Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the default authentication protocol in an Active Directory network?






2. The system partition contains what types of files?






3. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






4. Updates that can be deployed via WSUS can include all of the following except __________.






5. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






6. Do not use Tunnel mode when you require _________________






7. If you wish to perform backups from the command line - what will you need to install?






8. You cannot mark an existing dynamic disk as an ____________.






9. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






10. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?






11. Which of the following is not a node found in the Print Management console?






12. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






13. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






14. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






15. What is one of the major problems for printing administrators on large enterprise networks?






16. To set the Netsh IPSec context - what is the first command you enter at the command prompt?






17. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






18. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






19. Compared with NTFS permissions - printer permissions are __________.






20. A single computer cannot perform all of the roles in the______________






21. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






22. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?






23. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.






24. In which view can you view the counters associated with Data Collector Sets?






25. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






26. Which of the following is not an option with the Print Services Management Console?






27. What feature allows users or computers to manually request a certificate based a template?






28. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






29. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






30. A period of _______________ is necessary before you start implementation of a file server deployment.






31. You can create your own ______






32. Which of the following is not a built-in Data Collector Set within Windows Server 2008?






33. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?






34. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






35. Windows Server Backup supports the use of what type of media as backup destinations?






36. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






37. Server management includes all of the following with the exception of __________.






38. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






39. Which of the following is not a category for the Windows operating system updates?






40. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






41. By default - the Print Management console displays only which of the following in its list of print servers?






42. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






43. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






44. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






45. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?






46. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?






47. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?






48. To share printers - which Network Sharing and Discovery setting must be turned on?






49. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






50. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?