Windows Server 2008 Knowledge Assessment Quiz

Windows Server 2008 Questions Techhyme

Before investing time and resources into downloading and installing Windows Server 2008, the first step is to gain an in-depth knowledge to effectively run the operating system.

Also Read: Windows Server 2008 Multiple Choice Questions (MCQ)

It provides you with powerful tools to react to business needs faster than ever before with greater control and confidence.

Complete the following sentences by writing the correct word or words in the blanks provided.

  1. The most widely used IP addressing scheme is ___________.
  2. The most recent and largest address space IP addressing scheme is ________________.
  3. To distribute IP addresses automatically, a network administrator would configure the ______________ service.
  4. The first attempt at breaking up IP address space used ____________to provides address ranges of differing sizes.
  5. Prior to the introduction of the Domain Name System, computers used ______________ TO MAP human readable names to IP addresses.
  6. A (n) __________ is used to separate the host address portion of an IP address from the network address.
  7. The subnet mask within the TCP/IP configuration is used to distinguish the ____________ from the host address.
  8. In dotted decimal notation, each IPv4 address is broken up into four ______________.
  9. Server computers and other systems that need to be accessed reliably by network clients should be configured with a (n) _________.
  10. The method of breaking up IP address space into address ranges of flexible size is called ______________.
  11. The ability to use the installation process to fix problems with an existing Windows Server system is called _____________.
  12. Installation of just the necessary components for a particular server role, without the GUI and other software features, is called _______________.
  13. The ______________ screen appears by default when the Windows Server 2008 operating system is first installed.
  14. A _______________ offers the best performance of any multi-disk configuration option within the Disk Management MMC, but does so at the expense of fault tolerance.
  15. The feature that allows users on different computers to access the Internet through a single connection is called ____________.
  16. The ______________ provides a single point of administration to configure networking and firewall configuration tasks on a Windows Server 2008 computer.
  17. The setting describing the network environment, such as home or public network, is called the _______________.
  18. Unsolicited inbound traffic can be blocked through the use of the ______________.
  19. The network location setting controls the behavior of _______________________.
  20. Once a disk is converted from a basic disk to a (n) ______________________ it can be accessed only by operating systems that support dynamic disks: Windows 2000 Professional, Windows XP Professional, Windows Vista Business, Enterprise or Ultimate, Windows 2000 Server, Windows Server 2003, and Windows Server 2008.
  21. A (n) __________________ will transfer all records within a zone from a primary server to a secondary server.
  22. A (n) ________________________ creates an alias for an existing A record.
  23. A (n) ___________________ creates an alias for an existing A record. is used by e-mail systems such as Microsoft Exchange to locate mail servers in different networks.
  24. The __________________ allows IPv6 hosts to map host names to IP addresses.
  25. Techhyme.com is an example of a (n) ____________________ within the .com top-level domain.
  26. The ________________ application scope will replicate DNS data to all DNS servers within a domain.
  27. A (n) ________________ than as part of Active Directory.
  28. Each DNS record has a(n) ___________________ that indicates the maximum time that a record will be coached by a DNS server before it is discarded.
  29. A DNS server is considered ______________________for each zone that it hosts.
  30. A DNS domain name like abc.io is an example of a (n) ___________________ domain.
  31. A (n)___________________ is the software interface through which a computer communicates with a print device.
  32. When you connect a single print server to multiple print devices, you create what is called a (n) ______________.
  33. By default, all printers assign the Allow Print permission to the ________________ special identity, which enables all users to access the printer and manage their own documents.
  34. Users with the _________________ permission can go beyond just manipulating queued documents; they can reconfigure the printer itself.
  35. The ___________________ is the default print format used by the Windows 2000, Windows XP, and Windows Server 2003 operating systems.
  36. A (n) _______________ is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device.
  37. The ____________________ allows clients to print documents using HTTP traffic over an intranet or the World Wide Web.
  38. Users with the _________________ allows clients to print documents using HTTP traffic over an permission to a printer have the ability to pause, resume, restart, and cancel their own documents, but not documents created by any other user.
  39. A (n) ____________________ print architecture consists of one print device connected to one computer.
  40. ________________________such as Printer Not Ready are a useful way for administrators to determine what printers need attention throughout a Windows Server 2008 network.
  41. The ________________ was configured in Windows 2000, Windows Server 2003, and Windows XP IPSec policies to ensure that the computer responds to requests for secure communication.
  42. A (n) _________ attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic.
  43. The strongest form of NT LAN Manager Authentication is _______________.
  44. IPSec __________ is used to provide end-to-end security, in which both hosts support IPSec using the same authentication protocols.
  45. A (n) _________ connection security rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as membership in a particular Active Directory domain.
  46. Microsoft Network Monitor is an example of a real world______________.
  47. The Windows Firewall with Advanced Security MMC snap-in allows you to integrate IPSec into the Windows Firewall by configuring one or more _____________________.
  48. The default ______________ for IPSec connections in an Active Directory environment is the Kerberos v5 protocol.
  49. Each Windows Firewall exception can be configured with a specific __________ to control which computers the local computer will accept connections from.
  50. A (n) _______________ must occur before secure traffic can be sent, in order to determine the type of traffic to be secured and how it will be secured
  51. A(n) _________________ is a CA that integrates with Active Directory and allows for auto enrolment of user and computer certificates through the use of Group Policy and certificate templates.
  52. The top-level CA in any PKI hierarchy is the__________________.
  53. One alternative to using public key cryptography is by using a(n) _____________.
  54. Each PKI certificate consists of a public key that is widely known, and a (n) ________________ that is known only to the user or computer who holds the certificate.
  55. Users can request certificates via the Web using the _______________ service.
  56. A (n) __________ obtains PKI health certificates from client computers when the IPSec NAP enforcement method is used.
  57. The _____________ method is the only NAP enforcement agent that can be deployed in the absence of an Active Directory domain.
  58. _________________ provide continuous monitoring of system compliance on all NAP clients.
  59. The _________________ distributes Statement of Health information to the appropriate System Health Validators.
  60. Each System Health Agent provides a________________ regarding its health status.
  61. The DFS Replication engine uses a form of replication called ____________.
  62. In the Distributed File System, the actual shared folders referred to by the virtual folders in the namespace are known as ___________.
  63. DFS-Replication relies on a protocol called _______ for file replication.
  64. A DPS replication topology in which every server replicates with every other server is called a(n) _______________ topology.
  65. The basic file sharing capabilities of a Windows server are provided by the _________ service.
  66. To keep a DFS folder’s multiple targets synchronized, you must create a(n) ___________.
  67. The ___________ allows you to simplify the view of file shares located across multiple servers as they appear to your user base.
  68. A(n) _______________ appears to the operating system as though it is a physically separate disk and can host an operating system
  69. A(n) ______________ enables you to limit DFS replication traffic to specific pairs of members.
  70. A DFS ________________ enables you to create a single directory tree that contains references to shared folders located on multiple separate file servers.