SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
server volume
self-enrollment
300MB
2. To share printers - which Network Sharing and Discovery setting must be turned on?
Online Responder
main mode negotiations
Printer Sharing
Shadow Copies of Shared Folders
3. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
both A & B
NAP enforcement method
Shadow Copies of Shared Folders
System Statement of Health Response
4. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
print router
compliance - autoremediation
Statement of Health
main mode negotiations
5. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
Online Responder
by right-clicking on the file and selecting Restore previous versions
8
power-cycling the unit
6. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
controlling download and installation behavior
files/folders/volumes
older versions
namespace server
7. Which of the following is not an option with the Print Services Management Console?
300MB
Reliability Monitor
Installing a printer
Key Addition Failures
8. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Certificate Practice Statement
file-based
480
Online Responder
9. What is the minimum amount of space you must allocate to store shadow copies?
300MB
NTLM Authentication
Internet Printing role service
Windows Server 2008
10. What feature allows users or computers to manually request a certificate based a template?
System Statement of Health Response
Windows Server 2008
Enroll ACL
role service
11. Windows Server 2008 does not include ______________
a built-in network monitor.
Windows PowerShell
Enroll ACL
Directory Service
12. A single computer cannot perform all of the roles in the______________
controlling download and installation behavior
Statement of Health
Windows print architecture
64
13. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
keeping track of print devices
per user
Printer > Use Printer Offline
14. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
Isolation
Authentication exemption
Enhanced Metafile (EMF)
7:00 am and 12:00 pm
15. How many active partitions can you have per hard drive?
60 - 86 -400
NAP Agent
point-in-time
1
16. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
Macintosh and Linux computers
number of file servers
identity spoofing
active partition
17. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
private key
compliance - autoremediation
keeping track of print devices
access the shadow copies
18. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
controlling download and installation behavior
Setup
file server at each location
write
19. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
resource
security settings associated with each template
SPI field
Security Parameters Index (SPI)
20. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
quick mode negotiations
7:00 am and 12:00 pm
NAP Agent
manual
21. Windows automatically makes a user the owner of all files that he or she creates on a _____
Shadow Copies of Shared Folders
server volume
Statement of Health
role service
22. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
Acquire Failures
file-sharing strategy
confidentiality and data encryption.
7:00 am and 12:00 pm
23. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
performance Monitor
DHCP enforcement method
online file settings
24. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
NTLM Authentication
per user
virtual
IPSec
25. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
administrative privileges
proper permissions
mutual authentication
Certificate Practice Statement
26. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
local machine
write
packet filtering and end-to-end security.
quick mode negotiations
27. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Online Responder
Certificate Manager
Internet Printing role service
self-enrollment
28. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
spanned
enforcement point
Acquire Failures
Windows Server 2003 R2
29. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
Printer > Use Printer Offline
performance counters
manually install
30. By default - the Print Management console displays only which of the following in its list of print servers?
packet filtering and end-to-end security.
simpler
Key Addition Failures
local machine
31. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
IPSec
manually install
Certificate Manager
by right-clicking on the file and selecting Restore previous versions
32. Just as with folder shares - what must clients have to access a shared printer?
Internet Printing role service
a built-in network monitor.
workstations
proper permissions
33. The Authentication Header (AH) protocol does not provide _____________________
create multiple print users
workstations
confidentiality and data encryption.
per user
34. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
enforcement point
mirroring
Reliability and Performance Monitor
namespace server
35. The system partition contains what types of files?
power-cycling the unit
hardware-related files that the computer uses to boot
Internet Printing role service
access the shadow copies
36. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
manually install
Disk Configuration MMC snap-in
mutual authentication
Terminal Services Gateway (TS Gateway) enforcement
37. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
compliance - autoremediation
Kerberos v5 protocol
virtual
mutual authentication
38. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
Online Responder
digital certificate
compliance - autoremediation
39. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
480
Acquire Failures
mutual authentication
access particular servers
40. What is the default authentication protocol in an Active Directory network?
Kerberos v5
NTFS
Authentication exemption
file-sharing strategy
41. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
Printer Sharing
System Monitor
support for Unix-based systems
controlling download and installation behavior
42. Printing in Microsoft Windows typically involves all of the following components except a __________.
Windows Server 2008
Duplicate
print router
Windows NT
43. Which digital document contains identifying information about a particular user - computer - service - and so on?
create event log entries
Reliability Monitor
digital certificate
keeping track of print devices
44. The File Server Resource Manager console was first introduced in which product?
point-in-time
simpler
Windows Server 2003 R2
Installing a printer
45. By default - what topology do replication groups use?
Duplicate
full mesh
Online Responder
confidentiality and data encryption.
46. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
server volume
SPI field
Windows Server 2003 R2
Automatically
47. A maximum of how many shadow copies can be stored on a particular volume?
Printer Sharing
64
DFS Replication
Windows NT
48. NTFS quotas are able to do which of the following?
Internet Printing role service
compliance - autoremediation
access the shadow copies
create event log entries
49. IKE main mode has a default lifetime of __________ hours.
Duplicate
Reliability and Performance Monitor
Diagnostics node
8
50. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
workstations
file-sharing strategy
print server
File Server Resource Manager