SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To share printers - which Network Sharing and Discovery setting must be turned on?
create event log entries
Printer Sharing
remediation server
number of file servers
2. A maximum of how many shadow copies can be stored on a particular volume?
64
active partition
point-in-time
Directory Service
3. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
spanned
keeping track of print devices
network traffic
Online Responder
4. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
resource
mutual authentication
Automatically
5. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
60 - 86 -400
number of file servers
spanned
6. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
additional user experience features
System Monitor
a built-in network monitor.
both A & B
7. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
print router
number of file servers
full mesh
8. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Reliability and Performance Monitor
publication schedules
digital certificate
proper permissions
9. What does the Windows Server Backup feature use to perform file and volume-level backups?
Volume Shadow Copies
DFS Replication
Macintosh and Linux computers
Internet Printing role service
10. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
60 - 86 -400
create multiple print users
Windows PowerShell
Isolation
11. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
Printer Sharing
support for Unix-based systems
enforcement point
Windows NT
12. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
Key Addition Failures
Enhanced Metafile (EMF)
DFS Replication
hardware-related files that the computer uses to boot
13. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
1
file-sharing strategy
Shadow Copies of Shared Folders
volume
14. What is one of the major problems for printing administrators on large enterprise networks?
proper permissions
power-cycling the unit
identity spoofing
keeping track of print devices
15. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
quick mode negotiations
write
enterprise
4
16. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
8
workstations
Enhanced Metafile (EMF)
file-based
17. Which of the following is not a tool that can help you proactively troubleshoot network problems?
performance console
files/folders/volumes
DHCP enforcement method
Certificate Manager
18. The NPS service combines each Statement of Health Response into what?
System Statement of Health Response
60 - 86 -400
Volume Shadow Copies
proper permissions
19. What are the IPSEC default settings for the key lifetime in minutes?
identity spoofing
480
publication schedules
partitioning drives
20. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
partitioning drives
Acquire Failures
performance Monitor
Directory Service
21. How can users restore previous versions of files on the selected volumes?
NTFS
performance counters
Terminal Services Gateway (TS Gateway) enforcement
by right-clicking on the file and selecting Restore previous versions
22. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
file-based
Windows PowerShell
remediation server
point-in-time
23. Shadow Copies of Shared Folders functionality is enabled at which level?
share permissions
Statement of Health
Printer Sharing
volume
24. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
enforcement point
4
keeping track of print devices
Printer Sharing
25. Which of the following is not a node found in the Print Management console?
sharing and security
online file settings
Enhanced Metafile (EMF)
Windows Server 2003 R2
26. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
System Monitor
remediation server
workstations
27. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
print server
Certificate Manager
System Monitor
workstations
28. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
namespace server
60 - 86 -400
share permissions
manually install
29. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
64
performance counters
Reliability Monitor
30. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
7:00 am and 12:00 pm
Online Responder
64
System Statement of Health Response
31. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
IPSec
Windows print architecture
file-sharing strategy
both A & B
32. What type of backup is supported by Windows Server 2008?
proper permissions
manual
Directory Service
4
33. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
intermediate
NAP Agent
NTFS
Kerberos v5 protocol
34. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
Reliability and Performance Monitor
60 - 86 -400
health certificate
IPSec
35. Server management includes all of the following with the exception of __________.
Shadow Copies of Shared Folders
compliance - autoremediation
Installing a printer
controlling download and installation behavior
36. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Reliability Monitor
NAP enforcement method
Reliability and Performance Monitor
performance Monitor
37. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
Statement of Health
number of file servers
publication schedules
38. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
DHCP enforcement method
number of file servers
Disk Configuration MMC snap-in
header of each packet
39. By default - the Print Management console displays only which of the following in its list of print servers?
Enhanced Metafile (EMF)
remediation server
number of file servers
local machine
40. You cannot mark an existing dynamic disk as an ____________.
File Server Resource Manager
publication schedules
active partition
partitioning drives
41. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
RAID-5
DHCP enforcement method
more than 1 -000
online file settings
42. Print Server is the only ___________ that is required when you add the Print Services role
4
role service
file-based
network traffic
43. In which view can you view the counters associated with Data Collector Sets?
virtual
performance Monitor
Internet Printing role service
Windows Server 2003 R2
44. What is the minimum amount of space you must allocate to store shadow copies?
300MB
manual
Disk Configuration MMC snap-in
Shadow Copies of Shared Folders
45. What is the default authentication protocol in an Active Directory network?
netsh
create multiple print users
access the shadow copies
Kerberos v5
46. Which log should be the first place you look when you suspect a problem with Active Directory?
volume
access particular servers
compliance - autoremediation
Directory Service
47. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
file server at each location
create event log entries
partitions and drives
Macintosh and Linux computers
48. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
DVD
health certificate
access particular servers
Kerberos v5 protocol
49. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
older versions
Statement of Health
DVD
enforcement point
50. What feature allows users or computers to manually request a certificate based a template?
1
Certificate Manager
hardware-related files that the computer uses to boot
Enroll ACL
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests