Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Printing in Microsoft Windows typically involves all of the following components except a __________.






2. The command "set config property=ipsecloginterval value=value" can be set to what range of values?






3. Compared with NTFS permissions - printer permissions are __________.






4. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.






5. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.






6. Which feature enables users to request their own PKI certificates - typically through a Web browser?






7. In which node is Event Viewer located?






8. Which of the following is not a category for the Windows operating system updates?






9. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.






10. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






11. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________






12. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?






13. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?






14. Which of the following is the default view of the Reliability and Performance Monitor?






15. Do not use Tunnel mode when you require _________________






16. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






17. Updates that can be deployed via WSUS can include all of the following except __________.






18. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a






19. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






20. Depending on the configuration item that is being monitored for _____________ may not be possible.






21. To set the Netsh IPSec context - what is the first command you enter at the command prompt?






22. NTFS quotas are able to do which of the following?






23. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






24. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






25. You can create your own ______






26. Shadow Copies of Shared Folders functionality is enabled at which level?






27. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?






28. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






29. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






30. Windows Server 2008 does not include ______________






31. By default - what topology do replication groups use?






32. You cannot mark an existing dynamic disk as an ____________.






33. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






34. Just as with folder shares - what must clients have to access a shared printer?






35. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.






36. What is the minimum amount of space you must allocate to store shadow copies?






37. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






38. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






39. A period of _______________ is necessary before you start implementation of a file server deployment.






40. NTFS quotas are limited to controlling storage on entire volumes on what basis?






41. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?






42. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






43. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?






44. A maximum of how many shadow copies can be stored on a particular volume?






45. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






46. How can users restore previous versions of files on the selected volumes?






47. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?






48. In which view can you view the counters associated with Data Collector Sets?






49. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






50. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?