-->
Server
Administrator Quiz
There are 20 questions in this quiz. Good luck!
Passing grade is 70% = C.
Passing grade is 70% = C.
1) You have IIS running on your Windows
2000 server. Recently the web site is responding slowly. What tool do you use
to monitor the performance of IIS?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
2) What interface in Windows 2000 can you
use for creating local shares?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
3) Proxy Server is ideal for creating which
of the following network elements/components?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
4) John Doe wants to make IPX/SPX and
TCP/IP the two protocols used on his computer but is not sure whether he can
do that on one nic card or if he needs a second one. How many protocols can
you bind to a single nic card?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
5) You are the administrator of a large
E-commerce site. Lately there have been a number of complaints about error
pages popping up due to pages being deleted but the links not removed. What
would be the best way to make the site more user friendly.
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
6) Which Unix command will give the
contents of the root directory?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
7) Host based IDS works by scanning:
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
8) What is a security tradeoff when you
utilize an intrusion detection system?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
9) You are trying to contact a host in a
different department of your company but can't seem to get through.You have
no problem communicating with others on your subnet but cannot even ping any
remote hosts. Other hosts on your subnet can reach remote hosts.
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
10) DNS and WINS are often being considered
as the:
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
11) If you saw the output in the example
below, what tool would you be using?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
12) Which of the following is the graphical
interface for managing a Netware 5 server from your windows client?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
13) The security log of your Windows 2000
server is best to be used for which of the following purposes?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
14) Which port is the NetBIOS User Datagram
Protocol (UDP) port?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
15) SSL can be viewed as its own layer
between what two layers of the four layer IP stack?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
16) Windows NT provides two group types. How
would you place these groups in order to provide access to resources?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
17) What is the default NTFS setting for
shares on an NT system?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
e)
![]() |
18) On a Windows NT system, where would you
go to manage shares to work with other computers?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
19) What is the first thing to do when
implementing a security policy?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
20) What is the Order of Name resolution on
Windows NT4.0 machines?
|
a)
![]() |
b)
![]() |
c)
![]() |
d)
![]() |
No comments:
Post a Comment