SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The system partition contains what types of files?
64
packet filtering and end-to-end security.
Duplicate
hardware-related files that the computer uses to boot
2. NTFS quotas are able to do which of the following?
Diagnostics node
create event log entries
SPI field
full mesh
3. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
a built-in network monitor.
point-in-time
security settings associated with each template
NTLM Authentication
4. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
Windows NT
file server at each location
partitions and drives
health certificate
5. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
keeping track of print devices
power-cycling the unit
active partition
main mode negotiations
6. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
Kerberos v5 protocol
identity spoofing
planning and design
IPSec
7. The Authentication Header (AH) protocol does not provide _____________________
a built-in network monitor.
confidentiality and data encryption.
volume
Certificate Manager
8. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
Authentication exemption
Setup
Windows print architecture
cryptographic checksum
9. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
7:00 am and 12:00 pm
private key
local machine
64
10. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
power-cycling the unit
access the shadow copies
intermediate
proper permissions
11. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
Shadow Copies of Shared Folders
quick mode negotiations
namespace server
both A & B
12. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
NAP enforcement method
remediation server
file server at each location
DFS Replication
13. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
Printer > Use Printer Offline
online file settings
print router
main mode negotiations
14. Updates that can be deployed via WSUS can include all of the following except __________.
DHCP enforcement method
Printer > Pause Printing
additional user experience features
Printer > Use Printer Offline
15. In which node is Event Viewer located?
Diagnostics node
Duplicate
Key Addition Failures
publication schedules
16. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
Online Responder
quick mode negotiations
role service
Enroll ACL
17. To share printers - which Network Sharing and Discovery setting must be turned on?
System Statement of Health Response
7:00 am and 12:00 pm
Statement of Health
Printer Sharing
18. What is the default authentication protocol in an Active Directory network?
SPI field
Kerberos v5
Certificate Manager
Printer > Use Printer Offline
19. A maximum of how many shadow copies can be stored on a particular volume?
compliance - autoremediation
print router
64
manually install
20. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
Reliability and Performance Monitor
DVD
controlling download and installation behavior
performance console
21. Which of the following is not a node found in the Print Management console?
additional user experience features
sharing and security
4
point-in-time
22. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Enhanced Metafile (EMF)
Automatically
Enroll ACL
volume
23. Which field does the IPSec driver use to match the correct SA with the correct packet?
write
SPI field
more than 1 -000
digital certificate
24. The File Server Resource Manager console was first introduced in which product?
performance counters
Windows Server 2003 R2
cryptographic checksum
main mode negotiations
25. What type of backup is supported by Windows Server 2008?
digital certificate
Online Responder
manual
main mode negotiations
26. Which log should be the first place you look when you suspect a problem with Active Directory?
point-in-time
local machine
performance console
Directory Service
27. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Enhanced Metafile (EMF)
network traffic
Windows Server 2008
per user
28. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
access the shadow copies
volume
NTLM Authentication
hardware-related files that the computer uses to boot
29. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
support for Unix-based systems
server volume
System Monitor
IPSec
30. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Statement of Health
Installing a printer
Kerberos v5
print server
31. Where is the checksum located?
header of each packet
64
60 - 86 -400
netsh
32. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
DVD
cryptographic checksum
performance console
RAID-5
33. Do not use Tunnel mode when you require _________________
private key
NAP Agent
packet filtering and end-to-end security.
intermediate
34. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
IPSec
Statement of Health
online file settings
security settings associated with each template
35. What allows traffic that is defined in one direction to also be defined in the opposite direction?
namespace server
support for Unix-based systems
Directory Service
mirroring
36. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
volume
access the shadow copies
performance Monitor
power-cycling the unit
37. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Online Responder
Isolation
write
NTFS
38. Which digital document contains identifying information about a particular user - computer - service - and so on?
access particular servers
sharing and security
security settings associated with each template
digital certificate
39. Windows Server 2008 does not include ______________
role service
Printer > Use Printer Offline
Isolation
a built-in network monitor.
40. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
Kerberos v5
4
sharing and security
DFS Replication
41. Printing in Microsoft Windows typically involves all of the following components except a __________.
print router
8
local machine
administrative privileges
42. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Authentication exemption
Kerberos v5 protocol
File Server Resource Manager
Enroll ACL
43. How many possibilities of filter combinations exist in the Print Management Console?
System Statement of Health Response
more than 1 -000
spanned
virtual
44. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
Acquire Failures
power-cycling the unit
health certificate
virtual
45. Server management includes all of the following with the exception of __________.
Windows Server 2008
packet filtering and end-to-end security.
performance counters
controlling download and installation behavior
46. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
hard quota
full mesh
self-enrollment
Macintosh and Linux computers
47. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
number of file servers
Security Parameters Index (SPI)
workstations
older versions
48. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
Reliability and Performance Monitor
System Monitor
files/folders/volumes
49. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
file server at each location
network traffic
planning and design
create multiple print users
50. Shadow Copies of Shared Folders functionality is enabled at which level?
Authentication exemption
Acquire Failures
volume
enforcement point
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests