SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
Acquire Failures
print router
health certificate
2. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
digital certificate
hard quota
workstations
mirroring
3. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
Acquire Failures
access particular servers
local machine
Volume Shadow Copies
4. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
quick mode negotiations
Setup
mutual authentication
main mode negotiations
5. By default - what topology do replication groups use?
Internet Printing role service
NTLM Authentication
full mesh
DHCP enforcement method
6. Which log should be the first place you look when you suspect a problem with Active Directory?
packet filtering and end-to-end security.
point-in-time
security settings associated with each template
Directory Service
7. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
Reliability and Performance Monitor
Windows Server 2008
main mode negotiations
8. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
namespace server
proper permissions
both A & B
sharing and security
9. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
compliance - autoremediation
partitioning drives
Authentication exemption
keeping track of print devices
10. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
Shadow Copies of Shared Folders
proper permissions
Reliability and Performance Monitor
DFS Replication
11. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
quick mode negotiations
Windows PowerShell
Key Addition Failures
create multiple print users
12. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Certificate Manager
volume
F10
Installing a printer
13. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
enforcement point
manually install
workstations
14. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
quick mode negotiations
File Server Resource Manager
security settings associated with each template
manual
15. NTFS quotas are limited to controlling storage on entire volumes on what basis?
power-cycling the unit
virtual
Authentication exemption
per user
16. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
enterprise
access particular servers
Reliability and Performance Monitor
older versions
17. In which node is Event Viewer located?
write
mutual authentication
Diagnostics node
Security Parameters Index (SPI)
18. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
DHCP enforcement method
hard quota
namespace server
manually install
19. How can users restore previous versions of files on the selected volumes?
volume
System Statement of Health Response
file server at each location
by right-clicking on the file and selecting Restore previous versions
20. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
files/folders/volumes
point-in-time
a built-in network monitor.
Windows print architecture
21. You can create your own ______
volume
keeping track of print devices
custom Data Collector Set
Printer > Use Printer Offline
22. Depending on the configuration item that is being monitored for _____________ may not be possible.
4
Automatically
Reliability Monitor
compliance - autoremediation
23. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
netsh
Isolation
file-sharing strategy
Certificate Practice Statement
24. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
enforcement point
DFS Replication
IPSec
sharing and security
25. By default - the Print Management console displays only which of the following in its list of print servers?
local machine
Statement of Health
resource
sharing and security
26. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
partitioning drives
hard quota
number of file servers
keeping track of print devices
27. Where is the checksum located?
header of each packet
remediation server
Acquire Failures
file-sharing strategy
28. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
Macintosh and Linux computers
Disk Configuration MMC snap-in
active partition
mutual authentication
29. A single computer cannot perform all of the roles in the______________
Windows print architecture
intermediate
60 - 86 -400
health certificate
30. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
simpler
cryptographic checksum
Reliability Monitor
create event log entries
31. What are the IPSEC default settings for the key lifetime in minutes?
volume
NTLM Authentication
480
enterprise
32. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
write
intermediate
namespace server
Windows NT
33. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
virtual
file server at each location
Macintosh and Linux computers
NAP Agent
34. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
identity spoofing
local machine
Windows print architecture
35. How many active partitions can you have per hard drive?
1
F10
network traffic
Statement of Health
36. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
active partition
controlling download and installation behavior
workstations
performance counters
37. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
F10
64
local machine
Acquire Failures
38. A maximum of how many shadow copies can be stored on a particular volume?
64
proper permissions
access particular servers
active partition
39. If you wish to perform backups from the command line - what will you need to install?
custom Data Collector Set
Windows PowerShell
resource
cryptographic checksum
40. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
per user
remediation server
Setup
spanned
41. IKE main mode has a default lifetime of __________ hours.
per user
Kerberos v5 protocol
Macintosh and Linux computers
8
42. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Enhanced Metafile (EMF)
7:00 am and 12:00 pm
Internet Printing role service
main mode negotiations
43. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
health certificate
Reliability and Performance Monitor
System Statement of Health Response
Printer > Pause Printing
44. NTFS quotas are able to do which of the following?
create event log entries
a built-in network monitor.
workstations
performance counters
45. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
Volume Shadow Copies
health certificate
Windows print architecture
private key
46. Which feature enables users to request their own PKI certificates - typically through a Web browser?
write
Windows print architecture
self-enrollment
performance console
47. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
identity spoofing
print server
F10
Reliability and Performance Monitor
48. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
identity spoofing
create multiple print users
4
additional user experience features
49. To share printers - which Network Sharing and Discovery setting must be turned on?
packet filtering and end-to-end security.
role service
administrative privileges
Printer Sharing
50. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
by right-clicking on the file and selecting Restore previous versions
keeping track of print devices
compliance - autoremediation
older versions