Windows Server Quiz
- November 17, 2017
- Posted by: Surender
- Category: Windows Server
The following Quiz comprises multiple choice questions which tests the knowledge of a user in various areas of Windows Server administration.
Windows Server Quiz
Ready for the Quiz? Click Play button below to get started.
Windows Server Quiz
Which of the following would you configure if you wanted to block computers running Windows 7 and earlier operating systems from consuming AD RMS-protected content?
You configure an exclusion policy based on the lockbox to block AD RMS clients running particular operating systems (such as Windows 7)
Which of the following utilities can be used to monitor the most recent stage of Active Directory replication?
The repadmin.exe utility is used to monitor Active Directory replication
Which of the following services would you restart on a domain controller if you wanted to trigger a re-registration of the domain controller’s _ldap and _kerberos SRV records?
Restarting the Netlogon service will trigger a re-registration of the domain controller’s _ldap and _kerberos SRV records.
What operator tests column for the absence of data in SQL?
IS NULL operators checks if a data is available or not
Port number used by Network Time Protocol (NTP) with UDP is?
Port number used by Network Time Protocol with UDP is 123.
Delegation of Control allows you to take control of Active Directory objects.
Delegation of Control is used when you want to allow any user to take control of Active Directory objects.
Which of the following is first fully supported 64 bit Operating system?
Linux became the first OS kernel to fully support x86-64 in year 2001.
You are about to promote a server running the Windows Server 2012 R2 operating system to domain controller.
The domain is currently running at the Windows Server 2008 domain functional level. Which groups should your account be a member of to ensure that the environment is appropriately configured for this domain controller running Windows Server 2012 R2?
An account used to promote a server running Windows Server 2012 to function as a Domain Controller must be a member of the Schema Admins and Enterprise Admins groups so that the existing Active Directory schema can be updated.
In which of the following scenarios might you need to upgrade SYSVOL replication from FRS to DFSR?
Domains where the domain controllers were initially running Windows Server 2000 or Windows Server 2003 may still use FRS for SYSVOL replication.
You cannot create a folder with name "CON" in Windows
CON is a reserved keyword for Console and cannot be used while creating a folder
Which of the following security groups can have their passwords replicated to an RODC by default?
Members of the Event Log Readers group can have their passwords replicated to an RODC by default
Which permission should you assign on a CA to a group of users that you want to allow to alter the list of recovery agents?
The Manage CA permission allows users to alter the list of recovery agents
What is the port number of DNS?
DNS uses both TCP 53 as well as UDP 53. TCP 53 is used during zone transfer and UDP 53 is used during name resolution.
Your organization has not configured a reverse lookup zone in DNS and management does not believe one must be configured in the future.
Errors are occurring because DHCP clients are attempting to register records in the reverse lookup zone. Which of the following settings would you change on the DHCP server to stop these errors from occurring?
By setting Disable Dynamic Updates For DNS PTR Records, you stop the creation of and updating of PTR records
IPv6 address is:
IPv6 addresses are 128-bit hexadecimal numbers. The IPv4 addresses we are all used to seeing are made up of four numerical octets that combine to form a 32-bit address
Active Directory Rights Management Services are designed to complete control of all documents stored in RMS-enabled applications.
Active Directory Rights Management Services (ADRMS) enable an application to encrypt and decrypt content, retrieve templates and revocation lists, acquire licenses and certificates from a server, and many other related tasks.
What is the standard port for HTTPS?
Standard port for HTTPS is 443
What is the HTTP error code for Resource Not Found?
Error code 404 means the requested resource could not be found but may be available in the future.
Which type of scope would you configure if you needed to lease IP addresses in the following range:
184.108.40.206 - 220.127.116.11
The IP addresses 18.104.22.168 - 22.214.171.124 belong to multicast range. So, you need to use Multicast scopes to lease these addresses
What does DNs stand for?
DNs is the abbreviation for Distinguished Names
You are a network administrator for Contoso, which has a main office and a branch office.
The company network consists of a single Active Directory domain, contoso.local. All servers are running Windows Server 2012 R2, and all clients are running Windows 8.1.
You configure a file server at the main office as a BranchCache content server. You now want to configure clients at the branch office for BranchCache.
You create a new GPO for the branch office. Which of the following Group Policy settings do you need to configure in the GPO to enable the clients for BranchCache?
You need to Turn on BranchCache policy setting to enable BranchCache on clients that fall within the scope of the policy.
In which version of Windows did Microsoft adopt Kerberos as an authentication policy?
Kerberos authentication was introduced in Windows Server 2000.
The root domain of the TechTutsOnline forest is TechTutsOnline.local. The contoso.com domain tree is part of the TechTutsOnline forest.
Bob has an account in the victoria.contoso.com domain and is signing on to a computer that is a member of the computers.TechTutsOnline.local domain. No additional UPNs have been configured. Which UPN suffix will Bob use to sign on to this computer?
The default UPN suffix for a forest is the forest root domain. Because the forest root domain is TechTutsOnline.local, this will be the default UPN suffix.
Which of the following Windows PowerShell cmdlets are used to view DNS zone statistics?
