Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following are the specific processes or events that you want to track?






2. A maximum of how many shadow copies can be stored on a particular volume?






3. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






4. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






5. If you wish to perform backups from the command line - what will you need to install?






6. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?






7. Windows Server 2008 does not include ______________






8. What is the minimum amount of space you must allocate to store shadow copies?






9. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






10. How can users restore previous versions of files on the selected volumes?






11. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






12. Print Server is the only ___________ that is required when you add the Print Services role






13. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






14. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






15. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.






16. The File Server Resource Manager console was first introduced in which product?






17. What is the default authentication protocol in an Active Directory network?






18. By default - the Print Management console displays only which of the following in its list of print servers?






19. The system partition contains what types of files?






20. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






21. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?






22. Which of the following is the default view of the Reliability and Performance Monitor?






23. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






24. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






25. The command "set config property=ipsecloginterval value=value" can be set to what range of values?






26. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






27. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






28. By default - what topology do replication groups use?






29. IKE main mode has a default lifetime of __________ hours.






30. What type of backup is supported by Windows Server 2008?






31. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






32. Which of the following is not a tool that can help you proactively troubleshoot network problems?






33. Printing in Microsoft Windows typically involves all of the following components except a __________.






34. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?






35. Where is the checksum located?






36. How many possibilities of filter combinations exist in the Print Management Console?






37. Which of the following is not a built-in Data Collector Set within Windows Server 2008?






38. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?






39. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?






40. In which view can you view the counters associated with Data Collector Sets?






41. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






42. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






43. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






44. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.






45. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?






46. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?






47. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






48. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






49. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






50. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?