SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What feature allows users or computers to manually request a certificate based a template?
planning and design
Enroll ACL
Printer > Use Printer Offline
Diagnostics node
2. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
64
point-in-time
Setup
Certificate Manager
3. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
Certificate Practice Statement
DFS Replication
Terminal Services Gateway (TS Gateway) enforcement
4. If you wish to perform backups from the command line - what will you need to install?
IPSec
create event log entries
Windows PowerShell
volume
5. Server management includes all of the following with the exception of __________.
both A & B
File Server Resource Manager
print router
controlling download and installation behavior
6. Printing in Microsoft Windows typically involves all of the following components except a __________.
7:00 am and 12:00 pm
simpler
F10
print router
7. What type of backup is supported by Windows Server 2008?
manual
a built-in network monitor.
self-enrollment
header of each packet
8. IKE main mode has a default lifetime of __________ hours.
64
Installing a printer
8
SPI field
9. Where is the checksum located?
Isolation
1
header of each packet
Windows Server 2003 R2
10. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
a built-in network monitor.
self-enrollment
Enhanced Metafile (EMF)
files/folders/volumes
11. A period of _______________ is necessary before you start implementation of a file server deployment.
planning and design
DFS Replication
workstations
packet filtering and end-to-end security.
12. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Reliability Monitor
network traffic
NAP enforcement method
Statement of Health
13. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Certificate Practice Statement
partitioning drives
netsh
Internet Printing role service
14. How can users restore previous versions of files on the selected volumes?
Internet Printing role service
private key
by right-clicking on the file and selecting Restore previous versions
Diagnostics node
15. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
create multiple print users
DVD
Windows NT
1
16. The NPS service combines each Statement of Health Response into what?
System Statement of Health Response
create multiple print users
Acquire Failures
netsh
17. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
Statement of Health
mutual authentication
Authentication exemption
server volume
18. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
main mode negotiations
intermediate
mutual authentication
19. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
create event log entries
identity spoofing
Windows Server 2003 R2
Duplicate
20. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
digital certificate
8
share permissions
Volume Shadow Copies
21. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
performance counters
manually install
Statement of Health
Windows NT
22. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
network traffic
virtual
support for Unix-based systems
number of file servers
23. Which of the following is not a tool that can help you proactively troubleshoot network problems?
performance console
4
additional user experience features
self-enrollment
24. You can create your own ______
Automatically
custom Data Collector Set
SPI field
digital certificate
25. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
files/folders/volumes
Kerberos v5 protocol
write
performance console
26. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
Isolation
Reliability and Performance Monitor
identity spoofing
access particular servers
27. What is the default authentication protocol in an Active Directory network?
Printer > Use Printer Offline
Kerberos v5
enterprise
server volume
28. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
Printer > Use Printer Offline
main mode negotiations
RAID-5
29. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
Windows print architecture
8
both A & B
file-sharing strategy
30. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
cryptographic checksum
DHCP enforcement method
Macintosh and Linux computers
header of each packet
31. To install the _____________ - you must also install the Web Server (IIS) role
custom Data Collector Set
Online Responder
Internet Printing role service
Printer > Pause Printing
32. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Group Policy updates
Windows Server 2008
header of each packet
Enroll ACL
33. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
64
4
self-enrollment
health certificate
34. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
partitions and drives
performance console
Authentication exemption
Automatically
35. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
security settings associated with each template
support for Unix-based systems
mutual authentication
power-cycling the unit
36. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
point-in-time
performance Monitor
hardware-related files that the computer uses to boot
Setup
37. What is one of the major problems for printing administrators on large enterprise networks?
keeping track of print devices
online file settings
mirroring
System Statement of Health Response
38. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
performance Monitor
simpler
Kerberos v5 protocol
network traffic
39. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
namespace server
partitioning drives
mirroring
virtual
40. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
full mesh
point-in-time
confidentiality and data encryption.
Authentication exemption
41. Which of the following is not a node found in the Print Management console?
access the shadow copies
file-sharing strategy
virtual
sharing and security
42. Which log should be the first place you look when you suspect a problem with Active Directory?
Directory Service
spanned
virtual
mutual authentication
43. Which digital document contains identifying information about a particular user - computer - service - and so on?
Printer Sharing
digital certificate
access the shadow copies
Kerberos v5
44. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
main mode negotiations
quick mode negotiations
spanned
Kerberos v5 protocol
45. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
64
Acquire Failures
Directory Service
Isolation
46. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
spanned
compliance - autoremediation
number of file servers
Kerberos v5
47. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
Printer > Pause Printing
file-based
Installing a printer
network traffic
48. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
480
netsh
DVD
Acquire Failures
49. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
print server
hardware-related files that the computer uses to boot
cryptographic checksum
Kerberos v5 protocol
50. Which field does the IPSec driver use to match the correct SA with the correct packet?
SPI field
server volume
performance Monitor
full mesh