

Server Virtualization Test Bank
Course Introduction
Server Virtualization is a foundational course that explores the concepts, technologies, and best practices associated with virtualizing physical server resources. Students will learn how virtualization enables organizations to optimize hardware usage, enhance system reliability, and streamline management by running multiple virtual machines on a single physical server. The course covers major virtualization platforms, including VMware, Hyper-V, and open-source alternatives, with hands-on labs focused on deployment, configuration, and management of virtualized environments. Key topics include hypervisor types, resource allocation, network and storage virtualization, security considerations, and strategies for backup and disaster recovery in virtual infrastructures.
Recommended Textbook
MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson
Available Study Resources on Quizplus
10 Chapters
409 Verified Questions
409 Flashcards
Source URL: https://quizplus.com/study-set/453 Page 2


Chapter 1: Designing Active Directory Domain Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8045
Sample Questions
Q1) A(n) _________________________ is used within a domain to organize objects.
Answer: Organizational Unit (OU)
Organizational Unit
OU
Q2) List the domain functional levels that a target domain can be operating in when using ADMT v3.1.
Answer: Windows Server 2000 Native Windows Server 2003
Windows Server 2008
Q3) An Active Directory domain is hosted on a server called a ____.
A) member server
B) domain master
C) domain controller
D) role master
Answer: C
Q4) SID filtering should be disabled by an automated process.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 3
Chapter 2: Designing Physical Topology
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8046
Sample Questions
Q1) If a DC fails while holding a role and you need to have another DC assume the role, you can ____________________ the role.
Answer: seize
Q2) Describe two reasons for not placing a domain controller in a branch office prior to the release of Windows Server 2008.
Answer: Security. If the branch office didn't have adequate physical security, placing a DC there presented a significant risk. If the DC was stolen, the attacker could gain access to administrator passwords. With unrestricted access to a DC, it's just a matter of time before the passwords would be cracked.
Manpower. If the site didn't have IT personnel with adequate expertise to be placed in a domain administrators group, an organization wouldn't place a DC there.
Q3) The physical locations of an enterprise include one or more ____________________.
Answer: subnets
Q4) A(n) ____________________ application can determine its own Active Directory site membership (and location) and connect to other servers in the same site.
Answer: site-aware
To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Designing and Implementing DNS
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8047
Sample Questions
Q1) A(n) ____________________ name mimics a NetBIOS name.
Answer: single-label
Q2) List and describe three benefits of moving the DNS to a domain controller and create the zone as an ADI zone instead of a standard primary zone.
Answer: Secure dynamic updates are supported. This feature ensures that only clients with accounts in the domain can update DNS records.
Zone data is transferred to other ADI zones through Active Directory replication. Zone transfers do not need to be configured or managed.
Replicated zone traffic is encrypted. Active Directory replication traffic is encrypted by default. Because DNS ADI zone transfer traffic is replicated as part of the Active Directory replication process, it is automatically encrypted.
Multiple writable DNS servers can host the same primary zone if they are also ADI. All ADI DNS servers can host primary zones if they are all ADI. Individual security permissions can be applied to zones and records. Granular control over zones and records is possible using traditional access control lists.
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Designing and Implementing Group Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8048
Sample Questions
Q1) Sometimes, you might not want inherited Group Policies to apply to an OU; this can be achieved by setting the ____.
A) Block Settings
B) Restrict Inheritance
C) Block Inheritance
D) Disable Inheritance
Q2) The ____________________ Policy includes the account lockout duration, threshold, and the time to reset the account lockout counter.
Q3) What is the most common use of WMI filters?
Q4) The ____ setting is useful to control the membership of any group in Active Directory.
A) Restrict Group Policy
B) Block Inheritance
C) Lock Group Membership
D) Restrict Group Membership
Q5) Discuss what printer location policies can be used for.
Q6) Describe the Kerberos policy within Group Policy.
Q7) Explain how to create fine-grained policies.
Q8) Discuss reasons to use OUs.
To view all questions and flashcards with answers, click on the resource link above. Page 6
Chapter 5: Designing Remote Access and Terminal
Services Strategies
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8049
Sample Questions
Q1) Describe the NAP enforcement and extended state settings.
Q2) Discuss two significant benefits offered by TS Session Broker, besides load balancing.
Q3) ____ is used to provide end users with access to individual applications or full desktop operating systems from almost any mobile device.
A) Remote Services (RS)
B) Terminal Interactive Services (TIS)
C) Terminal Services (TS)
D) Remote Interactive Services (RIS)
Q4) TS CALs are managed and maintained on a(n) ____________________ licensing server.
Q5) Hosting a server on the Internet adds minimal risk.
A)True
B)False
Q6) A(n) _________________________ is used to determine which users are granted access to a remote access server.
Q7) Discuss the purpose of TS Session Broker.
Q8) List and explain two goals for NAP.
Q9) Describe a NAP client.

