SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is not a category for the Windows operating system updates?
netsh
Group Policy updates
packet filtering and end-to-end security.
enterprise
2. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
hard quota
NAP enforcement method
SPI field
Online Responder
3. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
by right-clicking on the file and selecting Restore previous versions
Setup
Diagnostics node
file-based
4. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
administrative privileges
Windows Server 2003 R2
older versions
5. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
volume
health certificate
Security Parameters Index (SPI)
manual
6. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Isolation
quick mode negotiations
Group Policy updates
enterprise
7. Server management includes all of the following with the exception of __________.
controlling download and installation behavior
partitioning drives
Windows Server 2008
Security Parameters Index (SPI)
8. How many active partitions can you have per hard drive?
a built-in network monitor.
Isolation
support for Unix-based systems
1
9. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Windows print architecture
mirroring
publication schedules
Online Responder
10. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Group Policy updates
role service
File Server Resource Manager
Authentication exemption
11. Where is the checksum located?
Printer Sharing
header of each packet
Kerberos v5 protocol
NAP enforcement method
12. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
number of file servers
mutual authentication
print router
13. Which log should be the first place you look when you suspect a problem with Active Directory?
simpler
300MB
Windows Server 2003 R2
Directory Service
14. Windows automatically makes a user the owner of all files that he or she creates on a _____
8
Diagnostics node
print server
server volume
15. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
Diagnostics node
Group Policy updates
virtual
Certificate Manager
16. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
older versions
Duplicate
compliance - autoremediation
17. NTFS quotas are able to do which of the following?
performance console
create event log entries
RAID-5
Terminal Services Gateway (TS Gateway) enforcement
18. Which of the following is not an option with the Print Services Management Console?
Shadow Copies of Shared Folders
spanned
manual
Installing a printer
19. What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
quick mode negotiations
Online Responder
self-enrollment
20. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
Printer > Use Printer Offline
Kerberos v5
64
Acquire Failures
21. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
Disk Configuration MMC snap-in
compliance - autoremediation
quick mode negotiations
DFS Replication
22. What does the Windows Server Backup feature use to perform file and volume-level backups?
Online Responder
both A & B
namespace server
Volume Shadow Copies
23. Just as with folder shares - what must clients have to access a shared printer?
Terminal Services Gateway (TS Gateway) enforcement
DVD
proper permissions
publication schedules
24. A single computer cannot perform all of the roles in the______________
DVD
Windows print architecture
both A & B
support for Unix-based systems
25. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Statement of Health
Certificate Manager
write
Reliability and Performance Monitor
26. You cannot mark an existing dynamic disk as an ____________.
active partition
resource
F10
Shadow Copies of Shared Folders
27. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
files/folders/volumes
DFS Replication
partitions and drives
print server
28. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
confidentiality and data encryption.
Terminal Services Gateway (TS Gateway) enforcement
number of file servers
enforcement point
29. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
create event log entries
Kerberos v5 protocol
IPSec
DFS Replication
30. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
additional user experience features
publication schedules
partitioning drives
31. What is the minimum amount of space you must allocate to store shadow copies?
300MB
Terminal Services Gateway (TS Gateway) enforcement
System Statement of Health Response
confidentiality and data encryption.
32. You can create your own ______
Online Responder
custom Data Collector Set
Windows print architecture
netsh
33. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
planning and design
write
Key Addition Failures
support for Unix-based systems
34. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
virtual
Key Addition Failures
Internet Printing role service
access particular servers
35. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
file-sharing strategy
files/folders/volumes
enterprise
NAP Agent
36. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
SPI field
Disk Configuration MMC snap-in
Acquire Failures
Windows Server 2008
37. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
enterprise
Key Addition Failures
Acquire Failures
DHCP enforcement method
38. By default - the Print Management console displays only which of the following in its list of print servers?
RAID-5
online file settings
local machine
proper permissions
39. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
create multiple print users
manually install
performance Monitor
confidentiality and data encryption.
40. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
server volume
create multiple print users
Shadow Copies of Shared Folders
point-in-time
41. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
hardware-related files that the computer uses to boot
network traffic
active partition
Enhanced Metafile (EMF)
42. A maximum of how many shadow copies can be stored on a particular volume?
NAP enforcement method
file-based
Authentication exemption
64
43. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
full mesh
administrative privileges
F10
packet filtering and end-to-end security.
44. A period of _______________ is necessary before you start implementation of a file server deployment.
planning and design
print server
server volume
header of each packet
45. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
power-cycling the unit
keeping track of print devices
volume
both A & B
46. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
Reliability Monitor
DVD
Printer Sharing
47. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
netsh
Setup
both A & B
Kerberos v5
48. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
file server at each location
keeping track of print devices
performance counters
administrative privileges
49. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
remediation server
packet filtering and end-to-end security.
Certificate Practice Statement
Reliability Monitor
50. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
controlling download and installation behavior
older versions
Kerberos v5
Setup