SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IKE main mode has a default lifetime of __________ hours.
server volume
8
60 - 86 -400
Online Responder
2. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
both A & B
header of each packet
identity spoofing
write
3. Server management includes all of the following with the exception of __________.
controlling download and installation behavior
older versions
partitioning drives
Reliability and Performance Monitor
4. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
local machine
remediation server
enterprise
Volume Shadow Copies
5. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
publication schedules
quick mode negotiations
performance Monitor
keeping track of print devices
6. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
role service
online file settings
compliance - autoremediation
files/folders/volumes
7. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
DVD
1
Enhanced Metafile (EMF)
print server
8. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
4
Shadow Copies of Shared Folders
NAP Agent
DHCP enforcement method
9. Which of the following is not a node found in the Print Management console?
sharing and security
File Server Resource Manager
NAP Agent
private key
10. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
compliance - autoremediation
network traffic
Terminal Services Gateway (TS Gateway) enforcement
file server at each location
11. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
SPI field
File Server Resource Manager
Windows PowerShell
files/folders/volumes
12. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
4
volume
Online Responder
Windows PowerShell
13. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
IPSec
quick mode negotiations
64
300MB
14. If you wish to perform backups from the command line - what will you need to install?
System Monitor
60 - 86 -400
Windows PowerShell
Authentication exemption
15. In which view can you view the counters associated with Data Collector Sets?
digital certificate
mutual authentication
performance Monitor
enterprise
16. In which node is Event Viewer located?
File Server Resource Manager
sharing and security
Diagnostics node
print router
17. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
60 - 86 -400
Key Addition Failures
DHCP enforcement method
mutual authentication
18. What does the Windows Server Backup feature use to perform file and volume-level backups?
Automatically
mirroring
Volume Shadow Copies
files/folders/volumes
19. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
print router
print server
IPSec
NTFS
20. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
publication schedules
support for Unix-based systems
number of file servers
Windows Server 2003 R2
21. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
Automatically
partitions and drives
DFS Replication
22. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
per user
administrative privileges
Internet Printing role service
Shadow Copies of Shared Folders
23. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
Certificate Manager
digital certificate
intermediate
Terminal Services Gateway (TS Gateway) enforcement
24. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
DVD
60 - 86 -400
Certificate Manager
Windows Server 2003 R2
25. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
file-sharing strategy
Automatically
Disk Configuration MMC snap-in
Printer > Pause Printing
26. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
partitioning drives
NAP enforcement method
7:00 am and 12:00 pm
access the shadow copies
27. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
identity spoofing
Reliability and Performance Monitor
access particular servers
print router
28. Which of the following is not an option with the Print Services Management Console?
Installing a printer
Printer > Pause Printing
Online Responder
virtual
29. A maximum of how many shadow copies can be stored on a particular volume?
Reliability Monitor
64
create event log entries
Enroll ACL
30. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Directory Service
Authentication exemption
4
performance Monitor
31. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
performance Monitor
File Server Resource Manager
IPSec
private key
32. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
Enhanced Metafile (EMF)
keeping track of print devices
manual
file-sharing strategy
33. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
local machine
64
online file settings
digital certificate
34. Which of the following is not a tool that can help you proactively troubleshoot network problems?
Key Addition Failures
performance console
quick mode negotiations
power-cycling the unit
35. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
online file settings
active partition
share permissions
36. How many active partitions can you have per hard drive?
workstations
480
more than 1 -000
1
37. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
Macintosh and Linux computers
file server at each location
by right-clicking on the file and selecting Restore previous versions
enterprise
38. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
Authentication exemption
publication schedules
Group Policy updates
network traffic
39. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
8
1
file-based
40. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
NAP Agent
manually install
F10
System Monitor
41. What allows traffic that is defined in one direction to also be defined in the opposite direction?
mirroring
cryptographic checksum
controlling download and installation behavior
support for Unix-based systems
42. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
older versions
Automatically
F10
spanned
43. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
NAP Agent
additional user experience features
Automatically
publication schedules
44. NTFS quotas are able to do which of the following?
create event log entries
Setup
Group Policy updates
performance Monitor
45. To share printers - which Network Sharing and Discovery setting must be turned on?
virtual
Printer Sharing
files/folders/volumes
support for Unix-based systems
46. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Key Addition Failures
7:00 am and 12:00 pm
files/folders/volumes
Windows NT
47. By default - the Print Management console displays only which of the following in its list of print servers?
Isolation
local machine
hard quota
NTLM Authentication
48. Which log should be the first place you look when you suspect a problem with Active Directory?
Directory Service
enterprise
IPSec
publication schedules
49. Windows Server 2008 does not include ______________
more than 1 -000
header of each packet
hardware-related files that the computer uses to boot
a built-in network monitor.
50. Which field does the IPSec driver use to match the correct SA with the correct packet?
by right-clicking on the file and selecting Restore previous versions
share permissions
proper permissions
SPI field