SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
Internet Printing role service
write
Enhanced Metafile (EMF)
local machine
2. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
share permissions
file-sharing strategy
by right-clicking on the file and selecting Restore previous versions
Security Parameters Index (SPI)
3. How can users restore previous versions of files on the selected volumes?
by right-clicking on the file and selecting Restore previous versions
performance Monitor
manually install
Macintosh and Linux computers
4. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Windows print architecture
File Server Resource Manager
active partition
4
5. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Reliability Monitor
Duplicate
SPI field
4
6. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
main mode negotiations
Online Responder
performance console
Setup
7. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
intermediate
Isolation
share permissions
proper permissions
8. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
Automatically
performance counters
access the shadow copies
performance console
9. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
planning and design
Statement of Health
Certificate Manager
Directory Service
10. By default - the Print Management console displays only which of the following in its list of print servers?
mirroring
keeping track of print devices
Kerberos v5 protocol
local machine
11. Windows Server 2008 does not include ______________
manual
create multiple print users
local machine
a built-in network monitor.
12. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
Macintosh and Linux computers
Windows Server 2008
netsh
File Server Resource Manager
13. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
more than 1 -000
administrative privileges
Online Responder
online file settings
14. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
by right-clicking on the file and selecting Restore previous versions
Authentication exemption
Terminal Services Gateway (TS Gateway) enforcement
Statement of Health
15. You can create your own ______
RAID-5
partitioning drives
Enhanced Metafile (EMF)
custom Data Collector Set
16. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
spanned
Windows Server 2008
Printer > Use Printer Offline
17. What allows traffic that is defined in one direction to also be defined in the opposite direction?
mirroring
publication schedules
F10
role service
18. Compared with NTFS permissions - printer permissions are __________.
simpler
quick mode negotiations
file-based
planning and design
19. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
resource
NTLM Authentication
64
20. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
60 - 86 -400
Internet Printing role service
spanned
network traffic
21. What is the default authentication protocol in an Active Directory network?
server volume
Reliability and Performance Monitor
Kerberos v5
power-cycling the unit
22. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
active partition
both A & B
Key Addition Failures
planning and design
23. Which of the following is not a category for the Windows operating system updates?
System Monitor
Shadow Copies of Shared Folders
Group Policy updates
digital certificate
24. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
Printer Sharing
sharing and security
workstations
partitions and drives
25. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
point-in-time
access particular servers
a built-in network monitor.
header of each packet
26. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
spanned
full mesh
F10
27. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
SPI field
1
intermediate
simpler
28. What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
Diagnostics node
8
performance counters
29. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
main mode negotiations
Enhanced Metafile (EMF)
System Monitor
Printer > Pause Printing
30. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
NTLM Authentication
both A & B
Directory Service
64
31. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
simpler
NAP enforcement method
keeping track of print devices
health certificate
32. Just as with folder shares - what must clients have to access a shared printer?
controlling download and installation behavior
proper permissions
Printer > Pause Printing
network traffic
33. A period of _______________ is necessary before you start implementation of a file server deployment.
virtual
planning and design
Statement of Health
packet filtering and end-to-end security.
34. To set printer priorities - you must do all of the following except __________.
intermediate
create multiple print users
Statement of Health
active partition
35. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
confidentiality and data encryption.
partitions and drives
resource
Printer > Pause Printing
36. NTFS quotas are limited to controlling storage on entire volumes on what basis?
enforcement point
mirroring
digital certificate
per user
37. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
480
Installing a printer
System Monitor
private key
38. In which view can you view the counters associated with Data Collector Sets?
performance Monitor
create multiple print users
both A & B
Printer Sharing
39. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Kerberos v5
NAP enforcement method
header of each packet
60 - 86 -400
40. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
namespace server
role service
quick mode negotiations
performance Monitor
41. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
number of file servers
64
access particular servers
file server at each location
42. To share printers - which Network Sharing and Discovery setting must be turned on?
partitions and drives
Enroll ACL
Printer Sharing
controlling download and installation behavior
43. Do not use Tunnel mode when you require _________________
Terminal Services Gateway (TS Gateway) enforcement
Volume Shadow Copies
packet filtering and end-to-end security.
64
44. Print Server is the only ___________ that is required when you add the Print Services role
role service
virtual
Windows Server 2008
Online Responder
45. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
Printer > Use Printer Offline
NAP Agent
Windows Server 2008
write
46. How many active partitions can you have per hard drive?
Acquire Failures
1
Reliability and Performance Monitor
access the shadow copies
47. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Key Addition Failures
Terminal Services Gateway (TS Gateway) enforcement
Windows PowerShell
Online Responder
48. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Duplicate
print server
partitions and drives
performance Monitor
49. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
access the shadow copies
DVD
security settings associated with each template
Certificate Practice Statement
50. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
virtual
DHCP enforcement method
7:00 am and 12:00 pm
Enroll ACL