Quiz 6 (chapters 12 and 13)

Descrição

ACT Year 12 Certificate CSI265 Quiz sobre Quiz 6 (chapters 12 and 13), criado por Joshua Villy em 08-05-2013.
Joshua Villy
Quiz por Joshua Villy, atualizado more than 1 year ago
Joshua Villy
Criado por Joshua Villy mais de 11 anos atrás
445
0

Resumo de Recurso

Questão 1

Questão
The server operating system is exempt from WSRM resource policies and is granted resources last.
Responda
  • True
  • False

Questão 2

Questão
The ____ is a specialized language for creating windows, pages, and other visual features.
Responda
  • User Interface Markup Language
  • Windows Presentation Framework
  • Extensible Stylesheet Language
  • Extensible Application Markup Language

Questão 3

Questão
In an application pool, ____ mode means that application requests are processed in an environment that integrates ASP.NET and IIS.
Responda
  • classic
  • integrated
  • internal
  • external

Questão 4

Questão
If a drive is protected using ____, no one can access information without proper authentication even if the drive has been stolen.
Responda
  • BitLocker Drive Encryption
  • BitLocker System Encryption
  • BitLocker Volume Encryption
  • BitLocker Drive Vault

Questão 5

Questão
In Kerberos security, the permanent ticket, called a ____ ticket, is good for the duration of a logon session.
Responda
  • granting
  • service
  • session
  • connection

Questão 6

Questão
An NLB cluster is a feature that is installed through the NLB Cluster Manager.
Responda
  • True
  • False

Questão 7

Questão
The Microsoft System Center Configuration Manager ____ capability provides you with the ability to collect data about how software is used, such as the number of deployed copies, number of licenses needed, if the software is in use, and when the software is used.
Responda
  • remote assistance
  • desired configuration management
  • software installation
  • software metering

Questão 8

Questão
____ consists of standards for building software from individual objects or components.
Responda
  • Common Object Model
  • ActiveX
  • Component Object Model
  • Common Language Runtime

Questão 9

Questão
In TCP, a(n) ____ is like a virtual circuit between two communicating applications.
Responda
  • socket
  • handle
  • address
  • port

Questão 10

Questão
____ protocol is the protocol Microsoft uses for sharing files and folders on a network.
Responda
  • Remote Message Block
  • Server Message Block
  • Remote Procedure Call
  • Server Message Channel

Questão 11

Questão
For a “strong password” Microsoft recommends a minimum of ____ characters.
Responda
  • five
  • six
  • seven
  • eight

Questão 12

Questão
A ____ is a library of commonly used applications and application programming interfaces (APIs) that can be reused by programmers in the larger applications that they write.
Responda
  • device library
  • system library
  • type library
  • class library

Questão 13

Questão
____ enables a client to run an application from a server on the client as though the application is actually installed on that client.
Responda
  • Microsoft Application Virtualization Toolkit
  • Microsoft Application Virtualization Configuration
  • Microsoft Application Virtualization Management
  • Microsoft Application Virtualization Wizard

Questão 14

Questão
Ports are typically closed via ____.
Responda
  • routers
  • firewalls
  • proxies
  • gateways

Questão 15

Questão
NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.
Responda
  • False
  • True

Questão 16

Questão
NAP cannot work in conjunction with 802.1X.
Responda
  • False
  • True

Questão 17

Questão
UAC means there is little chance that the installation can destabilize the operating system, because the installation takes place only with the proper authorization and in standard user mode.
Responda
  • False
  • True

Questão 18

Questão
A ____ process is an ASP.NET process that runs on its own without using the same memory as IIS.
Responda
  • master
  • worker
  • primary
  • container

Questão 19

Questão
Customized software can enable an organization to shape a specialized business strategy to achieve a unique market niche or soar ahead of the competition.
Responda
  • True
  • False

Questão 20

Questão
Computers in the DMZ generally have more security defenses via routers and firewalls.
Responda
  • False
  • True

Semelhante

Quiz 5 (chapters 9, 10, 11)
Joshua Villy
Quiz 3 (chapters 5 and 6)
Joshua Villy
Quiz 4 (chapters 7 and 8)
Joshua Villy
Quiz 1 (chapters 1 and 2)
Joshua Villy
Quiz 2 (chapters 3 and 4)
Joshua Villy
Geologia 10ºANO
catarinacusca
Quiz Rápido de Matemática
Alessandra S.
BIOQUÍMICA CELULAR
paulo.ximendes
O efeito estufa
guilhermetcortes
Grécia antiga: formação
jacson luft
Citações para Redação - ENEM
Jayne Torres