SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the minimum amount of space you must allocate to store shadow copies?
publication schedules
300MB
packet filtering and end-to-end security.
spanned
2. To set printer priorities - you must do all of the following except __________.
self-enrollment
Directory Service
create multiple print users
Automatically
3. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
Reliability and Performance Monitor
planning and design
IPSec
private key
4. Which feature enables users to request their own PKI certificates - typically through a Web browser?
health certificate
self-enrollment
Reliability and Performance Monitor
full mesh
5. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
full mesh
packet filtering and end-to-end security.
Windows Server 2008
6. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
performance Monitor
Key Addition Failures
online file settings
Printer Sharing
7. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
print server
File Server Resource Manager
Group Policy updates
Setup
8. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
Printer > Pause Printing
Shadow Copies of Shared Folders
RAID-5
publication schedules
9. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
namespace server
Certificate Manager
file server at each location
performance Monitor
10. Which digital document contains identifying information about a particular user - computer - service - and so on?
cryptographic checksum
Windows PowerShell
digital certificate
spanned
11. What allows traffic that is defined in one direction to also be defined in the opposite direction?
mirroring
additional user experience features
health certificate
self-enrollment
12. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
print router
sharing and security
virtual
header of each packet
13. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
F10
Windows NT
Security Parameters Index (SPI)
Automatically
14. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
by right-clicking on the file and selecting Restore previous versions
1
Printer > Pause Printing
sharing and security
15. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
NTFS
1
file server at each location
NAP enforcement method
16. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
NAP enforcement method
point-in-time
file-sharing strategy
spanned
17. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
older versions
IPSec
identity spoofing
Certificate Manager
18. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
intermediate
Shadow Copies of Shared Folders
Installing a printer
file-sharing strategy
19. In which view can you view the counters associated with Data Collector Sets?
controlling download and installation behavior
manual
proper permissions
performance Monitor
20. Print Server is the only ___________ that is required when you add the Print Services role
netsh
role service
files/folders/volumes
self-enrollment
21. What is the default authentication protocol in an Active Directory network?
Kerberos v5
packet filtering and end-to-end security.
Online Responder
Certificate Practice Statement
22. Which of the following is not a tool that can help you proactively troubleshoot network problems?
Isolation
performance console
number of file servers
confidentiality and data encryption.
23. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
enterprise
Reliability Monitor
Security Parameters Index (SPI)
24. Just as with folder shares - what must clients have to access a shared printer?
proper permissions
Installing a printer
Certificate Manager
netsh
25. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
enforcement point
health certificate
performance Monitor
Duplicate
26. To share printers - which Network Sharing and Discovery setting must be turned on?
Diagnostics node
Printer Sharing
Printer > Use Printer Offline
namespace server
27. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
4
virtual
NTFS
more than 1 -000
28. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
enterprise
1
online file settings
Printer > Use Printer Offline
29. By default - the Print Management console displays only which of the following in its list of print servers?
Security Parameters Index (SPI)
simpler
write
local machine
30. Which log should be the first place you look when you suspect a problem with Active Directory?
intermediate
Windows print architecture
remediation server
Directory Service
31. Windows automatically makes a user the owner of all files that he or she creates on a _____
volume
DHCP enforcement method
security settings associated with each template
server volume
32. What type of backup is supported by Windows Server 2008?
cryptographic checksum
manual
print server
compliance - autoremediation
33. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
online file settings
Online Responder
64
Statement of Health
34. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
NTLM Authentication
print server
Certificate Manager
35. In which node is Event Viewer located?
Diagnostics node
Terminal Services Gateway (TS Gateway) enforcement
Certificate Practice Statement
Reliability Monitor
36. What feature allows users or computers to manually request a certificate based a template?
remediation server
hard quota
Enroll ACL
Terminal Services Gateway (TS Gateway) enforcement
37. The system partition contains what types of files?
older versions
hardware-related files that the computer uses to boot
both A & B
Reliability and Performance Monitor
38. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
a built-in network monitor.
point-in-time
480
IPSec
39. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
8
NTLM Authentication
identity spoofing
a built-in network monitor.
40. How many possibilities of filter combinations exist in the Print Management Console?
DVD
performance Monitor
System Monitor
more than 1 -000
41. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
write
480
enterprise
main mode negotiations
42. Printing in Microsoft Windows typically involves all of the following components except a __________.
print router
planning and design
Automatically
point-in-time
43. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
controlling download and installation behavior
Acquire Failures
server volume
file-based
44. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
64
4
300MB
45. Where is the checksum located?
header of each packet
cryptographic checksum
Key Addition Failures
Macintosh and Linux computers
46. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
server volume
spanned
print server
Setup
47. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
health certificate
Online Responder
Isolation
48. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
file server at each location
controlling download and installation behavior
virtual
older versions
49. Shadow Copies of Shared Folders functionality is enabled at which level?
share permissions
local machine
volume
Windows NT
50. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
sharing and security
NAP enforcement method
Certificate Practice Statement
Installing a printer