SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
print server
custom Data Collector Set
Kerberos v5 protocol
2. IKE main mode has a default lifetime of __________ hours.
1
Automatically
8
7:00 am and 12:00 pm
3. Where is the checksum located?
custom Data Collector Set
header of each packet
480
Authentication exemption
4. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
write
Kerberos v5
Windows Server 2003 R2
5. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
Windows NT
NTFS
Security Parameters Index (SPI)
files/folders/volumes
6. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
power-cycling the unit
simpler
cryptographic checksum
per user
7. What feature allows users or computers to manually request a certificate based a template?
NAP enforcement method
cryptographic checksum
Reliability Monitor
Enroll ACL
8. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
compliance - autoremediation
Acquire Failures
Kerberos v5 protocol
active partition
9. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
partitions and drives
health certificate
Installing a printer
online file settings
10. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
role service
server volume
Macintosh and Linux computers
11. The system partition contains what types of files?
hard quota
performance Monitor
hardware-related files that the computer uses to boot
1
12. By default - what topology do replication groups use?
Printer > Pause Printing
write
full mesh
additional user experience features
13. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
4
resource
private key
security settings associated with each template
14. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
DFS Replication
health certificate
performance Monitor
Enroll ACL
15. Depending on the configuration item that is being monitored for _____________ may not be possible.
Statement of Health
Security Parameters Index (SPI)
compliance - autoremediation
role service
16. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
file server at each location
manual
Acquire Failures
Online Responder
17. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
share permissions
Printer > Pause Printing
sharing and security
Isolation
18. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
number of file servers
packet filtering and end-to-end security.
Duplicate
file server at each location
19. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
access the shadow copies
mirroring
64
role service
20. Which digital document contains identifying information about a particular user - computer - service - and so on?
Windows PowerShell
planning and design
print server
digital certificate
21. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
performance console
System Monitor
file server at each location
spanned
22. The Authentication Header (AH) protocol does not provide _____________________
main mode negotiations
point-in-time
Acquire Failures
confidentiality and data encryption.
23. Which of the following is not a node found in the Print Management console?
sharing and security
custom Data Collector Set
simpler
power-cycling the unit
24. What is the default authentication protocol in an Active Directory network?
Kerberos v5
publication schedules
performance console
file server at each location
25. You can create your own ______
custom Data Collector Set
mutual authentication
older versions
digital certificate
26. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
64
Automatically
System Statement of Health Response
netsh
27. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
support for Unix-based systems
compliance - autoremediation
enforcement point
Authentication exemption
28. What are the IPSEC default settings for the key lifetime in minutes?
Internet Printing role service
Kerberos v5
access particular servers
480
29. Windows Server 2008 does not include ______________
keeping track of print devices
server volume
remediation server
a built-in network monitor.
30. To set printer priorities - you must do all of the following except __________.
print router
create multiple print users
write
quick mode negotiations
31. Printing in Microsoft Windows typically involves all of the following components except a __________.
main mode negotiations
Duplicate
print router
planning and design
32. Windows Server Backup supports the use of what type of media as backup destinations?
Shadow Copies of Shared Folders
planning and design
support for Unix-based systems
DVD
33. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
Security Parameters Index (SPI)
Windows Server 2008
hard quota
Volume Shadow Copies
34. How many possibilities of filter combinations exist in the Print Management Console?
Isolation
more than 1 -000
a built-in network monitor.
netsh
35. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
resource
custom Data Collector Set
partitions and drives
enforcement point
36. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Security Parameters Index (SPI)
7:00 am and 12:00 pm
Key Addition Failures
IPSec
37. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
older versions
System Statement of Health Response
mutual authentication
60 - 86 -400
38. How many active partitions can you have per hard drive?
share permissions
Authentication exemption
1
health certificate
39. Which of the following is the default view of the Reliability and Performance Monitor?
Reliability Monitor
resource
Acquire Failures
manually install
40. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
digital certificate
Automatically
netsh
IPSec
41. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
mirroring
number of file servers
Windows Server 2003 R2
print router
42. Which of the following are the specific processes or events that you want to track?
Statement of Health
main mode negotiations
private key
performance counters
43. What is one of the major problems for printing administrators on large enterprise networks?
Windows Server 2008
Group Policy updates
namespace server
keeping track of print devices
44. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
namespace server
Macintosh and Linux computers
Security Parameters Index (SPI)
NAP Agent
45. Windows automatically makes a user the owner of all files that he or she creates on a _____
local machine
Reliability and Performance Monitor
server volume
custom Data Collector Set
46. NTFS quotas are limited to controlling storage on entire volumes on what basis?
compliance - autoremediation
Printer > Use Printer Offline
per user
Certificate Manager
47. A single computer cannot perform all of the roles in the______________
DFS Replication
performance counters
performance Monitor
Windows print architecture
48. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
Printer > Use Printer Offline
netsh
access the shadow copies
Authentication exemption
49. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
keeping track of print devices
Windows Server 2008
Macintosh and Linux computers
hard quota
50. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
write
partitions and drives
main mode negotiations
create multiple print users
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests