SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many possibilities of filter combinations exist in the Print Management Console?
workstations
write
access the shadow copies
more than 1 -000
2. A maximum of how many shadow copies can be stored on a particular volume?
64
7:00 am and 12:00 pm
create event log entries
1
3. To set printer priorities - you must do all of the following except __________.
Kerberos v5 protocol
create multiple print users
Internet Printing role service
Directory Service
4. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
remediation server
volume
480
DHCP enforcement method
5. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
file-sharing strategy
Printer > Use Printer Offline
security settings associated with each template
6. To install the _____________ - you must also install the Web Server (IIS) role
per user
resource
health certificate
Internet Printing role service
7. Print Server is the only ___________ that is required when you add the Print Services role
identity spoofing
role service
7:00 am and 12:00 pm
hardware-related files that the computer uses to boot
8. In which node is Event Viewer located?
Group Policy updates
Diagnostics node
a built-in network monitor.
Statement of Health
9. What feature allows users or computers to manually request a certificate based a template?
NTLM Authentication
Enroll ACL
Volume Shadow Copies
Windows NT
10. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
Printer > Use Printer Offline
spanned
7:00 am and 12:00 pm
point-in-time
11. To share printers - which Network Sharing and Discovery setting must be turned on?
namespace server
NTFS
identity spoofing
Printer Sharing
12. Updates that can be deployed via WSUS can include all of the following except __________.
both A & B
additional user experience features
security settings associated with each template
performance console
13. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
Installing a printer
performance counters
Macintosh and Linux computers
Printer > Use Printer Offline
14. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
RAID-5
point-in-time
F10
Automatically
15. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
enterprise
480
Volume Shadow Copies
Certificate Practice Statement
16. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
power-cycling the unit
performance Monitor
publication schedules
System Monitor
17. The Authentication Header (AH) protocol does not provide _____________________
Disk Configuration MMC snap-in
confidentiality and data encryption.
300MB
point-in-time
18. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
older versions
both A & B
manually install
create event log entries
19. Which of the following is not an option with the Print Services Management Console?
namespace server
private key
Authentication exemption
Installing a printer
20. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
64
manually install
main mode negotiations
Certificate Practice Statement
21. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
Windows PowerShell
enterprise
Statement of Health
NTFS
22. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Enhanced Metafile (EMF)
RAID-5
enterprise
64
23. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
Printer Sharing
partitioning drives
enforcement point
Volume Shadow Copies
24. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
virtual
Key Addition Failures
role service
DVD
25. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
NAP Agent
cryptographic checksum
security settings associated with each template
Windows Server 2003 R2
26. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
more than 1 -000
1
Automatically
NTLM Authentication
27. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
remediation server
1
per user
4
28. Printing in Microsoft Windows typically involves all of the following components except a __________.
print router
write
mutual authentication
Enhanced Metafile (EMF)
29. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
point-in-time
64
Statement of Health
30. Which of the following is the default view of the Reliability and Performance Monitor?
performance console
resource
Windows PowerShell
additional user experience features
31. You cannot mark an existing dynamic disk as an ____________.
performance counters
active partition
Diagnostics node
per user
32. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
number of file servers
spanned
Terminal Services Gateway (TS Gateway) enforcement
Windows print architecture
33. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
packet filtering and end-to-end security.
write
DVD
volume
34. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
netsh
Setup
sharing and security
file server at each location
35. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Macintosh and Linux computers
file-sharing strategy
Setup
DVD
36. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Diagnostics node
Reliability Monitor
both A & B
confidentiality and data encryption.
37. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
packet filtering and end-to-end security.
Reliability and Performance Monitor
DFS Replication
access particular servers
38. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
performance console
namespace server
manually install
role service
39. Which of the following are the specific processes or events that you want to track?
DHCP enforcement method
performance counters
by right-clicking on the file and selecting Restore previous versions
Duplicate
40. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
NAP enforcement method
DVD
a built-in network monitor.
identity spoofing
41. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
point-in-time
more than 1 -000
cryptographic checksum
quick mode negotiations
42. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
enforcement point
performance Monitor
identity spoofing
partitions and drives
43. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
Shadow Copies of Shared Folders
remediation server
RAID-5
performance console
44. How many active partitions can you have per hard drive?
a built-in network monitor.
1
compliance - autoremediation
more than 1 -000
45. IKE main mode has a default lifetime of __________ hours.
8
main mode negotiations
Reliability and Performance Monitor
compliance - autoremediation
46. Which of the following is not a category for the Windows operating system updates?
manual
Macintosh and Linux computers
Group Policy updates
access particular servers
47. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
identity spoofing
create multiple print users
partitions and drives
Group Policy updates
48. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
per user
power-cycling the unit
64
partitions and drives
49. What is the default authentication protocol in an Active Directory network?
a built-in network monitor.
Kerberos v5
Enroll ACL
enforcement point
50. Which of the following is not a tool that can help you proactively troubleshoot network problems?
mirroring
performance console
power-cycling the unit
confidentiality and data encryption.