Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To share printers - which Network Sharing and Discovery setting must be turned on?






2. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






3. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.






4. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?






5. DHCP is the only __________ that can be deployed in a non-Active Directory environment.






6. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






7. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware






8. A maximum of how many shadow copies can be stored on a particular volume?






9. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.






10. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.






11. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks






12. In which node is Event Viewer located?






13. How many active partitions can you have per hard drive?






14. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?






15. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






16. Just as with folder shares - what must clients have to access a shared printer?






17. Which of the following is not a tool that can help you proactively troubleshoot network problems?






18. What is the default authentication protocol in an Active Directory network?






19. Windows Server 2008 does not include ______________






20. Where is the checksum located?






21. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






22. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?






23. The system partition contains what types of files?






24. Which feature enables users to request their own PKI certificates - typically through a Web browser?






25. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






26. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?






27. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






28. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.






29. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?






30. What type of backup is supported by Windows Server 2008?






31. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?






32. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






33. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?






34. What feature allows users or computers to manually request a certificate based a template?






35. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.






36. Which log should be the first place you look when you suspect a problem with Active Directory?






37. Shadow Copies of Shared Folders functionality is enabled at which level?






38. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?






39. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.






40. Windows automatically makes a user the owner of all files that he or she creates on a _____






41. To set printer priorities - you must do all of the following except __________.






42. Which of the following is not a node found in the Print Management console?






43. Updates that can be deployed via WSUS can include all of the following except __________.






44. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






45. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






46. Which of the following are the specific processes or events that you want to track?






47. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?






48. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?






49. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






50. You cannot mark an existing dynamic disk as an ____________.