These Windows Server multiple-choice questions and their answers will help you strengthen your grip on the subject of Windows Server. You can prepare for an upcoming exam or job interview with these Windows Server MCQs.
So scroll down and start answering.
A. mapadmin
B. mount
C. rpcinfo
D. showmount
E. nfsstat
F. nfsadmin
A. Secure Boot.
B. Vthm
C. Encrypt VM state and live migration traffic.
D. Connection to keyboard/mouse.
A. Digest Authentication
B. Integrated Windows Authentication
C. Kerberos
D. NTLM
A. split DNS records into different Zone Scopes on the same DNS server.
B. allow primary and secondary DNS servers to respond to DNS client queries based on the geographical location.
C. redirect malicious DNS clients to a non-existent IP address.
D. to distribute application traffic across different geographically-distributed instances on a given time of the day.
A. 200
B. 400
C. 500
D. 503
A. safeguard administrative credentials against Pass-the—hash attacks.
B. control hybrid workloads.
C. dynamically segment network. based on workloads.
D. provide priority-based storage resources using Storage Quality of Service.
A. Windows 8 Home
B. Windows 10
C. Windows Server 2012
D. Windows Server 2016
A. A mechanism that lets a hardware resource be abstracted and shared among multiple Consumers.
B. A virtualized device that mimics an actual physical hardware device so that guests can use the typical drivers for that hardware device.
C. Any virtual machine that is created by root partition.
D. An optimization to a guest operating system to make it aware of virtual machine environments and tune its behavior for virtual machines.
A. Up to 4TB.
B. Up to 8TB
C. Up to 12TB.
D. Up to 24TB.
A. Up to 1TB
B. Up to 4TB.
C. Up to 8TB.
D. Up to 12TB.
A. SPA helps manage server performance and troubleshoots server performance issues
B. SPA provides reports and recommendations about configuration and performance issues.
C. SPA makes changes to the servers and their functioning.
D. SPA provides recommendations by collecting data from the server and by applying rules for capturing best practices.
A. DSACLs.exe
B. Ll DSRm.exe
C. El Filescrnexe
D. WLBS.exe
A. DirectAccess and virtual private network (VPN).
B. Local area network (LAN) Routing
C. Web Application Proxy.
D. BranchCache.
A. El File Server
B. l'i Security Configuration Wizard
C. Nano Server Installation
D. u Windows Hello
A. It has no local Iogon capability.
B. It supports both 32-bit and 64-bit applications.
C. It can be used as a storage host for Scale-out File server.
D. It can be used as a DNS server.
E. It can also serve as an Active Directory domain controller.
A. Minimum 2GB of RAM for the host.
B. Minimum 4GB of RAM for the host.
C. Nested VM running Hyper-V must have dynamic memory disabled.
D. Nested VM running Hyper-V must have dynamic memory enabled.
A. Physical disk media failure, lost connectivity or unresponsive.
B. Storage enclosure lost connectivity.
C. Node missing on one or more cluster networks.
D. Storage pool unrecognized metadata.
A. BranchCache
B. Network Controller
C. Network Function Virtualization
D. Windows Internet Name Service (WINS)
A. Dfsradmin.exe
B. Dfscmd.exe
C. Filescrn.exe
D. WLBS.exe
A. A Microsoft Account.
B. An Active Directory Account.
C. A Microsoft Azure Active Directory (Azure AD) Account.
D. SSO between a server and a requesting application
A. \Terminal Service Gateway\‘
B. \RPC/HTTP Proxy\' RPC
C. \W38VC_W3WP\' RPC
D. \Network |nterface(‘)\“
A. Use of Bitlocker to encrypt disk and state of virtual machines
B. Li Implementation of Just Enough Administration (JEA), which limits administrative privileges to a minimum required set of action.
C. Use of virtualization-based security for securing credential information.
D. Enabling of an administrator to apply access control permissions and restrictions. based on well-defined rules.
A. Specification of Geo-Location based traffic management using DNS Policies.
B. creation of VLAN-based tenant virtual networks.
C. Creation of a Hyper+V Virtual Switch with a Remote Direct Memory Access (RDMA) leC.
D. Deployment and use Of a software load balancer to distribute both northbound and southbound traffic.
A. Active Directory Certificate Services
B. Active Directory Domain Services
C. Active Directory Lightweight Directory Services
D. Active Directory Rights Management Services
E. File and Storage Services
A. IP Subnets.
B. VLANS
C. Firewall rules management.
D. Layer 2 and Layer 3 switches.
E. Virtual network policies.
A. Providing priority-based storage resources using Storage Quality of Service.
B. Using a scalable network controller to deploy complex workloads such as load balancing. switching. etc.
C. Dynamically segmenting the network. based on the workload needs.
D. Availability of software-based scale up and scale out for both infrastructure and workloads.
A. ClusterName
B. StopAfter
C. Credential
D. WarnAfter
E. NodeOrder
A. Source IP
B. Protocol
C. Destination Port
D. Direction
A. In Windows Server 2016 Standard Edition, the maximum RAM supported is 24TB.
B. In Windows Server 2016 Datacenter Edition, the maximum RAM supported is 24TB.
C. In Windows Server 2016 Standard Edition. unlimited VMs are supported. when used as a virtualization guest.
D. In Windows Server 2016 Standard Edition. the network controller server role is not supported.
A. During the cloning process, the original computer is destroyed.
B. Dynamic Host Configuration Protocol (DHCP) server role is supported under the cloning process.
C. Active Directory Certificate Services (AD CS) server role is not supported under the cloning process.
D. Active Directory Lightweight Directory Services (AD LDS) server role is not supported under the cloning process.
A. It is a wide area network (WAN) bandwidth optimization technology.
B. When BranchCache is deployed in the distributed cache mode, the content cache at a branch Office is distributed among client computers.
C. When BranchCache is deployed in the hosted cache mode, the content cache at a branch office is hosted on one or more server computers.
D. BranchCache can only be deployed in one mode per branch office, i.e. either in Distributed Cache Mode or Hosted Cache Mode.
A. The Windows Container HOST can run one or more Windows Containers.
B. In a Windows Container, all write actions are captured in the "sandbox" layer.
C. A container OS image can be modified as per requirement.
D. A container image and its dependencies are stored in a local repository.
A. It changes Remote Desktop Session Host server settings for logons.
B. It lists or changes COM port mapping.
C. It changes the install mode for the Remote Desktop Session Host Server.
D. It connects to another session on a Remote Desktop Session Host Server.
A. Servers should be running Windows Server 2016 Datacenter edition.
B. At least 2GB of physical memory.
C. At least two cores on each server.
D. Greater than or equal to 1 Gbps network between the servers.
E. Firewall ports open: SMB, WS-MAN.
F. One NTFS/ReFS-formatted volume per server with at least 868 of free space.
A. You can delete volumes.
B. You can extend volumes.
C. You can shrink volumes.
D. All of the above
A. 6 hours
B. 8 hours
C. 6 days
D. 8 days
A. route add
B. route -f
C. route add -p
D. route static<br>
A.
Bcdedit /backup "C:\Backup\BCD-backup"
B.
Bcdedit /copy "C:\Backup\BCD-backup"
C.
Bcdedit /export "C:\Backup\BCD-backup"
D.