Page 7
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Chapter 6: Designing and Implementing a PKI
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8050
Sample Questions
Q1) When a public and private key are used for encryption, the process is called ____.
A) symmetric encryption
B) asymmetric encryption
C) bilateral encryption
D) dual encryption
Q2) Explain how you can view certificates in the Trusted Root Certification Authority.
Q3) A ____ is a number created by performing a hashing algorithm on data.
A) signature
B) key
C) cipher
D) hash
Q4) List and describe two AD CS role services.
Q5) AD CS publishes a delta CRL once a ____ by default.
A) day
B) week
C) month
D) year
Q6) Explain how the online responder service is configured.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Securing Windows Server 2008 Servers
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8051
Sample Questions
Q1) WSUS includes the ability to export and import updates to and from media.
A)True
B)False
Q2) You can use Server Manager to create a security policy that can be applied to any system to reduce the attack surface.
A)True
B)False
Q3) ____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.
Q4) ____________________ identify resources in one network that can communicate with resources in another network.
Q5) List and describe two areas that should be considered when hardening a system's security.
Q6) When you run SCW, it creates a configuration ____________________ of all the possible server roles, client features, options, services, and Windows firewall settings.
Q7) The scwcmd command ____________________ is used to analyze a system against a policy and determine if the system is compliant with the policy.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Designing High Availability and Business
Continuity
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8052
Sample Questions
Q1) If the user account is located in an OU, the OU is not included in the DN.
A)True
B)False
Q2) ____ means that a service is available when it's needed.
A) High availability
B) Load availability
C) Load balancing
D) Continuity availability
Q3) ___________________ rules are used to identify the traffic that will be balanced by the NLB cluster.
Q4) ____ includes all the methods and technologies used to ensure that a business can continue to operate even after a failure occurs.
A) Disaster recovery
B) Business recovery
C) Business continuity
D) Operations continuity
Q5) Failover clusters can be used to provide fault tolerance at the disk level.
A)True
B)False
Q6) Explain how the network address is assigned in a NLB cluster. Page 11
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 9: Designing Supporting Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8053
Sample Questions
Q1) Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
Q2) A ____ namespace would be created when the Windows Server 2008 server is not in a domain.
A) domain-based
B) stand-alone
C) forest-based
D) directory-based
Q3) ____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).
A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
Q4) The ____ is the top-level folder for the DFS namespace.
A) DFS Graphics folder
B) DFS forest
C) DFS root
D) DFS Project folder
Q5) List two applications through which RMS can be used to protect documents.
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Designing Virtualization Strategies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/8054
Sample Questions
Q1) The ____ setting in the Virtual Network Manager ensures that the virtual machines remain completely isolated.
A) internal only
B) external
C) host only
D) NAT
Q2) The Hyper-V Manager includes the ____, which can be used to create additional virtual networks or reconfigure the existing virtual network.
A) Virtual Resource Manager
B) Virtual Network Manager
C) Virtual Hardware Manager
D) Virtual Device Manager
Q3) Discuss two benefits of server consolidation.
Q4) Describe the private virtual machine network setting in the Virtual Network Manager.
Q5) Describe the System Center Application Virtualization Streaming Server.
Q6) What does a company need when they transition to multiple physical servers hosting multiple virtual servers?
Q7) Describe the Microsoft SoftGrid Application Virtualization for Desktops.
Page 14
To view all questions and flashcards with answers, click on the resource link above.