SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
Reliability and Performance Monitor
F10
spanned
NTFS
2. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
access the shadow copies
Windows print architecture
60 - 86 -400
volume
3. Windows automatically makes a user the owner of all files that he or she creates on a _____
main mode negotiations
point-in-time
server volume
DHCP enforcement method
4. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
Key Addition Failures
virtual
Certificate Manager
5. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
proper permissions
network traffic
simpler
DHCP enforcement method
6. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
mutual authentication
480
security settings associated with each template
create multiple print users
7. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
Setup
netsh
network traffic
cryptographic checksum
8. Which of the following is the default view of the Reliability and Performance Monitor?
performance counters
System Statement of Health Response
point-in-time
resource
9. You can create your own ______
1
custom Data Collector Set
publication schedules
mutual authentication
10. How many possibilities of filter combinations exist in the Print Management Console?
private key
300MB
intermediate
more than 1 -000
11. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
full mesh
Automatically
Kerberos v5 protocol
access the shadow copies
12. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Windows Server 2008
enterprise
Reliability Monitor
Duplicate
13. Compared with NTFS permissions - printer permissions are __________.
print server
simpler
create event log entries
online file settings
14. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
Isolation
F10
netsh
number of file servers
15. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
8
file server at each location
virtual
confidentiality and data encryption.
16. Windows Server 2008 does not include ______________
local machine
SPI field
a built-in network monitor.
point-in-time
17. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
File Server Resource Manager
number of file servers
write
active partition
18. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
point-in-time
Kerberos v5 protocol
NTLM Authentication
custom Data Collector Set
19. To set printer priorities - you must do all of the following except __________.
access particular servers
create multiple print users
by right-clicking on the file and selecting Restore previous versions
namespace server
20. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
64
performance Monitor
access particular servers
power-cycling the unit
21. Which of the following is not an option with the Print Services Management Console?
Online Responder
Installing a printer
remediation server
Reliability Monitor
22. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
Windows PowerShell
quick mode negotiations
workstations
23. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
planning and design
Isolation
manually install
access particular servers
24. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
F10
local machine
administrative privileges
64
25. Which of the following is not a tool that can help you proactively troubleshoot network problems?
Enroll ACL
performance console
namespace server
netsh
26. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
online file settings
power-cycling the unit
both A & B
Certificate Manager
27. The system partition contains what types of files?
Terminal Services Gateway (TS Gateway) enforcement
Volume Shadow Copies
hardware-related files that the computer uses to boot
packet filtering and end-to-end security.
28. Just as with folder shares - what must clients have to access a shared printer?
Windows Server 2003 R2
packet filtering and end-to-end security.
proper permissions
Acquire Failures
29. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
resource
Automatically
Kerberos v5 protocol
network traffic
30. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
both A & B
Enhanced Metafile (EMF)
enforcement point
planning and design
31. Shadow Copies of Shared Folders functionality is enabled at which level?
SPI field
volume
performance counters
print router
32. By default - what topology do replication groups use?
workstations
cryptographic checksum
file-based
full mesh
33. What does the Windows Server Backup feature use to perform file and volume-level backups?
NTLM Authentication
compliance - autoremediation
Volume Shadow Copies
file-sharing strategy
34. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
cryptographic checksum
Authentication exemption
DFS Replication
Key Addition Failures
35. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
intermediate
Directory Service
Diagnostics node
namespace server
36. Where is the checksum located?
point-in-time
planning and design
administrative privileges
header of each packet
37. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
Printer > Use Printer Offline
proper permissions
Windows Server 2003 R2
38. Updates that can be deployed via WSUS can include all of the following except __________.
Printer > Pause Printing
300MB
Certificate Practice Statement
additional user experience features
39. A maximum of how many shadow copies can be stored on a particular volume?
RAID-5
mutual authentication
64
Certificate Manager
40. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
manual
network traffic
partitioning drives
480
41. How can users restore previous versions of files on the selected volumes?
Statement of Health
Printer > Pause Printing
Isolation
by right-clicking on the file and selecting Restore previous versions
42. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
digital certificate
Security Parameters Index (SPI)
quick mode negotiations
300MB
43. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
write
4
mirroring
DFS Replication
44. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
manually install
Group Policy updates
volume
main mode negotiations
45. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NTLM Authentication
enforcement point
more than 1 -000
NAP Agent
46. Print Server is the only ___________ that is required when you add the Print Services role
4
virtual
role service
System Monitor
47. IKE main mode has a default lifetime of __________ hours.
8
Group Policy updates
Windows Server 2008
network traffic
48. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
file-sharing strategy
main mode negotiations
keeping track of print devices
Automatically
49. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
network traffic
local machine
create event log entries
access particular servers
50. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
files/folders/volumes
Enhanced Metafile (EMF)
network traffic
NTFS
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests