Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






2. The command "set config property=ipsecloginterval value=value" can be set to what range of values?






3. Windows automatically makes a user the owner of all files that he or she creates on a _____






4. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






5. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






6. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






7. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






8. Which of the following is the default view of the Reliability and Performance Monitor?






9. You can create your own ______






10. How many possibilities of filter combinations exist in the Print Management Console?






11. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






12. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






13. Compared with NTFS permissions - printer permissions are __________.






14. To set the Netsh IPSec context - what is the first command you enter at the command prompt?






15. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






16. Windows Server 2008 does not include ______________






17. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.






18. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






19. To set printer priorities - you must do all of the following except __________.






20. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.






21. Which of the following is not an option with the Print Services Management Console?






22. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?






23. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






24. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






25. Which of the following is not a tool that can help you proactively troubleshoot network problems?






26. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






27. The system partition contains what types of files?






28. Just as with folder shares - what must clients have to access a shared printer?






29. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






30. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.






31. Shadow Copies of Shared Folders functionality is enabled at which level?






32. By default - what topology do replication groups use?






33. What does the Windows Server Backup feature use to perform file and volume-level backups?






34. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






35. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






36. Where is the checksum located?






37. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?






38. Updates that can be deployed via WSUS can include all of the following except __________.






39. A maximum of how many shadow copies can be stored on a particular volume?






40. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.






41. How can users restore previous versions of files on the selected volumes?






42. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






43. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






44. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






45. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






46. Print Server is the only ___________ that is required when you add the Print Services role






47. IKE main mode has a default lifetime of __________ hours.






48. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.






49. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.






50. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests