SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
F10
proper permissions
intermediate
Key Addition Failures
2. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
support for Unix-based systems
4
enforcement point
3. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
Statement of Health
keeping track of print devices
Kerberos v5 protocol
4. Which of the following is not an option with the Print Services Management Console?
7:00 am and 12:00 pm
confidentiality and data encryption.
Installing a printer
hardware-related files that the computer uses to boot
5. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
access the shadow copies
resource
file-sharing strategy
Reliability and Performance Monitor
6. Which of the following is not a category for the Windows operating system updates?
Windows Server 2003 R2
Group Policy updates
performance counters
DHCP enforcement method
7. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
intermediate
NAP Agent
Directory Service
480
8. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
more than 1 -000
online file settings
IPSec
file-sharing strategy
9. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
DHCP enforcement method
Windows Server 2008
identity spoofing
Enroll ACL
10. How many possibilities of filter combinations exist in the Print Management Console?
quick mode negotiations
Online Responder
more than 1 -000
by right-clicking on the file and selecting Restore previous versions
11. Windows automatically makes a user the owner of all files that he or she creates on a _____
Windows Server 2008
server volume
performance Monitor
point-in-time
12. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Printer Sharing
60 - 86 -400
create event log entries
Security Parameters Index (SPI)
13. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Online Responder
mirroring
4
Authentication exemption
14. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
performance Monitor
partitioning drives
Setup
RAID-5
15. NTFS quotas are able to do which of the following?
create event log entries
Acquire Failures
60 - 86 -400
Internet Printing role service
16. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
Windows Server 2008
Reliability and Performance Monitor
Online Responder
more than 1 -000
17. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
NAP Agent
administrative privileges
Windows Server 2008
Online Responder
18. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
file-sharing strategy
partitions and drives
partitioning drives
main mode negotiations
19. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
namespace server
security settings associated with each template
DHCP enforcement method
controlling download and installation behavior
20. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
performance Monitor
Authentication exemption
Acquire Failures
self-enrollment
21. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
remediation server
Authentication exemption
Duplicate
NAP enforcement method
22. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
intermediate
Certificate Manager
NTLM Authentication
private key
23. To set printer priorities - you must do all of the following except __________.
Security Parameters Index (SPI)
Acquire Failures
create multiple print users
300MB
24. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
sharing and security
Shadow Copies of Shared Folders
System Monitor
performance counters
25. What is one of the major problems for printing administrators on large enterprise networks?
keeping track of print devices
Reliability Monitor
full mesh
Acquire Failures
26. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
print server
Kerberos v5
Automatically
main mode negotiations
27. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
manually install
Certificate Practice Statement
performance console
intermediate
28. Do not use Tunnel mode when you require _________________
Directory Service
packet filtering and end-to-end security.
Kerberos v5 protocol
480
29. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
NAP Agent
performance console
DFS Replication
enforcement point
30. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
power-cycling the unit
virtual
Windows Server 2003 R2
performance Monitor
31. If you wish to perform backups from the command line - what will you need to install?
header of each packet
Group Policy updates
confidentiality and data encryption.
Windows PowerShell
32. Which of the following is not a tool that can help you proactively troubleshoot network problems?
sharing and security
NAP enforcement method
Kerberos v5
performance console
33. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
file-based
Windows print architecture
a built-in network monitor.
write
34. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Setup
64
Terminal Services Gateway (TS Gateway) enforcement
number of file servers
35. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
partitions and drives
hard quota
quick mode negotiations
36. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Statement of Health
file server at each location
digital certificate
manually install
37. What does the Windows Server Backup feature use to perform file and volume-level backups?
create multiple print users
Volume Shadow Copies
server volume
digital certificate
38. How many active partitions can you have per hard drive?
1
spanned
Automatically
NTFS
39. What allows traffic that is defined in one direction to also be defined in the opposite direction?
hard quota
File Server Resource Manager
private key
mirroring
40. Which of the following is not a node found in the Print Management console?
64
sharing and security
NAP enforcement method
confidentiality and data encryption.
41. Just as with folder shares - what must clients have to access a shared printer?
online file settings
proper permissions
Isolation
300MB
42. IKE main mode has a default lifetime of __________ hours.
confidentiality and data encryption.
identity spoofing
8
Printer > Use Printer Offline
43. Server management includes all of the following with the exception of __________.
virtual
publication schedules
performance counters
controlling download and installation behavior
44. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
DVD
spanned
Acquire Failures
Enhanced Metafile (EMF)
45. Print Server is the only ___________ that is required when you add the Print Services role
role service
Online Responder
Certificate Manager
create event log entries
46. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
Windows Server 2008
Printer Sharing
64
47. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
volume
Windows Server 2008
workstations
publication schedules
48. Which feature enables users to request their own PKI certificates - typically through a Web browser?
self-enrollment
Online Responder
write
Isolation
49. Depending on the configuration item that is being monitored for _____________ may not be possible.
Online Responder
Reliability and Performance Monitor
compliance - autoremediation
sharing and security
50. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
60 - 86 -400
enforcement point
point-in-time
number of file servers