SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can users restore previous versions of files on the selected volumes?
Setup
security settings associated with each template
by right-clicking on the file and selecting Restore previous versions
netsh
2. What is the minimum amount of space you must allocate to store shadow copies?
performance console
300MB
file-sharing strategy
power-cycling the unit
3. What is the default authentication protocol in an Active Directory network?
Kerberos v5
DFS Replication
confidentiality and data encryption.
Installing a printer
4. Which field does the IPSec driver use to match the correct SA with the correct packet?
7:00 am and 12:00 pm
Isolation
self-enrollment
SPI field
5. The NPS service combines each Statement of Health Response into what?
point-in-time
Statement of Health
additional user experience features
System Statement of Health Response
6. By default - the Print Management console displays only which of the following in its list of print servers?
DVD
local machine
publication schedules
hardware-related files that the computer uses to boot
7. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
namespace server
digital certificate
Setup
manually install
8. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
access particular servers
mutual authentication
File Server Resource Manager
Security Parameters Index (SPI)
9. The system partition contains what types of files?
Enhanced Metafile (EMF)
hardware-related files that the computer uses to boot
64
64
10. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
planning and design
additional user experience features
NAP enforcement method
11. If you wish to perform backups from the command line - what will you need to install?
Windows PowerShell
hard quota
Enroll ACL
manual
12. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
partitions and drives
publication schedules
Security Parameters Index (SPI)
access the shadow copies
13. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
partitions and drives
Enhanced Metafile (EMF)
Windows print architecture
DFS Replication
14. What are the IPSEC default settings for the key lifetime in minutes?
Windows Server 2003 R2
performance counters
additional user experience features
480
15. Which of the following is the default view of the Reliability and Performance Monitor?
resource
Windows NT
main mode negotiations
security settings associated with each template
16. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
NAP Agent
enforcement point
Certificate Manager
intermediate
17. The File Server Resource Manager console was first introduced in which product?
Windows Server 2003 R2
64
Windows NT
Shadow Copies of Shared Folders
18. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Duplicate
controlling download and installation behavior
partitioning drives
Printer > Pause Printing
19. By default - what topology do replication groups use?
Macintosh and Linux computers
4
full mesh
Windows Server 2003 R2
20. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
print server
Duplicate
confidentiality and data encryption.
Printer > Pause Printing
21. You can create your own ______
remediation server
Kerberos v5 protocol
create event log entries
custom Data Collector Set
22. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
packet filtering and end-to-end security.
NTFS
Installing a printer
active partition
23. Which digital document contains identifying information about a particular user - computer - service - and so on?
Terminal Services Gateway (TS Gateway) enforcement
digital certificate
Disk Configuration MMC snap-in
manual
24. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
enforcement point
security settings associated with each template
namespace server
Disk Configuration MMC snap-in
25. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
Automatically
number of file servers
spanned
access particular servers
26. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
quick mode negotiations
SPI field
Statement of Health
both A & B
27. What allows traffic that is defined in one direction to also be defined in the opposite direction?
Group Policy updates
mirroring
confidentiality and data encryption.
Printer > Use Printer Offline
28. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
file-sharing strategy
4
F10
main mode negotiations
29. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
write
full mesh
Security Parameters Index (SPI)
Group Policy updates
30. Windows automatically makes a user the owner of all files that he or she creates on a _____
Duplicate
Enhanced Metafile (EMF)
publication schedules
server volume
31. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
support for Unix-based systems
DFS Replication
online file settings
Enhanced Metafile (EMF)
32. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
access the shadow copies
by right-clicking on the file and selecting Restore previous versions
power-cycling the unit
access particular servers
33. To install the _____________ - you must also install the Web Server (IIS) role
print router
create event log entries
Internet Printing role service
planning and design
34. In which node is Event Viewer located?
print router
publication schedules
4
Diagnostics node
35. Do not use Tunnel mode when you require _________________
packet filtering and end-to-end security.
print router
Volume Shadow Copies
Online Responder
36. NTFS quotas are able to do which of the following?
Disk Configuration MMC snap-in
access the shadow copies
Reliability and Performance Monitor
create event log entries
37. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
sharing and security
more than 1 -000
Windows PowerShell
F10
38. To set printer priorities - you must do all of the following except __________.
mutual authentication
performance Monitor
create multiple print users
manual
39. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
write
Windows Server 2008
private key
Acquire Failures
40. Which of the following are the specific processes or events that you want to track?
Terminal Services Gateway (TS Gateway) enforcement
performance counters
Enroll ACL
namespace server
41. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
Key Addition Failures
network traffic
sharing and security
workstations
42. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
file-based
number of file servers
quick mode negotiations
manual
43. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
full mesh
by right-clicking on the file and selecting Restore previous versions
Printer > Pause Printing
enterprise
44. Updates that can be deployed via WSUS can include all of the following except __________.
partitions and drives
additional user experience features
Printer Sharing
enterprise
45. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
cryptographic checksum
intermediate
SPI field
Automatically
46. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
1
NAP enforcement method
Kerberos v5 protocol
online file settings
47. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
resource
Printer > Pause Printing
identity spoofing
spanned
48. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
packet filtering and end-to-end security.
self-enrollment
NAP enforcement method
49. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
by right-clicking on the file and selecting Restore previous versions
custom Data Collector Set
Certificate Manager
System Monitor
50. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
performance counters
a built-in network monitor.
64
security settings associated with each template