SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
print router
intermediate
netsh
60 - 86 -400
2. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
publication schedules
Enhanced Metafile (EMF)
8
performance console
3. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
8
Volume Shadow Copies
Windows Server 2003 R2
Automatically
4. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Diagnostics node
spanned
Duplicate
Reliability Monitor
5. Which of the following is the default view of the Reliability and Performance Monitor?
File Server Resource Manager
number of file servers
RAID-5
resource
6. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
NTFS
more than 1 -000
Installing a printer
Terminal Services Gateway (TS Gateway) enforcement
7. You cannot mark an existing dynamic disk as an ____________.
active partition
Installing a printer
4
Key Addition Failures
8. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
mutual authentication
point-in-time
access particular servers
File Server Resource Manager
9. Which of the following is not a node found in the Print Management console?
sharing and security
1
quick mode negotiations
enforcement point
10. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
private key
NTLM Authentication
performance Monitor
Macintosh and Linux computers
11. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
intermediate
Authentication exemption
health certificate
Certificate Manager
12. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
local machine
File Server Resource Manager
number of file servers
files/folders/volumes
13. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
File Server Resource Manager
Installing a printer
Acquire Failures
14. You can create your own ______
Online Responder
Windows Server 2008
custom Data Collector Set
Printer Sharing
15. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Reliability and Performance Monitor
NTFS
Isolation
DVD
16. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
Certificate Manager
hardware-related files that the computer uses to boot
F10
file server at each location
17. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
Statement of Health
IPSec
manual
DHCP enforcement method
18. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
Printer > Use Printer Offline
namespace server
enforcement point
manual
19. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
mirroring
Online Responder
Statement of Health
Kerberos v5
20. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Authentication exemption
performance Monitor
server volume
online file settings
21. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
intermediate
Duplicate
files/folders/volumes
Windows Server 2008
22. If you wish to perform backups from the command line - what will you need to install?
mirroring
custom Data Collector Set
Windows PowerShell
SPI field
23. A single computer cannot perform all of the roles in the______________
Windows print architecture
Authentication exemption
enforcement point
partitions and drives
24. Which of the following is not an option with the Print Services Management Console?
NAP enforcement method
60 - 86 -400
SPI field
Installing a printer
25. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
file-sharing strategy
Duplicate
local machine
number of file servers
26. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
keeping track of print devices
number of file servers
support for Unix-based systems
27. By default - what topology do replication groups use?
4
full mesh
print server
access the shadow copies
28. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
quick mode negotiations
NTFS
per user
administrative privileges
29. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
create event log entries
Enhanced Metafile (EMF)
share permissions
point-in-time
30. NTFS quotas are limited to controlling storage on entire volumes on what basis?
a built-in network monitor.
Certificate Practice Statement
proper permissions
per user
31. The system partition contains what types of files?
Windows NT
Macintosh and Linux computers
hardware-related files that the computer uses to boot
publication schedules
32. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
intermediate
DFS Replication
support for Unix-based systems
resource
33. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
file-based
number of file servers
share permissions
remediation server
34. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
performance counters
IPSec
Isolation
35. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
write
Key Addition Failures
by right-clicking on the file and selecting Restore previous versions
share permissions
36. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
partitioning drives
file server at each location
Security Parameters Index (SPI)
mirroring
37. Print Server is the only ___________ that is required when you add the Print Services role
Directory Service
role service
controlling download and installation behavior
power-cycling the unit
38. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
Shadow Copies of Shared Folders
Setup
file-based
39. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
Kerberos v5 protocol
Duplicate
enforcement point
Reliability and Performance Monitor
40. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
compliance - autoremediation
mutual authentication
enforcement point
enterprise
41. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
administrative privileges
performance console
Shadow Copies of Shared Folders
self-enrollment
42. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
1
support for Unix-based systems
4
file-sharing strategy
43. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
both A & B
spanned
Duplicate
44. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
administrative privileges
file-sharing strategy
manual
45. Compared with NTFS permissions - printer permissions are __________.
administrative privileges
simpler
8
480
46. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
DHCP enforcement method
proper permissions
main mode negotiations
Setup
47. The Authentication Header (AH) protocol does not provide _____________________
confidentiality and data encryption.
Windows print architecture
sharing and security
packet filtering and end-to-end security.
48. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
security settings associated with each template
packet filtering and end-to-end security.
write
active partition
49. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
Authentication exemption
remediation server
power-cycling the unit
administrative privileges
50. Depending on the configuration item that is being monitored for _____________ may not be possible.
point-in-time
write
RAID-5
compliance - autoremediation