SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the default authentication protocol in an Active Directory network?
server volume
quick mode negotiations
Kerberos v5
Printer > Use Printer Offline
2. Which of the following is not a tool that can help you proactively troubleshoot network problems?
planning and design
Volume Shadow Copies
keeping track of print devices
performance console
3. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
access the shadow copies
per user
intermediate
NTLM Authentication
4. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
RAID-5
planning and design
DFS Replication
Enhanced Metafile (EMF)
5. Depending on the configuration item that is being monitored for _____________ may not be possible.
compliance - autoremediation
Printer > Use Printer Offline
administrative privileges
resource
6. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
Windows Server 2008
access the shadow copies
Security Parameters Index (SPI)
Disk Configuration MMC snap-in
7. Which of the following is the default view of the Reliability and Performance Monitor?
4
resource
netsh
Enroll ACL
8. If you wish to perform backups from the command line - what will you need to install?
Windows PowerShell
performance Monitor
intermediate
digital certificate
9. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
power-cycling the unit
Windows NT
Enroll ACL
partitioning drives
10. Which of the following is not a category for the Windows operating system updates?
Group Policy updates
resource
Printer Sharing
security settings associated with each template
11. You can create your own ______
access particular servers
partitioning drives
custom Data Collector Set
Printer > Use Printer Offline
12. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
Online Responder
Directory Service
a built-in network monitor.
DHCP enforcement method
13. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
4
file-sharing strategy
security settings associated with each template
file server at each location
14. What allows traffic that is defined in one direction to also be defined in the opposite direction?
proper permissions
mirroring
64
System Statement of Health Response
15. To share printers - which Network Sharing and Discovery setting must be turned on?
Printer > Use Printer Offline
Printer Sharing
Macintosh and Linux computers
Group Policy updates
16. Server management includes all of the following with the exception of __________.
intermediate
controlling download and installation behavior
Windows print architecture
digital certificate
17. Which log should be the first place you look when you suspect a problem with Active Directory?
performance Monitor
Directory Service
Security Parameters Index (SPI)
Printer > Use Printer Offline
18. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
intermediate
security settings associated with each template
mirroring
19. Compared with NTFS permissions - printer permissions are __________.
simpler
Disk Configuration MMC snap-in
NTFS
keeping track of print devices
20. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
write
Windows Server 2008
sharing and security
Group Policy updates
21. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
access the shadow copies
power-cycling the unit
create event log entries
manually install
22. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
300MB
quick mode negotiations
files/folders/volumes
Certificate Manager
23. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
Certificate Practice Statement
partitioning drives
Isolation
share permissions
24. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
cryptographic checksum
older versions
intermediate
security settings associated with each template
25. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
quick mode negotiations
enterprise
Printer Sharing
300MB
26. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
private key
Security Parameters Index (SPI)
manual
27. A single computer cannot perform all of the roles in the______________
point-in-time
Authentication exemption
Windows print architecture
a built-in network monitor.
28. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Statement of Health
Key Addition Failures
Directory Service
NAP enforcement method
29. Which feature enables users to request their own PKI certificates - typically through a Web browser?
Certificate Practice Statement
self-enrollment
Diagnostics node
virtual
30. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
server volume
manually install
Group Policy updates
administrative privileges
31. Just as with folder shares - what must clients have to access a shared printer?
a built-in network monitor.
proper permissions
write
access particular servers
32. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
confidentiality and data encryption.
health certificate
intermediate
cryptographic checksum
33. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
F10
60 - 86 -400
spanned
full mesh
34. By default - what topology do replication groups use?
support for Unix-based systems
create event log entries
full mesh
network traffic
35. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
point-in-time
support for Unix-based systems
write
Printer > Use Printer Offline
36. In which view can you view the counters associated with Data Collector Sets?
Windows NT
performance Monitor
main mode negotiations
F10
37. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Printer Sharing
Certificate Manager
Key Addition Failures
4
38. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
300MB
partitioning drives
Statement of Health
39. What type of backup is supported by Windows Server 2008?
files/folders/volumes
manual
share permissions
System Monitor
40. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
power-cycling the unit
Online Responder
both A & B
network traffic
41. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
quick mode negotiations
Isolation
file-based
volume
42. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
Security Parameters Index (SPI)
NTFS
7:00 am and 12:00 pm
Certificate Manager
43. By default - the Print Management console displays only which of the following in its list of print servers?
local machine
performance Monitor
file-sharing strategy
300MB
44. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
a built-in network monitor.
Windows PowerShell
60 - 86 -400
older versions
45. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
DHCP enforcement method
number of file servers
NAP Agent
Statement of Health
46. How many possibilities of filter combinations exist in the Print Management Console?
more than 1 -000
7:00 am and 12:00 pm
sharing and security
quick mode negotiations
47. The Authentication Header (AH) protocol does not provide _____________________
cryptographic checksum
namespace server
more than 1 -000
confidentiality and data encryption.
48. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
Printer Sharing
create event log entries
NAP Agent
49. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
Setup
hard quota
NAP enforcement method
file-sharing strategy
50. Which digital document contains identifying information about a particular user - computer - service - and so on?
intermediate
performance console
simpler
digital certificate