SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
Enroll ACL
security settings associated with each template
resource
power-cycling the unit
2. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
1
4
Key Addition Failures
workstations
3. Server management includes all of the following with the exception of __________.
System Statement of Health Response
controlling download and installation behavior
Installing a printer
8
4. How many active partitions can you have per hard drive?
Acquire Failures
proper permissions
Printer > Use Printer Offline
1
5. What does the Windows Server Backup feature use to perform file and volume-level backups?
print router
IPSec
DHCP enforcement method
Volume Shadow Copies
6. The File Server Resource Manager console was first introduced in which product?
Windows Server 2003 R2
Automatically
mutual authentication
planning and design
7. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
workstations
print server
System Monitor
header of each packet
8. Which of the following is the default view of the Reliability and Performance Monitor?
header of each packet
Key Addition Failures
local machine
resource
9. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
Volume Shadow Copies
file server at each location
mirroring
file-sharing strategy
10. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
300MB
NAP Agent
confidentiality and data encryption.
11. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
quick mode negotiations
Automatically
Printer > Use Printer Offline
per user
12. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Windows Server 2003 R2
Online Responder
publication schedules
security settings associated with each template
13. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
confidentiality and data encryption.
Printer > Pause Printing
access particular servers
keeping track of print devices
14. Which feature enables users to request their own PKI certificates - typically through a Web browser?
1
7:00 am and 12:00 pm
netsh
self-enrollment
15. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
Windows NT
file-based
spanned
16. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
DVD
active partition
Enroll ACL
Printer > Pause Printing
17. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
quick mode negotiations
packet filtering and end-to-end security.
server volume
System Monitor
18. What type of backup is supported by Windows Server 2008?
power-cycling the unit
manual
Printer > Pause Printing
file-sharing strategy
19. Printing in Microsoft Windows typically involves all of the following components except a __________.
Acquire Failures
print router
point-in-time
manual
20. What are the IPSEC default settings for the key lifetime in minutes?
intermediate
Enhanced Metafile (EMF)
480
partitions and drives
21. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
administrative privileges
Isolation
active partition
Online Responder
22. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
NAP enforcement method
64
Online Responder
local machine
23. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
volume
share permissions
publication schedules
Windows PowerShell
24. Updates that can be deployed via WSUS can include all of the following except __________.
additional user experience features
Duplicate
manually install
NTFS
25. A single computer cannot perform all of the roles in the______________
Authentication exemption
main mode negotiations
mirroring
Windows print architecture
26. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
8
write
administrative privileges
security settings associated with each template
27. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
active partition
64
7:00 am and 12:00 pm
identity spoofing
28. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
access particular servers
Windows Server 2008
network traffic
netsh
29. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
7:00 am and 12:00 pm
a built-in network monitor.
F10
Windows Server 2003 R2
30. How can users restore previous versions of files on the selected volumes?
cryptographic checksum
by right-clicking on the file and selecting Restore previous versions
Windows Server 2003 R2
manual
31. Which log should be the first place you look when you suspect a problem with Active Directory?
NTFS
share permissions
file-based
Directory Service
32. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
RAID-5
identity spoofing
enforcement point
hard quota
33. What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
Windows PowerShell
simpler
Internet Printing role service
34. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
Windows NT
access the shadow copies
performance Monitor
performance console
35. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
System Statement of Health Response
write
cryptographic checksum
Installing a printer
36. Windows automatically makes a user the owner of all files that he or she creates on a _____
compliance - autoremediation
server volume
Reliability and Performance Monitor
64
37. By default - the Print Management console displays only which of the following in its list of print servers?
workstations
Printer > Pause Printing
local machine
header of each packet
38. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
enterprise
hard quota
Volume Shadow Copies
network traffic
39. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
security settings associated with each template
file server at each location
SPI field
Printer > Use Printer Offline
40. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
older versions
60 - 86 -400
access particular servers
Online Responder
41. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
Macintosh and Linux computers
Internet Printing role service
active partition
Shadow Copies of Shared Folders
42. You cannot mark an existing dynamic disk as an ____________.
custom Data Collector Set
DVD
active partition
480
43. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
intermediate
Authentication exemption
security settings associated with each template
both A & B
44. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Printer Sharing
manually install
1
Windows Server 2008
45. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
access particular servers
digital certificate
Enroll ACL
46. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Volume Shadow Copies
proper permissions
Security Parameters Index (SPI)
480
47. Where is the checksum located?
64
header of each packet
Printer > Use Printer Offline
Directory Service
48. Windows Server Backup supports the use of what type of media as backup destinations?
simpler
DVD
480
performance counters
49. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
partitioning drives
Diagnostics node
compliance - autoremediation
8
50. You can create your own ______
4
F10
cryptographic checksum
custom Data Collector Set