3. Account    
audits
4. User rights 100%    
Score: 2/2
 

____ can provide security for all TCP/IP-based application and communications protocols, including FTP and
HTTP, which are used in Internet transmissions.
Student
  Value Correct Answer Feedback
Response
1. IPsec 100%    
2. UAC    
3. BitLock    
Encryption
4. NAP    
Score: 2/2

You might also like