SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is not an option with the Print Services Management Console?
Windows print architecture
Online Responder
Installing a printer
private key
2. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
header of each packet
System Statement of Health Response
sharing and security
Key Addition Failures
3. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
64
Automatically
file server at each location
7:00 am and 12:00 pm
4. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
64
files/folders/volumes
point-in-time
enterprise
5. Depending on the configuration item that is being monitored for _____________ may not be possible.
file-sharing strategy
access the shadow copies
resource
compliance - autoremediation
6. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
manually install
Macintosh and Linux computers
System Monitor
Terminal Services Gateway (TS Gateway) enforcement
7. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
partitioning drives
server volume
Enroll ACL
private key
8. Which of the following is not a category for the Windows operating system updates?
Diagnostics node
64
main mode negotiations
Group Policy updates
9. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
partitioning drives
spanned
NAP enforcement method
Certificate Practice Statement
10. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
publication schedules
intermediate
print server
namespace server
11. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
main mode negotiations
manually install
Printer > Pause Printing
enterprise
12. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
packet filtering and end-to-end security.
Kerberos v5
mutual authentication
security settings associated with each template
13. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
partitioning drives
identity spoofing
7:00 am and 12:00 pm
access the shadow copies
14. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Windows print architecture
Kerberos v5 protocol
print server
power-cycling the unit
15. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
performance Monitor
manually install
Group Policy updates
network traffic
16. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
remediation server
Shadow Copies of Shared Folders
Acquire Failures
Windows print architecture
17. What type of backup is supported by Windows Server 2008?
manual
both A & B
volume
more than 1 -000
18. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
simpler
cryptographic checksum
NAP Agent
Kerberos v5 protocol
19. Do not use Tunnel mode when you require _________________
packet filtering and end-to-end security.
network traffic
Isolation
access the shadow copies
20. What is the minimum amount of space you must allocate to store shadow copies?
network traffic
300MB
Kerberos v5
mutual authentication
21. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
virtual
F10
NTLM Authentication
Reliability Monitor
22. Which digital document contains identifying information about a particular user - computer - service - and so on?
keeping track of print devices
header of each packet
digital certificate
DVD
23. Which of the following are the specific processes or events that you want to track?
System Statement of Health Response
mirroring
performance counters
active partition
24. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
power-cycling the unit
7:00 am and 12:00 pm
online file settings
remediation server
25. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
active partition
Online Responder
8
26. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
enforcement point
confidentiality and data encryption.
DHCP enforcement method
27. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
partitioning drives
workstations
mirroring
NAP enforcement method
28. Just as with folder shares - what must clients have to access a shared printer?
number of file servers
manual
hard quota
proper permissions
29. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
NAP enforcement method
Printer > Use Printer Offline
IPSec
File Server Resource Manager
30. By default - the Print Management console displays only which of the following in its list of print servers?
local machine
Setup
custom Data Collector Set
self-enrollment
31. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
write
partitioning drives
simpler
Macintosh and Linux computers
32. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Online Responder
performance counters
RAID-5
cryptographic checksum
33. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
older versions
create multiple print users
Diagnostics node
namespace server
34. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
identity spoofing
create event log entries
netsh
Reliability Monitor
35. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
both A & B
Isolation
hard quota
Windows print architecture
36. The File Server Resource Manager console was first introduced in which product?
Acquire Failures
4
Windows Server 2003 R2
64
37. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
Volume Shadow Copies
enforcement point
Setup
self-enrollment
38. To install the _____________ - you must also install the Web Server (IIS) role
volume
access the shadow copies
Internet Printing role service
Windows Server 2003 R2
39. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Setup
more than 1 -000
Disk Configuration MMC snap-in
Windows NT
40. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
sharing and security
DFS Replication
Kerberos v5 protocol
RAID-5
41. IKE main mode has a default lifetime of __________ hours.
Macintosh and Linux computers
Windows NT
8
enterprise
42. You can create your own ______
64
custom Data Collector Set
Diagnostics node
Reliability and Performance Monitor
43. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
packet filtering and end-to-end security.
point-in-time
Windows Server 2003 R2
64
44. What are the IPSEC default settings for the key lifetime in minutes?
480
remediation server
by right-clicking on the file and selecting Restore previous versions
file server at each location
45. Which log should be the first place you look when you suspect a problem with Active Directory?
Acquire Failures
Directory Service
Windows NT
NAP Agent
46. Updates that can be deployed via WSUS can include all of the following except __________.
file server at each location
virtual
quick mode negotiations
additional user experience features
47. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
security settings associated with each template
per user
self-enrollment
mirroring
48. The Authentication Header (AH) protocol does not provide _____________________
NAP enforcement method
private key
confidentiality and data encryption.
virtual
49. NTFS quotas are limited to controlling storage on entire volumes on what basis?
server volume
IPSec
per user
full mesh
50. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
online file settings
performance Monitor
7:00 am and 12:00 pm