SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Kerberos v5
share permissions
64
4
2. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
main mode negotiations
network traffic
Windows NT
resource
3. Depending on the configuration item that is being monitored for _____________ may not be possible.
hardware-related files that the computer uses to boot
RAID-5
compliance - autoremediation
virtual
4. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
Duplicate
virtual
performance Monitor
hard quota
5. The Authentication Header (AH) protocol does not provide _____________________
create event log entries
confidentiality and data encryption.
create multiple print users
a built-in network monitor.
6. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
7:00 am and 12:00 pm
Shadow Copies of Shared Folders
self-enrollment
IPSec
7. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
DFS Replication
compliance - autoremediation
print server
hardware-related files that the computer uses to boot
8. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
Terminal Services Gateway (TS Gateway) enforcement
Printer > Pause Printing
confidentiality and data encryption.
NTLM Authentication
9. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
Disk Configuration MMC snap-in
point-in-time
custom Data Collector Set
both A & B
10. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
file-sharing strategy
performance Monitor
File Server Resource Manager
Enroll ACL
11. You cannot mark an existing dynamic disk as an ____________.
older versions
netsh
active partition
share permissions
12. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
by right-clicking on the file and selecting Restore previous versions
Kerberos v5
netsh
Disk Configuration MMC snap-in
13. IKE main mode has a default lifetime of __________ hours.
Group Policy updates
8
Enhanced Metafile (EMF)
access particular servers
14. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
NAP enforcement method
Authentication exemption
Printer Sharing
health certificate
15. Do not use Tunnel mode when you require _________________
IPSec
write
System Monitor
packet filtering and end-to-end security.
16. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
300MB
Printer > Use Printer Offline
create event log entries
17. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
File Server Resource Manager
support for Unix-based systems
role service
identity spoofing
18. A single computer cannot perform all of the roles in the______________
Windows NT
64
Setup
Windows print architecture
19. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
Kerberos v5 protocol
point-in-time
Automatically
20. Which digital document contains identifying information about a particular user - computer - service - and so on?
Certificate Manager
share permissions
access the shadow copies
digital certificate
21. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
number of file servers
7:00 am and 12:00 pm
Automatically
network traffic
22. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
IPSec
System Statement of Health Response
Certificate Practice Statement
file-sharing strategy
23. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
Installing a printer
manually install
netsh
24. What is the minimum amount of space you must allocate to store shadow copies?
Printer > Pause Printing
300MB
packet filtering and end-to-end security.
namespace server
25. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
Statement of Health
keeping track of print devices
write
Volume Shadow Copies
26. You can create your own ______
point-in-time
custom Data Collector Set
60 - 86 -400
manually install
27. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
a built-in network monitor.
access particular servers
administrative privileges
Enhanced Metafile (EMF)
28. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
health certificate
mirroring
Online Responder
enforcement point
29. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
Statement of Health
sharing and security
enterprise
30. What is the default authentication protocol in an Active Directory network?
Windows print architecture
intermediate
Internet Printing role service
Kerberos v5
31. Which of the following is not an option with the Print Services Management Console?
Shadow Copies of Shared Folders
Installing a printer
administrative privileges
private key
32. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
role service
print router
private key
files/folders/volumes
33. By default - what topology do replication groups use?
Online Responder
share permissions
keeping track of print devices
full mesh
34. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
enterprise
manual
more than 1 -000
35. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
write
file-sharing strategy
4
by right-clicking on the file and selecting Restore previous versions
36. Which of the following is not a category for the Windows operating system updates?
System Statement of Health Response
Group Policy updates
Security Parameters Index (SPI)
confidentiality and data encryption.
37. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
planning and design
number of file servers
DVD
Enhanced Metafile (EMF)
38. Compared with NTFS permissions - printer permissions are __________.
simpler
main mode negotiations
proper permissions
more than 1 -000
39. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Acquire Failures
mirroring
publication schedules
Certificate Manager
40. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
NAP enforcement method
files/folders/volumes
older versions
Installing a printer
41. Which of the following is not a tool that can help you proactively troubleshoot network problems?
access particular servers
performance console
Windows Server 2008
publication schedules
42. To install the _____________ - you must also install the Web Server (IIS) role
Internet Printing role service
Kerberos v5 protocol
Setup
main mode negotiations
43. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
Isolation
support for Unix-based systems
file-based
print server
44. How can users restore previous versions of files on the selected volumes?
by right-clicking on the file and selecting Restore previous versions
per user
create event log entries
performance Monitor
45. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
performance counters
a built-in network monitor.
quick mode negotiations
NAP enforcement method
46. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Automatically
packet filtering and end-to-end security.
point-in-time
Printer > Pause Printing
47. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Key Addition Failures
support for Unix-based systems
Windows NT
Statement of Health
48. If you wish to perform backups from the command line - what will you need to install?
files/folders/volumes
4
60 - 86 -400
Windows PowerShell
49. Which log should be the first place you look when you suspect a problem with Active Directory?
identity spoofing
header of each packet
64
Directory Service
50. Where is the checksum located?
packet filtering and end-to-end security.
quick mode negotiations
online file settings
header of each packet