Windows Server MCQs

Windows Server MCQs

These Windows Server multiple-choice questions and their answers will help you strengthen your grip on the subject of Windows Server. You can prepare for an upcoming exam or job interview with these Windows Server MCQs.
So scroll down and start answering.

1: Which of the following Network File System (NFS) command line tools is used for displaying or resetting counts of calls made to a Server from NFS?

A.   mapadmin

B.   mount

C.   rpcinfo

D.   showmount

E.   nfsstat

F.   nfsadmin

2: Which of the following features is NOT configurable in Generation 2 Encryption-Supported VMs?

A.   Secure Boot.

B.   Vthm

C.   Encrypt VM state and live migration traff‌ic.

D.   Connection to keyboard/mouse.

3: Which of the following authentication protocols is used to authenticate users within an Active Directory Domain?

A.   Digest Authentication

B.   Integrated Windows Authentication

C.   Kerberos

D.   NTLM

4: The main function of Forensics, which is one of the DNS policies, is to:

A.   split DNS records into different Zone Scopes on the same DNS server.

B.   allow primary and secondary DNS servers to respond to DNS client queries based on the geographical location.

C.   redirect malicious DNS clients to a non-existent IP address.

D.   to distribute application traff‌ic across different geographically-distributed instances on a given time of the day.

5: Which of the following error codes is thrown when an invalid health certif‌icate is detected in DHA?

A.   200

B.   400

C.   500

D.   503

6: In Windows Server 2016, VXLAN- and NVGRE-based virtual networking is used to:

A.   safeguard administrative credentials against Pass-the—hash attacks.

B.   control hybrid workloads.

C.   dynamically segment network. based on workloads.

D.   provide priority-based storage resources using Storage Quality of Service.

7: Which of the following Windows versions and editions does NOT support RDP?

A.   Windows 8 Home

B.   Windows 10

C.   Windows Server 2012

D.   Windows Server 2016

8: Which of the following is the correct description of the Hyper-V Terminology term "emulated device"?

A.   A mechanism that lets a hardware resource be abstracted and shared among multiple Consumers.

B.   A virtualized device that mimics an actual physical hardware device so that guests can use the typical drivers for that hardware device.

C.   Any virtual machine that is created by root partition.

D.   An optimization to a guest operating system to make it aware of virtual machine environments and tune its behavior for virtual machines.

9: How much Physical (HOST) Memory per physical server (6X) is supported by Windows Server 2016?

A.   Up to 4TB.

B.   Up to 8TB

C.   Up to 12TB.

D.   Up to 24TB.

10: How much Virtual Machine Memory per VM (12x) is supported by Windows Server 2016?

A.   Up to 1TB

B.   Up to 4TB.

C.   Up to 8TB.

D.   Up to 12TB.

11: Which of the following statements is incorrect about Server Performance Advisor (SPA)?

A.   SPA helps manage server performance and troubleshoots server performance issues

B.   SPA provides reports and recommendations about conf‌iguration and performance issues.

C.   SPA makes changes to the servers and their functioning.

D.   SPA provides recommendations by collecting data from the server and by applying rules for capturing best practices.

12: Which of the following command line tools are included in the Active Directory Domain Services Tools?

A.   DSACLs.exe

B.   Ll DSRm.exe

C.   El Filescrnexe

D.   WLBS.exe

13: Which of the following features are available under the Remote Access Server Role?

A.   DirectAccess and virtual private network (VPN).

B.   Local area network (LAN) Routing

C.   Web Application Proxy.

D.   BranchCache.

14: Which of the following features have been completely removed from Windows Server 2016?

A.   El File Server

B.   l'i Security Configuration Wizard

C.   Nano Server Installation

D.   u Windows Hello

15: Which of the following options are correct about the Nano Server installation option in Windows Server 2016?

A.   It has no local Iogon capability.

B.   It supports both 32-bit and 64-bit applications.

C.   It can be used as a storage host for Scale-out File server.

D.   It can be used as a DNS server.

E.   It can also serve as an Active Directory domain controller.

16: In Windows Server 2016, which of the following are the correct requirements for running Hyper-V as a guest VM running on Hyper-V?

A.   Minimum 2GB of RAM for the host.

B.   Minimum 4GB of RAM for the host.

C.   Nested VM running Hyper-V must have dynamic memory disabled.

D.   Nested VM running Hyper-V must have dynamic memory enabled.

A.   Physical disk media failure, lost connectivity or unresponsive.

B.   Storage enclosure lost connectivity.

C.   Node missing on one or more cluster networks.

D.   Storage pool unrecognized metadata.

18: In Windows Server 2016, which of the following are Software Defined Networking (SDN) technologies?

A.   BranchCache

B.   Network Controller

C.   Network Function Virtualization

D.   Windows Internet Name Service (WINS)

19: Which of the following command line tools are included in the File Services Remote Server Administration Tools?

A.   Dfsradmin.exe

B.   Dfscmd.exe

C.   Filescrn.exe

D.   WLBS.exe

20: Which of the following types of authentication are supported by Windows Hello for Business?

A.   A Microsoft Account.

B.   An Active Directory Account.

C.   A Microsoft Azure Active Directory (Azure AD) Account.

D.   SSO between a server and a requesting application

21: For monitoring the resource usage in the Remote Desktop (RD) gateway, which of the following performance counters are used only for legacy RPC transport?

A.   \Terminal Service Gateway\‘

B.   \RPC/HTTP Proxy\' RPC

C.   \W38VC_W3WP\' RPC

D.   \Network |nterface(‘)\“

22: Which of the following are the NEW security features that are supported by Windows Server 2016 but not by Windows Server 2012 R2?

A.   Use of Bitlocker to encrypt disk and state of virtual machines

B.   Li Implementation of Just Enough Administration (JEA), which limits administrative privileges to a minimum required set of action.

C.   Use of virtualization-based security for securing credential information.

D.   Enabling of an administrator to apply access control permissions and restrictions. based on well-def‌ined rules.

23: Windows Server 2016 supports which of the following networking scenarios?

A.   Specif‌ication of Geo-Location based traffic management using DNS Policies.

B.   creation of VLAN-based tenant virtual networks.

C.   Creation of a Hyper+V Virtual Switch with a Remote Direct Memory Access (RDMA) leC.

D.   Deployment and use Of a software load balancer to distribute both northbound and southbound traff‌ic.

24: Following are the server roles that need to be migrated from Windows Server R2 2012 to Windows Server 2016. Which of the following will require a downtime to complete the migration process?

A.   Active Directory Certif‌icate Services

B.   Active Directory Domain Services

C.   Active Directory Lightweight Directory Services

D.   Active Directory Rights Management Services

E.   File and Storage Services

25: Which of the following areas fall under the Fabric network management part of Windows Server 2016 networking?

A.   IP Subnets.

B.   VLANS

C.   Firewall rules management.

D.   Layer 2 and Layer 3 switches.

E.   Virtual network policies.

A.   Providing priority-based storage resources using Storage Quality of Service.

B.   Using a scalable network controller to deploy complex workloads such as load balancing. switching. etc.

C.   Dynamically segmenting the network. based on the workload needs.

D.   Availability of software-based scale up and scale out for both infrastructure and workloads.

27: Which of the following options are specified while requesting for an "Updating Run" under Cluster-Aware Updating?

A.   ClusterName

B.   StopAfter

C.   Credential

D.   WarnAfter

E.   NodeOrder

28: Which of the following attributes are present in a packet running under Stateful ACL rules?

A.   Source IP

B.   Protocol

C.   Destination Port

D.   Direction

29: Which of the following options are correct?

A.   In Windows Server 2016 Standard Edition, the maximum RAM supported is 24TB.

B.   In Windows Server 2016 Datacenter Edition, the maximum RAM supported is 24TB.

C.   In Windows Server 2016 Standard Edition. unlimited VMs are supported. when used as a virtualization guest.

D.   In Windows Server 2016 Standard Edition. the network controller server role is not supported.

30: Which of the following statements are correct about Virtualized Domain controller cloning process?

A.   During the cloning process, the original computer is destroyed.

B.   Dynamic Host Configuration Protocol (DHCP) server role is supported under the cloning process.

C.   Active Directory Certif‌icate Services (AD CS) server role is not supported under the cloning process.

D.   Active Directory Lightweight Directory Services (AD LDS) server role is not supported under the cloning process.

31: In Windows Server 2016, which of the following statements are correct about BranchCache?

