SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
Shadow Copies of Shared Folders
DHCP enforcement method
full mesh
cryptographic checksum
2. If you wish to perform backups from the command line - what will you need to install?
custom Data Collector Set
a built-in network monitor.
File Server Resource Manager
Windows PowerShell
3. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
Isolation
Automatically
Online Responder
file server at each location
4. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
Setup
a built-in network monitor.
Printer > Pause Printing
F10
5. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
share permissions
Printer > Use Printer Offline
namespace server
identity spoofing
6. The Authentication Header (AH) protocol does not provide _____________________
DVD
planning and design
hardware-related files that the computer uses to boot
confidentiality and data encryption.
7. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
sharing and security
System Monitor
DFS Replication
controlling download and installation behavior
8. Compared with NTFS permissions - printer permissions are __________.
header of each packet
Printer Sharing
simpler
netsh
9. Windows automatically makes a user the owner of all files that he or she creates on a _____
Installing a printer
server volume
additional user experience features
enterprise
10. A maximum of how many shadow copies can be stored on a particular volume?
health certificate
Setup
64
self-enrollment
11. You can create your own ______
Kerberos v5 protocol
custom Data Collector Set
share permissions
IPSec
12. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
Macintosh and Linux computers
netsh
Terminal Services Gateway (TS Gateway) enforcement
Directory Service
13. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
Windows Server 2003 R2
DHCP enforcement method
hardware-related files that the computer uses to boot
controlling download and installation behavior
14. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
security settings associated with each template
enterprise
planning and design
resource
15. Windows Server Backup supports the use of what type of media as backup destinations?
DVD
Kerberos v5 protocol
hardware-related files that the computer uses to boot
DHCP enforcement method
16. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
network traffic
hard quota
Key Addition Failures
Certificate Manager
17. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
DHCP enforcement method
Terminal Services Gateway (TS Gateway) enforcement
main mode negotiations
Enhanced Metafile (EMF)
18. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Authentication exemption
System Statement of Health Response
System Monitor
7:00 am and 12:00 pm
19. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
security settings associated with each template
support for Unix-based systems
proper permissions
full mesh
20. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Online Responder
private key
Shadow Copies of Shared Folders
digital certificate
21. By default - what topology do replication groups use?
64
support for Unix-based systems
network traffic
full mesh
22. The system partition contains what types of files?
hardware-related files that the computer uses to boot
create event log entries
Windows print architecture
300MB
23. Which digital document contains identifying information about a particular user - computer - service - and so on?
print router
Printer > Use Printer Offline
health certificate
digital certificate
24. What type of backup is supported by Windows Server 2008?
RAID-5
manual
Setup
performance Monitor
25. What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
Printer Sharing
proper permissions
identity spoofing
26. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
resource
partitions and drives
mutual authentication
Acquire Failures
27. NTFS quotas are limited to controlling storage on entire volumes on what basis?
per user
Automatically
File Server Resource Manager
Terminal Services Gateway (TS Gateway) enforcement
28. What allows traffic that is defined in one direction to also be defined in the opposite direction?
simpler
NTFS
mirroring
a built-in network monitor.
29. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
sharing and security
Key Addition Failures
intermediate
power-cycling the unit
30. Do not use Tunnel mode when you require _________________
Windows Server 2008
administrative privileges
Internet Printing role service
packet filtering and end-to-end security.
31. Depending on the configuration item that is being monitored for _____________ may not be possible.
Setup
power-cycling the unit
compliance - autoremediation
spanned
32. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
Reliability and Performance Monitor
Kerberos v5 protocol
Enhanced Metafile (EMF)
print server
33. In which node is Event Viewer located?
Diagnostics node
additional user experience features
DHCP enforcement method
file-based
34. To install the _____________ - you must also install the Web Server (IIS) role
Windows print architecture
Internet Printing role service
RAID-5
Online Responder
35. How can users restore previous versions of files on the selected volumes?
Diagnostics node
Duplicate
by right-clicking on the file and selecting Restore previous versions
share permissions
36. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
both A & B
file server at each location
volume
support for Unix-based systems
37. A period of _______________ is necessary before you start implementation of a file server deployment.
hard quota
planning and design
manual
Shadow Copies of Shared Folders
38. Which of the following is the default view of the Reliability and Performance Monitor?
custom Data Collector Set
Acquire Failures
performance console
resource
39. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
Printer > Pause Printing
local machine
online file settings
compliance - autoremediation
40. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
DVD
print server
300MB
virtual
41. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
manual
performance Monitor
Reliability Monitor
Windows Server 2008
42. Windows Server 2008 does not include ______________
publication schedules
a built-in network monitor.
virtual
Directory Service
43. Which of the following is not a category for the Windows operating system updates?
self-enrollment
role service
Isolation
Group Policy updates
44. What is the default authentication protocol in an Active Directory network?
Authentication exemption
Kerberos v5
cryptographic checksum
file server at each location
45. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
64
NAP enforcement method
additional user experience features
manual
46. NTFS quotas are able to do which of the following?
hard quota
create event log entries
DVD
Acquire Failures
47. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
System Monitor
file-sharing strategy
controlling download and installation behavior
both A & B
48. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
file-sharing strategy
Reliability Monitor
Disk Configuration MMC snap-in
49. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
DFS Replication
publication schedules
health certificate
7:00 am and 12:00 pm
50. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
Installing a printer
8
netsh
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests