SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the default authentication protocol in an Active Directory network?
Kerberos v5 protocol
write
Kerberos v5
F10
2. The system partition contains what types of files?
remediation server
hardware-related files that the computer uses to boot
network traffic
compliance - autoremediation
3. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
Windows PowerShell
8
share permissions
full mesh
4. Updates that can be deployed via WSUS can include all of the following except __________.
DHCP enforcement method
mirroring
NTFS
additional user experience features
5. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
Printer Sharing
Kerberos v5
virtual
main mode negotiations
6. Do not use Tunnel mode when you require _________________
create multiple print users
packet filtering and end-to-end security.
manually install
Printer > Pause Printing
7. If you wish to perform backups from the command line - what will you need to install?
compliance - autoremediation
7:00 am and 12:00 pm
file server at each location
Windows PowerShell
8. You cannot mark an existing dynamic disk as an ____________.
full mesh
performance Monitor
System Statement of Health Response
active partition
9. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
Setup
virtual
Automatically
administrative privileges
10. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
create event log entries
network traffic
self-enrollment
Printer > Use Printer Offline
11. Which of the following is not a node found in the Print Management console?
Statement of Health
virtual
sharing and security
proper permissions
12. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Shadow Copies of Shared Folders
full mesh
Installing a printer
Windows Server 2008
13. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
spanned
Diagnostics node
access particular servers
NAP enforcement method
14. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
Macintosh and Linux computers
access the shadow copies
Automatically
hard quota
15. What is one of the major problems for printing administrators on large enterprise networks?
print router
keeping track of print devices
NTFS
more than 1 -000
16. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
a built-in network monitor.
netsh
create event log entries
Volume Shadow Copies
17. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
file-sharing strategy
point-in-time
access the shadow copies
power-cycling the unit
18. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
mutual authentication
hard quota
netsh
Windows print architecture
19. Compared with NTFS permissions - printer permissions are __________.
administrative privileges
simpler
custom Data Collector Set
64
20. A single computer cannot perform all of the roles in the______________
Reliability and Performance Monitor
Windows print architecture
64
Certificate Manager
21. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
workstations
manually install
Reliability Monitor
Windows Server 2003 R2
22. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
System Monitor
Certificate Practice Statement
number of file servers
300MB
23. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
number of file servers
Disk Configuration MMC snap-in
proper permissions
Isolation
24. In which view can you view the counters associated with Data Collector Sets?
Automatically
a built-in network monitor.
performance Monitor
Isolation
25. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
Reliability Monitor
Enroll ACL
files/folders/volumes
virtual
26. Which of the following is not an option with the Print Services Management Console?
Installing a printer
performance counters
manually install
virtual
27. What feature allows users or computers to manually request a certificate based a template?
60 - 86 -400
Enroll ACL
Isolation
online file settings
28. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Isolation
partitions and drives
Enhanced Metafile (EMF)
Certificate Manager
29. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Duplicate
DHCP enforcement method
hard quota
Online Responder
30. A period of _______________ is necessary before you start implementation of a file server deployment.
NTFS
role service
planning and design
namespace server
31. You can create your own ______
300MB
1
custom Data Collector Set
point-in-time
32. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
files/folders/volumes
write
Disk Configuration MMC snap-in
33. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
print server
Acquire Failures
4
7:00 am and 12:00 pm
34. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
Internet Printing role service
mirroring
write
proper permissions
35. Windows Server Backup supports the use of what type of media as backup destinations?
netsh
create event log entries
DVD
server volume
36. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
Kerberos v5
spanned
Key Addition Failures
NAP enforcement method
37. Server management includes all of the following with the exception of __________.
intermediate
controlling download and installation behavior
480
partitions and drives
38. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
intermediate
Automatically
Enroll ACL
39. Which of the following is not a category for the Windows operating system updates?
Group Policy updates
controlling download and installation behavior
Duplicate
enforcement point
40. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Printer > Use Printer Offline
administrative privileges
netsh
Reliability Monitor
41. By default - the Print Management console displays only which of the following in its list of print servers?
Acquire Failures
IPSec
Kerberos v5
local machine
42. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
Key Addition Failures
manual
workstations
identity spoofing
43. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
4
workstations
proper permissions
Isolation
44. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
Acquire Failures
planning and design
print server
both A & B
45. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
additional user experience features
confidentiality and data encryption.
remediation server
8
46. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
60 - 86 -400
8
IPSec
Enhanced Metafile (EMF)
47. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
planning and design
Online Responder
Kerberos v5
performance Monitor
48. To share printers - which Network Sharing and Discovery setting must be turned on?
point-in-time
Windows PowerShell
Printer Sharing
DHCP enforcement method
49. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
virtual
Reliability and Performance Monitor
a built-in network monitor.
print server
50. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
access the shadow copies
header of each packet
File Server Resource Manager
quick mode negotiations