A.   It is a wide area network (WAN) bandwidth optimization technology.

B.   When BranchCache is deployed in the distributed cache mode, the content cache at a branch Office is distributed among client computers.

C.   When BranchCache is deployed in the hosted cache mode, the content cache at a branch off‌ice is hosted on one or more server computers.

D.   BranchCache can only be deployed in one mode per branch office, i.e. either in Distributed Cache Mode or Hosted Cache Mode.

32: Windows Containers provide operating-system-level virtualization that allows multiple isolated applications to be run on a single system. Which of the following statements are correct regarding Windows Containers?

A.   The Windows Container HOST can run one or more Windows Containers.

B.   In a Windows Container, all write actions are captured in the "sandbox" layer.

C.   A container OS image can be modified as per requirement.

D.   A container image and its dependencies are stored in a local repository.

33: In Windows Server 2016, what is the function of the "change" Remote Desktop (RD) services command line-tools?

A.   It changes Remote Desktop Session Host server settings for logons.

B.   It lists or changes COM port mapping.

C.   It changes the install mode for the Remote Desktop Session Host Server.

D.   It connects to another session on a Remote Desktop Session Host Server.

34: What are the prerequisites for Storage Replica testing between two Windows Server 2016 servers?

A.   Servers should be running Windows Server 2016 Datacenter edition.

B.   At least 2GB of physical memory.

C.   At least two cores on each server.

D.   Greater than or equal to 1 Gbps network between the servers.

E.   Firewall ports open: SMB, WS-MAN.

F.   One NTFS/ReFS-formatted volume per server with at least 868 of free space.

35: Which of the following is true regarding volumes on Windows Server 2008?


A.   You can delete volumes.

B.   You can extend volumes.

C.   You can shrink volumes.

D.   All of the above

36: In a Windows Server 2008 based DHCP server, what is the default value of the Lease duration for DHCP clients?


A.   6 hours

B.   8 hours

C.   6 days

D.   8 days

37: Which of the following parameters will you use in the 'route' command so that Windows will keep and retain the newly added route in the IP routing table even if the server is rebooted?


A.   route add

B.   route -f

C.   route add -p

D.   route static<br>

38: Which of the following commands will you use to take the backup of IIS Global Configuration?


A.  

Bcdedit /backup "C:\Backup\BCD-backup"    

B.  

Bcdedit /copy "C:\Backup\BCD-backup"  

C.  

Bcdedit /export "C:\Backup\BCD-backup"

D.  

Bcdedit /import "C:\Backup\BCD-backup"

39: Which of the following commands will enable Automatic Updates on Windows Server 2008?


A.   Cscript Scregedit.wsf /AU 1

B.   Cscript Scregedit.wsf /AU 2

C.   Cscript Scregedit.wsf /AU 3

D.   Cscript Scregedit.wsf /AU 4

40: State whether true or false.

An internet connection sharing and using the Windows Server 2008 as a router with NAT can be enabled on the same computer at the same time.


A.   True

B.   False

41: What is the maximum length of a password for either a domain or a local user account on Windows Server 2008?


A.   8 characters

B.   32 characters

C.   127 characters

D.   255 characters

42: In Windows Server 2008, which of the following replaced the 'Manage Your Server' present in Windows Server 2003?


A.   Control Panel

B.   System Configuration

C.   Server Manager

D.   None of the above<br>

43: How many roles does Microsoft support in the Server Core installation?


A.   Five

B.   Eleven

C.   Sixteen

D.   All the roles

44: For which of the following protocols is support available in Windows Server 2008?


A.   IPv4

B.   IPv6

C.   NetBEUI

D.   a and b

E.   a, b and c

45: Which of the following utilities will you use to convert basic disks to dynamic disks?


A.   Fdisk.exe

B.   Fsutil.exe

C.   Convdisk.exe

D.   Diskpart.exe

46: Which of the following commands will you use to convert an NTFS drive to FAT or FAT32?


A.   convert.exe

B.   fsconvert.exe

C.   format

D.   None of the above<br>

47: Which of the following commands will you use to configure the Windows core installation server to accept the remote connection and to designate a port for the remote connection?


A.   netsh

B.   IPSec

C.   set port status

D.   None of the above

48: Which of the following tools would you use to reset the Directory Services Recovery Mode (DSRM) password on a single domain controller?


A.   ntdsutil

B.   passwd

C.   netsh

D.   None of the above

49: For which of the following does the Network Policy Server in Windows Server 2008 allow you to create and enforce organization wide network access policies?


A.   Connection request authentication

B.   Connection request authorization

C.   Client health

D.   All of the above

50: State whether true or false.

The jetpack.exe command is used to reduce the size of DHCP database.



A.   True

B.   False

51: Which of the following commands will you use to test IPv6 communication to a server?


A.   ping followed by the IP address of the server

B.   ping followed by the site-local address of the server

C.   ping followed by the link-local address of the server

D.   Any of the above

52: Which of the following features are available under the NTFS file system, but not under the FAT or FAT32 file systems?


A.   File encryption

B.   File compression

C.   Disk quotas

D.   All of the above

53: What is/are the number of RAID levels that Windows Server 2008 supports?


A.   One

B.   Two

C.   Three

D.   Four<br>

54: Which of the following are requirements for data compression in Windows Server 2008?


A.   The volume must be the NTFS volume

B.   The cluster size must not be less than 2 KB

C.   The cluster size must not be larger than 4 KB

D.   None of the above

55: Which of the following EAP methods are supported by Windows Server 2008 by default?


A.   PEAP-MS-CHAP v2

B.   EAP-TLS

C.   PEAP-TLS

D.   All of the above

56: You want VPN connection between your company's head office and branch offices to use end-to-end encryption to encrypt data transmission. You also want VPN connection to use only computer-level authentication instead of usernames and passwords. Which of the following will you use to accomplish this?


A.   Use an IPsec connection

B.   Use an L2TP/IPsec connection and MS-CHAP v2 authentication

C.   Use a PPTP connection and MS-CHAP 2 authentication

D.   Use an L2TP/IPsec connection and EAP-TLS authentication<br>

57: Which of the following can be used to perform database maintenance of Active Directory, manage and control single master operations and create application directory partitions?


A.   Ldp.exe

B.   Dsdbutil.exe

C.   Ntdsutil.exe

D.   None of the above

58: State whether true or false.

Windows 2000 Professional supports IPv6.


A.   True

B.   False

59: How many logical drives can you create in an extended partition?


A.   4

B.   16

C.   23

D.   Unlimited

60: Your company opened a new branch office with 32 computers. You are asked to assign an appropriate subnet scheme to the new network. Which of the following subnets will accomplish this task without wasting IP addresses?


A.   192.168.10.0/25

B.   192.168.10.0/26

C.   192.168.10.0/27

D.   192.168.10.0/30

61: Which of the following methods will you use to remove the outdated DNS records from the DNS zone automatically?


A.   Disable updates of DNS records

B.   Enable scavenging through zone properties

C.   Remove outdated records manually

D.   None of the above

62: How many primary partitions can be made on a single drive?


A.   Up to one

B.   Up to two

C.   Up to four

D.   Unlimited<br>

63: Which of the following commands will you use to take the backup of BCD in a "C:\Backup" folder?


A.   Bcdedit /backup "C:\Backup\BCD-backup"

B.   Bcdedit /copy "C:\Backup\BCD-backup"

C.   Bcdedit /export "C:\Backup\BCD-backup"

D.   Bcdedit /import "C:\Backup\BCD-backup"

64: What is the maximum memory that is supported by the Windows Server 2008 Enterprise Edition running on a 64-bit processor?


A.   4 GB

B.   32 GB

C.   64 GB

D.   1 TB

65: What is the full form of AIA?


A.   Accounting Information Authority

B.   Audit Information Authority

C.   Authority Information Access

D.   Active directory Information Access

66: Which of the following should you use on a DHCP server to make sure that the DHCP server does not assign to the DHCP clients, the IP addresses which are currently in use on the network?


A.   Set Conflict Detection value to 0.

B.   Reboot the DHCP server.

C.   Set Conflict Detection value to 2.

D.   None of the above<br>

67: State whether true or false.

There can be more than one domain naming masters in the whole forest.



A.   True

B.   False

68: What will you do to allow peer-to-peer communication between all branch office computers where each branch office is protected by a firewall that performs symmetric NAT?


A.   Remove access list from the firewall

B.   Configure the firewall to perform PAT (Port Address Translation) instead of NAT

C.   Configure the firewall to allow the use of Teredo

D.   None of the above

69: With which of the following TCP ports is the Remote Desktop Protocol designed to work?


A.   3389

B.   5901

C.   5902

D.   None of the above<br>

70: Which of the following can be used by administrators to enforce health requirements for all the computers that are connected to an organization's private network?


A.   IPsec (Internet Protocol Security)

B.   GPO (Group Policy Object)

C.   NAP (Network Access Protection)

D.   Any of the above

71: Which command will you use to remove an NT Loader from the boot sequence completely?


A.   Bcdedit {ntldr} /bootsequence /remove

B.   Bcdedit {ntloader} /boot sequence /remove

C.   Bcdedit /bootsequence {ntloader} /remove

D.   Bcdedit /bootsequence {ntldr} /remove

72: State whether true or false.

You cannot uncompress a volume once it is compressed.


A.   True

B.   False

73: Which of the following file systems fully utilizes all the features of Windows Server 2008 such as domains and active directory?


A.   FAT

B.   FAT32

C.   NTFS

D.   All of the above

74: Which of the following will you use to see the logon attempts (including the IP address and the user account) on the domain controller?


A.   Check the log viewer

B.   Check the security tab on the domain controller computer object

C.   Check the event viewer

D.   Any of the above

75: What is the full form of ADLDS?


A.   Active Directory Lightweight Data Services

B.   Active Directory Lightweight Domain Services

C.   Active Directory Lightweight Directory Services

D.   None of the above

76: Which of the following would you use to transfer all forest-wide operation master roles to another domain?


A.   Forest-wide server master roles

B.   Secondary domain master

C.   Primary domain controller master

D.   Domain naming master

E.   Schema master

77: Which of the following roles are required to be installed on the server to configure a server as a VPN server?


A.   Routing and Remote Access Services role

B.   Network Policy Server Services role

C.   Windows Deployment Services role

D.   Network Policy and Access Services role

78: What is the full form of RADIUS?


A.   Remote Access Dial-in User Service

B.   Remote Authentication Dial-in User Service

C.   Remote Access Directory User Service

D.   Remote Authentication Directory Update Service

79: To record all inbound DNS queries to the DNS server, which of the following would you configure in the DNS Manager Console?


A.   Enable query logging

B.   Enable info logging

C.   Enable debug logging

D.   Enable event logging<br>

80: State whether true or false.

There can be only one schema master in the whole forest.


A.   True

B.   False

81: Which of the following configuration file settings apply to the whole server and are inherited by all .NET and IIS configuration files?


A.   Machine.config

B.   ApplicationHost.config

C.   Web.config (root-level)

D.   web.config (application-level)

82: Which of the following can you use to create, configure, and manage volumes?


A.   Provision Storage Wizard

B.   Provision a Shared Folder Wizard

C.   Provision Volume Wizard

D.   None of the above

83: What is the maximum length of a username for either a domain or a local user account in Windows Server 2008?


A.   16 characters

B.   20 characters

C.   32 characters

D.   128 characters

84: In Windows Server 2016, how many VM virtual processors are supported?

A.   Up to 64 VPs per VM (3.75x).

B.   Up to 140 VPs per VM (3.75x).

C.   Up to 190 VPs per VM (3.75x).

D.   Up to 240 VPs per VM (3.75x).

85: Windows Server 2016 has a Cloud Ready Application Platform. One of its new features is: Nano Server Installation, which:

A.   is optimized for cloud infrastructure and is best suited for running microservices and applications in containers.

B.   is an isolated application environment (like kernels), which helps in running an application, without having any effect from application/configuration changes.

C.   creates a multi-machine Azure Service Fabric cluster in the datacenter or other public clouds.

D.   helps in creating modern web apps, microservices and libraries.

A.   DNS-based Authentication of Named Entities (DANE).

B.   Nano Server support for file-based DNS.

C.   Enhanced IP address management.

D.   Network Function Virtualization (NFV).

E.   Multiple Active Directory Forest support.

87: Which of the following statements is incorrect about Remote Credential Guard?

