Test your basic knowledge |

Windows Server Administration

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________






2. Windows Server 2008 does not include ______________






3. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.






4. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?






5. Which of the following are the specific processes or events that you want to track?






6. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?






7. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?






8. Which of the following is not a node found in the Print Management console?






9. Which of the following prohibits users from consuming any disk space beyond the allotted amount?






10. Print Server is the only ___________ that is required when you add the Print Services role






11. Where is the checksum located?






12. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.






13. The Authentication Header (AH) protocol does not provide _____________________






14. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?






15. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?






16. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?






17. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?






18. Printing in Microsoft Windows typically involves all of the following components except a __________.






19. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?






20. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?






21. The NPS service combines each Statement of Health Response into what?






22. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?






23. What is the minimum amount of space you must allocate to store shadow copies?






24. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?






25. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?






26. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.






27. To set printer priorities - you must do all of the following except __________.






28. NTFS quotas are able to do which of the following?






29. Server management includes all of the following with the exception of __________.






30. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.






31. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?






32. To share printers - which Network Sharing and Discovery setting must be turned on?






33. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?






34. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.






35. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.






36. Which feature enables users to request their own PKI certificates - typically through a Web browser?






37. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?






38. What is one of the major problems for printing administrators on large enterprise networks?






39. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.






40. In which node is Event Viewer located?






41. Which of the following is not a category for the Windows operating system updates?






42. The system partition contains what types of files?






43. A maximum of how many shadow copies can be stored on a particular volume?






44. Shadow Copies of Shared Folders functionality is enabled at which level?






45. A single computer cannot perform all of the roles in the______________






46. Just as with folder shares - what must clients have to access a shared printer?






47. What are the IPSEC default settings for the key lifetime in minutes?






48. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.






49. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?






50. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?