SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To install the _____________ - you must also install the Web Server (IIS) role
Directory Service
Internet Printing role service
controlling download and installation behavior
hardware-related files that the computer uses to boot
2. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
System Monitor
power-cycling the unit
cryptographic checksum
Windows NT
3. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
mirroring
Online Responder
intermediate
Kerberos v5 protocol
4. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
print server
Security Parameters Index (SPI)
Diagnostics node
Volume Shadow Copies
5. The File Server Resource Manager console was first introduced in which product?
planning and design
Windows Server 2003 R2
Duplicate
7:00 am and 12:00 pm
6. Printing in Microsoft Windows typically involves all of the following components except a __________.
files/folders/volumes
create multiple print users
create event log entries
print router
7. Which of the following is not a tool that can help you proactively troubleshoot network problems?
cryptographic checksum
60 - 86 -400
Installing a printer
performance console
8. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Installing a printer
NAP enforcement method
security settings associated with each template
Printer > Pause Printing
9. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
partitioning drives
NTFS
Statement of Health
DFS Replication
10. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
64
performance Monitor
Security Parameters Index (SPI)
Printer Sharing
11. Depending on the configuration item that is being monitored for _____________ may not be possible.
compliance - autoremediation
NTLM Authentication
IPSec
7:00 am and 12:00 pm
12. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
8
Security Parameters Index (SPI)
64
Windows NT
13. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
file-based
print router
virtual
performance counters
14. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
enforcement point
workstations
Duplicate
partitions and drives
15. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
identity spoofing
Windows print architecture
namespace server
self-enrollment
16. By default - what topology do replication groups use?
Diagnostics node
full mesh
Windows print architecture
active partition
17. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
manually install
cryptographic checksum
compliance - autoremediation
Macintosh and Linux computers
18. What is one of the major problems for printing administrators on large enterprise networks?
keeping track of print devices
480
Terminal Services Gateway (TS Gateway) enforcement
identity spoofing
19. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
administrative privileges
Kerberos v5
online file settings
Internet Printing role service
20. IKE main mode has a default lifetime of __________ hours.
spanned
8
enforcement point
more than 1 -000
21. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
Statement of Health
NTLM Authentication
workstations
Shadow Copies of Shared Folders
22. Which feature enables users to request their own PKI certificates - typically through a Web browser?
server volume
file server at each location
full mesh
self-enrollment
23. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
Kerberos v5
partitioning drives
support for Unix-based systems
mutual authentication
24. Server management includes all of the following with the exception of __________.
intermediate
access particular servers
controlling download and installation behavior
Duplicate
25. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Internet Printing role service
publication schedules
DHCP enforcement method
Duplicate
26. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
Windows print architecture
File Server Resource Manager
NTFS
number of file servers
27. What does the Windows Server Backup feature use to perform file and volume-level backups?
Volume Shadow Copies
hard quota
Windows Server 2003 R2
header of each packet
28. Do not use Tunnel mode when you require _________________
simpler
packet filtering and end-to-end security.
create event log entries
performance counters
29. Where is the checksum located?
header of each packet
additional user experience features
Internet Printing role service
manual
30. Which of the following is the default view of the Reliability and Performance Monitor?
support for Unix-based systems
performance Monitor
volume
resource
31. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
keeping track of print devices
file server at each location
Isolation
partitioning drives
32. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
main mode negotiations
custom Data Collector Set
RAID-5
Enhanced Metafile (EMF)
33. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
enforcement point
mirroring
hard quota
Reliability and Performance Monitor
34. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Enroll ACL
Online Responder
resource
file server at each location
35. Which digital document contains identifying information about a particular user - computer - service - and so on?
file-based
digital certificate
Kerberos v5 protocol
Key Addition Failures
36. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
RAID-5
64
hard quota
37. Windows Server Backup supports the use of what type of media as backup destinations?
DVD
per user
1
NTFS
38. Print Server is the only ___________ that is required when you add the Print Services role
mirroring
Printer > Use Printer Offline
role service
health certificate
39. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
performance Monitor
file-sharing strategy
RAID-5
DFS Replication
40. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Isolation
local machine
Windows print architecture
Certificate Manager
41. What is the default authentication protocol in an Active Directory network?
NTFS
packet filtering and end-to-end security.
Disk Configuration MMC snap-in
Kerberos v5
42. By default - the Print Management console displays only which of the following in its list of print servers?
Online Responder
local machine
compliance - autoremediation
performance counters
43. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
Macintosh and Linux computers
a built-in network monitor.
self-enrollment
security settings associated with each template
44. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
file server at each location
controlling download and installation behavior
role service
Printer > Use Printer Offline
45. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
simpler
write
Kerberos v5 protocol
Terminal Services Gateway (TS Gateway) enforcement
46. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
Kerberos v5 protocol
Windows print architecture
additional user experience features
47. What is the minimum amount of space you must allocate to store shadow copies?
proper permissions
file-sharing strategy
300MB
1
48. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
digital certificate
300MB
print server
network traffic
49. Updates that can be deployed via WSUS can include all of the following except __________.
additional user experience features
mirroring
Authentication exemption
Printer Sharing
50. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
Kerberos v5 protocol
Terminal Services Gateway (TS Gateway) enforcement
file-based
virtual