SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
DFS Replication
virtual
performance console
64
2. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
Windows print architecture
volume
server volume
3. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
60 - 86 -400
partitioning drives
manually install
support for Unix-based systems
4. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Online Responder
namespace server
write
file server at each location
5. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
file server at each location
per user
F10
namespace server
6. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
digital certificate
enterprise
NAP Agent
System Statement of Health Response
7. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
quick mode negotiations
Diagnostics node
share permissions
Macintosh and Linux computers
8. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
SPI field
RAID-5
keeping track of print devices
9. Which log should be the first place you look when you suspect a problem with Active Directory?
Printer > Use Printer Offline
Directory Service
create event log entries
Enroll ACL
10. What are the IPSEC default settings for the key lifetime in minutes?
per user
480
System Monitor
server volume
11. You cannot mark an existing dynamic disk as an ____________.
simpler
Online Responder
Windows Server 2003 R2
active partition
12. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Windows Server 2008
proper permissions
Diagnostics node
controlling download and installation behavior
13. When users accidentally overwrite or delete files - they can ___________ to restore earlier versions.
access the shadow copies
Kerberos v5 protocol
online file settings
enforcement point
14. What is one of the major problems for printing administrators on large enterprise networks?
full mesh
keeping track of print devices
server volume
Group Policy updates
15. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
performance Monitor
Macintosh and Linux computers
Reliability Monitor
Volume Shadow Copies
16. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
write
Internet Printing role service
keeping track of print devices
publication schedules
17. Where is the checksum located?
mutual authentication
custom Data Collector Set
header of each packet
Installing a printer
18. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
DFS Replication
64
partitioning drives
Windows print architecture
19. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
Reliability Monitor
per user
Enroll ACL
20. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
Terminal Services Gateway (TS Gateway) enforcement
access the shadow copies
simpler
21. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
support for Unix-based systems
confidentiality and data encryption.
security settings associated with each template
22. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
virtual
by right-clicking on the file and selecting Restore previous versions
mutual authentication
1
23. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
file-sharing strategy
full mesh
Printer > Pause Printing
24. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
Online Responder
full mesh
workstations
25. IKE main mode has a default lifetime of __________ hours.
planning and design
System Monitor
8
performance Monitor
26. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
partitions and drives
namespace server
full mesh
controlling download and installation behavior
27. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
print server
hardware-related files that the computer uses to boot
quick mode negotiations
server volume
28. Print Server is the only ___________ that is required when you add the Print Services role
role service
60 - 86 -400
Acquire Failures
both A & B
29. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
Isolation
print router
files/folders/volumes
file server at each location
30. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
System Statement of Health Response
Isolation
Installing a printer
remediation server
31. You can create your own ______
custom Data Collector Set
64
access particular servers
access the shadow copies
32. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
digital certificate
Diagnostics node
hard quota
file-based
33. What does the Windows Server Backup feature use to perform file and volume-level backups?
more than 1 -000
Volume Shadow Copies
private key
cryptographic checksum
34. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
Enhanced Metafile (EMF)
files/folders/volumes
manually install
performance counters
35. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
online file settings
access particular servers
Setup
intermediate
36. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
Automatically
additional user experience features
Isolation
37. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
local machine
Windows NT
network traffic
Windows PowerShell
38. NTFS quotas are able to do which of the following?
Isolation
NTLM Authentication
Installing a printer
create event log entries
39. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Reliability Monitor
enterprise
network traffic
Macintosh and Linux computers
40. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
enforcement point
server volume
Enhanced Metafile (EMF)
7:00 am and 12:00 pm
41. Compared with NTFS permissions - printer permissions are __________.
simpler
Printer > Pause Printing
Printer Sharing
access particular servers
42. Windows automatically makes a user the owner of all files that he or she creates on a _____
resource
Reliability Monitor
simpler
server volume
43. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
older versions
Group Policy updates
file server at each location
NTFS
44. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
resource
Windows PowerShell
Diagnostics node
45. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
Kerberos v5 protocol
mutual authentication
Terminal Services Gateway (TS Gateway) enforcement
performance Monitor
46. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
controlling download and installation behavior
netsh
Directory Service
namespace server
47. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
Duplicate
Reliability and Performance Monitor
File Server Resource Manager
cryptographic checksum
48. Depending on the configuration item that is being monitored for _____________ may not be possible.
publication schedules
compliance - autoremediation
mirroring
planning and design
49. Which field does the IPSec driver use to match the correct SA with the correct packet?
security settings associated with each template
mutual authentication
8
SPI field
50. A maximum of how many shadow copies can be stored on a particular volume?
NAP enforcement method
64
per user
Windows Server 2003 R2