SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
share permissions
confidentiality and data encryption.
NAP Agent
file-sharing strategy
2. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
IPSec
DVD
Setup
a built-in network monitor.
3. If you wish to perform backups from the command line - what will you need to install?
Windows PowerShell
Volume Shadow Copies
file-sharing strategy
Online Responder
4. To share printers - which Network Sharing and Discovery setting must be turned on?
Printer Sharing
RAID-5
proper permissions
Online Responder
5. Where is the checksum located?
cryptographic checksum
header of each packet
mirroring
NTFS
6. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
point-in-time
DHCP enforcement method
Automatically
Installing a printer
7. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
files/folders/volumes
publication schedules
Windows NT
resource
8. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
Windows PowerShell
number of file servers
F10
intermediate
9. NTFS quotas are able to do which of the following?
performance Monitor
Enroll ACL
Authentication exemption
create event log entries
10. What is one of the major problems for printing administrators on large enterprise networks?
DVD
cryptographic checksum
keeping track of print devices
custom Data Collector Set
11. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
point-in-time
enforcement point
7:00 am and 12:00 pm
virtual
12. How many possibilities of filter combinations exist in the Print Management Console?
Windows print architecture
F10
publication schedules
more than 1 -000
13. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
enterprise
Key Addition Failures
DFS Replication
Terminal Services Gateway (TS Gateway) enforcement
14. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
quick mode negotiations
number of file servers
spanned
identity spoofing
15. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
64
Online Responder
create multiple print users
16. A maximum of how many shadow copies can be stored on a particular volume?
64
Windows print architecture
role service
Terminal Services Gateway (TS Gateway) enforcement
17. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
Windows Server 2008
quick mode negotiations
virtual
mutual authentication
18. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
manual
point-in-time
Macintosh and Linux computers
publication schedules
19. A period of _______________ is necessary before you start implementation of a file server deployment.
Enroll ACL
planning and design
8
health certificate
20. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
NTFS
Duplicate
480
60 - 86 -400
21. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
spanned
Printer > Use Printer Offline
NAP Agent
virtual
22. What allows traffic that is defined in one direction to also be defined in the opposite direction?
private key
network traffic
mirroring
share permissions
23. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
60 - 86 -400
access the shadow copies
Windows Server 2008
print router
24. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Reliability Monitor
1
main mode negotiations
Duplicate
25. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
hardware-related files that the computer uses to boot
RAID-5
controlling download and installation behavior
proper permissions
26. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
print server
files/folders/volumes
share permissions
Installing a printer
27. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Printer > Use Printer Offline
NAP enforcement method
Enhanced Metafile (EMF)
Duplicate
28. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
partitioning drives
health certificate
Automatically
Shadow Copies of Shared Folders
29. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
SPI field
network traffic
NAP enforcement method
support for Unix-based systems
30. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
partitioning drives
file-based
hard quota
mutual authentication
31. Windows Server 2008 does not include ______________
Diagnostics node
a built-in network monitor.
create multiple print users
Windows Server 2003 R2
32. The File Server Resource Manager console was first introduced in which product?
file-based
File Server Resource Manager
Certificate Practice Statement
Windows Server 2003 R2
33. The NPS service combines each Statement of Health Response into what?
Printer Sharing
compliance - autoremediation
System Statement of Health Response
Internet Printing role service
34. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Enhanced Metafile (EMF)
cryptographic checksum
performance Monitor
Key Addition Failures
35. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Online Responder
spanned
NAP enforcement method
Printer > Pause Printing
36. You can create your own ______
custom Data Collector Set
local machine
Certificate Manager
enforcement point
37. You cannot mark an existing dynamic disk as an ____________.
performance Monitor
Enroll ACL
sharing and security
active partition
38. Which digital document contains identifying information about a particular user - computer - service - and so on?
Kerberos v5 protocol
performance console
digital certificate
Reliability Monitor
39. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
Security Parameters Index (SPI)
point-in-time
cryptographic checksum
40. Windows automatically makes a user the owner of all files that he or she creates on a _____
Printer Sharing
DHCP enforcement method
1
server volume
41. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
Acquire Failures
partitions and drives
both A & B
42. Updates that can be deployed via WSUS can include all of the following except __________.
Isolation
additional user experience features
planning and design
1
43. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
DVD
enterprise
Reliability Monitor
44. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
Reliability Monitor
print router
both A & B
Disk Configuration MMC snap-in
45. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
resource
controlling download and installation behavior
compliance - autoremediation
46. What is the minimum amount of space you must allocate to store shadow copies?
partitions and drives
60 - 86 -400
300MB
compliance - autoremediation
47. To install the _____________ - you must also install the Web Server (IIS) role
mutual authentication
cryptographic checksum
Internet Printing role service
point-in-time
48. By default - the Print Management console displays only which of the following in its list of print servers?
both A & B
local machine
Windows print architecture
Duplicate
49. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
quick mode negotiations
spanned
Reliability Monitor
Isolation
50. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
netsh
write
480
performance Monitor
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests