Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What feature allows users or computers to manually request a certificate based a template?






2. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






3. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






4. If you wish to perform backups from the command line - what will you need to install?






5. Server management includes all of the following with the exception of __________.






6. Printing in Microsoft Windows typically involves all of the following components except a __________.






7. What type of backup is supported by Windows Server 2008?






8. IKE main mode has a default lifetime of __________ hours.






9. Where is the checksum located?






10. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






11. A period of _______________ is necessary before you start implementation of a file server deployment.






12. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?






13. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.






14. How can users restore previous versions of files on the selected volumes?






15. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.






16. The NPS service combines each Statement of Health Response into what?






17. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






18. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






19. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






20. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






21. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






22. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.






23. Which of the following is not a tool that can help you proactively troubleshoot network problems?






24. You can create your own ______






25. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






26. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.






27. What is the default authentication protocol in an Active Directory network?






28. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






29. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






30. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________






31. To install the _____________ - you must also install the Web Server (IIS) role






32. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






33. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?






34. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






35. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






36. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?






37. What is one of the major problems for printing administrators on large enterprise networks?






38. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






39. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?






40. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






41. Which of the following is not a node found in the Print Management console?






42. Which log should be the first place you look when you suspect a problem with Active Directory?






43. Which digital document contains identifying information about a particular user - computer - service - and so on?






44. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






45. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






46. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.






47. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?






48. To set the Netsh IPSec context - what is the first command you enter at the command prompt?






49. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






50. Which field does the IPSec driver use to match the correct SA with the correct packet?