Bcdedit /import "C:\Backup\BCD-backup"
A. Cscript Scregedit.wsf /AU 1
B. Cscript Scregedit.wsf /AU 2
C. Cscript Scregedit.wsf /AU 3
D. Cscript Scregedit.wsf /AU 4
A. True
B. False
A. 8 characters
B. 32 characters
C. 127 characters
D. 255 characters
A. Control Panel
B. System Configuration
C. Server Manager
D. None of the above<br>
A. Five
B. Eleven
C. Sixteen
D. All the roles
A. IPv4
B. IPv6
C. NetBEUI
D. a and b
E. a, b and c
A. Fdisk.exe
B. Fsutil.exe
C. Convdisk.exe
D. Diskpart.exe
A. convert.exe
B. fsconvert.exe
C. format
D. None of the above<br>
A. netsh
B. IPSec
C. set port status
D. None of the above
A. ntdsutil
B. passwd
C. netsh
D. None of the above
A. Connection request authentication
B. Connection request authorization
C. Client health
D. All of the above
A. True
B. False
A. ping followed by the IP address of the server
B. ping followed by the site-local address of the server
C. ping followed by the link-local address of the server
D. Any of the above
A. File encryption
B. File compression
C. Disk quotas
D. All of the above
A. One
B. Two
C. Three
D. Four<br>
A. The volume must be the NTFS volume
B. The cluster size must not be less than 2 KB
C. The cluster size must not be larger than 4 KB
D. None of the above
A. PEAP-MS-CHAP v2
B. EAP-TLS
C. PEAP-TLS
D. All of the above
A. Use an IPsec connection
B. Use an L2TP/IPsec connection and MS-CHAP v2 authentication
C. Use a PPTP connection and MS-CHAP 2 authentication
D. Use an L2TP/IPsec connection and EAP-TLS authentication<br>
A. Ldp.exe
B. Dsdbutil.exe
C. Ntdsutil.exe
D. None of the above
A. True
B. False
A. 4
B. 16
C. 23
D. Unlimited
A. 192.168.10.0/25
B. 192.168.10.0/26
C. 192.168.10.0/27
D. 192.168.10.0/30
A. Disable updates of DNS records
B. Enable scavenging through zone properties
C. Remove outdated records manually
D. None of the above
A. Up to one
B. Up to two
C. Up to four
D. Unlimited<br>
A. Bcdedit /backup "C:\Backup\BCD-backup"
B. Bcdedit /copy "C:\Backup\BCD-backup"
C. Bcdedit /export "C:\Backup\BCD-backup"
D. Bcdedit /import "C:\Backup\BCD-backup"
A. 4 GB
B. 32 GB
C. 64 GB
D. 1 TB
A. Accounting Information Authority
B. Audit Information Authority
C. Authority Information Access
D. Active directory Information Access
A. Set Conflict Detection value to 0.
B. Reboot the DHCP server.
C. Set Conflict Detection value to 2.
D. None of the above<br>
A. True
B. False
A. Remove access list from the firewall
B. Configure the firewall to perform PAT (Port Address Translation) instead of NAT
C. Configure the firewall to allow the use of Teredo
D. None of the above
A. 3389
B. 5901
C. 5902
D. None of the above<br>
A. IPsec (Internet Protocol Security)
B. GPO (Group Policy Object)
C. NAP (Network Access Protection)
D. Any of the above
A. Bcdedit {ntldr} /bootsequence /remove
B. Bcdedit {ntloader} /boot sequence /remove
C. Bcdedit /bootsequence {ntloader} /remove
D. Bcdedit /bootsequence {ntldr} /remove
A. True
B. False
A. FAT
B. FAT32
C. NTFS
D. All of the above
A. Check the log viewer
B. Check the security tab on the domain controller computer object
C. Check the event viewer
D. Any of the above
A. Active Directory Lightweight Data Services
B. Active Directory Lightweight Domain Services
C. Active Directory Lightweight Directory Services
D. None of the above
A. Forest-wide server master roles
B. Secondary domain master
C. Primary domain controller master
D. Domain naming master
E. Schema master
A. Routing and Remote Access Services role
B. Network Policy Server Services role
C. Windows Deployment Services role
D. Network Policy and Access Services role
A. Remote Access Dial-in User Service
B. Remote Authentication Dial-in User Service
C. Remote Access Directory User Service
D. Remote Authentication Directory Update Service
