SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
Certificate Practice Statement
namespace server
7:00 am and 12:00 pm
2. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Windows NT
publication schedules
identity spoofing
intermediate
3. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
Printer > Pause Printing
Reliability and Performance Monitor
access particular servers
Windows NT
4. Just as with folder shares - what must clients have to access a shared printer?
local machine
hard quota
files/folders/volumes
proper permissions
5. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Authentication exemption
Printer > Pause Printing
NAP enforcement method
proper permissions
6. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
Windows print architecture
IPSec
files/folders/volumes
hardware-related files that the computer uses to boot
7. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
number of file servers
custom Data Collector Set
7:00 am and 12:00 pm
RAID-5
8. You can create your own ______
Isolation
custom Data Collector Set
Disk Configuration MMC snap-in
Printer > Use Printer Offline
9. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
64
DFS Replication
header of each packet
Printer Sharing
10. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
Windows NT
enterprise
performance Monitor
publication schedules
11. Updates that can be deployed via WSUS can include all of the following except __________.
resource
Key Addition Failures
Windows Server 2008
additional user experience features
12. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
namespace server
write
digital certificate
File Server Resource Manager
13. By default - what topology do replication groups use?
Authentication exemption
DVD
self-enrollment
full mesh
14. A maximum of how many shadow copies can be stored on a particular volume?
file-sharing strategy
identity spoofing
digital certificate
64
15. Windows automatically makes a user the owner of all files that he or she creates on a _____
server volume
more than 1 -000
digital certificate
64
16. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
resource
Acquire Failures
Group Policy updates
a built-in network monitor.
17. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
support for Unix-based systems
DHCP enforcement method
access the shadow copies
partitions and drives
18. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Authentication exemption
security settings associated with each template
manually install
Security Parameters Index (SPI)
19. Do not use Tunnel mode when you require _________________
packet filtering and end-to-end security.
Internet Printing role service
Automatically
Kerberos v5
20. How many possibilities of filter combinations exist in the Print Management Console?
administrative privileges
identity spoofing
Key Addition Failures
more than 1 -000
21. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
intermediate
NTFS
security settings associated with each template
write
22. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
Windows Server 2003 R2
Certificate Practice Statement
Macintosh and Linux computers
security settings associated with each template
23. By default - the Print Management console displays only which of the following in its list of print servers?
virtual
local machine
packet filtering and end-to-end security.
workstations
24. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Online Responder
Setup
private key
print router
25. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
hard quota
identity spoofing
RAID-5
print server
26. Compared with NTFS permissions - printer permissions are __________.
network traffic
partitions and drives
Volume Shadow Copies
simpler
27. Depending on the configuration item that is being monitored for _____________ may not be possible.
resource
DFS Replication
compliance - autoremediation
Certificate Practice Statement
28. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
cryptographic checksum
full mesh
Shadow Copies of Shared Folders
Disk Configuration MMC snap-in
29. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
Certificate Practice Statement
Setup
private key
Key Addition Failures
30. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Reliability Monitor
Certificate Manager
network traffic
health certificate
31. Where is the checksum located?
main mode negotiations
quick mode negotiations
header of each packet
performance counters
32. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
8
Enhanced Metafile (EMF)
digital certificate
proper permissions
33. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
quick mode negotiations
create multiple print users
7:00 am and 12:00 pm
partitions and drives
34. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
administrative privileges
more than 1 -000
main mode negotiations
partitioning drives
35. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
Windows Server 2008
volume
simpler
print server
36. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
60 - 86 -400
Disk Configuration MMC snap-in
manually install
enterprise
37. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
administrative privileges
NAP enforcement method
support for Unix-based systems
hard quota
38. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
NAP Agent
private key
workstations
39. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
F10
NTLM Authentication
7:00 am and 12:00 pm
Printer > Use Printer Offline
40. The File Server Resource Manager console was first introduced in which product?
Setup
file-sharing strategy
Windows Server 2003 R2
confidentiality and data encryption.
41. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
a built-in network monitor.
volume
Terminal Services Gateway (TS Gateway) enforcement
publication schedules
42. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
planning and design
spanned
SPI field
Kerberos v5
43. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
access the shadow copies
Disk Configuration MMC snap-in
Windows NT
Directory Service
44. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
access the shadow copies
digital certificate
security settings associated with each template
Isolation
45. NTFS quotas are limited to controlling storage on entire volumes on what basis?
Installing a printer
per user
DVD
controlling download and installation behavior
46. Which of the following is the default view of the Reliability and Performance Monitor?
manual
Windows print architecture
online file settings
resource
47. Which of the following is not a category for the Windows operating system updates?
Group Policy updates
performance Monitor
file-based
Installing a printer
48. Which digital document contains identifying information about a particular user - computer - service - and so on?
digital certificate
Windows Server 2008
packet filtering and end-to-end security.
full mesh
49. What is the minimum amount of space you must allocate to store shadow copies?
planning and design
300MB
1
support for Unix-based systems
50. What does the Windows Server Backup feature use to perform file and volume-level backups?
support for Unix-based systems
Authentication exemption
access particular servers
Volume Shadow Copies