SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
performance console
enterprise
main mode negotiations
60 - 86 -400
2. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
health certificate
security settings associated with each template
file server at each location
Printer > Use Printer Offline
3. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
hardware-related files that the computer uses to boot
file-sharing strategy
Acquire Failures
Macintosh and Linux computers
4. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
keeping track of print devices
packet filtering and end-to-end security.
active partition
5. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
480
intermediate
confidentiality and data encryption.
F10
6. Server management includes all of the following with the exception of __________.
Statement of Health
Security Parameters Index (SPI)
controlling download and installation behavior
Windows PowerShell
7. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
main mode negotiations
role service
older versions
identity spoofing
8. Which feature enables users to request their own PKI certificates - typically through a Web browser?
volume
share permissions
self-enrollment
security settings associated with each template
9. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
number of file servers
64
Shadow Copies of Shared Folders
Online Responder
10. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Automatically
NAP enforcement method
Windows Server 2003 R2
share permissions
11. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
netsh
File Server Resource Manager
active partition
volume
12. In which view can you view the counters associated with Data Collector Sets?
virtual
Online Responder
NAP Agent
performance Monitor
13. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
additional user experience features
full mesh
health certificate
mutual authentication
14. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
custom Data Collector Set
Certificate Practice Statement
intermediate
Windows PowerShell
15. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
by right-clicking on the file and selecting Restore previous versions
files/folders/volumes
quick mode negotiations
Reliability and Performance Monitor
16. Windows Server Backup supports the use of what type of media as backup destinations?
full mesh
manually install
DVD
planning and design
17. What is the default authentication protocol in an Active Directory network?
mutual authentication
enterprise
Acquire Failures
Kerberos v5
18. Shadow Copies of Shared Folders functionality is enabled at which level?
volume
Windows NT
RAID-5
proper permissions
19. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Key Addition Failures
share permissions
full mesh
Duplicate
20. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
online file settings
write
Terminal Services Gateway (TS Gateway) enforcement
performance Monitor
21. By default - what topology do replication groups use?
access particular servers
cryptographic checksum
full mesh
file-based
22. Windows Server 2008 does not include ______________
netsh
a built-in network monitor.
create event log entries
quick mode negotiations
23. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
resource
hard quota
Printer > Pause Printing
print server
24. Which of the following is the default view of the Reliability and Performance Monitor?
NTLM Authentication
online file settings
resource
controlling download and installation behavior
25. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Key Addition Failures
Statement of Health
hard quota
private key
26. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
role service
Security Parameters Index (SPI)
Volume Shadow Copies
Printer > Pause Printing
27. Do not use Tunnel mode when you require _________________
network traffic
local machine
packet filtering and end-to-end security.
cryptographic checksum
28. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
number of file servers
digital certificate
performance Monitor
Reliability and Performance Monitor
29. What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
digital certificate
NAP Agent
administrative privileges
30. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
Automatically
Terminal Services Gateway (TS Gateway) enforcement
Certificate Practice Statement
RAID-5
31. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
Group Policy updates
Windows print architecture
Terminal Services Gateway (TS Gateway) enforcement
digital certificate
32. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
F10
point-in-time
performance counters
partitions and drives
33. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
F10
support for Unix-based systems
Certificate Manager
Windows NT
34. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
Shadow Copies of Shared Folders
compliance - autoremediation
server volume
35. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
files/folders/volumes
Kerberos v5
manually install
Enroll ACL
36. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
support for Unix-based systems
Diagnostics node
volume
partitions and drives
37. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Installing a printer
share permissions
keeping track of print devices
Automatically
38. The NPS service combines each Statement of Health Response into what?
publication schedules
NTLM Authentication
packet filtering and end-to-end security.
System Statement of Health Response
39. IKE main mode has a default lifetime of __________ hours.
8
DHCP enforcement method
file-based
Internet Printing role service
40. Where is the checksum located?
support for Unix-based systems
Key Addition Failures
header of each packet
60 - 86 -400
41. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
64
Windows NT
DHCP enforcement method
42. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
7:00 am and 12:00 pm
partitioning drives
performance Monitor
Key Addition Failures
43. Which of the following is not a node found in the Print Management console?
F10
sharing and security
active partition
DFS Replication
44. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
Shadow Copies of Shared Folders
Reliability Monitor
server volume
private key
45. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
Enhanced Metafile (EMF)
volume
Isolation
online file settings
46. How many active partitions can you have per hard drive?
1
performance counters
Enhanced Metafile (EMF)
Certificate Practice Statement
47. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
remediation server
file server at each location
Directory Service
packet filtering and end-to-end security.
48. What allows traffic that is defined in one direction to also be defined in the opposite direction?
Kerberos v5 protocol
mirroring
Setup
F10
49. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
remediation server
4
Setup
self-enrollment
50. How can users restore previous versions of files on the selected volumes?
by right-clicking on the file and selecting Restore previous versions
64
Acquire Failures
System Statement of Health Response