Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.






2. If you wish to perform backups from the command line - what will you need to install?






3. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a






4. When you first launch Network Monitor - what key do you press to begin capturing network traffic?






5. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






6. The Authentication Header (AH) protocol does not provide _____________________






7. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.






8. Compared with NTFS permissions - printer permissions are __________.






9. Windows automatically makes a user the owner of all files that he or she creates on a _____






10. A maximum of how many shadow copies can be stored on a particular volume?






11. You can create your own ______






12. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________






13. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






14. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






15. Windows Server Backup supports the use of what type of media as backup destinations?






16. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.






17. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?






18. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?






19. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.






20. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?






21. By default - what topology do replication groups use?






22. The system partition contains what types of files?






23. Which digital document contains identifying information about a particular user - computer - service - and so on?






24. What type of backup is supported by Windows Server 2008?






25. What feature allows users or computers to manually request a certificate based a template?






26. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?






27. NTFS quotas are limited to controlling storage on entire volumes on what basis?






28. What allows traffic that is defined in one direction to also be defined in the opposite direction?






29. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






30. Do not use Tunnel mode when you require _________________






31. Depending on the configuration item that is being monitored for _____________ may not be possible.






32. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






33. In which node is Event Viewer located?






34. To install the _____________ - you must also install the Web Server (IIS) role






35. How can users restore previous versions of files on the selected volumes?






36. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.






37. A period of _______________ is necessary before you start implementation of a file server deployment.






38. Which of the following is the default view of the Reliability and Performance Monitor?






39. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.






40. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.






41. Which of the following is the most frequently used view within the Reliability and Performance Monitor?






42. Windows Server 2008 does not include ______________






43. Which of the following is not a category for the Windows operating system updates?






44. What is the default authentication protocol in an Active Directory network?






45. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.






46. NTFS quotas are able to do which of the following?






47. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs






48. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?






49. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)






50. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests