SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
print server
administrative privileges
partitions and drives
hard quota
2. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
60 - 86 -400
Disk Configuration MMC snap-in
spanned
3. How many active partitions can you have per hard drive?
1
Printer Sharing
controlling download and installation behavior
additional user experience features
4. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
DFS Replication
sharing and security
health certificate
5. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
publication schedules
System Statement of Health Response
Key Addition Failures
identity spoofing
6. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
Kerberos v5
F10
self-enrollment
quick mode negotiations
7. How can users restore previous versions of files on the selected volumes?
by right-clicking on the file and selecting Restore previous versions
Duplicate
60 - 86 -400
Enroll ACL
8. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Authentication exemption
Terminal Services Gateway (TS Gateway) enforcement
file-based
access the shadow copies
9. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
IPSec
Automatically
access particular servers
File Server Resource Manager
10. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
confidentiality and data encryption.
Duplicate
planning and design
NAP enforcement method
11. Windows automatically makes a user the owner of all files that he or she creates on a _____
hard quota
full mesh
server volume
header of each packet
12. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
file-based
full mesh
Isolation
Online Responder
13. What is one of the major problems for printing administrators on large enterprise networks?
Kerberos v5
health certificate
netsh
keeping track of print devices
14. Printing in Microsoft Windows typically involves all of the following components except a __________.
print router
Reliability and Performance Monitor
Windows Server 2008
confidentiality and data encryption.
15. Updates that can be deployed via WSUS can include all of the following except __________.
point-in-time
Shadow Copies of Shared Folders
additional user experience features
write
16. If you wish to perform backups from the command line - what will you need to install?
access particular servers
Diagnostics node
manual
Windows PowerShell
17. The system partition contains what types of files?
Kerberos v5
security settings associated with each template
hardware-related files that the computer uses to boot
volume
18. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
more than 1 -000
300MB
quick mode negotiations
19. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
create event log entries
print server
Isolation
Setup
20. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
hardware-related files that the computer uses to boot
DFS Replication
power-cycling the unit
file server at each location
21. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
Shadow Copies of Shared Folders
DVD
64
Certificate Practice Statement
22. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
RAID-5
Printer Sharing
Acquire Failures
NTFS
23. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Statement of Health
manual
enterprise
File Server Resource Manager
24. What is the minimum amount of space you must allocate to store shadow copies?
compliance - autoremediation
create multiple print users
300MB
publication schedules
25. Which of the following is not an option with the Print Services Management Console?
share permissions
Installing a printer
Reliability and Performance Monitor
power-cycling the unit
26. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
file-based
access particular servers
Isolation
Group Policy updates
27. The File Server Resource Manager console was first introduced in which product?
file server at each location
Windows Server 2003 R2
performance Monitor
older versions
28. You can create your own ______
custom Data Collector Set
enforcement point
spanned
Printer Sharing
29. Which log should be the first place you look when you suspect a problem with Active Directory?
share permissions
access the shadow copies
Directory Service
Key Addition Failures
30. NTFS quotas are limited to controlling storage on entire volumes on what basis?
spanned
Installing a printer
per user
older versions
31. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Disk Configuration MMC snap-in
a built-in network monitor.
netsh
partitioning drives
32. What does the Windows Server Backup feature use to perform file and volume-level backups?
64
administrative privileges
intermediate
Volume Shadow Copies
33. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
keeping track of print devices
Internet Printing role service
older versions
Key Addition Failures
34. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
confidentiality and data encryption.
Key Addition Failures
header of each packet
35. Where is the checksum located?
Authentication exemption
header of each packet
Acquire Failures
Enhanced Metafile (EMF)
36. What is the default authentication protocol in an Active Directory network?
Kerberos v5
older versions
enforcement point
files/folders/volumes
37. To share printers - which Network Sharing and Discovery setting must be turned on?
quick mode negotiations
Printer Sharing
8
file server at each location
38. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
Key Addition Failures
Macintosh and Linux computers
1
local machine
39. Which of the following are the specific processes or events that you want to track?
performance counters
Windows print architecture
480
Printer Sharing
40. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
performance Monitor
netsh
mirroring
spanned
41. The Authentication Header (AH) protocol does not provide _____________________
print router
netsh
confidentiality and data encryption.
Online Responder
42. A maximum of how many shadow copies can be stored on a particular volume?
cryptographic checksum
performance counters
Online Responder
64
43. Which of the following is not a category for the Windows operating system updates?
Group Policy updates
1
partitioning drives
Internet Printing role service
44. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
hardware-related files that the computer uses to boot
security settings associated with each template
Windows NT
Key Addition Failures
45. What allows traffic that is defined in one direction to also be defined in the opposite direction?
full mesh
access the shadow copies
mirroring
security settings associated with each template
46. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
digital certificate
Reliability and Performance Monitor
hardware-related files that the computer uses to boot
Acquire Failures
47. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
quick mode negotiations
Windows Server 2008
Printer > Pause Printing
Directory Service
48. NTFS quotas are able to do which of the following?
Directory Service
create event log entries
Windows Server 2003 R2
Windows PowerShell
49. Which digital document contains identifying information about a particular user - computer - service - and so on?
File Server Resource Manager
confidentiality and data encryption.
digital certificate
health certificate
50. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
8
enterprise
Online Responder
access the shadow copies
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests