SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Certificate Practice Statement
Windows NT
planning and design
Duplicate
2. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
spanned
Online Responder
planning and design
older versions
3. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
Key Addition Failures
NTLM Authentication
Reliability Monitor
planning and design
4. To share printers - which Network Sharing and Discovery setting must be turned on?
both A & B
Printer Sharing
Group Policy updates
NTLM Authentication
5. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Volume Shadow Copies
Terminal Services Gateway (TS Gateway) enforcement
create event log entries
Automatically
6. The Authentication Header (AH) protocol does not provide _____________________
partitioning drives
File Server Resource Manager
health certificate
confidentiality and data encryption.
7. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
Setup
header of each packet
Reliability Monitor
8. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
performance Monitor
manual
partitioning drives
custom Data Collector Set
9. Which of the following is not a node found in the Print Management console?
sharing and security
RAID-5
Installing a printer
DFS Replication
10. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
identity spoofing
number of file servers
Security Parameters Index (SPI)
11. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
DVD
security settings associated with each template
intermediate
hard quota
12. How many active partitions can you have per hard drive?
1
network traffic
files/folders/volumes
File Server Resource Manager
13. Printing in Microsoft Windows typically involves all of the following components except a __________.
print router
Disk Configuration MMC snap-in
Key Addition Failures
sharing and security
14. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
60 - 86 -400
enforcement point
manually install
Reliability Monitor
15. What is the default authentication protocol in an Active Directory network?
Setup
server volume
performance console
Kerberos v5
16. How many possibilities of filter combinations exist in the Print Management Console?
more than 1 -000
Directory Service
role service
Kerberos v5
17. Windows Server 2008 does not include ______________
Isolation
Disk Configuration MMC snap-in
by right-clicking on the file and selecting Restore previous versions
a built-in network monitor.
18. IKE main mode has a default lifetime of __________ hours.
Kerberos v5
print router
file server at each location
8
19. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
compliance - autoremediation
Security Parameters Index (SPI)
mutual authentication
private key
20. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Windows Server 2003 R2
security settings associated with each template
publication schedules
Printer Sharing
21. Shadow Copies of Shared Folders functionality is enabled at which level?
volume
files/folders/volumes
SPI field
security settings associated with each template
22. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
Disk Configuration MMC snap-in
security settings associated with each template
more than 1 -000
File Server Resource Manager
23. What is the minimum amount of space you must allocate to store shadow copies?
RAID-5
File Server Resource Manager
files/folders/volumes
300MB
24. If you wish to perform backups from the command line - what will you need to install?
controlling download and installation behavior
manual
Windows PowerShell
more than 1 -000
25. Just as with folder shares - what must clients have to access a shared printer?
manual
volume
proper permissions
Statement of Health
26. To set printer priorities - you must do all of the following except __________.
Shadow Copies of Shared Folders
mirroring
Windows PowerShell
create multiple print users
27. Which of the following is not a category for the Windows operating system updates?
performance Monitor
8
Enroll ACL
Group Policy updates
28. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
manually install
self-enrollment
network traffic
create multiple print users
29. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
point-in-time
NAP enforcement method
RAID-5
NTFS
30. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
intermediate
mutual authentication
private key
Disk Configuration MMC snap-in
31. Which of the following are the specific processes or events that you want to track?
8
Windows Server 2008
performance counters
SPI field
32. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
role service
netsh
access particular servers
8
33. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
per user
Enhanced Metafile (EMF)
custom Data Collector Set
mutual authentication
34. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
Volume Shadow Copies
administrative privileges
enforcement point
online file settings
35. What are the IPSEC default settings for the key lifetime in minutes?
480
access the shadow copies
Volume Shadow Copies
60 - 86 -400
36. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
Key Addition Failures
performance Monitor
mutual authentication
IPSec
37. How can users restore previous versions of files on the selected volumes?
System Monitor
by right-clicking on the file and selecting Restore previous versions
full mesh
file server at each location
38. Compared with NTFS permissions - printer permissions are __________.
Acquire Failures
Windows print architecture
simpler
Volume Shadow Copies
39. What feature allows users or computers to manually request a certificate based a template?
SPI field
Reliability Monitor
Enroll ACL
main mode negotiations
40. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
confidentiality and data encryption.
mutual authentication
NAP Agent
spanned
41. What allows traffic that is defined in one direction to also be defined in the opposite direction?
file-sharing strategy
custom Data Collector Set
Authentication exemption
mirroring
42. Do not use Tunnel mode when you require _________________
IPSec
write
packet filtering and end-to-end security.
per user
43. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
security settings associated with each template
4
SPI field
health certificate
44. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
Enhanced Metafile (EMF)
System Statement of Health Response
compliance - autoremediation
Terminal Services Gateway (TS Gateway) enforcement
45. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
Authentication exemption
Duplicate
enterprise
RAID-5
46. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
per user
remediation server
Kerberos v5 protocol
Reliability Monitor
47. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
Reliability and Performance Monitor
health certificate
mutual authentication
48. In which view can you view the counters associated with Data Collector Sets?
7:00 am and 12:00 pm
Setup
Key Addition Failures
performance Monitor
49. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
8
health certificate
NTFS
50. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
workstations
8
file-based
print server