Professional Documents
Culture Documents
(Download PDF) MCTS Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration 1st Edition Bender Test Bank Full Chapter
(Download PDF) MCTS Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration 1st Edition Bender Test Bank Full Chapter
https://testbankfan.com/product/mcts-guide-to-configuring-
microsoft-windows-server-2008-active-directory-1st-edition-
tomsho-test-bank/
https://testbankfan.com/product/mcts-guide-to-configuring-
microsoft-windows-server-2008-active-directory-1st-edition-
tomsho-solutions-manual/
https://testbankfan.com/product/mcitp-guide-to-microsoftr-
windows-server-2008-1st-edition-palmer-test-bank/
https://testbankfan.com/product/network-guide-to-networks-7th-
edition-west-test-bank/
Network+ Guide to Networks 8th Edition West Test Bank
https://testbankfan.com/product/network-guide-to-networks-8th-
edition-west-test-bank/
https://testbankfan.com/product/network-guide-to-networks-5th-
edition-dean-test-bank/
https://testbankfan.com/product/guide-to-network-security-
fundamentals-6th-edition-ciampa-test-bank/
https://testbankfan.com/product/network-guide-to-networks-6th-
edition-tamara-dean-test-bank/
https://testbankfan.com/product/network-guide-to-networks-7th-
edition-west-solutions-manual/
Chapter 7: Configuring File Services in Windows Server 2008
TRUE/FALSE
1. The SMB protocol can be used on private networks and the Internet by communicating over TCP/IP.
2. Shares on FAT32 volumes can use share permissions; they also have the ability to use file or
folder-level security.
3. NTFS permissions are retained when a file or folder is backed up, while share permissions are not.
4. DFS is the preferred file system used in Windows networks for its increased security and detailed
configuration settings.
5. After installing the DFS roles and role services, you should create a DFS namespace to act as the
central point for clients to access network shared data.
MULTIPLE CHOICE
2. ____ is the preferred format in Windows Server 2008 due to its more robust features and file-level
security.
a. NTFS c. OEM
b. DFS d. DCDiag
ANS: A PTS: 1 REF: 265
3. ____ are defined at the shared resource level and allow clients access to a network share.
a. Server Message Blocks c. Offline files
b. Share-level permissions d. Security identifiers
ANS: B PTS: 1 REF: 265
4. ____ can be identified by name because they always end with a dollar sign ($).
a. Tokens c. Administrative shares
b. Permissions d. Net shares
ANS: C PTS: 1 REF: 266
5. ____ are defined at the folder or file level.
a. Net shares c. Administrative shares
b. Tokens d. User-level permissions
ANS: D PTS: 1 REF: 268
6. Folder ____ are applied to a specific folder on a Windows Server 2008 server.
a. permissions c. files
b. namespaces d. ACLs
ANS: A PTS: 1 REF: 268
8. A ____ is an object attached to a user’s account that validates the user’s identity and privileges they
have to resources.
a. zone c. record
b. token d. domain
ANS: B PTS: 1 REF: 270
9. Windows uses ____ to make every user, computer, and resource on a network unique.
a. security identifiers c. domains
b. ACLs d. root hints
ANS: A PTS: 1 REF: 270
10. ____ is a CLI utility provided with Windows that allows you to create and manage shared folder
resources.
a. SID c. Server Message Block
b. ACL d. Net share
ANS: D PTS: 1 REF: 274
11. ____ allow shared file resources to be available to clients when they are not connected to the network.
a. Domains c. Offline files
b. Net shares d. ACLS
ANS: C PTS: 1 REF: 276
13. The ____ requires a domain to be running in Windows Server 2008 AD DS functional mode, and all
namespace servers to be running Windows Server 2008.
a. Windows Server 2008 mode c. ACL
b. stand-alone namespace d. DFS namespace
ANS: A PTS: 1 REF: 279
14. The ____ requires a domain to be running in Windows 2000 mixed AD DS functional mode or higher,
and all namespace servers to be running at least Windows 2000 Server.
a. Windows Server 2000 mode c. DFS
b. NTFS d. ACL
ANS: A PTS: 1 REF: 279
15. ____ is responsible for synchronizing all the data within a DFS structure.
a. DFS namespace c. Administrative share
b. DFS replication d. Net share
ANS: B PTS: 1 REF: 280
16. Using a multimaster replication engine (such as AD), ____ allows servers connected across WAN or
limited bandwidth network connections to stay current.
a. DFS namespace c. administrative share
b. DFS replication d. net share
ANS: B PTS: 1 REF: 280
17. Once deployed, ____ has a hierarchical namespace structure that allows users to locate information
using a UNC path location.
a. net share c. SID
b. DFS d. ACL
ANS: B PTS: 1 REF: 282
18. ____ allows you to add existing folder shares into a namespace.
a. DFS c. DFS
b. NTFS d. SID
ANS: C PTS: 1 REF: 284
19. ____ allows administrators to block specific types of files from being stored in Windows Server 2008
file directories.
a. DFS replication c. Public folder sharing
b. Filter screening d. Private folder sharing
ANS: B PTS: 1 REF: 290
20. ____ can be defined by using built-in templates or custom-created templates or by specific file type.
a. ACLs c. SIDs
b. Filters d. Domains
ANS: B PTS: 1 REF: 290
21. ____ use actual file size instead of the logical file size.
a. FSRM quotas c. SMBs
b. File servers d. Net shares
ANS: A PTS: 1 REF: 288
COMPLETION
1. _________________________ allows users to share files with all the users logged on locally or on the
network, if that feature is enabled.
ANS:
ACEs (access control entries)
access control entries (ACEs)
access control entries
ACEs
ANS: caching
ANS:
DFS (Distributed File System)
Distributed File System (DFS)
Distributed File System
DFS
5. Microsoft’s implementation of DFS allows you to create an entry point for shared file resources using
a naming convention of your choice. This is referred to as the
_____________________________________________
ANS:
DFS namespace
Distributed File System (DFS) namespace
DFS (Distributed File System) namespace
Distributed File System namespace
MATCHING
SHORT ANSWER
1. The Windows Server 2008 File Services role contains many functions for providing access to and
storage of electronic data. Each function includes a specific service for network clients. Briefly
describe the following functions: File Server and Distributed File System.
ANS:
File Server—The most basic of the File Services functions, the file server is responsible for sharing
and managing data resources on a Windows Server 2008 computer.
Distributed File System—This function is improved in Windows Server 2008. DFS provides a
framework for creating a centralized point of entry for accessing network data. DFS uses a common
namespace as the entry point for all clients to access data on one or more servers.
2. The Windows Server 2008 File Services role contains many functions for providing access to and
storage of electronic data. Each function includes a specific service for network clients. Briefly
describe the following functions: Services for Network File System and Windows Server 2003 File
Services.
ANS:
Services for Network File System—Services for Network File System (NFS) provide a filesharing
solution for enterprises that have a mixed Windows and UNIX environment. With Services for NFS,
you can transfer files between computers running Windows Server 2008 and UNIX operating systems
using the NFS protocol.
Windows Server 2003 File Services—This function provides backward compatibility for Windows
Server 2003 computers by providing access to two Windows Server 2003 features: the File Replication
Service and the Indexing Service.
ANS:
Admin$—This share provides you with network access to the Windows Server 2008 system files on a
remote computer. By default, the system files, also known by the environmental variable of
%systemroot%, are located in the c:\Windows directory.
IPC$—This share is used by Windows Server 2008 for sharing resources, not files or folders, and
facilitating communication between processes and computers. IPC$ is used for any remote
management function not related to the sharing of files. For example, IPC$ is used to exchange
authentication data between computers wanting to communicate.
4. Provide brief descriptions of the following NTFS file permissions: Full Control and Read & Execute.
ANS:
Full Control: Read, write, modify, execute, change attributes and permissions, and take ownership of
the file.
