SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
64
enterprise
Windows PowerShell
Enhanced Metafile (EMF)
2. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Printer > Pause Printing
access the shadow copies
DFS Replication
publication schedules
3. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
8
file-based
support for Unix-based systems
publication schedules
4. Depending on the configuration item that is being monitored for _____________ may not be possible.
DFS Replication
security settings associated with each template
quick mode negotiations
compliance - autoremediation
5. Shadow Copies of Shared Folders functionality is enabled at which level?
access particular servers
volume
performance Monitor
confidentiality and data encryption.
6. What type of backup is supported by Windows Server 2008?
Online Responder
access particular servers
manual
netsh
7. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
Volume Shadow Copies
64
Directory Service
planning and design
8. Updates that can be deployed via WSUS can include all of the following except __________.
Windows PowerShell
additional user experience features
publication schedules
online file settings
9. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
older versions
NTLM Authentication
64
Reliability Monitor
10. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
64
additional user experience features
create event log entries
Duplicate
11. The NPS service combines each Statement of Health Response into what?
identity spoofing
access the shadow copies
System Statement of Health Response
manual
12. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
main mode negotiations
identity spoofing
NAP Agent
Isolation
13. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
support for Unix-based systems
DVD
point-in-time
14. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
access particular servers
keeping track of print devices
F10
both A & B
15. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
manual
Windows Server 2008
Automatically
controlling download and installation behavior
16. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
local machine
netsh
spanned
keeping track of print devices
17. What feature allows users or computers to manually request a certificate based a template?
performance Monitor
Enroll ACL
identity spoofing
manually install
18. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
enterprise
namespace server
Volume Shadow Copies
both A & B
19. By default - what topology do replication groups use?
more than 1 -000
sharing and security
performance Monitor
full mesh
20. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
volume
cryptographic checksum
remediation server
21. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
by right-clicking on the file and selecting Restore previous versions
namespace server
full mesh
both A & B
22. To share printers - which Network Sharing and Discovery setting must be turned on?
DVD
full mesh
Key Addition Failures
Printer Sharing
23. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
point-in-time
volume
Statement of Health
remediation server
24. In which node is Event Viewer located?
Diagnostics node
Certificate Manager
performance Monitor
network traffic
25. Compared with NTFS permissions - printer permissions are __________.
Online Responder
power-cycling the unit
simpler
proper permissions
26. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
Key Addition Failures
write
controlling download and installation behavior
File Server Resource Manager
27. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Windows NT
mirroring
role service
Enroll ACL
28. What allows traffic that is defined in one direction to also be defined in the opposite direction?
controlling download and installation behavior
mirroring
hard quota
DFS Replication
29. How can users restore previous versions of files on the selected volumes?
by right-clicking on the file and selecting Restore previous versions
64
Directory Service
access particular servers
30. By default - the Print Management console displays only which of the following in its list of print servers?
DHCP enforcement method
local machine
confidentiality and data encryption.
create event log entries
31. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
File Server Resource Manager
System Statement of Health Response
older versions
Enhanced Metafile (EMF)
32. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
identity spoofing
access particular servers
DHCP enforcement method
4
33. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
manually install
netsh
Printer > Use Printer Offline
Macintosh and Linux computers
34. IKE main mode has a default lifetime of __________ hours.
8
300MB
hardware-related files that the computer uses to boot
more than 1 -000
35. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Enhanced Metafile (EMF)
namespace server
SPI field
simpler
36. Windows Server 2008 does not include ______________
digital certificate
System Statement of Health Response
Enhanced Metafile (EMF)
a built-in network monitor.
37. NTFS quotas are able to do which of the following?
create event log entries
Printer > Pause Printing
a built-in network monitor.
Online Responder
38. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
role service
Certificate Manager
mutual authentication
partitions and drives
39. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
Directory Service
file-based
health certificate
60 - 86 -400
40. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
more than 1 -000
Statement of Health
Reliability Monitor
file server at each location
41. What is the minimum amount of space you must allocate to store shadow copies?
300MB
number of file servers
custom Data Collector Set
NAP Agent
42. You cannot mark an existing dynamic disk as an ____________.
active partition
older versions
64
power-cycling the unit
43. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
security settings associated with each template
point-in-time
DFS Replication
performance counters
44. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
remediation server
Volume Shadow Copies
SPI field
Authentication exemption
45. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
a built-in network monitor.
manual
support for Unix-based systems
network traffic
46. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
Security Parameters Index (SPI)
sharing and security
main mode negotiations
partitions and drives
47. Where is the checksum located?
administrative privileges
header of each packet
Certificate Manager
Windows Server 2008
48. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
namespace server
administrative privileges
Security Parameters Index (SPI)
4
49. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
480
NTLM Authentication
partitioning drives
simpler
50. Which of the following is not a tool that can help you proactively troubleshoot network problems?
access the shadow copies
Terminal Services Gateway (TS Gateway) enforcement
performance console
hard quota