SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
netsh
file server at each location
point-in-time
NTLM Authentication
2. By default - the Print Management console displays only which of the following in its list of print servers?
Windows Server 2008
Automatically
a built-in network monitor.
local machine
3. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
per user
F10
NTLM Authentication
file-sharing strategy
4. The system partition contains what types of files?
hardware-related files that the computer uses to boot
Disk Configuration MMC snap-in
Shadow Copies of Shared Folders
full mesh
5. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
F10
8
private key
network traffic
6. Which of the following is not a category for the Windows operating system updates?
additional user experience features
Group Policy updates
Online Responder
quick mode negotiations
7. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
300MB
SPI field
60 - 86 -400
netsh
8. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
power-cycling the unit
main mode negotiations
performance counters
NAP Agent
9. Windows automatically makes a user the owner of all files that he or she creates on a _____
server volume
60 - 86 -400
Statement of Health
sharing and security
10. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
480
spanned
Acquire Failures
older versions
11. Windows Server 2008 does not include ______________
health certificate
namespace server
identity spoofing
a built-in network monitor.
12. Just as with folder shares - what must clients have to access a shared printer?
proper permissions
write
Certificate Manager
Online Responder
13. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
administrative privileges
file server at each location
quick mode negotiations
sharing and security
14. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
performance console
F10
spanned
resource
15. You cannot mark an existing dynamic disk as an ____________.
active partition
main mode negotiations
Kerberos v5
server volume
16. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
enforcement point
Directory Service
remediation server
by right-clicking on the file and selecting Restore previous versions
17. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
create multiple print users
64
Security Parameters Index (SPI)
identity spoofing
18. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
sharing and security
workstations
netsh
NTFS
19. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
packet filtering and end-to-end security.
F10
power-cycling the unit
1
20. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
older versions
Enroll ACL
network traffic
health certificate
21. Updates that can be deployed via WSUS can include all of the following except __________.
Online Responder
network traffic
additional user experience features
Volume Shadow Copies
22. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
compliance - autoremediation
Printer Sharing
security settings associated with each template
23. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Key Addition Failures
SPI field
private key
Statement of Health
24. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
1
private key
role service
online file settings
25. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Certificate Manager
Duplicate
System Monitor
Printer > Pause Printing
26. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
spanned
sharing and security
security settings associated with each template
DHCP enforcement method
27. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Installing a printer
Enhanced Metafile (EMF)
additional user experience features
Authentication exemption
28. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
publication schedules
Online Responder
performance Monitor
security settings associated with each template
29. To share printers - which Network Sharing and Discovery setting must be turned on?
Printer Sharing
create multiple print users
Security Parameters Index (SPI)
SPI field
30. What is the minimum amount of space you must allocate to store shadow copies?
300MB
file-sharing strategy
header of each packet
compliance - autoremediation
31. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
performance Monitor
Diagnostics node
Printer > Use Printer Offline
32. By default - what topology do replication groups use?
virtual
Acquire Failures
full mesh
local machine
33. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
Reliability Monitor
RAID-5
Key Addition Failures
share permissions
34. What are the IPSEC default settings for the key lifetime in minutes?
custom Data Collector Set
480
performance Monitor
resource
35. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
enforcement point
Setup
Automatically
Statement of Health
36. Windows Server Backup supports the use of what type of media as backup destinations?
DVD
Certificate Practice Statement
digital certificate
file-sharing strategy
37. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
main mode negotiations
enterprise
number of file servers
38. A period of _______________ is necessary before you start implementation of a file server deployment.
additional user experience features
planning and design
hard quota
simpler
39. Server management includes all of the following with the exception of __________.
online file settings
Disk Configuration MMC snap-in
SPI field
controlling download and installation behavior
40. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
Setup
digital certificate
64
administrative privileges
41. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
administrative privileges
Kerberos v5 protocol
power-cycling the unit
System Statement of Health Response
42. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
virtual
hard quota
8
System Monitor
43. A single computer cannot perform all of the roles in the______________
older versions
power-cycling the unit
local machine
Windows print architecture
44. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
namespace server
health certificate
by right-clicking on the file and selecting Restore previous versions
file server at each location
45. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
Macintosh and Linux computers
NTLM Authentication
Windows Server 2003 R2
46. What does the Windows Server Backup feature use to perform file and volume-level backups?
Volume Shadow Copies
file-based
both A & B
Isolation
47. What is the default authentication protocol in an Active Directory network?
both A & B
Kerberos v5
NTLM Authentication
Kerberos v5 protocol
48. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Shadow Copies of Shared Folders
namespace server
4
access particular servers
49. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
partitions and drives
NTFS
power-cycling the unit
Reliability and Performance Monitor
50. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
mutual authentication
Disk Configuration MMC snap-in
local machine
custom Data Collector Set