SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
partitions and drives
print server
Authentication exemption
performance Monitor
2. By default - what topology do replication groups use?
full mesh
namespace server
Isolation
RAID-5
3. What type of backup is supported by Windows Server 2008?
Authentication exemption
compliance - autoremediation
Directory Service
manual
4. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Duplicate
server volume
keeping track of print devices
planning and design
5. You can create your own ______
custom Data Collector Set
Installing a printer
Internet Printing role service
mirroring
6. The Authentication Header (AH) protocol does not provide _____________________
quick mode negotiations
keeping track of print devices
Enhanced Metafile (EMF)
confidentiality and data encryption.
7. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
access the shadow copies
NAP enforcement method
Terminal Services Gateway (TS Gateway) enforcement
Acquire Failures
8. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
workstations
Kerberos v5
virtual
Online Responder
9. Which field does the IPSec driver use to match the correct SA with the correct packet?
SPI field
enterprise
older versions
7:00 am and 12:00 pm
10. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Enhanced Metafile (EMF)
DHCP enforcement method
Authentication exemption
Acquire Failures
11. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
write
performance Monitor
file-sharing strategy
12. What allows traffic that is defined in one direction to also be defined in the opposite direction?
mirroring
Installing a printer
Statement of Health
by right-clicking on the file and selecting Restore previous versions
13. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
health certificate
file-sharing strategy
Certificate Practice Statement
additional user experience features
14. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
sharing and security
Terminal Services Gateway (TS Gateway) enforcement
share permissions
15. Which digital document contains identifying information about a particular user - computer - service - and so on?
F10
Volume Shadow Copies
System Statement of Health Response
digital certificate
16. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
header of each packet
file-based
Security Parameters Index (SPI)
System Monitor
17. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
remediation server
Online Responder
resource
1
18. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
DHCP enforcement method
hard quota
hardware-related files that the computer uses to boot
private key
19. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
Duplicate
both A & B
Kerberos v5
Disk Configuration MMC snap-in
20. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
print server
Key Addition Failures
Duplicate
full mesh
21. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
8
hardware-related files that the computer uses to boot
Reliability Monitor
access particular servers
22. IKE main mode has a default lifetime of __________ hours.
mutual authentication
create event log entries
8
Reliability and Performance Monitor
23. Printing in Microsoft Windows typically involves all of the following components except a __________.
number of file servers
print router
mirroring
Enhanced Metafile (EMF)
24. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
Directory Service
health certificate
virtual
25. How can users restore previous versions of files on the selected volumes?
spanned
controlling download and installation behavior
compliance - autoremediation
by right-clicking on the file and selecting Restore previous versions
26. How many possibilities of filter combinations exist in the Print Management Console?
60 - 86 -400
partitioning drives
480
more than 1 -000
27. What is the minimum amount of space you must allocate to store shadow copies?
NTFS
300MB
additional user experience features
number of file servers
28. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
Online Responder
NTLM Authentication
Kerberos v5 protocol
64
29. Which log should be the first place you look when you suspect a problem with Active Directory?
power-cycling the unit
Directory Service
Automatically
performance Monitor
30. Print Server is the only ___________ that is required when you add the Print Services role
quick mode negotiations
number of file servers
role service
Enhanced Metafile (EMF)
31. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
quick mode negotiations
workstations
System Monitor
Installing a printer
32. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
power-cycling the unit
manual
64
cryptographic checksum
33. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Online Responder
netsh
volume
Windows NT
34. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
DFS Replication
NAP Agent
Terminal Services Gateway (TS Gateway) enforcement
35. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
Statement of Health
Directory Service
mutual authentication
main mode negotiations
36. What does the Windows Server Backup feature use to perform file and volume-level backups?
additional user experience features
quick mode negotiations
Volume Shadow Copies
self-enrollment
37. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
7:00 am and 12:00 pm
spanned
performance Monitor
enforcement point
38. Server management includes all of the following with the exception of __________.
IPSec
controlling download and installation behavior
quick mode negotiations
more than 1 -000
39. In which node is Event Viewer located?
Printer > Pause Printing
Diagnostics node
main mode negotiations
Automatically
40. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
Shadow Copies of Shared Folders
7:00 am and 12:00 pm
cryptographic checksum
41. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
administrative privileges
Kerberos v5
Online Responder
DFS Replication
42. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
custom Data Collector Set
partitions and drives
Disk Configuration MMC snap-in
publication schedules
43. Where is the checksum located?
namespace server
Certificate Practice Statement
header of each packet
full mesh
44. The NPS service combines each Statement of Health Response into what?
health certificate
manual
SPI field
System Statement of Health Response
45. Do not use Tunnel mode when you require _________________
packet filtering and end-to-end security.
Windows print architecture
power-cycling the unit
a built-in network monitor.
46. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
a built-in network monitor.
administrative privileges
per user
47. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
Windows print architecture
Printer Sharing
resource
namespace server
48. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
480
simpler
partitioning drives
virtual
49. Which feature enables users to request their own PKI certificates - typically through a Web browser?
DVD
self-enrollment
Online Responder
planning and design
50. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
older versions
Online Responder
per user
8