Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You cannot mark an existing dynamic disk as an ____________.






2. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






3. Windows automatically makes a user the owner of all files that he or she creates on a _____






4. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






5. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






6. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






7. Which of the following is not a category for the Windows operating system updates?






8. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






9. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






10. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






11. In which view can you view the counters associated with Data Collector Sets?






12. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________






13. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






14. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






15. The command "set config property=ipsecloginterval value=value" can be set to what range of values?






16. When you first launch Network Monitor - what key do you press to begin capturing network traffic?






17. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.






18. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






19. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






20. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






21. Where is the checksum located?






22. Printing in Microsoft Windows typically involves all of the following components except a __________.






23. How many possibilities of filter combinations exist in the Print Management Console?






24. What is the default authentication protocol in an Active Directory network?






25. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






26. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






27. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a






28. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






29. Which of the following are the specific processes or events that you want to track?






30. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






31. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?






32. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






33. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






34. Print Server is the only ___________ that is required when you add the Print Services role






35. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?






36. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






37. Which feature enables users to request their own PKI certificates - typically through a Web browser?






38. How can users restore previous versions of files on the selected volumes?






39. The File Server Resource Manager console was first introduced in which product?






40. Which of the following is not an option with the Print Services Management Console?






41. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?






42. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






43. Which of the following is the default view of the Reliability and Performance Monitor?






44. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






45. What feature allows users or computers to manually request a certificate based a template?






46. Windows Server 2008 does not include ______________






47. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






48. What type of backup is supported by Windows Server 2008?






49. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






50. NTFS quotas are able to do which of the following?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests