SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
Windows Server 2003 R2
Reliability and Performance Monitor
NAP enforcement method
role service
2. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
local machine
60 - 86 -400
simpler
4
3. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
active partition
netsh
server volume
NTLM Authentication
4. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
create event log entries
custom Data Collector Set
virtual
Terminal Services Gateway (TS Gateway) enforcement
5. To set printer priorities - you must do all of the following except __________.
create multiple print users
netsh
Internet Printing role service
partitions and drives
6. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
manually install
older versions
Authentication exemption
Certificate Practice Statement
7. What is the minimum amount of space you must allocate to store shadow copies?
older versions
by right-clicking on the file and selecting Restore previous versions
300MB
Automatically
8. The NPS service combines each Statement of Health Response into what?
7:00 am and 12:00 pm
System Statement of Health Response
enterprise
access particular servers
9. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
partitioning drives
more than 1 -000
Security Parameters Index (SPI)
300MB
10. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
identity spoofing
controlling download and installation behavior
Windows Server 2008
Certificate Manager
11. Print Server is the only ___________ that is required when you add the Print Services role
more than 1 -000
full mesh
Enhanced Metafile (EMF)
role service
12. A single computer cannot perform all of the roles in the______________
Statement of Health
manual
Windows print architecture
manually install
13. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
publication schedules
Printer > Pause Printing
online file settings
Isolation
14. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
4
planning and design
namespace server
15. The Authentication Header (AH) protocol does not provide _____________________
header of each packet
Windows Server 2003 R2
confidentiality and data encryption.
resource
16. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
namespace server
file-sharing strategy
RAID-5
NTLM Authentication
17. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
local machine
role service
DVD
18. Windows Server Backup supports the use of what type of media as backup destinations?
Setup
keeping track of print devices
DVD
file-sharing strategy
19. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
SPI field
workstations
7:00 am and 12:00 pm
access the shadow copies
20. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
300MB
access the shadow copies
older versions
Online Responder
21. In which node is Event Viewer located?
Kerberos v5
Diagnostics node
performance console
hard quota
22. Where is the checksum located?
Shadow Copies of Shared Folders
header of each packet
enterprise
simpler
23. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Internet Printing role service
enforcement point
partitions and drives
Setup
24. The File Server Resource Manager console was first introduced in which product?
both A & B
full mesh
Isolation
Windows Server 2003 R2
25. NTFS quotas are limited to controlling storage on entire volumes on what basis?
Printer Sharing
point-in-time
Macintosh and Linux computers
per user
26. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
enterprise
480
network traffic
header of each packet
27. Do not use Tunnel mode when you require _________________
Setup
Reliability Monitor
security settings associated with each template
packet filtering and end-to-end security.
28. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
DFS Replication
System Statement of Health Response
number of file servers
private key
29. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
support for Unix-based systems
volume
Duplicate
Directory Service
30. Which log should be the first place you look when you suspect a problem with Active Directory?
64
netsh
Directory Service
print server
31. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
NTLM Authentication
Statement of Health
by right-clicking on the file and selecting Restore previous versions
hardware-related files that the computer uses to boot
32. By default - the Print Management console displays only which of the following in its list of print servers?
Windows Server 2008
1
local machine
DFS Replication
33. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
DVD
support for Unix-based systems
volume
Printer > Pause Printing
34. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
both A & B
SPI field
Terminal Services Gateway (TS Gateway) enforcement
35. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
Windows print architecture
NTLM Authentication
Printer > Pause Printing
digital certificate
36. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
private key
Online Responder
Duplicate
37. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
simpler
cryptographic checksum
share permissions
Isolation
38. What feature allows users or computers to manually request a certificate based a template?
point-in-time
create multiple print users
Enroll ACL
60 - 86 -400
39. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
planning and design
Printer > Pause Printing
create event log entries
Automatically
40. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
Disk Configuration MMC snap-in
480
Terminal Services Gateway (TS Gateway) enforcement
41. Depending on the configuration item that is being monitored for _____________ may not be possible.
write
virtual
enforcement point
compliance - autoremediation
42. Compared with NTFS permissions - printer permissions are __________.
Enroll ACL
Windows NT
enforcement point
simpler
43. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
online file settings
quick mode negotiations
partitioning drives
main mode negotiations
44. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
online file settings
mirroring
volume
DHCP enforcement method
45. What are the IPSEC default settings for the key lifetime in minutes?
Windows Server 2008
Volume Shadow Copies
Online Responder
480
46. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
main mode negotiations
print router
Printer > Use Printer Offline
volume
47. What is the default authentication protocol in an Active Directory network?
Kerberos v5
custom Data Collector Set
Windows NT
access the shadow copies
48. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
namespace server
System Statement of Health Response
Kerberos v5
Disk Configuration MMC snap-in
49. If you wish to perform backups from the command line - what will you need to install?
print router
Online Responder
private key
Windows PowerShell
50. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
local machine
Key Addition Failures
Shadow Copies of Shared Folders
System Monitor