Shortcut Navigation:

Server Administrator Quiz

You have IIS running on your Windows 2000 server. Recently the web site is responding slowly. What tool do you use to monitor the performance of IIS?

What interface in Windows 2000 can you use for creating local shares?

Proxy Server is ideal for creating which of the following network elements/components?

John Doe wants to make IPX/SPX and TCP/IP the two protocols used on his computer but is not sure whether he can do that on one nic card or if he needs a second one. How many protocols can you bind to a single nic card?

You are the administrator of a large E-commerce site. Lately there have been a number of complaints about error pages popping up due to pages being deleted but the links not removed. What would be the best way to make the site more user friendly.

Which Unix command will give the contents of the root directory?

Host based IDS works by scanning:

What is a security tradeoff when you utilize an intrusion detection system?

You are trying to contact a host in a different department of your company but can't seem to get through.You have no problem communicating with others on your subnet but cannot even ping any remote hosts. Other hosts on your subnet can reach remote hosts.

DNS and WINS are often being considered as the:

If you saw the output in the example below, what tool would you be using?

Which of the following is the graphical interface for managing a Netware 5 server from your windows client?

The security log of your Windows 2000 server is best to be used for which of the following purposes?

Which port is the NetBIOS User Datagram Protocol (UDP) port?

SSL can be viewed as its own layer between what two layers of the four layer IP stack?

Windows NT provides two group types. How would you place these groups in order to provide access to resources?

What is the default NTFS setting for shares on an NT system?

On a Windows NT system, where would you go to manage shares to work with other computers?

What is the first thing to do when implementing a security policy?