SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
health certificate
virtual
F10
RAID-5
2. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
performance Monitor
by right-clicking on the file and selecting Restore previous versions
Certificate Practice Statement
Group Policy updates
3. NTFS quotas are limited to controlling storage on entire volumes on what basis?
per user
performance console
file-sharing strategy
intermediate
4. You can create your own ______
network traffic
hardware-related files that the computer uses to boot
NAP Agent
custom Data Collector Set
5. In which node is Event Viewer located?
System Monitor
health certificate
Diagnostics node
Printer > Pause Printing
6. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
DVD
file-sharing strategy
Directory Service
identity spoofing
7. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
files/folders/volumes
partitioning drives
security settings associated with each template
health certificate
8. Server management includes all of the following with the exception of __________.
local machine
8
System Monitor
controlling download and installation behavior
9. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
Terminal Services Gateway (TS Gateway) enforcement
480
intermediate
volume
10. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
partitions and drives
Certificate Practice Statement
security settings associated with each template
simpler
11. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
Diagnostics node
DVD
mirroring
12. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
4
1
Enroll ACL
13. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
share permissions
role service
Shadow Copies of Shared Folders
number of file servers
14. Although any Windows computer can function as a __________ - it is recommended that you use a workstation for this task.
publication schedules
print server
300MB
files/folders/volumes
15. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
performance Monitor
administrative privileges
partitions and drives
namespace server
16. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
Shadow Copies of Shared Folders
role service
local machine
17. Which of the following are the specific processes or events that you want to track?
performance counters
Kerberos v5
8
number of file servers
18. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
enterprise
Volume Shadow Copies
Duplicate
Windows NT
19. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
hard quota
Kerberos v5 protocol
480
intermediate
20. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
cryptographic checksum
300MB
Kerberos v5 protocol
Certificate Manager
21. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
power-cycling the unit
Installing a printer
create multiple print users
enforcement point
22. By default - the Print Management console displays only which of the following in its list of print servers?
RAID-5
Shadow Copies of Shared Folders
create event log entries
local machine
23. Which of the following is not a node found in the Print Management console?
sharing and security
digital certificate
System Monitor
Terminal Services Gateway (TS Gateway) enforcement
24. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
DFS Replication
System Monitor
partitions and drives
point-in-time
25. To share printers - which Network Sharing and Discovery setting must be turned on?
Printer Sharing
enforcement point
Certificate Practice Statement
NTLM Authentication
26. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
Windows PowerShell
virtual
Windows Server 2008
additional user experience features
27. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
Printer Sharing
netsh
resource
remediation server
28. Which of the following is not an option with the Print Services Management Console?
Installing a printer
NTFS
namespace server
Key Addition Failures
29. Shadow Copies of Shared Folders functionality is enabled at which level?
full mesh
volume
60 - 86 -400
confidentiality and data encryption.
30. Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?
Diagnostics node
Duplicate
number of file servers
spanned
31. In which view can you view the counters associated with Data Collector Sets?
header of each packet
Shadow Copies of Shared Folders
performance Monitor
simpler
32. What does the Windows Server Backup feature use to perform file and volume-level backups?
hardware-related files that the computer uses to boot
performance Monitor
Volume Shadow Copies
online file settings
33. What type of backup is supported by Windows Server 2008?
System Monitor
online file settings
by right-clicking on the file and selecting Restore previous versions
manual
34. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
create multiple print users
NAP Agent
online file settings
Shadow Copies of Shared Folders
35. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
quick mode negotiations
spanned
Statement of Health
Printer > Use Printer Offline
36. The Authentication Header (AH) protocol does not provide _____________________
number of file servers
manually install
quick mode negotiations
confidentiality and data encryption.
37. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
resource
share permissions
controlling download and installation behavior
Online Responder
38. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Kerberos v5 protocol
server volume
Windows NT
role service
39. Windows Server 2008 does not include ______________
mutual authentication
a built-in network monitor.
NTLM Authentication
volume
40. Print Server is the only ___________ that is required when you add the Print Services role
Windows Server 2008
additional user experience features
access particular servers
role service
41. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
a built-in network monitor.
enforcement point
480
Acquire Failures
42. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Automatically
64
cryptographic checksum
Security Parameters Index (SPI)
43. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
additional user experience features
file server at each location
print server
NAP enforcement method
44. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
mirroring
access the shadow copies
Automatically
64
45. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
spanned
DVD
Reliability Monitor
Reliability and Performance Monitor
46. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Reliability and Performance Monitor
local machine
intermediate
Windows Server 2008
47. The system partition contains what types of files?
role service
hardware-related files that the computer uses to boot
64
administrative privileges
48. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
network traffic
mutual authentication
full mesh
Terminal Services Gateway (TS Gateway) enforcement
49. Just as with folder shares - what must clients have to access a shared printer?
file-sharing strategy
spanned
proper permissions
server volume
50. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
480
cryptographic checksum
Diagnostics node
digital certificate