SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
print server
DVD
Windows NT
point-in-time
2. The NPS service combines each Statement of Health Response into what?
more than 1 -000
share permissions
System Statement of Health Response
both A & B
3. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
file server at each location
active partition
both A & B
Reliability and Performance Monitor
4. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Setup
Directory Service
7:00 am and 12:00 pm
File Server Resource Manager
5. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
network traffic
planning and design
Kerberos v5
NTFS
6. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
file-based
64
Authentication exemption
file server at each location
7. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
Kerberos v5
additional user experience features
performance Monitor
8. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
create multiple print users
Online Responder
System Monitor
file-sharing strategy
9. What is one of the major problems for printing administrators on large enterprise networks?
Certificate Practice Statement
keeping track of print devices
Duplicate
4
10. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
Authentication exemption
older versions
quick mode negotiations
performance Monitor
11. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
older versions
Windows Server 2008
remediation server
point-in-time
12. How many active partitions can you have per hard drive?
DHCP enforcement method
F10
1
Printer > Pause Printing
13. What type of backup is supported by Windows Server 2008?
manual
8
create multiple print users
NAP enforcement method
14. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
performance Monitor
Printer > Use Printer Offline
Windows PowerShell
4
15. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
access the shadow copies
share permissions
hard quota
1
16. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
7:00 am and 12:00 pm
full mesh
System Monitor
power-cycling the unit
17. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Online Responder
NTLM Authentication
header of each packet
performance counters
18. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
file-based
NAP Agent
network traffic
19. A period of _______________ is necessary before you start implementation of a file server deployment.
planning and design
print router
point-in-time
Security Parameters Index (SPI)
20. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
enterprise
create event log entries
full mesh
performance console
21. You can create your own ______
compliance - autoremediation
confidentiality and data encryption.
custom Data Collector Set
Installing a printer
22. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
sharing and security
create event log entries
Kerberos v5
23. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
partitioning drives
Enhanced Metafile (EMF)
confidentiality and data encryption.
24. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
confidentiality and data encryption.
Shadow Copies of Shared Folders
Windows NT
Disk Configuration MMC snap-in
25. Which of the following is the default view of the Reliability and Performance Monitor?
resource
role service
controlling download and installation behavior
Terminal Services Gateway (TS Gateway) enforcement
26. Depending on the configuration item that is being monitored for _____________ may not be possible.
Windows NT
compliance - autoremediation
simpler
Shadow Copies of Shared Folders
27. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Key Addition Failures
older versions
support for Unix-based systems
System Statement of Health Response
28. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
namespace server
performance console
hardware-related files that the computer uses to boot
29. Where is the checksum located?
partitions and drives
Macintosh and Linux computers
volume
header of each packet
30. To set printer priorities - you must do all of the following except __________.
create multiple print users
manually install
share permissions
health certificate
31. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
DHCP enforcement method
F10
SPI field
Key Addition Failures
32. Server management includes all of the following with the exception of __________.
Internet Printing role service
Online Responder
controlling download and installation behavior
active partition
33. Which log should be the first place you look when you suspect a problem with Active Directory?
Directory Service
publication schedules
Kerberos v5
Authentication exemption
34. What does the Windows Server Backup feature use to perform file and volume-level backups?
64
Volume Shadow Copies
cryptographic checksum
enforcement point
35. NTFS quotas are limited to controlling storage on entire volumes on what basis?
sharing and security
self-enrollment
per user
resource
36. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Internet Printing role service
partitioning drives
header of each packet
Windows Server 2008
37. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
Windows NT
Certificate Manager
Directory Service
38. Updates that can be deployed via WSUS can include all of the following except __________.
additional user experience features
file server at each location
Disk Configuration MMC snap-in
volume
39. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
digital certificate
Windows PowerShell
virtual
health certificate
40. By default - what topology do replication groups use?
access the shadow copies
300MB
full mesh
proper permissions
41. In which view can you view the counters associated with Data Collector Sets?
create event log entries
create multiple print users
self-enrollment
performance Monitor
42. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
access particular servers
Security Parameters Index (SPI)
publication schedules
300MB
43. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
Diagnostics node
Windows PowerShell
cryptographic checksum
intermediate
44. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
health certificate
print server
share permissions
45. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
cryptographic checksum
Enhanced Metafile (EMF)
hard quota
create event log entries
46. If you wish to perform backups from the command line - what will you need to install?
access particular servers
Windows PowerShell
File Server Resource Manager
cryptographic checksum
47. What is the minimum amount of space you must allocate to store shadow copies?
480
power-cycling the unit
Statement of Health
300MB
48. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
remediation server
4
virtual
workstations
49. What allows traffic that is defined in one direction to also be defined in the opposite direction?
mirroring
IPSec
NAP enforcement method
Windows print architecture
50. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
performance console
cryptographic checksum
60 - 86 -400
Macintosh and Linux computers