Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






2. Which digital document contains identifying information about a particular user - computer - service - and so on?






3. Do not use Tunnel mode when you require _________________






4. Windows Server Backup supports the use of what type of media as backup destinations?






5. Shadow Copies of Shared Folders functionality is enabled at which level?






6. NTFS quotas are able to do which of the following?






7. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






8. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.






9. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






10. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.






11. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?






12. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






13. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






14. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






15. NTFS quotas are limited to controlling storage on entire volumes on what basis?






16. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






17. Print Server is the only ___________ that is required when you add the Print Services role






18. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






19. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






20. Printing in Microsoft Windows typically involves all of the following components except a __________.






21. A maximum of how many shadow copies can be stored on a particular volume?






22. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.






23. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.






24. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






25. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






26. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






27. Which of the following is not an option with the Print Services Management Console?






28. A period of _______________ is necessary before you start implementation of a file server deployment.






29. Windows automatically makes a user the owner of all files that he or she creates on a _____






30. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






31. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






32. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






33. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






34. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






35. Depending on the configuration item that is being monitored for _____________ may not be possible.






36. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?






37. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?






38. Server management includes all of the following with the exception of __________.






39. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?






40. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






41. The Authentication Header (AH) protocol does not provide _____________________






42. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.






43. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






44. Just as with folder shares - what must clients have to access a shared printer?






45. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?






46. How many active partitions can you have per hard drive?






47. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






48. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?






49. Windows Server 2008 does not include ______________






50. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?