SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What feature allows users or computers to manually request a certificate based a template?
Volume Shadow Copies
Enroll ACL
simpler
Isolation
2. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
Installing a printer
create multiple print users
virtual
System Monitor
3. Do not use Tunnel mode when you require _________________
Terminal Services Gateway (TS Gateway) enforcement
NTFS
packet filtering and end-to-end security.
4
4. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
role service
manual
480
support for Unix-based systems
5. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
health certificate
main mode negotiations
Disk Configuration MMC snap-in
Windows NT
6. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Security Parameters Index (SPI)
Online Responder
IPSec
compliance - autoremediation
7. IKE main mode has a default lifetime of __________ hours.
Internet Printing role service
access particular servers
8
Automatically
8. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
partitions and drives
4
300MB
NTLM Authentication
9. Compared with NTFS permissions - printer permissions are __________.
simpler
4
hardware-related files that the computer uses to boot
self-enrollment
10. What is the minimum amount of space you must allocate to store shadow copies?
300MB
confidentiality and data encryption.
server volume
Windows NT
11. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
network traffic
by right-clicking on the file and selecting Restore previous versions
DHCP enforcement method
private key
12. In which node is Event Viewer located?
manually install
netsh
cryptographic checksum
Diagnostics node
13. What are the IPSEC default settings for the key lifetime in minutes?
compliance - autoremediation
480
additional user experience features
more than 1 -000
14. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
power-cycling the unit
partitioning drives
Authentication exemption
intermediate
15. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
intermediate
enterprise
remediation server
File Server Resource Manager
16. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
more than 1 -000
Terminal Services Gateway (TS Gateway) enforcement
both A & B
Installing a printer
17. How many possibilities of filter combinations exist in the Print Management Console?
digital certificate
Diagnostics node
full mesh
more than 1 -000
18. What allows traffic that is defined in one direction to also be defined in the opposite direction?
7:00 am and 12:00 pm
Enroll ACL
480
mirroring
19. Printing in Microsoft Windows typically involves all of the following components except a __________.
packet filtering and end-to-end security.
self-enrollment
remediation server
print router
20. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
network traffic
Setup
confidentiality and data encryption.
4
21. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
1
number of file servers
Printer > Pause Printing
namespace server
22. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
Certificate Practice Statement
file-based
64
administrative privileges
23. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
4
volume
private key
24. Which of the following is not a category for the Windows operating system updates?
4
DHCP enforcement method
a built-in network monitor.
Group Policy updates
25. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Internet Printing role service
480
Authentication exemption
Windows Server 2008
26. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
7:00 am and 12:00 pm
create event log entries
Online Responder
Reliability and Performance Monitor
27. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
server volume
netsh
Printer > Pause Printing
Duplicate
28. By default - the Print Management console displays only which of the following in its list of print servers?
access the shadow copies
Windows Server 2003 R2
Diagnostics node
local machine
29. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
64
Online Responder
a built-in network monitor.
30. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
Macintosh and Linux computers
7:00 am and 12:00 pm
Statement of Health
packet filtering and end-to-end security.
31. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
Enhanced Metafile (EMF)
access the shadow copies
resource
digital certificate
32. Print Server is the only ___________ that is required when you add the Print Services role
online file settings
Kerberos v5
Printer > Use Printer Offline
role service
33. To share printers - which Network Sharing and Discovery setting must be turned on?
Installing a printer
Printer Sharing
Authentication exemption
NTLM Authentication
34. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
performance console
volume
namespace server
35. Updates that can be deployed via WSUS can include all of the following except __________.
Windows NT
additional user experience features
online file settings
confidentiality and data encryption.
36. The system partition contains what types of files?
self-enrollment
hard quota
hardware-related files that the computer uses to boot
digital certificate
37. How can users restore previous versions of files on the selected volumes?
Enroll ACL
by right-clicking on the file and selecting Restore previous versions
RAID-5
Online Responder
38. Which log should be the first place you look when you suspect a problem with Active Directory?
Kerberos v5 protocol
Enhanced Metafile (EMF)
private key
Directory Service
39. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Windows print architecture
partitioning drives
Security Parameters Index (SPI)
Reliability and Performance Monitor
40. What type of backup is supported by Windows Server 2008?
manual
performance counters
full mesh
confidentiality and data encryption.
41. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
F10
main mode negotiations
resource
Authentication exemption
42. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
older versions
Printer > Pause Printing
NAP enforcement method
43. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Volume Shadow Copies
4
Printer > Pause Printing
access the shadow copies
44. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
support for Unix-based systems
volume
Certificate Practice Statement
Windows Server 2003 R2
45. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
Automatically
security settings associated with each template
workstations
resource
46. To install the _____________ - you must also install the Web Server (IIS) role
header of each packet
Internet Printing role service
both A & B
performance console
47. If you wish to perform backups from the command line - what will you need to install?
Windows Server 2003 R2
packet filtering and end-to-end security.
active partition
Windows PowerShell
48. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
Online Responder
Kerberos v5
header of each packet
49. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
online file settings
local machine
enforcement point
netsh
50. Just as with folder shares - what must clients have to access a shared printer?
volume
a built-in network monitor.
proper permissions
mirroring