SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
netsh
Authentication exemption
main mode negotiations
7:00 am and 12:00 pm
2. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
proper permissions
hard quota
workstations
Kerberos v5 protocol
3. What allows traffic that is defined in one direction to also be defined in the opposite direction?
Online Responder
mirroring
Isolation
network traffic
4. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
Macintosh and Linux computers
System Statement of Health Response
Internet Printing role service
5. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
Automatically
file-based
enterprise
IPSec
6. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
access particular servers
server volume
Printer > Pause Printing
file-sharing strategy
7. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
full mesh
digital certificate
self-enrollment
8. If you wish to perform backups from the command line - what will you need to install?
NTLM Authentication
role service
manually install
Windows PowerShell
9. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
resource
access particular servers
both A & B
10. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
System Monitor
access the shadow copies
64
by right-clicking on the file and selecting Restore previous versions
11. What is one of the major problems for printing administrators on large enterprise networks?
more than 1 -000
custom Data Collector Set
security settings associated with each template
keeping track of print devices
12. By default - the Print Management console displays only which of the following in its list of print servers?
compliance - autoremediation
simpler
local machine
mirroring
13. What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
NAP Agent
compliance - autoremediation
virtual
14. You cannot mark an existing dynamic disk as an ____________.
volume
Acquire Failures
active partition
quick mode negotiations
15. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Reliability and Performance Monitor
publication schedules
netsh
access particular servers
16. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
volume
Macintosh and Linux computers
Shadow Copies of Shared Folders
Terminal Services Gateway (TS Gateway) enforcement
17. A single computer cannot perform all of the roles in the______________
support for Unix-based systems
Windows print architecture
sharing and security
Group Policy updates
18. A period of _______________ is necessary before you start implementation of a file server deployment.
intermediate
security settings associated with each template
Security Parameters Index (SPI)
planning and design
19. Which log should be the first place you look when you suspect a problem with Active Directory?
Directory Service
performance counters
System Statement of Health Response
create multiple print users
20. What type of backup is supported by Windows Server 2008?
additional user experience features
planning and design
manual
IPSec
21. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
security settings associated with each template
print server
controlling download and installation behavior
digital certificate
22. In which node is Event Viewer located?
simpler
Diagnostics node
Volume Shadow Copies
access particular servers
23. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
quick mode negotiations
Reliability and Performance Monitor
hard quota
24. How many possibilities of filter combinations exist in the Print Management Console?
power-cycling the unit
compliance - autoremediation
F10
more than 1 -000
25. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Shadow Copies of Shared Folders
spanned
F10
Windows Server 2008
26. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
NAP enforcement method
custom Data Collector Set
RAID-5
virtual
27. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
Windows PowerShell
Enhanced Metafile (EMF)
partitions and drives
7:00 am and 12:00 pm
28. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
planning and design
DFS Replication
8
point-in-time
29. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
simpler
a built-in network monitor.
compliance - autoremediation
online file settings
30. Which of the following is not a tool that can help you proactively troubleshoot network problems?
create multiple print users
local machine
Security Parameters Index (SPI)
performance console
31. By default - what topology do replication groups use?
a built-in network monitor.
full mesh
number of file servers
NAP enforcement method
32. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
netsh
Printer > Pause Printing
Acquire Failures
33. Server management includes all of the following with the exception of __________.
print server
controlling download and installation behavior
file-sharing strategy
Certificate Manager
34. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Reliability Monitor
by right-clicking on the file and selecting Restore previous versions
local machine
per user
35. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
print server
access particular servers
network traffic
partitions and drives
36. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
file server at each location
per user
performance Monitor
performance console
37. Updates that can be deployed via WSUS can include all of the following except __________.
intermediate
active partition
additional user experience features
Shadow Copies of Shared Folders
38. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
DVD
Printer > Use Printer Offline
partitions and drives
performance counters
39. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
volume
Key Addition Failures
Online Responder
NAP enforcement method
40. How many active partitions can you have per hard drive?
1
namespace server
more than 1 -000
workstations
41. Which of the following is not a node found in the Print Management console?
both A & B
8
performance console
sharing and security
42. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
File Server Resource Manager
publication schedules
Online Responder
43. IKE main mode has a default lifetime of __________ hours.
cryptographic checksum
enforcement point
Kerberos v5 protocol
8
44. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
active partition
Enroll ACL
file-based
SPI field
45. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
main mode negotiations
Windows Server 2008
network traffic
46. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
hard quota
private key
Reliability and Performance Monitor
namespace server
47. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
both A & B
mirroring
intermediate
more than 1 -000
48. What are the IPSEC default settings for the key lifetime in minutes?
8
file-based
NTFS
480
49. A maximum of how many shadow copies can be stored on a particular volume?
print router
more than 1 -000
packet filtering and end-to-end security.
64
50. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
sharing and security
digital certificate
both A & B
namespace server