

Windows Server Administration
Chapter Exam Questions
Course Introduction
Windows Server Administration provides students with the foundational knowledge and practical skills necessary to install, configure, manage, and troubleshoot Windows Server environments. The course covers key concepts such as Active Directory, user and group management, server roles, storage solutions, security features, and network services. Through hands-on labs and exercises, learners gain experience in deploying Windows Server, managing resources, implementing security measures, and performing routine maintenance tasks. The course also introduces tools for monitoring server performance and ensuring the reliability and availability of server infrastructure in enterprise settings.
Recommended Textbook
MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson
Available Study Resources on Quizplus
10 Chapters
409 Verified Questions
409 Flashcards
Source URL: https://quizplus.com/study-set/453 Page 2


Chapter 1: Designing Active Directory Domain Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8045
Sample Questions
Q1) An Active Directory ____________________ includes one or more trees comprised of one or more domains.
Answer: Forest
Q2) ____________________ is achieved when an organization can independently manage their data.
Answer: Data autonomy
Q3) A ____ trust creates an explicit trust relationship between two domains and is not transferred to any other domains.
A) non-transitive
B) transitive
C) one-way
D) foreign
Answer: A
Q4) A(n) _________________________ is used within a domain to organize objects.
Answer: Organizational Unit (OU)
Organizational Unit
OU
Q5) Beyond autonomy, what are two other reasons to create separate domains?
Answer: To control replication traffic over WAN links
To protect the root domain (and the Enterprise Admins group)
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Designing Physical Topology
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8046
Sample Questions
Q1) Active Directory applications use ____ queries to query domain controllers, and these queries add to the load of a domain controller.
A) Lightweight Directory Access Protocol
B) Remote Procedure Call
C) domain controller access
D) server access protocol
Answer: A
Q2) The ____ option allows a server to get a copy of Active Directory from media (such as CD, DVD, or USB drive) instead of replicating the data over a WAN link.
A) IDE
B) DMA
C) IFM
D) ADM
Answer: C
Q3) The physical locations of an enterprise include one or more ____________________.
Answer: subnets
Q4) Cached credentials only provide ____________________ access.
Answer: local
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Designing and Implementing DNS
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8047
Sample Questions
Q1) If zone transfers are not authorized to the server where you're logged on, the response will be "____" when performing NSLookup.
A) Query Absent
B) Access Refused
C) Query Refused
D) Access Denied
Answer: C
Q2) ____ introduced Active Directory partitions.
A) Windows Server 2003
B) Windows 2000
C) Windows NT
D) Windows 2008 R2
Answer: A
Q3) ____________________ are used to store information about other zones hosted by other authoritative DNS servers.
Answer: Stub zones
Q4) It's often said that 75 percent of Active Directory problems can be directly attributed to ___________________.
Answer: DNS
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Designing and Implementing Group Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8048
Sample Questions
Q1) Internet Protocol Security (IPSec) provides confidentiality by encrypting the data using ____.
A) Internet Key Exchange
B) Encapsulated Security Payload
C) Encrypted Security Header
D) Authentication Header
Q2) Discuss how OUs should be named.
Q3) The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.
A) CN
B) OU
C) DC
D) DN
Q4) GPOs can be linked to either the Users container or the Computers container.
A)True
B)False
Q5) The real strength of universal groups is realized with ____________________ domains.
Q6) Actual GPOs are commonly named based on their ____________________.
Q7) Discuss what printer location policies can be used for.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Designing Remote Access and Terminal
Services
Strategies
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8049
Sample Questions
Q1) Describe a NAP client.
Q2) The ____ condition in the network policy settings can be used to specify that only clients that have received a specific DHCP lease will meet the condition.
A) MS-Service Reason Code
B) MS-Service Authentication Type
C) MS-Service Class
D) MS-Service Service Type
Q3) ____ can be set to Allow or Deny within the policy to control access to the remote access server.
A) Roles
B) Constraints
C) Permissions
D) Policies
Q4) List and describe two methods that users can use to start TS RemoteApp applications.
Q5) TS CALs are managed and maintained on a(n) ____________________ licensing server.
To view all questions and flashcards with answers, click on the resource link above. Page 7
Q6) A(n) _________________________ is used to determine which users are granted access to a remote access server.

