SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is not a node found in the Print Management console?
sharing and security
keeping track of print devices
Setup
digital certificate
2. Windows Server 2008 does not include ______________
IPSec
Enhanced Metafile (EMF)
a built-in network monitor.
both A & B
3. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Windows NT
DFS Replication
Authentication exemption
Kerberos v5 protocol
4. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
F10
remediation server
DFS Replication
File Server Resource Manager
5. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Enroll ACL
Certificate Practice Statement
sharing and security
System Statement of Health Response
6. Printing in Microsoft Windows typically involves all of the following components except a __________.
partitioning drives
create event log entries
print router
Terminal Services Gateway (TS Gateway) enforcement
7. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Online Responder
Printer > Use Printer Offline
Windows NT
F10
8. To install the _____________ - you must also install the Web Server (IIS) role
Statement of Health
spanned
more than 1 -000
Internet Printing role service
9. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Windows Server 2008
local machine
planning and design
controlling download and installation behavior
10. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
a built-in network monitor.
Online Responder
netsh
Setup
11. The Authentication Header (AH) protocol does not provide _____________________
SPI field
confidentiality and data encryption.
performance Monitor
Kerberos v5 protocol
12. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
network traffic
File Server Resource Manager
mutual authentication
F10
13. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
F10
Online Responder
cryptographic checksum
Isolation
14. How many active partitions can you have per hard drive?
quick mode negotiations
Acquire Failures
create event log entries
1
15. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
simpler
Macintosh and Linux computers
Printer > Use Printer Offline
NAP Agent
16. How many possibilities of filter combinations exist in the Print Management Console?
performance counters
more than 1 -000
simpler
file server at each location
17. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
Setup
full mesh
RAID-5
8
18. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
partitioning drives
cryptographic checksum
print server
planning and design
19. What does the Windows Server Backup feature use to perform file and volume-level backups?
Volume Shadow Copies
Enroll ACL
mutual authentication
manual
20. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
DFS Replication
virtual
sharing and security
7:00 am and 12:00 pm
21. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
Disk Configuration MMC snap-in
NTFS
file-sharing strategy
workstations
22. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
System Statement of Health Response
DFS Replication
NTFS
main mode negotiations
23. Which log should be the first place you look when you suspect a problem with Active Directory?
Directory Service
DHCP enforcement method
1
NAP Agent
24. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
Windows Server 2003 R2
resource
7:00 am and 12:00 pm
by right-clicking on the file and selecting Restore previous versions
25. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
Certificate Manager
Authentication exemption
RAID-5
quick mode negotiations
26. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
Macintosh and Linux computers
identity spoofing
Group Policy updates
27. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
Authentication exemption
Printer > Pause Printing
both A & B
security settings associated with each template
28. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
access particular servers
Terminal Services Gateway (TS Gateway) enforcement
keeping track of print devices
Isolation
29. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
header of each packet
Printer Sharing
Key Addition Failures
Windows NT
30. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
Windows PowerShell
both A & B
proper permissions
31. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
300MB
Setup
main mode negotiations
4
32. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
write
performance Monitor
proper permissions
namespace server
33. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
IPSec
Security Parameters Index (SPI)
access the shadow copies
intermediate
34. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
Macintosh and Linux computers
64
performance Monitor
35. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
online file settings
IPSec
Windows NT
netsh
36. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
DVD
Certificate Manager
hardware-related files that the computer uses to boot
Disk Configuration MMC snap-in
37. To set printer priorities - you must do all of the following except __________.
Automatically
create multiple print users
NTLM Authentication
digital certificate
38. The File Server Resource Manager console was first introduced in which product?
hard quota
mutual authentication
Windows Server 2003 R2
performance Monitor
39. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
RAID-5
File Server Resource Manager
print server
by right-clicking on the file and selecting Restore previous versions
40. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
NAP enforcement method
Internet Printing role service
older versions
hardware-related files that the computer uses to boot
41. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
identity spoofing
online file settings
Authentication exemption
support for Unix-based systems
42. A maximum of how many shadow copies can be stored on a particular volume?
Duplicate
64
self-enrollment
Reliability and Performance Monitor
43. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
workstations
enterprise
Printer > Pause Printing
NAP enforcement method
44. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
480
digital certificate
Printer Sharing
45. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
mutual authentication
keeping track of print devices
online file settings
Volume Shadow Copies
46. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
SPI field
hard quota
share permissions
47. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
compliance - autoremediation
Automatically
SPI field
workstations
48. Windows Server Backup supports the use of what type of media as backup destinations?
performance counters
intermediate
DVD
IPSec
49. IKE main mode has a default lifetime of __________ hours.
Internet Printing role service
performance counters
Printer > Pause Printing
8
50. Where is the checksum located?
more than 1 -000
file-based
resource
header of each packet