NT 2670 NT2670 Final Exam with Answers (ITT Tech University)

NT 2670 NT2670 Final Exam with Answers (ITT Tech University)


  • $34.99

NT 2670 Final Exam Version 2 (ITT TECH)

1. Which of the following roles enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there? Moac 70-643: Pg.10

2. Which of the Windows Server 2008 installation options is a stripped-down version of the operating system, where there is no Start menu, no desktop Explorer shell, no MMC console, and virtually no graphical applications? Moac 70-643: Pg.19

3. When a client runs an application on a terminal server, which of the following resources does the application utilize? Moac 70-643: Pg.17

4. Which of the following is a complete installation of an operating system that runs in a software environment emulating a physical computer? Moac 70-643: Pg.21

5. _______________ is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. Moac 70-643: Pg.36

6. The Add Roles Wizard provides roles that fall into three basic categories: Directory services, Application services, and ___________. Moac 70-643: Pg.3

7. ____________ enable you to use a Web site to publish files located anywhere on the network. Moac 70-643: Pg.193

8. Which of the following correctly identifies the HTTP binding options available? Moac 70-643: Pg. 194-195

9. Which of the following is the original default filename for the Web? Moac 70-643: Pg.198

10. When IIS7 generates a 404 error, it sends a _________ error page, in response to local requests, and a ______________ error page for requests coming from other computers. Moac 70-643: Pg. 204

11. FTP7 can use ________ to encrypt its authentication traffic before transmission. Moac 70-643: Pg.207

12. The most secure of the traditional challenge/response authentication methods supported by IIS7 is______________. Moac 70-643: Pg.226

13. Which authentication protocol is integrated into an IIS7 installation by default? Moac 70-643: Pg.225

14. The process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called _________. Moac 70-643: Pg.224

15. To restrict Web site or FTP access to specific computers or companies, you can create a list of _____________ and _______________ to which the server will grant or deny access. Moac 70-643: Pg.220

16. If all of the authentication methods fail, as in an improperly configured site with no methods enables the client receives HTTP Error _________. Moac 70-643: Pg.226

17. Web servers use port number ___ by default and the default port number for an SSL connection is ___.Moac 70-643: Pg.249

18. Where is the root directory of the default Web site placed when IIS is installed? Moac 70-643: Pg.226

19. Digital certificates are issued by internal or external resources called __________. Moac 70-643: Pg.246

20. The client must use the prefix __________ in its URL to connect to an IIS7 server using SSL. Moac 70-643: Pg.249

21. Web applications use a three-tiered architecture. The first tier is the client browser application running on the end users’ computer. The second tier is a Web server with some type of dynamic content generation capability, and the third tier is a _____________ that stores the information the Web server uses to dynamically generate Web pages. Moac 70-643: Pg.256

22. All applications that you add to the Default Web Site on the server use ___________. Moac 70-643: Pg.260

23. IIS7, to protect its own server functions, as well as those of other Web sites and Windows Server 2008 itself, can isolate Web applications in separate address spaces called _____________. Moac 70-643: Pg.259

24. Windows Server 2008 includes a feature that implements an ____________, which you can configure to handle all of the outgoing email messages sent by the system’s various roles and features. Moac 70-643: Pg.270

25. Two basic types of computers that can be on an enterprise network are: Moac 70-643: Pg. 1

26. E-mail is typically created and sent using an e-mail client program, such as Microsoft Outlook or Eudora, called a __________. Moac 70-236: Pg.3

27. Domain names that contain the name of the host computer are called ________________. Moac 70-236: Pg.5

28. ________________ is an improved version of the standard e-mail protocol that provides greater support for embedded graphics and attachments in e-mail. Moac 70-236: Pg.9

29. Which Exchange Server role allows users to access e-mail, voice mail, and fax messages from a MAPI client, OWA, smart phone, or telephone? Moac 70-236: Pg.12

30. The two forest-wide FSMO roles that must be present on a single DC in the forest are the Domain Naming Master and the __________. Moac 70-236: Pg.37

31. GPOs are applied to user and computer objects based on the link in the following order: ________> 73Domain> Parent OUs> Child OUs. Moac 70-236: Pg.73

32. Unlike other Exchange servers within your Exchange Organization, servers that host the ______ role cannot communicate directly with Active Directory. Moac 70-236: Pg.81

33. To relay e-mail within your organization and across the Internet, your Hub and Edge role servers must have __________ that specify how to send and receive e-mail. Moac 70-236: Pg.140

34. Which user group represents users within an organization that have both a user account in AD and a mailbox on an Exchange server? Moac 70-236: Pg.175

35. Instead of using public folders, Outlook 2007 and Entourage 2008 MAPI clients use the __________________ within Exchange 2007 to obtain offline address books, schedule calendar appointments, and obtain configuration information. Moac 70-236: Pg.281

36. Although mailbox users connect to a single public folder database by default, they will be able to see and access all of the public folders within the Exchange organization using ___________. Moac 70-236: Pg.282

37. Which protocol is designed to download e-mail from an e-mail server to a client for viewing? Moac 70-236: Pg.318

38. POP3 uses TCP port 110 while IMAP uses TCP port ____ by default. Moac 70-236: Pg.319

39. Network-based firewalls can restrict traffic based on source and destination IP address, network, and _________ address. Moac 70-236: Pg.369

40. The _________ DNS record is used to indicate the e-mail server for a particular domain to which email should be forwarded. Moac 70-236: Pg.6

41. Which platform does Exchange Server 2007 require for a production environment? Moac 70-236: Pg.82

42. Edge role servers must use ADAM to periodically obtain AD and Exchange information using the _______________ protocol from a server that hosts the Hub role. Moac 70-236: Pg.120

43. When assigning permissions, it is best to assign them to ____________ rather than to individual users.Moac 70-236: Pg.29

44. The ______________ is a database of all object names in the forest and aids in locating objects in the AD. Moac 70-236: Pg.35

45. Which of the following is not a server role available in Exchange Server 2007? Moac 70-236: Pg.16

46. Which log in the Windows Event Viewer contains Exchange-related errors and warnings? Moac 70-236: Pg.103

47. What type of mailbox allows a user in one forest to access a mailbox in another forest across a trust relationship? Moac 70-236: Pg.174

48. How many hub role servers should you have? Moac 70-236: Pg.81

49. You can use the ______ command to test connectivity to SMTP, POP3, and IMAP4. Moac 70-236: Pg.319

50. Outlook Anywhere uses the ___________________ component to connect to your Exchange servers from across the Internet. Moac 70-236: Pg.133

    We Also Recommend



    Sold Out