Chapter 6: Designing and Implementing a PKI
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8050
Sample Questions
Q1) A(n) ____ is a complete listing of all certificates revoked by the CA.
A) new CRL
B) delta CRL
C) alpha CRL
D) revocation CRL
Q2) An established public CA will have a root certificate in the ____.
A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
Q3) Revoked certificates are published by the CA via a(n) ____ using an X.509 version 2 certificate.
A) invalid certificates list (ICL)
B) certificate revocation list (CRL)
C) certificate practice statement (CPS)
D) certificate life cycle list (CLCL)
Q4) Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.
Q5) List and describe two permissions that can be granted to enterprise admins.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Securing Windows Server 2008 Servers
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8051
Sample Questions
Q1) You can perform the compliance audit with the following command: ____
A) scwcmd configure /p:PolicyPathName
B) scwcmd display /p:PolicyPathName
C) scwcmd analyze /p:PolicyPathandName
D) scwcmd baseline /p:PolicyPathName
Q2) In the context of server security, a(n) ____________________ is a starting point for a server that locks it down as much as possible while also allowing it to operate.
Q3) ____ audits user logon events when a user is authenticated from a local computer (not a domain controller).
A) Audit account management
B) Audit logon events
C) Audit object events
D) Audit privilege use
Q4) Describe the purpose of the WSUS statistics server.
Q5) List and explain one concern when considering adding WSUS to a network.
Q6) Explain the difference between an upstream server and a downstream server.
Q7) Name and describe a primary tool used for compliance auditing.
Q8) ____________________ identify resources in one network that can communicate with resources in another network.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Designing High Availability and Business
Continuity
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8052
Sample Questions
Q1) The ____ can be used to validate the hardware used in the failover cluster and the configuration of a cluster.
A) Configuration wizard
B) System Configuration Validation wizard
C) Operational Validation wizard
D) Validate a Configuration wizard
Q2) The choice of quorum model largely depends on ____.
A) the number of nodes in the cluster
B) the services being balanced
C) the resources of the cluster
D) the network performance
Q3) With ____, server load is balanced across each of the servers and progressively more clients can be added without degrading the service.
A) scale up
B) scale out
C) vertical scaling
D) linear scaling
Q4) Identify a limitation of using the native backup tools for Active Directory.
Q5) List and describe the steps to perform a non-authoritative restore.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Designing Supporting Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8053
Sample Questions
Q1) ____________________ allows users to authenticate once and then use this authentication for all access.
Q2) List and describe two benefits AD LDS provides for Active Directory-enabled applications.
Q3) AD RMS works by ____ a document and embedding the usage rights within the document Itself.
A) sealing
B) encrypting
C) decrypting
D) copying
Q4) Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
Q5) ____ is most commonly used to support single sign-on with Web-based applications.
A) AD RMS
B) AD FS
C) AD LDS
D) ADSI
Q6) List and describe two WSS tools that can be used for collaboration.
Page 11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Designing Virtualization Strategies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/8054
Sample Questions
Q1) ____ can allow users to run legacy applications in a virtual environment on a newer operating system.
A) Application virtualization
B) RemoteApp virtualization
C) Desktop virtualization
D) Object virtualization
Q2) ___________________ allows a single physical server to support multiple virtual servers.
Q3) Describe the Microsoft SoftGrid Application Virtualization for Desktops.
Q4) Describe the private virtual machine network setting in the Virtual Network Manager.
Q5) The ____ setting in the Virtual Network Manager ensures that the virtual machines remain completely isolated.
A) internal only
B) external
C) host only
D) NAT
Q6) Discuss two benefits of server consolidation.
Q7) Describe Microsoft Application Virtualization for Terminal Services.
To view all questions and flashcards with answers, click on the resource link above. Page 12
Q8) Discuss how a VPC machine can be used to provide access to a legacy application.