Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






2. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






3. How can users restore previous versions of files on the selected volumes?






4. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






5. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






6. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?






7. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






8. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






9. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






10. By default - the Print Management console displays only which of the following in its list of print servers?






11. Windows Server 2008 does not include ______________






12. To set the Netsh IPSec context - what is the first command you enter at the command prompt?






13. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.






14. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






15. You can create your own ______






16. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






17. What allows traffic that is defined in one direction to also be defined in the opposite direction?






18. Compared with NTFS permissions - printer permissions are __________.






19. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






20. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






21. What is the default authentication protocol in an Active Directory network?






22. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?






23. Which of the following is not a category for the Windows operating system updates?






24. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.






25. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






26. Which feature enables users to request their own PKI certificates - typically through a Web browser?






27. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






28. What feature allows users or computers to manually request a certificate based a template?






29. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






30. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?






31. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?






32. Just as with folder shares - what must clients have to access a shared printer?






33. A period of _______________ is necessary before you start implementation of a file server deployment.






34. To set printer priorities - you must do all of the following except __________.






35. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






36. NTFS quotas are limited to controlling storage on entire volumes on what basis?






37. Which of the following is not a built-in Data Collector Set within Windows Server 2008?






38. In which view can you view the counters associated with Data Collector Sets?






39. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






40. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?






41. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.






42. To share printers - which Network Sharing and Discovery setting must be turned on?






43. Do not use Tunnel mode when you require _________________






44. Print Server is the only ___________ that is required when you add the Print Services role






45. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?






46. How many active partitions can you have per hard drive?






47. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?






48. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






49. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






50. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?