Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.






2. IKE main mode has a default lifetime of __________ hours.






3. Where is the checksum located?






4. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






5. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






6. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






7. What feature allows users or computers to manually request a certificate based a template?






8. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






9. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?






10. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






11. The system partition contains what types of files?






12. By default - what topology do replication groups use?






13. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.






14. Which of the following is the most frequently used view within the Reliability and Performance Monitor?






15. Depending on the configuration item that is being monitored for _____________ may not be possible.






16. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?






17. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






18. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






19. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






20. Which digital document contains identifying information about a particular user - computer - service - and so on?






21. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






22. The Authentication Header (AH) protocol does not provide _____________________






23. Which of the following is not a node found in the Print Management console?






24. What is the default authentication protocol in an Active Directory network?






25. You can create your own ______






26. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.






27. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.






28. What are the IPSEC default settings for the key lifetime in minutes?






29. Windows Server 2008 does not include ______________






30. To set printer priorities - you must do all of the following except __________.






31. Printing in Microsoft Windows typically involves all of the following components except a __________.






32. Windows Server Backup supports the use of what type of media as backup destinations?






33. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






34. How many possibilities of filter combinations exist in the Print Management Console?






35. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






36. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?






37. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.






38. How many active partitions can you have per hard drive?






39. Which of the following is the default view of the Reliability and Performance Monitor?






40. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?






41. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.






42. Which of the following are the specific processes or events that you want to track?






43. What is one of the major problems for printing administrators on large enterprise networks?






44. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






45. Windows automatically makes a user the owner of all files that he or she creates on a _____






46. NTFS quotas are limited to controlling storage on entire volumes on what basis?






47. A single computer cannot perform all of the roles in the______________






48. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






49. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






50. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests