-->
Server
Administrator Quiz
There are 20 questions in this quiz. Good luck!
Passing grade is 70% = C.
Passing grade is 70% = C.
1) You have IIS running on your Windows
2000 server. Recently the web site is responding slowly. What tool do you use
to monitor the performance of IIS?
|
a)
IISMon
|
b)
System Monitor
|
c)
Vmmon
|
d)
Vmstat
|
e)
Rmon
|
2) What interface in Windows 2000 can you
use for creating local shares?
|
a)
Netstat
|
b)
Domain Manager
|
c)
User Manager
|
d)
Windows Explorer
|
e)
Administrative tool
|
3) Proxy Server is ideal for creating which
of the following network elements/components?
|
a)
host based IDS
|
b)
network based IDS
|
c)
network perimeter
|
d)
network entrapment point
|
4) John Doe wants to make IPX/SPX and
TCP/IP the two protocols used on his computer but is not sure whether he can
do that on one nic card or if he needs a second one. How many protocols can
you bind to a single nic card?
|
a)
Two
|
b)
Ten
|
c)
Five
|
d)
Unlimited
|
e)
One
|
5) You are the administrator of a large
E-commerce site. Lately there have been a number of complaints about error
pages popping up due to pages being deleted but the links not removed. What
would be the best way to make the site more user friendly.
|
a)
Create a custom pop-up window to
redirect the user
|
b)
Reinstall the missing pages
|
c)
Create a custom error page with
a link back to the main site.
|
d)
Redirect the broken links to
another page on the site
|
6) Which Unix command will give the
contents of the root directory?
|
a)
ls
|
b)
ls -l
|
c)
ls -al
|
d)
ls /
|
7) Host based IDS works by scanning:
|
a)
the log files of the local host
|
b)
the log files of the desktop
client only
|
c)
the log files of the local host
and the dump terminal
|
d)
the log files of the dump
terminal only
|
e)
the log files of the central
server only
|
8) What is a security tradeoff when you
utilize an intrusion detection system?
|
a)
Changes in file permissions
|
b)
Unexplained or common system
shutdown and restarts
|
c)
Host performance degradation
|
d)
Failed logins
|
e)
Changes in user privileges
|
9) You are trying to contact a host in a
different department of your company but can't seem to get through.You have
no problem communicating with others on your subnet but cannot even ping any
remote hosts. Other hosts on your subnet can reach remote hosts.
|
a)
Incorrect subnet mask on the
remote subnet
|
b)
Incorrect subnet mask on your
computer
|
c)
Incorrect default gateway on
your computer
|
d)
The WINS server is down
|
10) DNS and WINS are often being considered
as the:
|
a)
Netbios services for a network
|
b)
file services for a network
|
c)
ARP services for a network
|
d)
foundation services for a
network
|
11) If you saw the output in the example
below, what tool would you be using?
|
a)
TRACERT
|
b)
NSLOOKUP
|
c)
DNSLOOKOUT
|
d)
TRACEROUTE
|
12) Which of the following is the graphical
interface for managing a Netware 5 server from your windows client?
|
a)
NWAdmin
|
b)
Server Manager
|
c)
Object Tree
|
d)
Directory Manager
|
e)
NDS Manager
|
13) The security log of your Windows 2000
server is best to be used for which of the following purposes?
|
a)
troubleshooting
|
b)
planning
|
c)
auditing
|
d)
system design
|
14) Which port is the NetBIOS User Datagram
Protocol (UDP) port?
|
a)
PORT 137
|
b)
PORT 135
|
c)
PORT 138
|
d)
PORT 139
|
15) SSL can be viewed as its own layer
between what two layers of the four layer IP stack?
|
a)
Network
|
b)
Transport
|
c)
Application
|
d)
Session
|
e)
B&C
|
16) Windows NT provides two group types. How
would you place these groups in order to provide access to resources?
|
a)
Local groups into global groups
|
b)
Global groups into local groups
|
c)
User groups into global groups
|
d)
User groups into local groups
|
17) What is the default NTFS setting for
shares on an NT system?
|
a)
Full control to the
administrators group
|
b)
Full control to the users group
|
c)
Full control to the everyone
group
|
d)
Full control to the global group
|
e)
Full control to the local group
|
18) On a Windows NT system, where would you
go to manage shares to work with other computers?
|
a)
Windows Explorer
|
b)
User manager
|
c)
Primary Domain Controller
|
d)
Server manager
|
19) What is the first thing to do when
implementing a security policy?
|
a)
Train the users
|
b)
Install a firewall
|
c)
Create a written plan
|
d)
Use a strong password
|
20) What is the Order of Name resolution on
Windows NT4.0 machines?
|
a)
Lmhosts file, Local Host Name,
Hosts File, DNS Server, NetBIOS Name Cache, WINS Server, Broadcast,
|
b)
Local Host Name, Hosts File,
DNS Server, NetBIOS Name Cache, WINS Server, Broadcast, Lmhosts file
|
c)
DNS Server, Local Host Name,
Hosts File, NetBIOS Name Cache, WINS Server, Broadcast, Lmhosts file
|
d)
Local Host Name, NetBIOS Name
Cache, Hosts File, DNS Server, WINS Server, Broadcast, Lmhosts file
|