SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the minimum amount of space you must allocate to store shadow copies?
compliance - autoremediation
DHCP enforcement method
300MB
4
2. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
Online Responder
main mode negotiations
Acquire Failures
per user
3. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
Group Policy updates
Directory Service
Online Responder
4. Depending on the configuration item that is being monitored for _____________ may not be possible.
compliance - autoremediation
Reliability Monitor
volume
simpler
5. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
full mesh
NAP Agent
a built-in network monitor.
write
6. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
manually install
simpler
hard quota
4
7. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
identity spoofing
NTFS
compliance - autoremediation
Online Responder
8. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Duplicate
Security Parameters Index (SPI)
proper permissions
Printer > Use Printer Offline
9. Updates that can be deployed via WSUS can include all of the following except __________.
additional user experience features
NAP enforcement method
resource
Internet Printing role service
10. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
main mode negotiations
Enhanced Metafile (EMF)
Volume Shadow Copies
private key
11. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
64
online file settings
file-based
header of each packet
12. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
confidentiality and data encryption.
Reliability and Performance Monitor
Acquire Failures
13. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
access the shadow copies
Windows print architecture
Reliability Monitor
F10
14. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
packet filtering and end-to-end security.
files/folders/volumes
7:00 am and 12:00 pm
15. Where is the checksum located?
files/folders/volumes
identity spoofing
header of each packet
file server at each location
16. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
files/folders/volumes
DFS Replication
NAP Agent
remediation server
17. Which of the following is not a tool that can help you proactively troubleshoot network problems?
publication schedules
performance Monitor
performance console
remediation server
18. In which node is Event Viewer located?
Diagnostics node
simpler
identity spoofing
create multiple print users
19. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
virtual
access particular servers
mirroring
sharing and security
20. How can users restore previous versions of files on the selected volumes?
Online Responder
by right-clicking on the file and selecting Restore previous versions
Duplicate
File Server Resource Manager
21. What does the Windows Server Backup feature use to perform file and volume-level backups?
manual
hard quota
power-cycling the unit
Volume Shadow Copies
22. Windows Server 2008 does not include ______________
controlling download and installation behavior
header of each packet
System Statement of Health Response
a built-in network monitor.
23. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
60 - 86 -400
file server at each location
publication schedules
24. Windows Server Backup supports the use of what type of media as backup destinations?
compliance - autoremediation
number of file servers
DVD
more than 1 -000
25. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
main mode negotiations
hard quota
point-in-time
Group Policy updates
26. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
NAP enforcement method
mirroring
files/folders/volumes
partitioning drives
27. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
point-in-time
DFS Replication
mutual authentication
60 - 86 -400
28. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
namespace server
64
NTLM Authentication
Printer > Pause Printing
29. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
manual
7:00 am and 12:00 pm
Windows PowerShell
Online Responder
30. What is one of the major problems for printing administrators on large enterprise networks?
keeping track of print devices
Reliability and Performance Monitor
IPSec
Printer > Pause Printing
31. You cannot mark an existing dynamic disk as an ____________.
power-cycling the unit
active partition
files/folders/volumes
access the shadow copies
32. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
a built-in network monitor.
Setup
enforcement point
Security Parameters Index (SPI)
33. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
by right-clicking on the file and selecting Restore previous versions
controlling download and installation behavior
Enhanced Metafile (EMF)
Key Addition Failures
34. NTFS quotas are limited to controlling storage on entire volumes on what basis?
resource
Statement of Health
per user
confidentiality and data encryption.
35. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
create event log entries
health certificate
Certificate Practice Statement
workstations
36. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
enterprise
create multiple print users
Statement of Health
intermediate
37. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
health certificate
security settings associated with each template
IPSec
performance console
38. You can create your own ______
custom Data Collector Set
Kerberos v5 protocol
Enroll ACL
60 - 86 -400
39. To set printer priorities - you must do all of the following except __________.
manually install
System Statement of Health Response
identity spoofing
create multiple print users
40. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
NTFS
quick mode negotiations
Windows Server 2008
manual
41. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
F10
NTFS
Enhanced Metafile (EMF)
System Monitor
42. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
spanned
Certificate Manager
mutual authentication
Windows Server 2008
43. What type of backup is supported by Windows Server 2008?
Kerberos v5 protocol
manual
print router
a built-in network monitor.
44. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
performance Monitor
simpler
print server
performance counters
45. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
enforcement point
digital certificate
Directory Service
mutual authentication
46. The Authentication Header (AH) protocol does not provide _____________________
Terminal Services Gateway (TS Gateway) enforcement
confidentiality and data encryption.
older versions
full mesh
47. IKE main mode has a default lifetime of __________ hours.
1
8
Directory Service
print router
48. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
performance Monitor
older versions
Reliability and Performance Monitor
administrative privileges
49. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
custom Data Collector Set
file-based
Kerberos v5
Statement of Health
50. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
file-sharing strategy
write
print router
Authentication exemption