SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
IPSec
Shadow Copies of Shared Folders
performance console
mirroring
2. To set printer priorities - you must do all of the following except __________.
Certificate Manager
controlling download and installation behavior
create multiple print users
Duplicate
3. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
Windows Server 2003 R2
System Statement of Health Response
partitions and drives
Disk Configuration MMC snap-in
4. To share printers - which Network Sharing and Discovery setting must be turned on?
Certificate Practice Statement
Reliability Monitor
hard quota
Printer Sharing
5. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
files/folders/volumes
enforcement point
Kerberos v5 protocol
Disk Configuration MMC snap-in
6. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
create multiple print users
Enhanced Metafile (EMF)
Windows Server 2008
NAP Agent
7. Which feature enables users to request their own PKI certificates - typically through a Web browser?
300MB
file-sharing strategy
digital certificate
self-enrollment
8. Windows automatically makes a user the owner of all files that he or she creates on a _____
network traffic
Duplicate
server volume
8
9. The system partition contains what types of files?
identity spoofing
Macintosh and Linux computers
Volume Shadow Copies
hardware-related files that the computer uses to boot
10. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Online Responder
File Server Resource Manager
quick mode negotiations
Certificate Manager
11. Do not use Tunnel mode when you require _________________
print router
Duplicate
IPSec
packet filtering and end-to-end security.
12. Which field does the IPSec driver use to match the correct SA with the correct packet?
Terminal Services Gateway (TS Gateway) enforcement
SPI field
file server at each location
header of each packet
13. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
cryptographic checksum
Statement of Health
File Server Resource Manager
64
14. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
300MB
access the shadow copies
Internet Printing role service
64
15. A maximum of how many shadow copies can be stored on a particular volume?
Isolation
compliance - autoremediation
controlling download and installation behavior
64
16. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
DFS Replication
create event log entries
NAP Agent
more than 1 -000
17. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
mirroring
Windows PowerShell
network traffic
administrative privileges
18. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
IPSec
performance Monitor
spanned
role service
19. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
planning and design
workstations
share permissions
digital certificate
20. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
custom Data Collector Set
self-enrollment
7:00 am and 12:00 pm
health certificate
21. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
volume
point-in-time
Macintosh and Linux computers
cryptographic checksum
22. Which digital document contains identifying information about a particular user - computer - service - and so on?
digital certificate
300MB
sharing and security
NTFS
23. Which of the following is the default view of the Reliability and Performance Monitor?
resource
SPI field
Enhanced Metafile (EMF)
quick mode negotiations
24. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
Windows Server 2008
workstations
older versions
25. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Windows print architecture
Windows NT
quick mode negotiations
Kerberos v5 protocol
26. Shadow Copies of Shared Folders functionality is enabled at which level?
online file settings
virtual
64
volume
27. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
performance Monitor
Windows Server 2003 R2
file-sharing strategy
role service
28. Which of the following is not a category for the Windows operating system updates?
Enroll ACL
Group Policy updates
planning and design
power-cycling the unit
29. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
power-cycling the unit
simpler
mutual authentication
Group Policy updates
30. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
System Statement of Health Response
support for Unix-based systems
more than 1 -000
Macintosh and Linux computers
31. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
health certificate
Installing a printer
Windows Server 2008
32. A period of _______________ is necessary before you start implementation of a file server deployment.
NTFS
planning and design
Online Responder
480
33. Which of the following is not an option with the Print Services Management Console?
Installing a printer
self-enrollment
resource
digital certificate
34. Depending on the configuration item that is being monitored for _____________ may not be possible.
compliance - autoremediation
health certificate
volume
Setup
35. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
performance console
a built-in network monitor.
older versions
cryptographic checksum
36. What does the Windows Server Backup feature use to perform file and volume-level backups?
Macintosh and Linux computers
DVD
60 - 86 -400
Volume Shadow Copies
37. What is one of the major problems for printing administrators on large enterprise networks?
file-sharing strategy
7:00 am and 12:00 pm
workstations
keeping track of print devices
38. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Certificate Manager
server volume
Automatically
Kerberos v5
39. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
Windows PowerShell
RAID-5
60 - 86 -400
SPI field
40. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
print server
64
mirroring
4
41. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
per user
7:00 am and 12:00 pm
health certificate
file-based
42. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
namespace server
access the shadow copies
NTLM Authentication
Windows NT
43. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
F10
more than 1 -000
NAP Agent
spanned
44. By default - what topology do replication groups use?
point-in-time
full mesh
Macintosh and Linux computers
confidentiality and data encryption.
45. Which of the following is not a node found in the Print Management console?
Internet Printing role service
sharing and security
NTFS
Printer > Pause Printing
46. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
performance counters
Reliability Monitor
resource
File Server Resource Manager
47. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
partitions and drives
60 - 86 -400
write
Duplicate
48. What allows traffic that is defined in one direction to also be defined in the opposite direction?
Key Addition Failures
power-cycling the unit
mirroring
header of each packet
49. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
self-enrollment
Key Addition Failures
server volume
50. Windows Server Backup supports the use of what type of media as backup destinations?
Windows Server 2008
DVD
NAP Agent
power-cycling the unit
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests