Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Just as with folder shares - what must clients have to access a shared printer?






2. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






3. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?






4. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?






5. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






6. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






7. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






8. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.






9. To set the Netsh IPSec context - what is the first command you enter at the command prompt?






10. How many possibilities of filter combinations exist in the Print Management Console?






11. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?






12. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






13. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.






14. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?






15. Which of the following is not a tool that can help you proactively troubleshoot network problems?






16. A single computer cannot perform all of the roles in the______________






17. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






18. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?






19. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.






20. A maximum of how many shadow copies can be stored on a particular volume?






21. What is the minimum amount of space you must allocate to store shadow copies?






22. Where is the checksum located?






23. Which of the following is not a built-in Data Collector Set within Windows Server 2008?






24. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






25. A period of _______________ is necessary before you start implementation of a file server deployment.






26. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






27. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.






28. Server management includes all of the following with the exception of __________.






29. What allows traffic that is defined in one direction to also be defined in the opposite direction?






30. Which feature enables users to request their own PKI certificates - typically through a Web browser?






31. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






32. What feature allows users or computers to manually request a certificate based a template?






33. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






34. Which log should be the first place you look when you suspect a problem with Active Directory?






35. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?






36. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






37. NTFS quotas are able to do which of the following?






38. By default - what topology do replication groups use?






39. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






40. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.






41. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.






42. To install the _____________ - you must also install the Web Server (IIS) role






43. Windows Server Backup supports the use of what type of media as backup destinations?






44. What is the default authentication protocol in an Active Directory network?






45. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






46. Which of the following is not an option with the Print Services Management Console?






47. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






48. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?






49. What is one of the major problems for printing administrators on large enterprise networks?






50. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a