SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
security settings associated with each template
print server
Macintosh and Linux computers
spanned
2. Windows Server 2008 does not include ______________
share permissions
a built-in network monitor.
file-sharing strategy
Online Responder
3. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
self-enrollment
print server
Installing a printer
Certificate Practice Statement
4. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
7:00 am and 12:00 pm
300MB
Printer Sharing
Authentication exemption
5. Which of the following are the specific processes or events that you want to track?
network traffic
SPI field
digital certificate
performance counters
6. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
support for Unix-based systems
compliance - autoremediation
Duplicate
Printer Sharing
7. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
more than 1 -000
Terminal Services Gateway (TS Gateway) enforcement
8
share permissions
8. Which of the following is not a node found in the Print Management console?
administrative privileges
files/folders/volumes
sharing and security
write
9. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
Online Responder
compliance - autoremediation
planning and design
hard quota
10. Print Server is the only ___________ that is required when you add the Print Services role
role service
Terminal Services Gateway (TS Gateway) enforcement
both A & B
60 - 86 -400
11. Where is the checksum located?
header of each packet
Shadow Copies of Shared Folders
IPSec
write
12. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
create event log entries
planning and design
Kerberos v5 protocol
13. The Authentication Header (AH) protocol does not provide _____________________
System Monitor
confidentiality and data encryption.
Automatically
Windows Server 2008
14. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
enterprise
Windows print architecture
number of file servers
System Monitor
15. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
header of each packet
Kerberos v5 protocol
point-in-time
identity spoofing
16. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
main mode negotiations
Online Responder
remediation server
enforcement point
17. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Statement of Health
support for Unix-based systems
power-cycling the unit
SPI field
18. Printing in Microsoft Windows typically involves all of the following components except a __________.
access the shadow copies
print router
DHCP enforcement method
64
19. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
digital certificate
Directory Service
number of file servers
Isolation
20. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
NAP enforcement method
quick mode negotiations
Certificate Manager
virtual
21. The NPS service combines each Statement of Health Response into what?
Terminal Services Gateway (TS Gateway) enforcement
System Statement of Health Response
role service
main mode negotiations
22. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
DVD
Key Addition Failures
4
online file settings
23. What is the minimum amount of space you must allocate to store shadow copies?
hard quota
300MB
security settings associated with each template
Printer > Pause Printing
24. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
private key
Online Responder
partitions and drives
Windows Server 2008
25. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
support for Unix-based systems
RAID-5
resource
point-in-time
26. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
System Statement of Health Response
Certificate Manager
intermediate
DVD
27. To set printer priorities - you must do all of the following except __________.
Authentication exemption
create multiple print users
point-in-time
number of file servers
28. NTFS quotas are able to do which of the following?
manually install
create event log entries
Windows PowerShell
NAP Agent
29. Server management includes all of the following with the exception of __________.
additional user experience features
8
role service
controlling download and installation behavior
30. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
netsh
proper permissions
support for Unix-based systems
Certificate Manager
31. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
online file settings
DFS Replication
Group Policy updates
Windows Server 2008
32. To share printers - which Network Sharing and Discovery setting must be turned on?
System Monitor
Printer Sharing
DFS Replication
Duplicate
33. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
Isolation
File Server Resource Manager
simpler
Enroll ACL
34. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
files/folders/volumes
private key
DFS Replication
virtual
35. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
Windows Server 2008
Enroll ACL
Authentication exemption
access particular servers
36. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
NAP Agent
Security Parameters Index (SPI)
access particular servers
37. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
Group Policy updates
partitioning drives
NTFS
power-cycling the unit
38. What is one of the major problems for printing administrators on large enterprise networks?
remediation server
print server
keeping track of print devices
Installing a printer
39. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
performance console
IPSec
DHCP enforcement method
local machine
40. In which node is Event Viewer located?
spanned
8
Kerberos v5
Diagnostics node
41. Which of the following is not a category for the Windows operating system updates?
Key Addition Failures
Reliability and Performance Monitor
proper permissions
Group Policy updates
42. The system partition contains what types of files?
hardware-related files that the computer uses to boot
Shadow Copies of Shared Folders
local machine
access particular servers
43. A maximum of how many shadow copies can be stored on a particular volume?
Online Responder
Setup
64
Diagnostics node
44. Shadow Copies of Shared Folders functionality is enabled at which level?
volume
compliance - autoremediation
role service
Windows PowerShell
45. A single computer cannot perform all of the roles in the______________
300MB
Setup
8
Windows print architecture
46. Just as with folder shares - what must clients have to access a shared printer?
Internet Printing role service
DHCP enforcement method
file-based
proper permissions
47. What are the IPSEC default settings for the key lifetime in minutes?
480
custom Data Collector Set
Acquire Failures
System Monitor
48. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
enforcement point
by right-clicking on the file and selecting Restore previous versions
F10
Windows NT
49. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
Enroll ACL
number of file servers
files/folders/volumes
Windows NT
50. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
health certificate
Certificate Practice Statement
enforcement point
resource