SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
sharing and security
IPSec
access the shadow copies
performance Monitor
2. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
server volume
4
cryptographic checksum
NAP Agent
3. Updates that can be deployed via WSUS can include all of the following except __________.
Reliability Monitor
Setup
additional user experience features
64
4. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
per user
Printer Sharing
60 - 86 -400
Kerberos v5 protocol
5. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
private key
sharing and security
Disk Configuration MMC snap-in
6. A single computer cannot perform all of the roles in the______________
Enhanced Metafile (EMF)
full mesh
online file settings
Windows print architecture
7. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
access the shadow copies
Key Addition Failures
header of each packet
simpler
8. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
by right-clicking on the file and selecting Restore previous versions
64
Volume Shadow Copies
Acquire Failures
9. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Setup
local machine
performance console
enforcement point
10. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
Enhanced Metafile (EMF)
Windows print architecture
administrative privileges
netsh
11. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Group Policy updates
8
Volume Shadow Copies
Online Responder
12. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
planning and design
Directory Service
packet filtering and end-to-end security.
Security Parameters Index (SPI)
13. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
manually install
DFS Replication
older versions
NAP enforcement method
14. Server management includes all of the following with the exception of __________.
controlling download and installation behavior
File Server Resource Manager
create multiple print users
Shadow Copies of Shared Folders
15. Windows automatically makes a user the owner of all files that he or she creates on a _____
Online Responder
enterprise
server volume
self-enrollment
16. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Isolation
Online Responder
Online Responder
performance Monitor
17. What are the IPSEC default settings for the key lifetime in minutes?
Windows Server 2003 R2
480
packet filtering and end-to-end security.
create multiple print users
18. How many possibilities of filter combinations exist in the Print Management Console?
IPSec
full mesh
more than 1 -000
NAP enforcement method
19. What does the Windows Server Backup feature use to perform file and volume-level backups?
remediation server
hardware-related files that the computer uses to boot
Duplicate
Volume Shadow Copies
20. Where is the checksum located?
Reliability Monitor
create multiple print users
hard quota
header of each packet
21. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
file-based
hard quota
file-sharing strategy
Duplicate
22. In which view can you view the counters associated with Data Collector Sets?
partitions and drives
resource
Windows print architecture
performance Monitor
23. Compared with NTFS permissions - printer permissions are __________.
DFS Replication
simpler
manually install
NAP Agent
24. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
more than 1 -000
confidentiality and data encryption.
remediation server
manually install
25. Print Server is the only ___________ that is required when you add the Print Services role
Windows NT
role service
Setup
netsh
26. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
Macintosh and Linux computers
4
planning and design
Disk Configuration MMC snap-in
27. A maximum of how many shadow copies can be stored on a particular volume?
64
role service
file-sharing strategy
Setup
28. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
Printer > Use Printer Offline
enterprise
identity spoofing
active partition
29. To share printers - which Network Sharing and Discovery setting must be turned on?
Printer Sharing
access the shadow copies
additional user experience features
a built-in network monitor.
30. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
self-enrollment
Statement of Health
Setup
31. Which field does the IPSec driver use to match the correct SA with the correct packet?
SPI field
manually install
packet filtering and end-to-end security.
file-sharing strategy
32. What is the default authentication protocol in an Active Directory network?
server volume
Windows Server 2003 R2
Kerberos v5
intermediate
33. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Windows NT
power-cycling the unit
Authentication exemption
Certificate Manager
34. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
Reliability Monitor
planning and design
File Server Resource Manager
Certificate Manager
35. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
Windows PowerShell
enterprise
point-in-time
confidentiality and data encryption.
36. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
Shadow Copies of Shared Folders
performance Monitor
share permissions
RAID-5
37. The File Server Resource Manager console was first introduced in which product?
online file settings
Windows Server 2003 R2
sharing and security
files/folders/volumes
38. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
private key
Statement of Health
older versions
39. IKE main mode has a default lifetime of __________ hours.
Acquire Failures
confidentiality and data encryption.
a built-in network monitor.
8
40. What feature allows users or computers to manually request a certificate based a template?
digital certificate
Enroll ACL
access the shadow copies
8
41. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
full mesh
DHCP enforcement method
identity spoofing
main mode negotiations
42. Just as with folder shares - what must clients have to access a shared printer?
performance Monitor
System Monitor
proper permissions
create event log entries
43. What is one of the major problems for printing administrators on large enterprise networks?
Duplicate
main mode negotiations
online file settings
keeping track of print devices
44. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
NTLM Authentication
performance counters
Reliability and Performance Monitor
both A & B
45. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
mutual authentication
NTLM Authentication
mirroring
confidentiality and data encryption.
46. Depending on the configuration item that is being monitored for _____________ may not be possible.
private key
60 - 86 -400
IPSec
compliance - autoremediation
47. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
Diagnostics node
a built-in network monitor.
System Monitor
60 - 86 -400
48. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
mirroring
a built-in network monitor.
simpler
49. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
Windows PowerShell
controlling download and installation behavior
performance counters
F10
50. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
confidentiality and data encryption.
network traffic
manual
Certificate Practice Statement