SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To share printers - which Network Sharing and Discovery setting must be turned on?
Printer Sharing
Kerberos v5 protocol
64
NAP enforcement method
2. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
Volume Shadow Copies
identity spoofing
network traffic
active partition
3. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
proper permissions
file server at each location
workstations
health certificate
4. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
simpler
8
Isolation
Printer > Pause Printing
5. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
local machine
packet filtering and end-to-end security.
partitions and drives
6. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
online file settings
DHCP enforcement method
access particular servers
enterprise
7. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Terminal Services Gateway (TS Gateway) enforcement
file-based
300MB
Reliability Monitor
8. A maximum of how many shadow copies can be stored on a particular volume?
Printer Sharing
64
Key Addition Failures
Internet Printing role service
9. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
planning and design
Isolation
300MB
10. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Automatically
DVD
planning and design
Printer > Pause Printing
11. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
Setup
Online Responder
partitions and drives
file-based
12. In which node is Event Viewer located?
power-cycling the unit
netsh
Diagnostics node
network traffic
13. How many active partitions can you have per hard drive?
1
Diagnostics node
intermediate
Acquire Failures
14. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
mutual authentication
administrative privileges
cryptographic checksum
15. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
netsh
64
keeping track of print devices
security settings associated with each template
16. Just as with folder shares - what must clients have to access a shared printer?
System Monitor
proper permissions
network traffic
System Statement of Health Response
17. Which of the following is not a tool that can help you proactively troubleshoot network problems?
packet filtering and end-to-end security.
performance console
hard quota
Shadow Copies of Shared Folders
18. What is the default authentication protocol in an Active Directory network?
performance Monitor
network traffic
confidentiality and data encryption.
Kerberos v5
19. Windows Server 2008 does not include ______________
DFS Replication
Shadow Copies of Shared Folders
a built-in network monitor.
cryptographic checksum
20. Where is the checksum located?
Terminal Services Gateway (TS Gateway) enforcement
header of each packet
power-cycling the unit
a built-in network monitor.
21. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
Internet Printing role service
Duplicate
Setup
22. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
intermediate
both A & B
private key
NTLM Authentication
23. The system partition contains what types of files?
support for Unix-based systems
local machine
hardware-related files that the computer uses to boot
Setup
24. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
confidentiality and data encryption.
IPSec
NTLM Authentication
25. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
publication schedules
print server
custom Data Collector Set
Windows Server 2003 R2
26. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
support for Unix-based systems
Enhanced Metafile (EMF)
point-in-time
share permissions
27. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
create multiple print users
cryptographic checksum
keeping track of print devices
Acquire Failures
28. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
access the shadow copies
number of file servers
Windows Server 2008
Certificate Manager
29. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Kerberos v5 protocol
custom Data Collector Set
Key Addition Failures
enforcement point
30. What type of backup is supported by Windows Server 2008?
performance Monitor
administrative privileges
manual
NTLM Authentication
31. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
Isolation
compliance - autoremediation
remediation server
300MB
32. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
64
private key
file-based
60 - 86 -400
33. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
300MB
Internet Printing role service
hard quota
File Server Resource Manager
34. What feature allows users or computers to manually request a certificate based a template?
Isolation
online file settings
Enroll ACL
Shadow Copies of Shared Folders
35. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Printer > Use Printer Offline
Security Parameters Index (SPI)
quick mode negotiations
Kerberos v5 protocol
36. Which log should be the first place you look when you suspect a problem with Active Directory?
Printer Sharing
identity spoofing
Directory Service
planning and design
37. Shadow Copies of Shared Folders functionality is enabled at which level?
Isolation
enforcement point
60 - 86 -400
volume
38. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
DHCP enforcement method
point-in-time
Disk Configuration MMC snap-in
access the shadow copies
39. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
enforcement point
header of each packet
NTLM Authentication
power-cycling the unit
40. Windows automatically makes a user the owner of all files that he or she creates on a _____
server volume
Online Responder
Group Policy updates
keeping track of print devices
41. To set printer priorities - you must do all of the following except __________.
64
create multiple print users
power-cycling the unit
IPSec
42. Which of the following is not a node found in the Print Management console?
DFS Replication
Key Addition Failures
files/folders/volumes
sharing and security
43. Updates that can be deployed via WSUS can include all of the following except __________.
Windows PowerShell
Directory Service
additional user experience features
Macintosh and Linux computers
44. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Authentication exemption
spanned
workstations
health certificate
45. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
cryptographic checksum
share permissions
active partition
Duplicate
46. Which of the following are the specific processes or events that you want to track?
performance counters
health certificate
sharing and security
SPI field
47. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
write
simpler
health certificate
confidentiality and data encryption.
48. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
quick mode negotiations
keeping track of print devices
volume
print router
49. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
performance console
performance Monitor
network traffic
Acquire Failures
50. You cannot mark an existing dynamic disk as an ____________.
active partition
access the shadow copies
Security Parameters Index (SPI)
by right-clicking on the file and selecting Restore previous versions