Home
21.
Which server role uses HTTP as its transfer mechanism?
  • A.
    Web
  • B.
    Application
  • C.
    Directory
  • D.
    Database
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Web servers are used to provide access to information to users connecting to the server using a web browser, which is the client part of the application. It uses the HTTP protocol as its transfer mechanism.
Report
Name Email  
22.
Which resource is stressed the most on an application server?
  • A.
    Disk
  • B.
    NIC
  • C.
    CPU
  • D.
    Memory
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The CPU is the component that is stressed on an application server since it is doing all of the processing on behalf of the clients. Multicore and multiple processors are advisable.
Report
Name Email  
23.
Which of the following server roles is used to authenticate users to the network?
  • A.
    Web
  • B.
    Application
  • C.
    Directory
  • D.
    Database
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A directory server is one that accepts and verifies the credentials of users. Typically it not only authenticates them but also provides them with access to resources using single sign-on.
Report
Name Email  
24.
Which server role automates the process of providing an IP configuration to devices in the network?
  • A.
    DNS
  • B.
    Routing and Remote Access
  • C.
    DHCP
  • D.
    NTP
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
DHCP servers are used to automate the process of providing an IP configuration to devices in the network. These servers respond to broadcast-based requests for a configuration by offering an IP address, subnet mask, and default gateway to the DHCP client.
Report
Name Email  
25.
Which server role is critical to the operation of digital certificates?
  • A.
    DNS
  • B.
    Routing and Remote Access
  • C.
    DHCP
  • D.
    NTP
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Network Time Protocol (NTP) servers are used as a time source by the devices in the network. This service ensures that log entries that are time stamped can be properly interpreted and that digital certificates, which depend heavily on time, continue to function correctly.
Report
Name Email