SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The NPS service combines each Statement of Health Response into what?
access the shadow copies
number of file servers
System Statement of Health Response
Enhanced Metafile (EMF)
2. In which view can you view the counters associated with Data Collector Sets?
Setup
print server
performance Monitor
workstations
3. A single computer cannot perform all of the roles in the______________
Disk Configuration MMC snap-in
Shadow Copies of Shared Folders
private key
Windows print architecture
4. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
netsh
1
performance Monitor
5. Printing in Microsoft Windows typically involves all of the following components except a __________.
print router
workstations
Windows Server 2008
Certificate Practice Statement
6. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
spanned
main mode negotiations
enforcement point
Printer > Use Printer Offline
7. Updates that can be deployed via WSUS can include all of the following except __________.
by right-clicking on the file and selecting Restore previous versions
additional user experience features
administrative privileges
print router
8. To set printer priorities - you must do all of the following except __________.
create multiple print users
Internet Printing role service
private key
a built-in network monitor.
9. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Windows print architecture
performance console
Reliability Monitor
partitioning drives
10. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
IPSec
NTFS
files/folders/volumes
network traffic
11. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
File Server Resource Manager
64
Group Policy updates
12. Windows Server Backup supports the use of what type of media as backup destinations?
confidentiality and data encryption.
Enhanced Metafile (EMF)
DVD
Key Addition Failures
13. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
Online Responder
Shadow Copies of Shared Folders
namespace server
14. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
write
access the shadow copies
Diagnostics node
volume
15. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
file server at each location
Windows NT
Enhanced Metafile (EMF)
Online Responder
16. A period of _______________ is necessary before you start implementation of a file server deployment.
more than 1 -000
planning and design
Certificate Practice Statement
create event log entries
17. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
Printer Sharing
planning and design
performance Monitor
netsh
18. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
quick mode negotiations
Windows Server 2008
spanned
Group Policy updates
19. Which of the following is not a tool that can help you proactively troubleshoot network problems?
both A & B
performance console
NAP Agent
active partition
20. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
file-sharing strategy
keeping track of print devices
administrative privileges
cryptographic checksum
21. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
file-based
number of file servers
digital certificate
mutual authentication
22. What feature allows users or computers to manually request a certificate based a template?
Reliability Monitor
Enroll ACL
planning and design
print router
23. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
7:00 am and 12:00 pm
performance Monitor
hard quota
number of file servers
24. Which log should be the first place you look when you suspect a problem with Active Directory?
online file settings
packet filtering and end-to-end security.
Directory Service
file server at each location
25. NTFS quotas are able to do which of the following?
60 - 86 -400
mirroring
create event log entries
Certificate Manager
26. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
enterprise
virtual
1
Certificate Manager
27. Windows Server 2008 does not include ______________
NTFS
a built-in network monitor.
number of file servers
Kerberos v5 protocol
28. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
proper permissions
Windows PowerShell
60 - 86 -400
hard quota
29. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
DFS Replication
spanned
print server
manual
30. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
namespace server
print router
Macintosh and Linux computers
NAP Agent
31. What is the default authentication protocol in an Active Directory network?
Shadow Copies of Shared Folders
print server
full mesh
Kerberos v5
32. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Terminal Services Gateway (TS Gateway) enforcement
IPSec
Setup
private key
33. Which digital document contains identifying information about a particular user - computer - service - and so on?
hardware-related files that the computer uses to boot
digital certificate
Kerberos v5 protocol
mirroring
34. The system partition contains what types of files?
Online Responder
Kerberos v5
hardware-related files that the computer uses to boot
partitions and drives
35. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
network traffic
full mesh
Setup
publication schedules
36. By default - what topology do replication groups use?
controlling download and installation behavior
custom Data Collector Set
Terminal Services Gateway (TS Gateway) enforcement
full mesh
37. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
security settings associated with each template
simpler
power-cycling the unit
SPI field
38. By default - the Print Management console displays only which of the following in its list of print servers?
create event log entries
confidentiality and data encryption.
local machine
Reliability Monitor
39. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
main mode negotiations
Statement of Health
both A & B
64
40. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
64
Isolation
number of file servers
Duplicate
41. The File Server Resource Manager console was first introduced in which product?
Windows Server 2003 R2
performance Monitor
Certificate Practice Statement
Kerberos v5 protocol
42. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
F10
Statement of Health
per user
Online Responder
43. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
simpler
write
Setup
older versions
44. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
RAID-5
NTLM Authentication
resource
power-cycling the unit
45. Where is the checksum located?
Printer > Use Printer Offline
volume
header of each packet
access the shadow copies
46. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
Printer > Use Printer Offline
create event log entries
performance console
keeping track of print devices
47. Which of the following are the specific processes or events that you want to track?
performance counters
Windows PowerShell
1
security settings associated with each template
48. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
netsh
security settings associated with each template
hardware-related files that the computer uses to boot
49. Which of the following is not a node found in the Print Management console?
Enhanced Metafile (EMF)
Automatically
sharing and security
System Monitor
50. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
a built-in network monitor.
resource
share permissions
System Statement of Health Response