SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
publication schedules
Key Addition Failures
Disk Configuration MMC snap-in
local machine
2. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
access the shadow copies
role service
netsh
namespace server
3. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
partitioning drives
access the shadow copies
server volume
share permissions
4. You can create your own ______
custom Data Collector Set
manually install
performance console
power-cycling the unit
5. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
Printer > Use Printer Offline
share permissions
full mesh
custom Data Collector Set
6. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
quick mode negotiations
NAP Agent
support for Unix-based systems
Acquire Failures
7. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
power-cycling the unit
Isolation
manually install
point-in-time
8. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
intermediate
mirroring
local machine
RAID-5
9. What is one of the major problems for printing administrators on large enterprise networks?
hard quota
300MB
hardware-related files that the computer uses to boot
keeping track of print devices
10. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
DVD
remediation server
System Monitor
enforcement point
11. You cannot mark an existing dynamic disk as an ____________.
active partition
Online Responder
Printer Sharing
Enroll ACL
12. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
file server at each location
file-based
480
Shadow Copies of Shared Folders
13. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Automatically
access the shadow copies
Enhanced Metafile (EMF)
sharing and security
14. What is the minimum amount of space you must allocate to store shadow copies?
a built-in network monitor.
keeping track of print devices
300MB
Certificate Practice Statement
15. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
Setup
identity spoofing
Duplicate
number of file servers
16. Just as with folder shares - what must clients have to access a shared printer?
NAP enforcement method
remediation server
publication schedules
proper permissions
17. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Statement of Health
Online Responder
namespace server
Diagnostics node
18. NTFS quotas are limited to controlling storage on entire volumes on what basis?
server volume
performance Monitor
per user
create multiple print users
19. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Duplicate
a built-in network monitor.
Enhanced Metafile (EMF)
Printer > Use Printer Offline
20. Printing in Microsoft Windows typically involves all of the following components except a __________.
quick mode negotiations
print router
support for Unix-based systems
64
21. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
NAP enforcement method
access particular servers
virtual
compliance - autoremediation
22. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
SPI field
7:00 am and 12:00 pm
active partition
Kerberos v5 protocol
23. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
remediation server
netsh
Acquire Failures
1
24. A period of _______________ is necessary before you start implementation of a file server deployment.
by right-clicking on the file and selecting Restore previous versions
planning and design
keeping track of print devices
Printer > Use Printer Offline
25. Depending on the configuration item that is being monitored for _____________ may not be possible.
8
compliance - autoremediation
a built-in network monitor.
keeping track of print devices
26. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
Duplicate
60 - 86 -400
identity spoofing
manually install
27. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
active partition
Windows Server 2008
Printer > Pause Printing
28. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
print router
planning and design
partitioning drives
Disk Configuration MMC snap-in
29. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
namespace server
private key
partitions and drives
per user
30. To share printers - which Network Sharing and Discovery setting must be turned on?
Authentication exemption
Printer Sharing
File Server Resource Manager
point-in-time
31. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
write
compliance - autoremediation
hard quota
identity spoofing
32. To install the _____________ - you must also install the Web Server (IIS) role
publication schedules
RAID-5
Internet Printing role service
Volume Shadow Copies
33. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
hardware-related files that the computer uses to boot
partitioning drives
cryptographic checksum
NTLM Authentication
34. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
Group Policy updates
file server at each location
Shadow Copies of Shared Folders
Enhanced Metafile (EMF)
35. Do not use Tunnel mode when you require _________________
packet filtering and end-to-end security.
support for Unix-based systems
mutual authentication
Certificate Manager
36. What are the IPSEC default settings for the key lifetime in minutes?
480
Installing a printer
NTLM Authentication
System Statement of Health Response
37. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
7:00 am and 12:00 pm
performance Monitor
full mesh
Reliability and Performance Monitor
38. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Terminal Services Gateway (TS Gateway) enforcement
Reliability Monitor
file-based
keeping track of print devices
39. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
F10
Key Addition Failures
security settings associated with each template
64
40. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Disk Configuration MMC snap-in
NAP Agent
quick mode negotiations
Shadow Copies of Shared Folders
41. Which of the following is not a node found in the Print Management console?
NAP enforcement method
Windows Server 2008
sharing and security
packet filtering and end-to-end security.
42. The NPS service combines each Statement of Health Response into what?
System Statement of Health Response
number of file servers
custom Data Collector Set
Reliability Monitor
43. In which node is Event Viewer located?
server volume
mutual authentication
compliance - autoremediation
Diagnostics node
44. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
both A & B
Online Responder
480
DVD
45. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
active partition
workstations
Duplicate
more than 1 -000
46. What is the default authentication protocol in an Active Directory network?
mirroring
Kerberos v5
point-in-time
custom Data Collector Set
47. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
spanned
performance Monitor
Authentication exemption
create event log entries
48. What type of backup is supported by Windows Server 2008?
DFS Replication
manual
Volume Shadow Copies
compliance - autoremediation
49. Server management includes all of the following with the exception of __________.
file-based
controlling download and installation behavior
access particular servers
cryptographic checksum
50. The Authentication Header (AH) protocol does not provide _____________________
Windows PowerShell
480
confidentiality and data encryption.
Internet Printing role service