SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Windows Server 2008
Windows PowerShell
hardware-related files that the computer uses to boot
server volume
2. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
resource
DFS Replication
network traffic
Security Parameters Index (SPI)
3. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
F10
Isolation
publication schedules
packet filtering and end-to-end security.
4. How can users restore previous versions of files on the selected volumes?
Group Policy updates
64
by right-clicking on the file and selecting Restore previous versions
Disk Configuration MMC snap-in
5. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
300MB
file server at each location
confidentiality and data encryption.
packet filtering and end-to-end security.
6. Server management includes all of the following with the exception of __________.
controlling download and installation behavior
number of file servers
custom Data Collector Set
netsh
7. Which of the following is not a tool that can help you proactively troubleshoot network problems?
performance console
System Statement of Health Response
file-based
remediation server
8. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
support for Unix-based systems
performance console
partitions and drives
packet filtering and end-to-end security.
9. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
files/folders/volumes
workstations
access particular servers
Shadow Copies of Shared Folders
10. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
write
number of file servers
Statement of Health
Setup
11. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
enterprise
Printer > Use Printer Offline
Windows PowerShell
7:00 am and 12:00 pm
12. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
Printer Sharing
quick mode negotiations
Installing a printer
13. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
Online Responder
7:00 am and 12:00 pm
RAID-5
per user
14. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Automatically
Online Responder
print server
DFS Replication
15. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
file-based
Setup
RAID-5
self-enrollment
16. Which of the following is not a category for the Windows operating system updates?
Windows Server 2008
support for Unix-based systems
Group Policy updates
create multiple print users
17. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
print server
identity spoofing
security settings associated with each template
480
18. What is the default authentication protocol in an Active Directory network?
Kerberos v5
file server at each location
NTLM Authentication
8
19. Which field does the IPSec driver use to match the correct SA with the correct packet?
SPI field
a built-in network monitor.
NTFS
quick mode negotiations
20. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
header of each packet
DVD
Certificate Practice Statement
print router
21. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Installing a printer
Key Addition Failures
health certificate
Statement of Health
22. What are the IPSEC default settings for the key lifetime in minutes?
performance Monitor
Directory Service
Reliability Monitor
480
23. What feature allows users or computers to manually request a certificate based a template?
identity spoofing
Duplicate
Enroll ACL
online file settings
24. Print Server is the only ___________ that is required when you add the Print Services role
Automatically
role service
Reliability Monitor
namespace server
25. Shadow Copies of Shared Folders functionality is enabled at which level?
create event log entries
Directory Service
volume
Installing a printer
26. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Isolation
partitions and drives
manually install
60 - 86 -400
27. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
sharing and security
both A & B
480
Volume Shadow Copies
28. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
partitioning drives
spanned
additional user experience features
300MB
29. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Diagnostics node
7:00 am and 12:00 pm
NAP enforcement method
intermediate
30. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
resource
health certificate
files/folders/volumes
Macintosh and Linux computers
31. The File Server Resource Manager console was first introduced in which product?
Windows Server 2003 R2
both A & B
confidentiality and data encryption.
NAP enforcement method
32. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
packet filtering and end-to-end security.
controlling download and installation behavior
workstations
Reliability Monitor
33. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
by right-clicking on the file and selecting Restore previous versions
active partition
write
partitions and drives
34. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
compliance - autoremediation
Statement of Health
netsh
quick mode negotiations
35. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
manually install
Directory Service
Volume Shadow Copies
36. Do not use Tunnel mode when you require _________________
digital certificate
Windows Server 2008
Printer > Use Printer Offline
packet filtering and end-to-end security.
37. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
access particular servers
cryptographic checksum
Enhanced Metafile (EMF)
private key
38. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Disk Configuration MMC snap-in
Automatically
partitioning drives
F10
39. What does the Windows Server Backup feature use to perform file and volume-level backups?
custom Data Collector Set
Disk Configuration MMC snap-in
network traffic
Volume Shadow Copies
40. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
Printer > Use Printer Offline
Windows Server 2008
file-based
Setup
41. By default - what topology do replication groups use?
NTFS
F10
print server
full mesh
42. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
digital certificate
Disk Configuration MMC snap-in
by right-clicking on the file and selecting Restore previous versions
File Server Resource Manager
43. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
64
print server
Online Responder
64
44. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
300MB
power-cycling the unit
Macintosh and Linux computers
1
45. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
performance Monitor
64
mirroring
hard quota
46. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
performance counters
Windows Server 2003 R2
planning and design
47. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
RAID-5
Certificate Manager
IPSec
both A & B
48. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
Security Parameters Index (SPI)
file-based
64
enforcement point
49. The system partition contains what types of files?
confidentiality and data encryption.
Printer > Use Printer Offline
Group Policy updates
hardware-related files that the computer uses to boot
50. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
Setup
mutual authentication
Reliability Monitor
older versions