SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Printing in Microsoft Windows typically involves all of the following components except a __________.
Acquire Failures
older versions
performance console
print router
2. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
Reliability Monitor
share permissions
additional user experience features
3. Compared with NTFS permissions - printer permissions are __________.
simpler
remediation server
power-cycling the unit
Diagnostics node
4. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
share permissions
mutual authentication
RAID-5
support for Unix-based systems
5. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
partitioning drives
full mesh
300MB
NAP enforcement method
6. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
file-sharing strategy
publication schedules
Macintosh and Linux computers
7. In which node is Event Viewer located?
hardware-related files that the computer uses to boot
per user
Diagnostics node
Statement of Health
8. Which of the following is not a category for the Windows operating system updates?
Group Policy updates
mirroring
simpler
header of each packet
9. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
older versions
DFS Replication
intermediate
resource
10. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
quick mode negotiations
more than 1 -000
Enroll ACL
11. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
Diagnostics node
Macintosh and Linux computers
netsh
administrative privileges
12. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
support for Unix-based systems
file-based
Enhanced Metafile (EMF)
13. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
hard quota
Key Addition Failures
Statement of Health
NAP enforcement method
14. Which of the following is the default view of the Reliability and Performance Monitor?
health certificate
480
resource
Online Responder
15. Do not use Tunnel mode when you require _________________
planning and design
resource
Terminal Services Gateway (TS Gateway) enforcement
packet filtering and end-to-end security.
16. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
Duplicate
SPI field
confidentiality and data encryption.
print server
17. Updates that can be deployed via WSUS can include all of the following except __________.
additional user experience features
F10
file-based
performance console
18. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
Acquire Failures
Automatically
file server at each location
Volume Shadow Copies
19. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
Certificate Manager
Windows PowerShell
full mesh
20. Depending on the configuration item that is being monitored for _____________ may not be possible.
performance counters
compliance - autoremediation
create event log entries
custom Data Collector Set
21. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
partitioning drives
DVD
netsh
Terminal Services Gateway (TS Gateway) enforcement
22. NTFS quotas are able to do which of the following?
Internet Printing role service
create event log entries
Installing a printer
performance Monitor
23. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
64
Windows Server 2008
enterprise
F10
24. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
Enhanced Metafile (EMF)
print router
Isolation
25. You can create your own ______
more than 1 -000
file-based
custom Data Collector Set
NAP enforcement method
26. Shadow Copies of Shared Folders functionality is enabled at which level?
access particular servers
volume
write
controlling download and installation behavior
27. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
Windows print architecture
online file settings
Volume Shadow Copies
28. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
header of each packet
write
create multiple print users
local machine
29. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
RAID-5
hard quota
Setup
namespace server
30. Windows Server 2008 does not include ______________
number of file servers
a built-in network monitor.
Installing a printer
volume
31. By default - what topology do replication groups use?
full mesh
enforcement point
manual
print router
32. You cannot mark an existing dynamic disk as an ____________.
Windows PowerShell
intermediate
share permissions
active partition
33. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Enroll ACL
performance Monitor
Kerberos v5
publication schedules
34. Just as with folder shares - what must clients have to access a shared printer?
number of file servers
files/folders/volumes
health certificate
proper permissions
35. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
SPI field
Shadow Copies of Shared Folders
local machine
online file settings
36. What is the minimum amount of space you must allocate to store shadow copies?
300MB
Kerberos v5 protocol
quick mode negotiations
confidentiality and data encryption.
37. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
mutual authentication
Windows print architecture
older versions
Internet Printing role service
38. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
power-cycling the unit
online file settings
netsh
39. A period of _______________ is necessary before you start implementation of a file server deployment.
more than 1 -000
DHCP enforcement method
Authentication exemption
planning and design
40. NTFS quotas are limited to controlling storage on entire volumes on what basis?
hard quota
RAID-5
per user
64
41. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Directory Service
Disk Configuration MMC snap-in
by right-clicking on the file and selecting Restore previous versions
performance counters
42. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
intermediate
300MB
access the shadow copies
self-enrollment
43. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
remediation server
DVD
sharing and security
performance Monitor
44. A maximum of how many shadow copies can be stored on a particular volume?
Printer Sharing
64
create multiple print users
Kerberos v5 protocol
45. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
Windows Server 2003 R2
partitions and drives
health certificate
480
46. How can users restore previous versions of files on the selected volumes?
64
quick mode negotiations
by right-clicking on the file and selecting Restore previous versions
NAP enforcement method
47. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
print router
private key
Terminal Services Gateway (TS Gateway) enforcement
Reliability and Performance Monitor
48. In which view can you view the counters associated with Data Collector Sets?
Setup
netsh
performance Monitor
7:00 am and 12:00 pm
49. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
file-sharing strategy
Kerberos v5
network traffic
60 - 86 -400
50. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
sharing and security
Certificate Manager
simpler
intermediate