The Get-DNSServerStatistics cmdlet is used to retrieve DNS server zone statistics.
Which of the following resource records is associated with a host record in a zone and allows a DNS client to verify the authenticity of the host record?
Each record in a DNSSEC secured DNS zone has an associated RRSIG record that allows a DNS client to verify the authenticity of the record.
You are configuring AD FS. Which server should you deploy on your organization’s perimeter network?
You deploy a web application proxy on a perimeter network
Which of the following divisions or container structures do not exist in Active Directory?
Webs do not exist in Active Directory.
Which of the following CA types would you deploy if you wanted to deploy a CA at the top of a hierarchy that could issue signing certificates to other CAs and which would be taken offline if not issuing, renewing, or revoking signing certificates?
You can take a standalone root CA offline and it functions as the top of a CA hierarchy
What do Windows administrative shared folder names always end with?
The administrative share with $ at their end is part of a few that are automatically created in windows. For example, C$ is the administrative share for C drive. These shares are not visible when discovering shared computer via File Explorer.
Identify the false statement
While files are in Recycle Bin, they are still using the space of original drive. To reclaim the space, you need to permanently delete those files.
Group Policy Management Console doesn't allow editing of settings within individual GPOs?
Group Policy Management Console allows the editing of settings within individual GPOs.
Which of the following techniques can you use to provide high availability for a DHCP scope?
Split scopes separate a scope across two servers. DHCP failover provides high availability for a DHCP scope through either load balancing the scope across two servers or having the scope fail over to a new server in in case the original one is offline.
Which operator performs pattern matching in SQL?
LIKE operator is used for matching patterns
Which of these is not applicable for IP protocol?
IP offers unreliable service. This is the main reason it is used along with TCP; to make communication reliable 🙂
You want to enable key archiving on a CA. You need to issue a certificate from a specific template to the user who will recover private keys. Which certificate template will you use as the basis for this certificate?
You need to issue a certificate from the key recovery agent template to a user before you can enable key archiving on a CA
Which protocol is used to send email?
First defined by RFC 821 in 1982, SMTP (Simple Mail Transfer Protocol) is an Internet standard for electronic mail (email) transmission
Which of the following utilities provides information in the format given below?
This image represents the output of Tracert utility. Tracert determines the path taken by a packet to reach the destination by sending ICMP echo request to the destination with incrementally increasing Time to Live (TTL) field values.
Which of the following revocation statuses can you change to alter the status of a certificate from revoked to valid?
You can remove a Certificate Hold status, which means that the certificate will be recognized as valid.
Which group policy item should you configure to enable automatic re-enrollment of certificates?
You configure automatic re-enrollment by configuring the Certificate Services Client – Auto-Enrollment policy
Which of the following protocols is Active Directory based upon?
Active Directory is based upon LDAP (Lightweight Directory Access Protocol).
What does an assigned IP address 169.254.0.15 indicate?
The address 169.254.0.15 belongs to reserved range (169.254.0.0 - 169.255.255) known as APIPA (Automatic Private Internet Protocol Address). A computer configures itself with an address from this range when it is configured to obtain TCP/IP info from a DHCP server but it cannot connect to DHCP server.
Which of the following CA types must be deployed on domain-joined computers?
Enterprise CA must be deployed on domain-joined computers
What is the full form of SQL?
Structured Query Language is the correct answer
Between Active Directory Sites, you can also use ____ for replication, but only for changes in the Schema or Configuration.
You have an option to use SMTP (Simple Mail Transfer Protocol) while configuring replication between AD Sites but SMTP can only replicate changes in Schema or configuration
You have configured a forest trust relationship between the TechTutsOnline forest and the Contoso forest.
You want to ensure that users from the Contoso forest can authenticate only when needing to access resources in the TechTutsOnline forest using the email@example.com UPN rather than any other UPN that is available for them. Which of the following should you use to accomplish this goal?
You can use name suffix routing to manage which UPNs can be used for authentication.
In any Active Directory forest there are five Operations Masters roles that must be assigned to one or more domain controllers.
Which of the following answers correctly depicts these roles?
Five Flexible Single Master Operation (FSMO) Roles are:
- Schema Master
- Domain Naming Master
- Infrastructure Master
- PDC Emulator
- Relative ID master
Which of the following is the minimum domain functional level required before you can promote a member server running Windows Server 2012 R2 so that it functions as a domain controller?
The Windows Server 2003 functional level supports domain controllers running Windows Server 2012 R2 operating system
You have moved several domain controllers out of your organization’s head office site to a new secondary datacenter that has its own site.
Which of the following consoles should be used to update the site association of these domain controllers?
You use the Active Directory Sites And Services console to change domain controller site association
Which of the following should be configured when you wanted to change the number of ports available when a DNS server makes a query to another DNS server on behalf of a client?
You configure the Socket Pool when you want to change the number of ports available when a DNS server makes a query to another DNS server on behalf of a client.
Which of the following resource records is returned when a zone protected by DNSSEC does not contain the record queried by the client?
NSEC records are returned when a host record does not exist in a DNSSEC secured zone.