Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the default authentication protocol in an Active Directory network?






2. Which of the following is not a tool that can help you proactively troubleshoot network problems?






3. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?






4. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.






5. Depending on the configuration item that is being monitored for _____________ may not be possible.






6. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






7. Which of the following is the default view of the Reliability and Performance Monitor?






8. If you wish to perform backups from the command line - what will you need to install?






9. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.






10. Which of the following is not a category for the Windows operating system updates?






11. You can create your own ______






12. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






13. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






14. What allows traffic that is defined in one direction to also be defined in the opposite direction?






15. To share printers - which Network Sharing and Discovery setting must be turned on?






16. Server management includes all of the following with the exception of __________.






17. Which log should be the first place you look when you suspect a problem with Active Directory?






18. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






19. Compared with NTFS permissions - printer permissions are __________.






20. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






21. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.






22. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






23. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?






24. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.






25. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






26. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






27. A single computer cannot perform all of the roles in the______________






28. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?






29. Which feature enables users to request their own PKI certificates - typically through a Web browser?






30. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






31. Just as with folder shares - what must clients have to access a shared printer?






32. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






33. When you first launch Network Monitor - what key do you press to begin capturing network traffic?






34. By default - what topology do replication groups use?






35. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






36. In which view can you view the counters associated with Data Collector Sets?






37. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






38. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






39. What type of backup is supported by Windows Server 2008?






40. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






41. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?






42. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






43. By default - the Print Management console displays only which of the following in its list of print servers?






44. The command "set config property=ipsecloginterval value=value" can be set to what range of values?






45. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?






46. How many possibilities of filter combinations exist in the Print Management Console?






47. The Authentication Header (AH) protocol does not provide _____________________






48. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






49. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






50. Which digital document contains identifying information about a particular user - computer - service - and so on?