Read & Execute: Display the file’s data, attributes, owner, and permissions and run the file (if it’s a
program or has a program associated with it for which you have the necessary permissions)
5. List four tools that can be used to implement file and folder sharing.
ANS:
The tools include:
6. Briefly discuss the following implementations of DFS namespaces: domain-based and stand-alone.
ANS:
Domain-based—A domain-based namespace is stored on one or more servers as part of AD DS.
Because of its integration with AD DS, this namespace provides increased scalability and availability
because it can be spread across multiple servers.
Stand-alone—This type of namespace is stored on a single server so that it is restricted to the space
and availability of the server on which it is stored. Stand-alone namespace servers can use increased
availability if they are hosted on a failover cluster.
7. What questions would you ask when trying to determine how to deploy DFS?
ANS:
The following questions will help you determine how to deploy DFS:
• Are you running an AD DS domain?
• Do you need support for DFS servers not running Windows Server 2008?
• Do you need multiple DFS servers or just one?
• Will your environment support moving to Windows Server 2008 functional mode on all your DCs?
• Does your solution require scalability?
• Do you need to replicate across LAN or WAN connections?
8. DFS replication can be used on its own for replicating data, or it can be combined with the DFS
namespace. Discuss the benefits derived when used along with the DFS namespace.
ANS:
When used along with the DFS namespace, you receive the following advantages:
• Data collection—This allows you to take data from multiple servers and collect it in a central
location on one server. Data collection is helpful if you need to perform local server backups from a
single server.
• Data distribution—DFS allows you to distribute data across multiple locations so that users can use a
copy of a resource located in their geographic location. AD DS sites are used to determine which DFS
resources are local to the user.
• Load balancing—This allows you to deploy multiple servers that hold copies of your data. When
users attempt to access a document stored in DFS, they will be directed to a DFS server in their AD
DS site or the closest AD DS site.
ANS:
The steps for deploying DFS are as follows:
• Install the File Services role and the Distributed File System role services
• Create a namespace
• Add folders to the namespace
• Configure the DFS referral order
• Create a DFS replication group
10. FSRM allows administrators to perform various tasks in managing files and disk volumes through the
FSRM console. List three of these tasks.
ANS:
These tasks include the following:
• Managing file and disk quotas
• Screening files using built-in and custom templates
• Creating reports on storage resources
Fig. 456.—Leaf-like
branch with flowers (nat.
size).
Fig. 457.—♂-flower; and
Fig. 458, ♀-flower (mag.).
Euphorbia (Spurge) has the most reduced flowers, which are
borne in a very complicated inflorescence. Each ♂-flower (Fig. 460
B) is naked, and consists of one stamen only (terminal on the axis).
In the closely allied genus Anthostema, a small perianth is situated
at the place where, in Euphorbia, there is a joint in the “filament,”
(Fig. 461 A). The ♀ -flowers (Fig. 460) are naked, with a 3-locular
ovary and 3 bifid styles. (Anthostema has a distinct perianth (Fig.
461 B); in a few Euphorbias traces of a perianth are present). In
Euphorbia the ♂ -and ♀ -flowers are grouped into flower-like
inflorescences termed “cyathia.” Each cyathium consists of a
centrally placed ♀ -flower which is first developed, surrounded by 5
groups of ♂-flowers (stamens) placed in a zig-zag, with a centrifugal
order of development (Figs. 459, 460 B), that is, in unipared
scorpioid cymes; these flowers are surrounded by an involucre of 5
leaves united into a bell-shaped structure (Fig. 459, 1–5) (resembling
a calyx); on its edge are placed 4, generally crescent-like, yellow
glands, one in each of the intervals, except one, between the lobes
of the involucre (shaded in Fig. 459; see also Fig. 460 A). Scale-like
thin structures (floral-leaves?) are situated between the ♂ -flowers.
The ♀-flower has a long stalk, and finally bends down on one side,
namely to the place on the edge of the involucre where the gland is
not developed. These cyathia are again arranged in an inflorescence
which commences as a 3–5-rayed umbellate cyme (pleiochasium),
the branches of which ramify dichasially and finally as scorpioid
cymes.—Latex, with peculiar-shaped starch-grains, is found in
laticiferous cells (especially in the Cactus-like, leafless species.)
Fig. 459.—Diagram of an inflorescence (cyathium) of
Euphorbia with 3 floral-leaves, m, n, o, supporting other cyathia
which are subtended by 2 floral-leaves (bracteoles; m, n). 1–5,
the involucral leaves in their order of development; the shaded
portions are the crescentic glands.
Fig. 460.—Euphorbia lathyris: A an (entire) inflorescence (cyathium); B the
same after the removal of the involucre.
Fig. 461.—Anthostema: ♂- (A) and ♀ -(B)
flowers; p the perianth; ar the node; o the
ovule.
205 genera; more than 3,000 species; especially in the Tropics.—Many are
used on account of the oil, and of the pungent (aperient, poisonous, anthelmintic,
etc.) properties in the latex or the seeds. Officinal: “Cascarilla-bark” of Croton
eluteria; the fatty oil of the seeds of Croton tiglium (Trop. Asia); “Castor oil” from
Ricinus communis (Africa, and cultivated in all warm climates throughout the
world); the glandular hairs of Mallotus philippinensis (“Kamala”); this also yields a
red dye. Gum “Euphorbium” is the hardened (resinous) latex of the Cactus-like
Euphorbia resinifera (Morocco).—Nutritive plants: Manihot utilissima and other
species (Maniok, Am.). Their large, farinaceous roots form a very important article
of food in the Tropics (Cassava-flour, Tapioca or Brazilian arrowroot). The fresh
latex of the root in some species is a powerful poison; but the poisonous properties
are diminished by roasting or cooking. Caoutchouc is obtained from Siphonia
elastica (Trop. S. Am.). The vegetable tallow of the Chinese tallow-tree (Stillingia
sebifera) is used in large quantities in soap factories. An indigo-like dye is obtained
from Crozophora tinctoria, and is also found in Mercurialis perennis. Shellac is
obtained from Aleurites laccifera. Ornamental plants: Acalypha, Croton,
Dalechampia.—Hippomane is poisonous.
Order 2. Buxaceæ. This order differs from the Euphorbiaceæ in having the
micropyle turned inwards; the ♂-flower has a 4-partite perianth and 4 stamens; the
♀ -flower a 6-partite perianth and 3 carpels. Capsule with loculicidal dehiscence,
the inner layer being detached elastically from the outer.—30 species. Shrubs
without latex and with evergreen leaves.—Buxus sempervirens (Box) is an
ornamental shrub (poisonous); it has a very hard and valuable wood which is used
for wood-engraving and carving.
Fig. 472.—Flower in
longitudinal section.
Fig. 473.—Seed in
longitudinal section.
Æsculus (Horse-Chestnut). Trees with opposite, digitate, dentate
leaves without stipules; the inflorescence is composed of unipared
scorpioid cymes arranged in a pyramidal panicle (termed a thyrsus).
The flowers are irregular, with an oblique plane of symmetry (through
the 4th sepal, Fig. 471); there are 5 sepals, 5 free petals, of which
the one lying between S3 and S5 is the smallest (see Fig. 471) and
may be absent; stamens 7 (5 + 2), three being suppressed;
gynœceum simple, 3-carpellary and 3-locular, with single style; of
the two ovules one is ascending, the other descending (Fig. 472).—
The fruit is a 3-valvate, sometimes spiny, capsule, with loculicidal
dehiscence, the seed having a large hilum, a curved embryo without
endosperm and united cotyledons (the radicle lies in a fold of the
testa, Fig. 473). Æ. hippocastanum (Greece, Asia), introduced into
cultivation about 300 years ago; the majority of the other species,
e.g. Æ. pavia, etc., several of which are frequently cultivated in
gardens, are from N. America. The flower of the Horse-Chestnut is adapted
for bees, whose abdomen touches the anthers or style when visiting the flower.
The flowers are protogynous.
The other Sapindaceæ have most frequently 4 sepals, 8 stamens, various fruits
(septicidal capsule, nuts with or without wings, schizocarp), etc. Serjania,
Cardiospermum, Sapindus, Koelreuteria, etc. (about 118 genera, 970 species).