Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a






2. By default - the Print Management console displays only which of the following in its list of print servers?






3. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?






4. The system partition contains what types of files?






5. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






6. Which of the following is not a category for the Windows operating system updates?






7. The command "set config property=ipsecloginterval value=value" can be set to what range of values?






8. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






9. Windows automatically makes a user the owner of all files that he or she creates on a _____






10. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?






11. Windows Server 2008 does not include ______________






12. Just as with folder shares - what must clients have to access a shared printer?






13. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?






14. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






15. You cannot mark an existing dynamic disk as an ____________.






16. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.






17. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






18. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.






19. When you first launch Network Monitor - what key do you press to begin capturing network traffic?






20. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.






21. Updates that can be deployed via WSUS can include all of the following except __________.






22. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?






23. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?






24. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.






25. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






26. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






27. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?






28. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






29. To share printers - which Network Sharing and Discovery setting must be turned on?






30. What is the minimum amount of space you must allocate to store shadow copies?






31. Which of the following is not a built-in Data Collector Set within Windows Server 2008?






32. By default - what topology do replication groups use?






33. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






34. What are the IPSEC default settings for the key lifetime in minutes?






35. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?






36. Windows Server Backup supports the use of what type of media as backup destinations?






37. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






38. A period of _______________ is necessary before you start implementation of a file server deployment.






39. Server management includes all of the following with the exception of __________.






40. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






41. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






42. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






43. A single computer cannot perform all of the roles in the______________






44. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?






45. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






46. What does the Windows Server Backup feature use to perform file and volume-level backups?






47. What is the default authentication protocol in an Active Directory network?






48. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






49. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.






50. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?