Windows 2008 Administration

125 Questions | Attempts: 222
Please wait...
Question 1 / 126
🏆 Rank #--
Score 0/100

1. Which built in role enables Windows server 2008 to host virtual machines?

Submit
Please wait...
About This Quiz
Windows Server 2008 Quizzes & Trivia

.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Which permissions do administrators typically use to assign storage space as well as modify permissions on a Windows Server 2008 file server

Submit

3. To use a Windows Server 2008 computer as a domain controller,you must configure it to use a

Submit

4. Hyper-V available on which version of Server Core

Submit

5. Which of the following is the preferred file system for a server ?

Submit

6. Which version of WIndows Server 2008  must computers be running to create a failover cluster ?

Submit

7. What is the term for the ability of entire servers to be redundant so that if anything goes wrong with one computer ,another one can take its place almost immediately?

Submit

8. Which drive type must a WDS servers have to store image files ?

Submit

9. The simple print architecture consists of one print device that is connected to one computer this printer device is also known as a

Submit

10. What is the full DNS name for a particular computer called ?

Submit

11. To send email messages ,what service does a Windows Server 2008 computer  need to be running

Submit

12. Active Directory was first introduced in which operating system?

Submit

13. A well designed sharing strategy provides each user with three resources .which of the following is not a provided resource?

Submit

14. Which windows installation option in windows server 2008 provides  a stripped-down version of the provides a stripped down version of the operating system when you select it?

Submit

15. Which group is used for non security-related functions such as sending email messages to a collection of users ?

Submit

16. An active Directory domain controller can verify user's identity by which of the following methods ?

Submit

17. Which of the following is an advantage of using Microsoft Terminal Services?

Submit

18. To whom should you always assign security permissions ?

Submit

19. In what type of configuration does the computer write the same data to identical volumes on two different disks ?

Submit

20. Which role is used when performing unattended installations of Windows Server 2008 and other operating systems on remote computers using network -based boot and installation media ?

Submit

21. Which of the following is part of the recommended hardware environment for a failover cluster ?

Submit

22. Where do users log in when joining an Active Directory?

Submit

23. The read only domain Controller (RODC) supports only incoming replication traffic.As a result .What is it possible to do when using a Read-Only Domain Controller?

Submit

24. Which operating system cannot process the Software installation policy?

Submit

25. An Install image contains the operating system that WDS will install on the client computer .What file from the Windows Server 2008 Installation DVD is used to install the WDS ?

Submit

26. Which type of file is a script containing responses to all of the prompts that appear on the WDS client computer during the installation process?

Submit

27. To which type of server do client computers on the network send their DNS queries ?

Submit

28. Which of the following features can be used to automate the shadow copy process ?

Submit

29. What mechanism allows users to work with copies of files that remain accessible whether the workstation can access the server or not ?

Submit

30. In what type of communication can servers access storage devices over the SAN as if they are connected directly to the computer ?

Submit

31. Which of the following has become the primary backup medium for home users and small network in recent years ?

Submit

32. What must a network adapter support on the client computer for the WDS server to work ?

Submit

33. Which of the following s not a primary management tool for Active Directory

Submit

34. Which of the following is not a variable that can affect the performance of an Active DIrectory installation ?

Submit

35. Which console can be used to create multiple shares and exercise more granular control over their properties ?

Submit

36. Which command prompt utility can be used to perform disk management tasks ?

Submit

37. Which of the following authentication devices verifies the identify of a user during logon?

Submit

38. Which of the following is the most basic type of backup job and copies the entire set of selected targets to the backup medium ?

Submit

39. Which kind of backup job backs up only the files that have changed since since the last backup job of any kind ?

Submit

40. What is the name of the communications protocol called for by the original X:500 standard?

Submit

41. The Fax Service Manager application enables administrators to do all of the following except

Submit

42. Which type of backup job backs only the files that have changed since the last full backup and does not reset their archive bits ?

Submit

43. MAP can run on the 32 -bit  version of all the following operating except

Submit

44. Which of the following is not a top level domain ?

Submit

45. Which technique creates multiple resource records using the same name with a different server IP address in each record ?

Submit

46. In which operating system is the Previous Versions Client not available by default ?

Submit

47. Which of the following is a disadvantage of a centralized DHCP infrastructure?

Submit

48. Which print services role installs the print management console  for Microsoft Management console (MMC) that enables administrators to deploy,monitor,and manage printers throughout the enterprise ?

