Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






2. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?






3. If you wish to perform backups from the command line - what will you need to install?






4. To share printers - which Network Sharing and Discovery setting must be turned on?






5. Where is the checksum located?






6. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






7. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






8. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






9. NTFS quotas are able to do which of the following?






10. What is one of the major problems for printing administrators on large enterprise networks?






11. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






12. How many possibilities of filter combinations exist in the Print Management Console?






13. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






14. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.






15. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






16. A maximum of how many shadow copies can be stored on a particular volume?






17. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






18. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






19. A period of _______________ is necessary before you start implementation of a file server deployment.






20. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






21. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






22. What allows traffic that is defined in one direction to also be defined in the opposite direction?






23. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






24. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






25. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?






26. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






27. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






28. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?






29. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.






30. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?






31. Windows Server 2008 does not include ______________






32. The File Server Resource Manager console was first introduced in which product?






33. The NPS service combines each Statement of Health Response into what?






34. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?






35. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






36. You can create your own ______






37. You cannot mark an existing dynamic disk as an ____________.






38. Which digital document contains identifying information about a particular user - computer - service - and so on?






39. Which feature enables users to request their own PKI certificates - typically through a Web browser?






40. Windows automatically makes a user the owner of all files that he or she creates on a _____






41. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






42. Updates that can be deployed via WSUS can include all of the following except __________.






43. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






44. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






45. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






46. What is the minimum amount of space you must allocate to store shadow copies?






47. To install the _____________ - you must also install the Web Server (IIS) role






48. By default - the Print Management console displays only which of the following in its list of print servers?






49. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






50. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests