Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






2. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.






3. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?






4. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?






5. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






6. You can create your own ______






7. What allows traffic that is defined in one direction to also be defined in the opposite direction?






8. Which of the following is the most frequently used view within the Reliability and Performance Monitor?






9. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






10. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






11. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?






12. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






13. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






14. The Authentication Header (AH) protocol does not provide _____________________






15. How many active partitions can you have per hard drive?






16. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






17. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






18. To set printer priorities - you must do all of the following except __________.






19. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






20. Which log should be the first place you look when you suspect a problem with Active Directory?






21. A maximum of how many shadow copies can be stored on a particular volume?






22. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






23. Which of the following is not a tool that can help you proactively troubleshoot network problems?






24. How many possibilities of filter combinations exist in the Print Management Console?






25. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?






26. To install the _____________ - you must also install the Web Server (IIS) role






27. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






28. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






29. Just as with folder shares - what must clients have to access a shared printer?






30. Windows automatically makes a user the owner of all files that he or she creates on a _____






31. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?






32. Windows Server Backup supports the use of what type of media as backup destinations?






33. You cannot mark an existing dynamic disk as an ____________.






34. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






35. By default - what topology do replication groups use?






36. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?






37. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?






38. Printing in Microsoft Windows typically involves all of the following components except a __________.






39. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.






40. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.






41. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






42. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.






43. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.






44. To share printers - which Network Sharing and Discovery setting must be turned on?






45. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






46. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






47. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?






48. Depending on the configuration item that is being monitored for _____________ may not be possible.






49. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






50. Which field does the IPSec driver use to match the correct SA with the correct packet?