Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can users restore previous versions of files on the selected volumes?






2. What is the minimum amount of space you must allocate to store shadow copies?






3. What is the default authentication protocol in an Active Directory network?






4. Which field does the IPSec driver use to match the correct SA with the correct packet?






5. The NPS service combines each Statement of Health Response into what?






6. By default - the Print Management console displays only which of the following in its list of print servers?






7. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?






8. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?






9. The system partition contains what types of files?






10. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






11. If you wish to perform backups from the command line - what will you need to install?






12. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






13. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






14. What are the IPSEC default settings for the key lifetime in minutes?






15. Which of the following is the default view of the Reliability and Performance Monitor?






16. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






17. The File Server Resource Manager console was first introduced in which product?






18. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.






19. By default - what topology do replication groups use?






20. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






21. You can create your own ______






22. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?






23. Which digital document contains identifying information about a particular user - computer - service - and so on?






24. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?






25. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.






26. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?






27. What allows traffic that is defined in one direction to also be defined in the opposite direction?






28. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






29. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






30. Windows automatically makes a user the owner of all files that he or she creates on a _____






31. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.






32. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.






33. To install the _____________ - you must also install the Web Server (IIS) role






34. In which node is Event Viewer located?






35. Do not use Tunnel mode when you require _________________






36. NTFS quotas are able to do which of the following?






37. When you first launch Network Monitor - what key do you press to begin capturing network traffic?






38. To set printer priorities - you must do all of the following except __________.






39. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






40. Which of the following are the specific processes or events that you want to track?






41. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.






42. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?






43. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






44. Updates that can be deployed via WSUS can include all of the following except __________.






45. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.






46. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






47. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






48. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






49. Which of the following is not a built-in Data Collector Set within Windows Server 2008?






50. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.