SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Automatically
mutual authentication
create event log entries
Online Responder
2. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
digital certificate
performance console
60 - 86 -400
print server
3. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
by right-clicking on the file and selecting Restore previous versions
performance counters
per user
4. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
mutual authentication
per user
compliance - autoremediation
5. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
sharing and security
enterprise
hard quota
8
6. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
power-cycling the unit
Certificate Practice Statement
NTLM Authentication
proper permissions
7. Which digital document contains identifying information about a particular user - computer - service - and so on?
cryptographic checksum
planning and design
digital certificate
create event log entries
8. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
keeping track of print devices
virtual
Group Policy updates
9. A period of _______________ is necessary before you start implementation of a file server deployment.
Enroll ACL
planning and design
cryptographic checksum
Installing a printer
10. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
file-sharing strategy
Terminal Services Gateway (TS Gateway) enforcement
private key
64
11. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
mutual authentication
Volume Shadow Copies
Printer Sharing
12. Printing in Microsoft Windows typically involves all of the following components except a __________.
mutual authentication
Windows print architecture
confidentiality and data encryption.
print router
13. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
intermediate
NTFS
64
Windows print architecture
14. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Online Responder
Internet Printing role service
manual
enforcement point
15. How many possibilities of filter combinations exist in the Print Management Console?
NAP Agent
virtual
Windows print architecture
more than 1 -000
16. You cannot mark an existing dynamic disk as an ____________.
digital certificate
Reliability Monitor
7:00 am and 12:00 pm
active partition
17. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
performance counters
access particular servers
Isolation
Printer > Use Printer Offline
18. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
identity spoofing
simpler
volume
Key Addition Failures
19. Which of the following is not a node found in the Print Management console?
sharing and security
Security Parameters Index (SPI)
7:00 am and 12:00 pm
Duplicate
20. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
File Server Resource Manager
additional user experience features
performance counters
21. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
simpler
custom Data Collector Set
cryptographic checksum
7:00 am and 12:00 pm
22. What is the minimum amount of space you must allocate to store shadow copies?
300MB
both A & B
private key
Macintosh and Linux computers
23. Which of the following is the default view of the Reliability and Performance Monitor?
access particular servers
resource
Key Addition Failures
files/folders/volumes
24. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
custom Data Collector Set
F10
partitions and drives
netsh
25. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Windows Server 2008
enterprise
1
4
26. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
workstations
partitions and drives
NTLM Authentication
namespace server
27. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
8
power-cycling the unit
proper permissions
server volume
28. Where is the checksum located?
header of each packet
Duplicate
file-based
Directory Service
29. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
Isolation
private key
access the shadow copies
write
30. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
Statement of Health
enterprise
NTLM Authentication
Windows NT
31. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
System Monitor
60 - 86 -400
8
Macintosh and Linux computers
32. By default - the Print Management console displays only which of the following in its list of print servers?
netsh
local machine
namespace server
full mesh
33. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
print server
file-based
480
namespace server
34. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
digital certificate
intermediate
DFS Replication
file server at each location
35. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
Duplicate
Kerberos v5 protocol
remediation server
Installing a printer
36. By default - what topology do replication groups use?
compliance - autoremediation
local machine
manual
full mesh
37. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
point-in-time
share permissions
controlling download and installation behavior
health certificate
38. Print Server is the only ___________ that is required when you add the Print Services role
role service
controlling download and installation behavior
Group Policy updates
share permissions
39. NTFS quotas are able to do which of the following?
Internet Printing role service
create event log entries
server volume
Group Policy updates
40. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
create event log entries
Online Responder
mutual authentication
network traffic
41. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
number of file servers
Diagnostics node
older versions
NAP Agent
42. A maximum of how many shadow copies can be stored on a particular volume?
DVD
64
Certificate Manager
health certificate
43. NTFS quotas are limited to controlling storage on entire volumes on what basis?
300MB
NTFS
enterprise
per user
44. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
System Monitor
spanned
DHCP enforcement method
performance Monitor
45. What is the default authentication protocol in an Active Directory network?
Kerberos v5
share permissions
64
resource
46. To set printer priorities - you must do all of the following except __________.
Printer > Use Printer Offline
System Monitor
access particular servers
create multiple print users
47. The File Server Resource Manager console was first introduced in which product?
manual
file server at each location
share permissions
Windows Server 2003 R2
48. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
mirroring
full mesh
remediation server
49. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
network traffic
Windows Server 2008
create event log entries
60 - 86 -400
50. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Windows Server 2008
Enhanced Metafile (EMF)
create multiple print users
both A & B