Submit

49. What role service maintains a database of client sessions and enables a disconnected client  to reconnect to the same terminal server?

Submit

50. Which of type of log contains events that signify a change in the application or service,such as the addition or removal of a printer ?

Submit

51. Which new tool provides capabilities so you can evaluate the hardware on servers as well as workstations ?

Submit

52. What converts the print jobs generated by applications into an appropriate string of commands for specific print device?

Submit

53.          is the only role service that is required when you add the print services role

Submit

54. What is one way to simplify the process of deploying applications on a large number of computers?

Submit

55. Which tool builds automated deployment solutions and is included with Windows Server 2008 ?

Submit

56. Which method is most frequently used for providing fault tolerance to DHCP servers ?

Submit

57. What must at least one DNS server support when running Active Directory on your network?

Submit

58. To protect workstation applications and ensure their continued availability what feature should be used to run them?

Submit

59. Which graphical utility creates and modifies the answer files you can use to perform unattended operating system installations on remote computers ?

Submit

60. There are two basic classes of objects in an Active Directory domain. which of the following is an object ?

Submit

61. Which of the following is not a reason why you should try to create as few domains as possible when designing  an infrastructure ?

Submit

62. Which of the following is the simplest form of disk redundancy ?

Submit

63. What is the primary difference between global and universal groups?

Submit

64. When creating a GPO software installation which option causes the client computer to automatically install the application the next time the computer starts or the user logs on ?

Submit

65. Which of the following is the strongest authentication protocol supported by windows  Server 2008?

Submit

66. Which of the following is a main group type found in Active Directory ?

Submit

67. Which application role provides an integrated environment for deploying and running server based business applications ?

Submit

68. You must add the  role to use a Windows Server 2008 computer as a fax server

Submit

69. What is the traditional choice for server and network backups ?

Submit

70. The number of roles that a server can perform is dependent on all of the following factors except the

Submit

71. The most common use of  a file screen is to

Submit

72. Which of the following allows designated recovery agents  to create public keys that can decode encrypted information ?

Submit

73. Which group is used most often when designing an Active Directory infrastructure ?

Submit

74. What hardware actually produces hard copy documents on paper or other print media ?

Submit

75. Which single device contains one or more magnetic tape drives as well as a robotic mechanism that inserts tapes into and removes them from the drives?

Submit

76. What process is used when is necessary for a computer to convert an IP addresses into a DNS name ?

Submit

77. By default the DHCP server service in windows server 2008 uses dynamic allocation,leasing IP addresses for clients for how many days ?

Submit

78. DNS naming limitations call for a maximum of how many characters per domain name ?

Submit

79. When you open a Command Prompt window in standard Windows session and restore the system state ,you are performing a    restore

Submit

80. Which of the following is not an element of the client /server model implemented by IIS and Internet Explorer?

Submit

81. Which fault tolerance solution uses duplicate host adapters as well as duplicate hard drives ?

Submit

82. Which of the following is a hardware or software device running on a computer that accesses the storage devices on the SAN?

Submit

83. To use shadow copes effectively where must users store their files?

Submit

84. Which of the following is not a factor that administrators  should consider when choosing the length for certificate's lifetime?

Submit

85. In an MMC snap-in ,which of the following panes contains links  to the tasks most commonly associated  with the content appearing in the detail pane ?

Submit

86. What is the primary drawback of optical disks ?

Submit

87. The windows Deployment Services role includes all the following role services except

Submit

88. Which of the folllowing is not a message type defined by the DHCP communication protocol?

Submit

89. Which of the following holds the failover cluster configuration database ?

Submit

90. Which of the following enables communication between the terminal server and the client ?

Submit

91. What MMC console contains a collection of snap-ins that is most commonly used by Windows Server 2008 administrators ?

Submit

92. Which component in WIndows Server 2008 enables the system to install software packaged as files with an .msi extension ?

Submit

93. For authentication ,PPTP supports  all the following authentication protocols except

Submit

94. Which of the following do attackers use if they want to find an organization 's dial -up ports ?

Submit

95. Which of the following is the default windows server 2008 printer sharing configuration ?

Submit

96. What must you download and install before using WSUS ?

Submit

97. Which of the following specifies a value assigned by the CA that uniquely identifies the certificate ?

Submit

98.  which of the following is not a role that can be selected when you install Active Directory Certificate Services on a Windows Server 2008 computer ?

Submit

99. Which of the following WIndows Server 2008 certificate templates allows user authenticaton,EFS encryption secure email,and certificate trust list signing ?

Submit

100. Which of the following is the default mode when you create  a new MMC console ?

Submit

101. To perform a full server restore ,you must boot the system using a Windows Server 2008 installation disk and access the backup disk using which interface ?

Submit

102. You must also install the  when installing the Internet Printing role service

Submit

103. Performance objects,performance counters ,and instances that appear in the Add Counters dialog box depend on all of the following except the

Submit

104. Which of the following is not a main criterion to consider when evaluating the suitability of a storage device for backups?

Submit

105. Which of the following methods  enables the server to support authentication with smart cards or other types of digital certificates ?

Submit

106. Which of the following is not a permission rule when allowing or denying permissions to security principals ?

Submit

107. At a minimum the Remote Desktop server must be running the    operating system to use Network Level Authentication

Submit

108. Which windows presents a consolidated view of the post-installation tasks that,in previous Windows Server versions,you had to perform using various interfaces presented during and after the OS setup process ?

Submit

109. Which of the following is a hard disk partition style supported by Windows Server 2008 ?

Submit

110. Which of the following contains a digest of the certificate data used for digital signing ?

Submit

111. The DNS server  receiving a name resolution request can take full responsibility for resolving the name by using what type of query ? 

Submit

112. Which of the following statements is not true regarding FSRM quotas ?

Submit

113. Which of the following types of connectons is established between two computers involved in the tunneling process ?

Submit

114. There are many reasons for registering an internet domain name .which of the following is one of those reasons ?

Submit

115. The Services for Network File System snap in does not display in Server Manager when you install the File Services Role .From what area must you run the Services for Network File System snap-in ?

Submit

116. Which of the following is not a WSUS architecture configuration?

Submit

117. Which of the following template versions provides backward compatibility for CAs running  Windows Server 2003,Standard Edition and Windows 2000 family operating systems?

Submit

118. Which backup is faster to restore ?

Submit

119. When using windows Server Backup for scheduled backup jobs,which type of drives can use as a backup?

Submit

120. In an MMC snap -in which of the following panes contains a hierarchical  list of the snap-ins installed in the console and any subheadings that the snap-ins provide ?

Submit

121. Which of the following graphs displays both current and historical values ?

Submit

122. A collection of settings in quota template defines all of following except

Submit

123. Which type of DHCP packet is used by servers to acknowledge a client 's acceptance of an offered IP address ?

Submit

124. A  computer communicates with a print device through which software interface ?

Submit

125. Secure Socket Tunneling Protocol (SSTP) is supported only on clients running which of the following operating systems ?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (125)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which built in role enables Windows server 2008 to host virtual...
Which permissions do administrators typically use to assign storage...
To use a Windows Server 2008 computer as a domain controller,you must...
Hyper-V available on which version of Server Core
Which of the following is the preferred file system for a server ?
Which version of WIndows Server 2008  must computers be running...
What is the term for the ability of entire servers to be redundant so...
Which drive type must a WDS servers have to store image files ?
The simple print architecture consists of one print device that is...
What is the full DNS name for a particular computer called ?
To send email messages ,what service does a Windows Server 2008...
Active Directory was first introduced in which operating system?
A well designed sharing strategy provides each user with three...
Which windows installation option in windows server 2008...
Which group is used for non security-related functions such as sending...
An active Directory domain controller can verify user's identity by...
Which of the following is an advantage of using Microsoft Terminal...
To whom should you always assign security permissions ?
In what type of configuration does the computer write the same data to...
Which role is used when performing unattended installations of Windows...
Which of the following is part of the recommended hardware environment...
Where do users log in when joining an Active Directory?
The read only domain Controller (RODC) supports only incoming...
Which operating system cannot process the Software installation...
An Install image contains the operating system that WDS will install...
Which type of file is a script containing responses to all of the...
To which type of server do client computers on the network send their...
Which of the following features can be used to automate the shadow...
What mechanism allows users to work with copies of files that remain...
In what type of communication can servers access storage devices over...
Which of the following has become the primary backup medium for home...
What must a network adapter support on the client computer for the WDS...
Which of the following s not a primary management tool for Active...
Which of the following is not a variable that can affect the...
Which console can be used to create multiple shares and exercise more...
Which command prompt utility can be used to perform disk management...
Which of the following authentication devices verifies the identify of...
Which of the following is the most basic type of backup job and copies...
Which kind of backup job backs up only the files that have changed...
What is the name of the communications protocol called for by the...
The Fax Service Manager application enables administrators to do all...
Which type of backup job backs only the files that have changed since...
MAP can run on the 32 -bit  version of all the following...
Which of the following is not a top level domain ?
Which technique creates multiple resource records using the same name...
In which operating system is the Previous Versions Client not...
Which of the following is a disadvantage of a centralized DHCP...
Which print services role installs the print management console ...
What role service maintains a database of client sessions and enables...
Which of type of log contains events that signify a change in the...
Which new tool provides capabilities so you can evaluate the hardware...
What converts the print jobs generated by applications into an...
         is the only role...
What is one way to simplify the process of deploying applications on a...
Which tool builds automated deployment solutions and is included with...
Which method is most frequently used for providing fault tolerance to...
What must at least one DNS server support when running Active...
To protect workstation applications and ensure their continued...
Which graphical utility creates and modifies the answer files you can...
There are two basic classes of objects in an Active Directory domain....
Which of the following is not a reason why you should try to create as...
Which of the following is the simplest form of disk redundancy ?
What is the primary difference between global and universal groups?
When creating a GPO software installation which option causes the...
Which of the following is the strongest authentication protocol...
Which of the following is a main group type found in Active Directory...
Which application role provides an integrated environment for...
You must add the  role to use a Windows Server 2008 computer as a...
What is the traditional choice for server and network backups ?
The number of roles that a server can perform is dependent on all of...
The most common use of  a file screen is to
Which of the following allows designated recovery agents  to...
Which group is used most often when designing an Active Directory...
What hardware actually produces hard copy documents on paper or other...
Which single device contains one or more magnetic tape drives as well...
What process is used when is necessary for a computer to convert an IP...
By default the DHCP server service in windows server 2008 uses dynamic...
DNS naming limitations call for a maximum of how many characters per...
When you open a Command Prompt window in standard Windows session and...
Which of the following is not an element of the client /server model...
Which fault tolerance solution uses duplicate host adapters as well as...
Which of the following is a hardware or software device running on a...
To use shadow copes effectively where must users store their files?
Which of the following is not a factor that administrators ...
In an MMC snap-in ,which of the following panes contains links ...
What is the primary drawback of optical disks ?
The windows Deployment Services role includes all the following role...
Which of the folllowing is not a message type defined by the DHCP...
Which of the following holds the failover cluster configuration...
Which of the following enables communication between the terminal...
What MMC console contains a collection of snap-ins that is most...
Which component in WIndows Server 2008 enables the system to install...
For authentication ,PPTP supports  all the following...
Which of the following do attackers use if they want to find an...
Which of the following is the default windows server 2008 printer...
What must you download and install before using WSUS ?
Which of the following specifies a value assigned by the CA that...
 which of the following is not a role that can be selected when...
Which of the following WIndows Server 2008 certificate templates...
Which of the following is the default mode when you create  a new...
To perform a full server restore ,you must boot the system using a...
You must also install the  when installing the Internet Printing...
Performance objects,performance counters ,and instances that appear in...
Which of the following is not a main criterion to consider when...
Which of the following methods  enables the server to support...
Which of the following is not a permission rule when allowing or...
At a minimum the Remote Desktop server must be running...
Which windows presents a consolidated view of the post-installation...
Which of the following is a hard disk partition style supported by...
Which of the following contains a digest of the certificate data used...
The DNS server  receiving a name resolution request can take full...
Which of the following statements is not true regarding FSRM quotas ?
Which of the following types of connectons is established between two...
There are many reasons for registering an internet domain name .which...
The Services for Network File System snap in does not display in...
Which of the following is not a WSUS architecture configuration?
Which of the following template versions provides backward...
Which backup is faster to restore ?
When using windows Server Backup for scheduled backup jobs,which type...
In an MMC snap -in which of the following panes contains a...
Which of the following graphs displays both current and historical...
A collection of settings in quota template defines all of following...
Which type of DHCP packet is used by servers to acknowledge a client...
A  computer communicates with a print device through which...
Secure Socket Tunneling Protocol (SSTP) is supported only on clients...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!