Which of the following security protocols will you use to encrypt Web traffic?
You work as a Server Administrator for company Inc. You want all transactions to the storefront on
the Web server to be encrypted. Which of the following security protocols will you use to encrypt
Web traffic?
Drag and Drop the name of the components on the right side that belongs to the CPU (Central Processing Unit) o
Which of the following is an application protocol for querying and modifying data using directory services run
Which of the following is an application protocol for querying and modifying data using directory
services running over TCP/IP?
Which of the following file systems centralizes data and can be used to replicate shared folders to other serv
Which of the following file systems centralizes data and can be used to replicate shared folders to
other servers?
Which of the following types of resource record is generally used with virtual servers that point to several s
Which of the following types of resource record is generally used with virtual servers that point to
several servers offering network load balancing to distribute work?
which of the following stand-alone tools?
You are using Windows Reliability and Performance Monitor to monitor and assess system
performance and reliability of Windows Server 2008 R2. Windows Reliability and Performance
Monitor combines the functionality of which of the following stand-alone tools?
Each correct answer represents a complete solution. Choose all that apply.
What is this process called?
You are the Microsoft Project Server administrator for your company. You have recently upgraded
the hardware of your Microsoft Project Server farm. You and the project managers in your company
believe that it will be much faster. You have now created performance logs to measure the
throughput of the new server configuration to compare to past performance. What is this process
called?
Which of the following statements best describe the benefits of using the Sysprep tool in Windows Server 2008
Which of the following statements best describe the benefits of using the Sysprep tool in Windows
Server 2008 R2?
Each correct answer represents a complete solution. Choose three.
which Windows mechanism can be used by 32-bit applications to allocate up to 64GB of physical memory and to ma
On 32-bit x86 systems, the total virtual address space is of 4GB. By default, Windows allocates half of
this address space to processes for their unique private storage and the other half for its own
protected system memory utilization. Since 2GB is not enough virtual address space to map very
large databases, which Windows mechanism can be used by 32-bit applications to allocate up to
64GB of physical memory and to map views into its 2GB virtual address space?
Which of the following tasks can you perform on Windows Server 2008 R2 using the Server Manager console when y
Which of the following tasks can you perform on Windows Server 2008 R2 using the Server Manager
console when you log in to the server as an administrator?
Each correct answer represents a complete solution. Choose three.