SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Windows Server 2008
controlling download and installation behavior
header of each packet
Security Parameters Index (SPI)
2. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
digital certificate
enterprise
spanned
IPSec
3. Which digital document contains identifying information about a particular user - computer - service - and so on?
8
private key
digital certificate
write
4. The File Server Resource Manager console was first introduced in which product?
Kerberos v5
security settings associated with each template
Internet Printing role service
Windows Server 2003 R2
5. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
workstations
Shadow Copies of Shared Folders
Installing a printer
intermediate
6. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
private key
Windows print architecture
publication schedules
DVD
7. Depending on the configuration item that is being monitored for _____________ may not be possible.
compliance - autoremediation
print router
Reliability and Performance Monitor
local machine
8. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
create event log entries
performance console
NTLM Authentication
Volume Shadow Copies
9. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Isolation
DVD
print router
by right-clicking on the file and selecting Restore previous versions
10. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Setup
Online Responder
Reliability and Performance Monitor
Printer > Pause Printing
11. By default - what topology do replication groups use?
access the shadow copies
full mesh
partitioning drives
Windows NT
12. How can users restore previous versions of files on the selected volumes?
identity spoofing
Windows PowerShell
by right-clicking on the file and selecting Restore previous versions
NAP enforcement method
13. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
power-cycling the unit
intermediate
create multiple print users
namespace server
14. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
manual
480
point-in-time
System Statement of Health Response
15. Which of the following is the default view of the Reliability and Performance Monitor?
7:00 am and 12:00 pm
resource
60 - 86 -400
simpler
16. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Windows NT
Authentication exemption
mutual authentication
print router
17. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
administrative privileges
proper permissions
planning and design
print server
18. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
network traffic
keeping track of print devices
workstations
Automatically
19. In which view can you view the counters associated with Data Collector Sets?
self-enrollment
Key Addition Failures
cryptographic checksum
performance Monitor
20. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
manually install
Group Policy updates
1
21. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
Macintosh and Linux computers
planning and design
DHCP enforcement method
access the shadow copies
22. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
Online Responder
RAID-5
Internet Printing role service
7:00 am and 12:00 pm
23. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
Isolation
F10
access the shadow copies
File Server Resource Manager
24. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
DFS Replication
System Monitor
64
IPSec
25. Which log should be the first place you look when you suspect a problem with Active Directory?
Directory Service
quick mode negotiations
digital certificate
remediation server
26. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
Directory Service
digital certificate
server volume
share permissions
27. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
RAID-5
per user
security settings associated with each template
28. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
share permissions
files/folders/volumes
Online Responder
Printer > Use Printer Offline
29. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
compliance - autoremediation
DHCP enforcement method
Disk Configuration MMC snap-in
performance console
30. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
online file settings
namespace server
Setup
Kerberos v5
31. Which feature enables users to request their own PKI certificates - typically through a Web browser?
Reliability and Performance Monitor
self-enrollment
Statement of Health
write
32. You can create your own ______
planning and design
administrative privileges
custom Data Collector Set
DHCP enforcement method
33. A maximum of how many shadow copies can be stored on a particular volume?
64
access particular servers
NAP enforcement method
RAID-5
34. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
both A & B
identity spoofing
namespace server
volume
35. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
controlling download and installation behavior
partitions and drives
administrative privileges
Printer > Pause Printing
36. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
namespace server
Automatically
virtual
packet filtering and end-to-end security.
37. To set printer priorities - you must do all of the following except __________.
create multiple print users
print router
performance Monitor
quick mode negotiations
38. A single computer cannot perform all of the roles in the______________
Internet Printing role service
Windows print architecture
older versions
quick mode negotiations
39. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Statement of Health
Automatically
performance Monitor
access the shadow copies
40. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
partitions and drives
64
main mode negotiations
4
41. What is one of the major problems for printing administrators on large enterprise networks?
NAP enforcement method
partitioning drives
SPI field
keeping track of print devices
42. Which of the following is not a node found in the Print Management console?
remediation server
sharing and security
7:00 am and 12:00 pm
share permissions
43. You cannot mark an existing dynamic disk as an ____________.
300MB
active partition
Acquire Failures
NAP Agent
44. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
File Server Resource Manager
Diagnostics node
7:00 am and 12:00 pm
Enroll ACL
45. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
security settings associated with each template
Acquire Failures
digital certificate
46. By default - the Print Management console displays only which of the following in its list of print servers?
Reliability Monitor
Online Responder
local machine
full mesh
47. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
NAP enforcement method
DVD
both A & B
partitioning drives
48. NTFS quotas are able to do which of the following?
write
both A & B
create event log entries
performance Monitor
49. NTFS quotas are limited to controlling storage on entire volumes on what basis?
Enroll ACL
per user
Online Responder
Statement of Health
50. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
administrative privileges
publication schedules
Reliability and Performance Monitor
identity spoofing