A. Enable query logging
B. Enable info logging
C. Enable debug logging
D. Enable event logging<br>
A. True
B. False
A. Machine.config
B. ApplicationHost.config
C. Web.config (root-level)
D. web.config (application-level)
A. Provision Storage Wizard
B. Provision a Shared Folder Wizard
C. Provision Volume Wizard
D. None of the above
A. 16 characters
B. 20 characters
C. 32 characters
D. 128 characters
A. Up to 64 VPs per VM (3.75x).
B. Up to 140 VPs per VM (3.75x).
C. Up to 190 VPs per VM (3.75x).
D. Up to 240 VPs per VM (3.75x).
A. is optimized for cloud infrastructure and is best suited for running microservices and applications in containers.
B. is an isolated application environment (like kernels), which helps in running an application, without having any effect from application/configuration changes.
C. creates a multi-machine Azure Service Fabric cluster in the datacenter or other public clouds.
D. helps in creating modern web apps, microservices and libraries.
A. DNS-based Authentication of Named Entities (DANE).
B. Nano Server support for file-based DNS.
C. Enhanced IP address management.
D. Network Function Virtualization (NFV).
E. Multiple Active Directory Forest support.
A. It blocks NTLM authentications.
B. It allows only Kerberos for authentication.
C. It does not prevent usage of credentials after disconnection.
D. It allows Single Sign-On connection to applications.
Which of the following assurances is provided by Shielded VMs to encrypt disk data and provide protection to operating system's disk?
A. BitLocker
B. Trusted OS images
C. RDP certificates
D. Tenant control of VM
A. The schema.
B. A global catalog.
C. A query and index mechanism.
D. A replication service.
A. Get-BCClientConfiguration
B. Enable-BCHostedClient
C. Get-BCContentServerConfiguration
D. Get-BCHostedCacheServerConfiguration
In Windows Server 2016, W32tm.exe is used to configure Windows Time service settings. Which of the following W32tm.exe parameters will convert an NT system time, in (10^-7)s intervals from 0h 1-Jan 1601, into a readable format?
A.
w32tm /ntpte
B.
w32tm /ntte
C.
w32tm /resync
D.
w32tm /stripchart
A. Guarded host
B. Fabric administrator
C. HGS administrator
D. Virtualization-Based Security (VBS)
A. Code Identity
B. Control Flow Guard
C. Credential Guard
D. Shielded VMs
A. Credential Guard
B. Device Guard
C. Remote Credential Guard
D. Shielded & Encryption Supported VMs
A. It uses the Nano Server deployment option to minimize attack, increase availability and reduce resource usage.
B. It uses Microsoft Hyper-V for running heaving workloads.
C. It uses Desired State Configuration to safeguard administrative credentials against Pass-the-hash attacks.
D. It uses Mixed-mode clusters upgrades for zero downtime for application/workload.
A. Get-ClusterFaultDomain
B. Set-ClusterFaultDomain
C. New-ClusterFaultDomain
D. Remove-ClusterFaultDomain
A. Remote Desktop Services
B. Remote Access
C. Web Application Proxy
D. Multipoint Services
A. CAU clustered role is required to be installed in case of self-updating mode.
B. CAU clustered role is required to be installed in case of remote-updating mode.
C. Failover Clustering Tools are required to be installed on all cluster nodes in case of self-updating mode.
D. Failover Clustering Tools are required to be installed on all remote-updating computers in case of remote-updating mode.
A. Central Access Policy.
B. File Access Auditing.
C. Access-Denied Assistance.
D. Implement Retention of Information on File Servers.
A. UriEnableCache handles the memory allocation.
B. UriScavengerPeriod handles the maximum size of an entry.
C. UriMaxUriBytes handles the maximum size of an entry.
D. UriScavengerPeriod handles the maximum size of an entry.