Quiz 6 (chapters 12 and 13)

Beschreibung

ACT Year 12 Certificate CSI265 Quiz am Quiz 6 (chapters 12 and 13), erstellt von Joshua Villy am 08/05/2013.
Joshua Villy
Quiz von Joshua Villy, aktualisiert more than 1 year ago
Joshua Villy
Erstellt von Joshua Villy vor mehr als 11 Jahre
445
0

Zusammenfassung der Ressource

Frage 1

Frage
The server operating system is exempt from WSRM resource policies and is granted resources last.
Antworten
  • True
  • False

Frage 2

Frage
The ____ is a specialized language for creating windows, pages, and other visual features.
Antworten
  • User Interface Markup Language
  • Windows Presentation Framework
  • Extensible Stylesheet Language
  • Extensible Application Markup Language

Frage 3

Frage
In an application pool, ____ mode means that application requests are processed in an environment that integrates ASP.NET and IIS.
Antworten
  • classic
  • integrated
  • internal
  • external

Frage 4

Frage
If a drive is protected using ____, no one can access information without proper authentication even if the drive has been stolen.
Antworten
  • BitLocker Drive Encryption
  • BitLocker System Encryption
  • BitLocker Volume Encryption
  • BitLocker Drive Vault

Frage 5

Frage
In Kerberos security, the permanent ticket, called a ____ ticket, is good for the duration of a logon session.
Antworten
  • granting
  • service
  • session
  • connection

Frage 6

Frage
An NLB cluster is a feature that is installed through the NLB Cluster Manager.
Antworten
  • True
  • False

Frage 7

Frage
The Microsoft System Center Configuration Manager ____ capability provides you with the ability to collect data about how software is used, such as the number of deployed copies, number of licenses needed, if the software is in use, and when the software is used.
Antworten
  • remote assistance
  • desired configuration management
  • software installation
  • software metering

Frage 8

Frage
____ consists of standards for building software from individual objects or components.
Antworten
  • Common Object Model
  • ActiveX
  • Component Object Model
  • Common Language Runtime

Frage 9

Frage
In TCP, a(n) ____ is like a virtual circuit between two communicating applications.
Antworten
  • socket
  • handle
  • address
  • port

Frage 10

Frage
____ protocol is the protocol Microsoft uses for sharing files and folders on a network.
Antworten
  • Remote Message Block
  • Server Message Block
  • Remote Procedure Call
  • Server Message Channel

Frage 11

Frage
For a “strong password” Microsoft recommends a minimum of ____ characters.
Antworten
  • five
  • six
  • seven
  • eight

Frage 12

Frage
A ____ is a library of commonly used applications and application programming interfaces (APIs) that can be reused by programmers in the larger applications that they write.
Antworten
  • device library
  • system library
  • type library
  • class library

Frage 13

Frage
____ enables a client to run an application from a server on the client as though the application is actually installed on that client.
Antworten
  • Microsoft Application Virtualization Toolkit
  • Microsoft Application Virtualization Configuration
  • Microsoft Application Virtualization Management
  • Microsoft Application Virtualization Wizard

Frage 14

Frage
Ports are typically closed via ____.
Antworten
  • routers
  • firewalls
  • proxies
  • gateways

Frage 15

Frage
NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.
Antworten
  • False
  • True

Frage 16

Frage
NAP cannot work in conjunction with 802.1X.
Antworten
  • False
  • True

Frage 17

Frage
UAC means there is little chance that the installation can destabilize the operating system, because the installation takes place only with the proper authorization and in standard user mode.
Antworten
  • False
  • True

Frage 18

Frage
A ____ process is an ASP.NET process that runs on its own without using the same memory as IIS.
Antworten
  • master
  • worker
  • primary
  • container

Frage 19

Frage
Customized software can enable an organization to shape a specialized business strategy to achieve a unique market niche or soar ahead of the competition.
Antworten
  • True
  • False

Frage 20

Frage
Computers in the DMZ generally have more security defenses via routers and firewalls.
Antworten
  • False
  • True
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Quiz 5 (chapters 9, 10, 11)
Joshua Villy
Quiz 3 (chapters 5 and 6)
Joshua Villy
Quiz 4 (chapters 7 and 8)
Joshua Villy
Quiz 1 (chapters 1 and 2)
Joshua Villy
Quiz 2 (chapters 3 and 4)
Joshua Villy
Das grosse Einmaleins
JohannesK
Alkalimetalle
Cassibodua
Zivilrecht - Zivilprozessrecht Streitigkeiten
myJurazone
Faust I
barbara91
Ziele der Erziehung
Mari Nokori
Matura Übungen Funktionale Abhängigkeiten
erwin.premstalle