Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many active partitions can you have per hard drive?






2. Shadow Copies of Shared Folders functionality is enabled at which level?






3. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






4. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.






5. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






6. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?






7. The File Server Resource Manager console was first introduced in which product?






8. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?






9. A period of _______________ is necessary before you start implementation of a file server deployment.






10. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






11. What are the IPSEC default settings for the key lifetime in minutes?






12. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?






13. Server management includes all of the following with the exception of __________.






14. How can users restore previous versions of files on the selected volumes?






15. What is the minimum amount of space you must allocate to store shadow copies?






16. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






17. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






18. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






19. NTFS quotas are limited to controlling storage on entire volumes on what basis?






20. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.






21. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?






22. Just as with folder shares - what must clients have to access a shared printer?






23. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?






24. You can create your own ______






25. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?






26. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a






27. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






28. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






29. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






30. Which of the following is not an option with the Print Services Management Console?






31. A maximum of how many shadow copies can be stored on a particular volume?






32. Updates that can be deployed via WSUS can include all of the following except __________.






33. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.






34. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






35. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






36. When you first launch Network Monitor - what key do you press to begin capturing network traffic?






37. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






38. Print Server is the only ___________ that is required when you add the Print Services role






39. A single computer cannot perform all of the roles in the______________






40. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






41. Printing in Microsoft Windows typically involves all of the following components except a __________.






42. The NPS service combines each Statement of Health Response into what?






43. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?






44. How many possibilities of filter combinations exist in the Print Management Console?






45. Which digital document contains identifying information about a particular user - computer - service - and so on?






46. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






47. Which of the following is not a node found in the Print Management console?






48. What does the Windows Server Backup feature use to perform file and volume-level backups?






49. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






50. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.