SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
online file settings
4
spanned
NTLM Authentication
2. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
60 - 86 -400
performance console
print server
confidentiality and data encryption.
3. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
netsh
Group Policy updates
Windows NT
virtual
4. Which of the following are the specific processes or events that you want to track?
Online Responder
older versions
file server at each location
performance counters
5. The NPS service combines each Statement of Health Response into what?
Online Responder
spanned
System Statement of Health Response
remediation server
6. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
Printer > Use Printer Offline
DFS Replication
workstations
manual
7. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
controlling download and installation behavior
quick mode negotiations
Online Responder
Terminal Services Gateway (TS Gateway) enforcement
8. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
RAID-5
cryptographic checksum
Disk Configuration MMC snap-in
number of file servers
9. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
RAID-5
SPI field
Kerberos v5 protocol
Automatically
10. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
480
a built-in network monitor.
Security Parameters Index (SPI)
11. Which of the following is not a tool that can help you proactively troubleshoot network problems?
access particular servers
performance console
planning and design
DVD
12. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
Online Responder
Setup
performance Monitor
security settings associated with each template
13. How many possibilities of filter combinations exist in the Print Management Console?
remediation server
file server at each location
more than 1 -000
mutual authentication
14. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Online Responder
sharing and security
Duplicate
spanned
15. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
Online Responder
active partition
manually install
64
16. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
Shadow Copies of Shared Folders
SPI field
additional user experience features
intermediate
17. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
active partition
full mesh
Kerberos v5 protocol
Windows print architecture
18. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
file-sharing strategy
Certificate Practice Statement
create event log entries
mutual authentication
19. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Reliability Monitor
Duplicate
Kerberos v5 protocol
point-in-time
20. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
create event log entries
simpler
Acquire Failures
IPSec
21. To share printers - which Network Sharing and Discovery setting must be turned on?
NTLM Authentication
workstations
Printer Sharing
packet filtering and end-to-end security.
22. Windows automatically makes a user the owner of all files that he or she creates on a _____
write
planning and design
server volume
file server at each location
23. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Windows print architecture
Reliability and Performance Monitor
hard quota
Certificate Manager
24. How many active partitions can you have per hard drive?
compliance - autoremediation
Acquire Failures
planning and design
1
25. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
Enhanced Metafile (EMF)
Online Responder
Macintosh and Linux computers
RAID-5
26. In which node is Event Viewer located?
Enroll ACL
Diagnostics node
DFS Replication
Security Parameters Index (SPI)
27. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
SPI field
Diagnostics node
proper permissions
health certificate
28. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
enterprise
security settings associated with each template
Online Responder
manually install
29. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
private key
point-in-time
access the shadow copies
30. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
System Statement of Health Response
quick mode negotiations
hardware-related files that the computer uses to boot
Setup
31. Do not use Tunnel mode when you require _________________
Windows Server 2008
support for Unix-based systems
packet filtering and end-to-end security.
intermediate
32. Depending on the configuration item that is being monitored for _____________ may not be possible.
System Statement of Health Response
compliance - autoremediation
Online Responder
Duplicate
33. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
print server
Printer Sharing
quick mode negotiations
point-in-time
34. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
480
spanned
partitions and drives
performance Monitor
35. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
4
Printer > Pause Printing
support for Unix-based systems
number of file servers
36. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Enroll ACL
write
Isolation
Authentication exemption
37. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
volume
number of file servers
a built-in network monitor.
support for Unix-based systems
38. Windows Server Backup supports the use of what type of media as backup destinations?
DVD
support for Unix-based systems
Key Addition Failures
partitioning drives
39. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
manually install
private key
older versions
full mesh
40. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
more than 1 -000
performance Monitor
cryptographic checksum
System Monitor
41. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
local machine
quick mode negotiations
digital certificate
Key Addition Failures
42. What allows traffic that is defined in one direction to also be defined in the opposite direction?
Reliability and Performance Monitor
server volume
performance console
mirroring
43. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
self-enrollment
DFS Replication
Diagnostics node
enterprise
44. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
cryptographic checksum
self-enrollment
partitioning drives
45. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
share permissions
Enroll ACL
private key
NTLM Authentication
46. What does the Windows Server Backup feature use to perform file and volume-level backups?
publication schedules
Volume Shadow Copies
Enroll ACL
print server
47. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Enroll ACL
publication schedules
Printer > Pause Printing
Volume Shadow Copies
48. You cannot mark an existing dynamic disk as an ____________.
performance Monitor
Windows Server 2008
active partition
Online Responder
49. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
Terminal Services Gateway (TS Gateway) enforcement
identity spoofing
digital certificate
access particular servers
50. IKE main mode has a default lifetime of __________ hours.
network traffic
8
hard quota
Internet Printing role service