A.   It blocks NTLM authentications.

B.   It allows only Kerberos for authentication.

C.   It does not prevent usage of credentials after disconnection.

D.   It allows Single Sign-On connection to applications.

88:

Which of the following assurances is provided by Shielded VMs to encrypt disk data and provide protection to operating system's disk?


A.   BitLocker

B.   Trusted OS images

C.   RDP certificates

D.   Tenant control of VM

89: In the Active Directory of Windows Server 2016, which of the following options is a set of rules, which defines the classes, attributes and name format of objects present in a directory?

A.   The schema.

B.   A global catalog.

C.   A query and index mechanism.

D.   A replication service.

90: Which of the following BranchCache cmdlets configures BranchCache to operate in the hosted cache client mode?

A.   Get-BCClientConfiguration

B.   Enable-BCHostedClient

C.   Get-BCContentServerConfiguration

D.   Get-BCHostedCacheServerConfiguration

91:

In Windows Server 2016, W32tm.exe is used to configure Windows Time service settings. Which of the following W32tm.exe parameters will convert an NT system time, in (10^-7)s intervals from 0h 1-Jan 1601, into a readable format?


A.  

w32tm /ntpte

B.  

w32tm /ntte

C.  

w32tm /resync


D.  

w32tm /stripchart


92: Which of the following options is a public or private cloud administrator that can manage virtual machines but does not have access to shielded VMs?

A.   Guarded host

B.   Fabric administrator

C.   HGS administrator

D.   Virtualization-Based Security (VBS)

93: Which of the following Windows Server 2016 security features ensure that only permitted binaries are deployed on the server?

A.   Code Identity

B.   Control Flow Guard

C.   Credential Guard

D.   Shielded VMs

94: Which of the following VDI collection types are NOT supported by the Remote Desktop Services with Managed Pools and Managed Personal?

A.   Credential Guard

B.   Device Guard

C.   Remote Credential Guard

D.   Shielded & Encryption Supported VMs

95: Which of the following are correct features of software-defined compute stack for Windows Server 2016?

A.   It uses the Nano Server deployment option to minimize attack, increase availability and reduce resource usage.

B.   It uses Microsoft Hyper-V for running heaving workloads.

C.   It uses Desired State Configuration to safeguard administrative credentials against Pass-the-hash attacks.

D.   It uses Mixed-mode clusters upgrades for zero downtime for application/workload.

96: A fault domain is a set of hardware components that share a single point of failure. Which of the following Windows Server 2016 cmdlets is used to move one fault domain into another cluster?

A.   Get-ClusterFaultDomain

B.   Set-ClusterFaultDomain

C.   New-ClusterFaultDomain

D.   Remove-ClusterFaultDomain

97: Which of the following remote access techniques provides the functionality in which the users of a corporate office can safely and securely access an office application from outside the office network?

A.   Remote Desktop Services

B.   Remote Access

C.   Web Application Proxy

D.   Multipoint Services

98: Cluster-Aware Updating (CAU) is a feature in Windows Server 2016, which automates the software updating process on clustered servers while maintaining availability. It has two modes: self-updating mode and remote-updating mode. Which of the following option is/are correct?

A.   CAU clustered role is required to be installed in case of self-updating mode.

B.   CAU clustered role is required to be installed in case of remote-updating mode.

C.   Failover Clustering Tools are required to be installed on all cluster nodes in case of self-updating mode.

D.   Failover Clustering Tools are required to be installed on all remote-updating computers in case of remote-updating mode.

99: Which of the following Dynamic Access Control scenarios is used to deploy and manage authorization policies in an Active Directory?

A.   Central Access Policy.

B.   File Access Auditing.

C.   Access-Denied Assistance.

D.   Implement Retention of Information on File Servers.

100: In Windows Server 2016, the kernel-mode web driver (http.sys) receives and routes HTTP requests. In http.sys, which setting handles the maximum size of an entry in the kernel-mode cache and which setting handles the memory allocation to the kernel-mode cache?

A.   UriEnableCache handles the memory allocation.

B.   UriScavengerPeriod handles the maximum size of an entry.

C.   UriMaxUriBytes handles the maximum size of an entry.

D.   UriScavengerPeriod handles the maximum size of an entry.