Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






2. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






3. What allows traffic that is defined in one direction to also be defined in the opposite direction?






4. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?






5. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






6. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






7. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






8. If you wish to perform backups from the command line - what will you need to install?






9. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






10. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






11. What is one of the major problems for printing administrators on large enterprise networks?






12. By default - the Print Management console displays only which of the following in its list of print servers?






13. What feature allows users or computers to manually request a certificate based a template?






14. You cannot mark an existing dynamic disk as an ____________.






15. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






16. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?






17. A single computer cannot perform all of the roles in the______________






18. A period of _______________ is necessary before you start implementation of a file server deployment.






19. Which log should be the first place you look when you suspect a problem with Active Directory?






20. What type of backup is supported by Windows Server 2008?






21. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






22. In which node is Event Viewer located?






23. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?






24. How many possibilities of filter combinations exist in the Print Management Console?






25. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






26. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






27. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






28. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.






29. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.






30. Which of the following is not a tool that can help you proactively troubleshoot network problems?






31. By default - what topology do replication groups use?






32. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






33. Server management includes all of the following with the exception of __________.






34. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






35. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






36. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a






37. Updates that can be deployed via WSUS can include all of the following except __________.






38. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?






39. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?






40. How many active partitions can you have per hard drive?






41. Which of the following is not a node found in the Print Management console?






42. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






43. IKE main mode has a default lifetime of __________ hours.






44. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?






45. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?






46. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.






47. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






48. What are the IPSEC default settings for the key lifetime in minutes?






49. A maximum of how many shadow copies can be stored on a particular volume?






50. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?