SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following are the specific processes or events that you want to track?
performance counters
compliance - autoremediation
300MB
Volume Shadow Copies
2. A maximum of how many shadow copies can be stored on a particular volume?
identity spoofing
administrative privileges
Windows NT
64
3. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
NAP enforcement method
point-in-time
identity spoofing
Internet Printing role service
4. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
Windows Server 2003 R2
power-cycling the unit
both A & B
Diagnostics node
5. If you wish to perform backups from the command line - what will you need to install?
server volume
Windows PowerShell
Shadow Copies of Shared Folders
spanned
6. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
file-based
sharing and security
1
identity spoofing
7. Windows Server 2008 does not include ______________
Windows print architecture
additional user experience features
NAP enforcement method
a built-in network monitor.
8. What is the minimum amount of space you must allocate to store shadow copies?
Security Parameters Index (SPI)
300MB
create multiple print users
role service
9. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Certificate Manager
resource
Reliability Monitor
manual
10. How can users restore previous versions of files on the selected volumes?
NTLM Authentication
by right-clicking on the file and selecting Restore previous versions
Printer Sharing
4
11. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
hard quota
64
480
Reliability and Performance Monitor
12. Print Server is the only ___________ that is required when you add the Print Services role
IPSec
role service
main mode negotiations
keeping track of print devices
13. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
60 - 86 -400
Internet Printing role service
performance Monitor
administrative privileges
14. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
NAP enforcement method
300MB
Duplicate
access the shadow copies
15. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
simpler
DFS Replication
netsh
volume
16. The File Server Resource Manager console was first introduced in which product?
Windows Server 2003 R2
480
identity spoofing
Macintosh and Linux computers
17. What is the default authentication protocol in an Active Directory network?
main mode negotiations
Kerberos v5
workstations
Printer Sharing
18. By default - the Print Management console displays only which of the following in its list of print servers?
local machine
Kerberos v5
health certificate
Setup
19. The system partition contains what types of files?
cryptographic checksum
hardware-related files that the computer uses to boot
print router
power-cycling the unit
20. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
intermediate
per user
proper permissions
print server
21. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
network traffic
remediation server
Certificate Practice Statement
Enroll ACL
22. Which of the following is the default view of the Reliability and Performance Monitor?
Macintosh and Linux computers
resource
remediation server
create multiple print users
23. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
intermediate
file-sharing strategy
Directory Service
workstations
24. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
security settings associated with each template
Statement of Health
Enhanced Metafile (EMF)
4
25. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
F10
60 - 86 -400
File Server Resource Manager
more than 1 -000
26. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
simpler
Printer Sharing
enterprise
server volume
27. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
partitions and drives
performance Monitor
controlling download and installation behavior
Windows print architecture
28. By default - what topology do replication groups use?
Security Parameters Index (SPI)
per user
full mesh
File Server Resource Manager
29. IKE main mode has a default lifetime of __________ hours.
mutual authentication
8
mirroring
Kerberos v5 protocol
30. What type of backup is supported by Windows Server 2008?
manual
quick mode negotiations
Enroll ACL
hard quota
31. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
Acquire Failures
Windows PowerShell
Windows Server 2008
hard quota
32. Which of the following is not a tool that can help you proactively troubleshoot network problems?
mirroring
Windows Server 2008
8
performance console
33. Printing in Microsoft Windows typically involves all of the following components except a __________.
active partition
virtual
RAID-5
print router
34. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
confidentiality and data encryption.
Diagnostics node
Printer > Use Printer Offline
Setup
35. Where is the checksum located?
workstations
Windows NT
header of each packet
print server
36. How many possibilities of filter combinations exist in the Print Management Console?
more than 1 -000
server volume
administrative privileges
Authentication exemption
37. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
controlling download and installation behavior
Certificate Practice Statement
8
38. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
IPSec
DHCP enforcement method
partitioning drives
Online Responder
39. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Volume Shadow Copies
Enhanced Metafile (EMF)
quick mode negotiations
NAP Agent
40. In which view can you view the counters associated with Data Collector Sets?
active partition
security settings associated with each template
performance Monitor
workstations
41. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
SPI field
1
create multiple print users
cryptographic checksum
42. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
System Monitor
cryptographic checksum
access the shadow copies
mutual authentication
43. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
print server
role service
4
a built-in network monitor.
44. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
power-cycling the unit
confidentiality and data encryption.
enterprise
volume
45. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
RAID-5
Duplicate
print router
300MB
46. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Online Responder
4
300MB
file server at each location
47. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
point-in-time
performance Monitor
300MB
Printer > Pause Printing
48. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
workstations
older versions
Isolation
namespace server
49. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
System Statement of Health Response
manually install
Installing a printer
Disk Configuration MMC snap-in
50. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
Reliability Monitor
access particular servers
NTFS
power-cycling the unit