SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
virtual
7:00 am and 12:00 pm
System Monitor
full mesh
2. Which digital document contains identifying information about a particular user - computer - service - and so on?
number of file servers
role service
point-in-time
digital certificate
3. Do not use Tunnel mode when you require _________________
create multiple print users
RAID-5
Kerberos v5 protocol
packet filtering and end-to-end security.
4. Windows Server Backup supports the use of what type of media as backup destinations?
DVD
8
file-sharing strategy
files/folders/volumes
5. Shadow Copies of Shared Folders functionality is enabled at which level?
volume
480
active partition
Macintosh and Linux computers
6. NTFS quotas are able to do which of the following?
partitions and drives
create event log entries
Acquire Failures
DHCP enforcement method
7. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
Terminal Services Gateway (TS Gateway) enforcement
namespace server
write
NAP Agent
8. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
older versions
Reliability and Performance Monitor
share permissions
file-sharing strategy
9. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
a built-in network monitor.
security settings associated with each template
manually install
Certificate Practice Statement
10. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
System Statement of Health Response
performance counters
volume
workstations
11. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
workstations
Kerberos v5 protocol
mutual authentication
RAID-5
12. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
intermediate
partitions and drives
Reliability Monitor
NAP enforcement method
13. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
namespace server
spanned
virtual
Certificate Manager
14. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
print router
file-based
Macintosh and Linux computers
files/folders/volumes
15. NTFS quotas are limited to controlling storage on entire volumes on what basis?
Certificate Manager
remediation server
Enhanced Metafile (EMF)
per user
16. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
more than 1 -000
both A & B
share permissions
remediation server
17. Print Server is the only ___________ that is required when you add the Print Services role
access the shadow copies
role service
mutual authentication
Setup
18. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
Diagnostics node
access the shadow copies
1
simpler
19. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Windows PowerShell
simpler
NAP enforcement method
Disk Configuration MMC snap-in
20. Printing in Microsoft Windows typically involves all of the following components except a __________.
power-cycling the unit
NTLM Authentication
print router
Acquire Failures
21. A maximum of how many shadow copies can be stored on a particular volume?
64
sharing and security
F10
per user
22. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
480
System Monitor
namespace server
enforcement point
23. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
480
Printer Sharing
private key
enterprise
24. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
Printer > Use Printer Offline
60 - 86 -400
point-in-time
per user
25. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
RAID-5
a built-in network monitor.
print server
Setup
26. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
simpler
Windows NT
mutual authentication
27. Which of the following is not an option with the Print Services Management Console?
Automatically
partitions and drives
Installing a printer
compliance - autoremediation
28. A period of _______________ is necessary before you start implementation of a file server deployment.
IPSec
planning and design
confidentiality and data encryption.
active partition
29. Windows automatically makes a user the owner of all files that he or she creates on a _____
64
server volume
Windows print architecture
publication schedules
30. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
both A & B
proper permissions
security settings associated with each template
print server
31. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Setup
Certificate Manager
hard quota
local machine
32. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
remediation server
File Server Resource Manager
spanned
Enhanced Metafile (EMF)
33. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
write
Kerberos v5 protocol
sharing and security
performance console
34. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
packet filtering and end-to-end security.
main mode negotiations
DHCP enforcement method
simpler
35. Depending on the configuration item that is being monitored for _____________ may not be possible.
print router
compliance - autoremediation
proper permissions
publication schedules
36. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
identity spoofing
Disk Configuration MMC snap-in
Enroll ACL
virtual
37. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
cryptographic checksum
packet filtering and end-to-end security.
volume
Setup
38. Server management includes all of the following with the exception of __________.
controlling download and installation behavior
confidentiality and data encryption.
health certificate
Printer Sharing
39. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
Reliability Monitor
controlling download and installation behavior
keeping track of print devices
NTLM Authentication
40. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
by right-clicking on the file and selecting Restore previous versions
more than 1 -000
share permissions
volume
41. The Authentication Header (AH) protocol does not provide _____________________
cryptographic checksum
online file settings
confidentiality and data encryption.
Macintosh and Linux computers
42. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
health certificate
Enroll ACL
support for Unix-based systems
controlling download and installation behavior
43. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Isolation
DHCP enforcement method
NAP Agent
full mesh
44. Just as with folder shares - what must clients have to access a shared printer?
SPI field
proper permissions
create event log entries
cryptographic checksum
45. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Online Responder
Key Addition Failures
support for Unix-based systems
print server
46. How many active partitions can you have per hard drive?
Volume Shadow Copies
Online Responder
System Monitor
1
47. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
SPI field
by right-clicking on the file and selecting Restore previous versions
4
48. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
Installing a printer
Certificate Practice Statement
main mode negotiations
49. Windows Server 2008 does not include ______________
a built-in network monitor.
full mesh
number of file servers
NTFS
50. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
remediation server
manually install
Windows NT
Enhanced Metafile (EMF)