Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






2. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?






3. Which digital document contains identifying information about a particular user - computer - service - and so on?






4. The File Server Resource Manager console was first introduced in which product?






5. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?






6. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






7. Depending on the configuration item that is being monitored for _____________ may not be possible.






8. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?






9. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






10. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?






11. By default - what topology do replication groups use?






12. How can users restore previous versions of files on the selected volumes?






13. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






14. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






15. Which of the following is the default view of the Reliability and Performance Monitor?






16. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






17. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






18. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






19. In which view can you view the counters associated with Data Collector Sets?






20. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?






21. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






22. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?






23. When you first launch Network Monitor - what key do you press to begin capturing network traffic?






24. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?






25. Which log should be the first place you look when you suspect a problem with Active Directory?






26. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?






27. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?






28. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?






29. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






30. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.






31. Which feature enables users to request their own PKI certificates - typically through a Web browser?






32. You can create your own ______






33. A maximum of how many shadow copies can be stored on a particular volume?






34. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






35. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






36. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






37. To set printer priorities - you must do all of the following except __________.






38. A single computer cannot perform all of the roles in the______________






39. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.






40. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






41. What is one of the major problems for printing administrators on large enterprise networks?






42. Which of the following is not a node found in the Print Management console?






43. You cannot mark an existing dynamic disk as an ____________.






44. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






45. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?






46. By default - the Print Management console displays only which of the following in its list of print servers?






47. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






48. NTFS quotas are able to do which of the following?






49. NTFS quotas are limited to controlling storage on entire volumes on what basis?






50. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.