SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A period of _______________ is necessary before you start implementation of a file server deployment.
manually install
planning and design
Enhanced Metafile (EMF)
Kerberos v5 protocol
2. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
NTFS
enterprise
Kerberos v5 protocol
Volume Shadow Copies
3. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
full mesh
NAP enforcement method
NTLM Authentication
header of each packet
4. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
DVD
number of file servers
publication schedules
private key
5. Which digital document contains identifying information about a particular user - computer - service - and so on?
4
digital certificate
Duplicate
NAP enforcement method
6. Where is the checksum located?
point-in-time
Authentication exemption
create multiple print users
header of each packet
7. If you wish to perform backups from the command line - what will you need to install?
manually install
Disk Configuration MMC snap-in
proper permissions
Windows PowerShell
8. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Windows PowerShell
partitioning drives
print router
performance Monitor
9. Which feature enables users to request their own PKI certificates - typically through a Web browser?
custom Data Collector Set
performance Monitor
older versions
self-enrollment
10. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
namespace server
hardware-related files that the computer uses to boot
performance Monitor
Duplicate
11. In which view can you view the counters associated with Data Collector Sets?
Enroll ACL
performance Monitor
4
manual
12. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
network traffic
hard quota
create multiple print users
custom Data Collector Set
13. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Printer Sharing
performance console
sharing and security
4
14. To set printer priorities - you must do all of the following except __________.
print server
create multiple print users
Security Parameters Index (SPI)
both A & B
15. The system partition contains what types of files?
hardware-related files that the computer uses to boot
header of each packet
namespace server
support for Unix-based systems
16. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
number of file servers
performance console
Printer > Use Printer Offline
NTLM Authentication
17. The NPS service combines each Statement of Health Response into what?
performance console
by right-clicking on the file and selecting Restore previous versions
System Statement of Health Response
power-cycling the unit
18. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
publication schedules
main mode negotiations
digital certificate
Authentication exemption
19. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
Windows NT
virtual
enforcement point
7:00 am and 12:00 pm
20. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
spanned
both A & B
Online Responder
Volume Shadow Copies
21. Windows Server Backup supports the use of what type of media as backup destinations?
publication schedules
DVD
intermediate
DFS Replication
22. NTFS quotas are limited to controlling storage on entire volumes on what basis?
security settings associated with each template
System Monitor
per user
mutual authentication
23. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
digital certificate
Authentication exemption
performance console
Windows print architecture
24. How many active partitions can you have per hard drive?
Windows NT
active partition
1
role service
25. What is the default authentication protocol in an Active Directory network?
Installing a printer
Kerberos v5
resource
packet filtering and end-to-end security.
26. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
planning and design
NAP Agent
file server at each location
Disk Configuration MMC snap-in
27. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
hard quota
Statement of Health
performance Monitor
remediation server
28. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
NTFS
both A & B
private key
Printer > Use Printer Offline
29. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
Windows print architecture
administrative privileges
4
power-cycling the unit
30. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
resource
File Server Resource Manager
enforcement point
Online Responder
31. Which of the following is the default view of the Reliability and Performance Monitor?
manually install
NAP enforcement method
resource
Enroll ACL
32. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
7:00 am and 12:00 pm
partitioning drives
network traffic
partitions and drives
33. Which field does the IPSec driver use to match the correct SA with the correct packet?
Isolation
volume
SPI field
main mode negotiations
34. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
partitioning drives
administrative privileges
namespace server
Disk Configuration MMC snap-in
35. Which of the following are the specific processes or events that you want to track?
identity spoofing
role service
performance counters
administrative privileges
36. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
Diagnostics node
create event log entries
print server
Directory Service
37. You can create your own ______
Enhanced Metafile (EMF)
manually install
custom Data Collector Set
Duplicate
38. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
NTFS
Reliability Monitor
access particular servers
support for Unix-based systems
39. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
workstations
share permissions
Terminal Services Gateway (TS Gateway) enforcement
older versions
40. How many possibilities of filter combinations exist in the Print Management Console?
300MB
network traffic
digital certificate
more than 1 -000
41. Compared with NTFS permissions - printer permissions are __________.
private key
simpler
Setup
Shadow Copies of Shared Folders
42. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
digital certificate
Volume Shadow Copies
remediation server
access particular servers
43. Just as with folder shares - what must clients have to access a shared printer?
mirroring
proper permissions
performance console
simpler
44. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
Reliability and Performance Monitor
online file settings
Windows PowerShell
access particular servers
45. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Kerberos v5 protocol
by right-clicking on the file and selecting Restore previous versions
Online Responder
Printer > Pause Printing
46. A single computer cannot perform all of the roles in the______________
Acquire Failures
controlling download and installation behavior
header of each packet
Windows print architecture
47. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
System Statement of Health Response
Certificate Practice Statement
mutual authentication
server volume
48. What is the minimum amount of space you must allocate to store shadow copies?
Enroll ACL
300MB
8
Internet Printing role service
49. In which node is Event Viewer located?
Diagnostics node
compliance - autoremediation
Macintosh and Linux computers
proper permissions
50. Do not use Tunnel mode when you require _________________
hard quota
packet filtering and end-to-end security.
Diagnostics node
NTFS