SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
partitioning drives
8
hard quota
Shadow Copies of Shared Folders
2. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
cryptographic checksum
7:00 am and 12:00 pm
number of file servers
custom Data Collector Set
3. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
Reliability and Performance Monitor
remediation server
Enhanced Metafile (EMF)
Windows PowerShell
4. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
System Monitor
Authentication exemption
Enroll ACL
older versions
5. What is the minimum amount of space you must allocate to store shadow copies?
Diagnostics node
point-in-time
Reliability Monitor
300MB
6. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
F10
Windows Server 2008
number of file servers
Disk Configuration MMC snap-in
7. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
controlling download and installation behavior
DHCP enforcement method
by right-clicking on the file and selecting Restore previous versions
F10
8. By default - what topology do replication groups use?
full mesh
number of file servers
custom Data Collector Set
security settings associated with each template
9. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
more than 1 -000
power-cycling the unit
Volume Shadow Copies
sharing and security
10. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
create multiple print users
Authentication exemption
both A & B
Certificate Manager
11. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
Group Policy updates
main mode negotiations
Enroll ACL
health certificate
12. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
file-based
namespace server
point-in-time
additional user experience features
13. The Authentication Header (AH) protocol does not provide _____________________
full mesh
number of file servers
Printer > Pause Printing
confidentiality and data encryption.
14. In which node is Event Viewer located?
controlling download and installation behavior
netsh
Diagnostics node
Shadow Copies of Shared Folders
15. NTFS quotas are able to do which of the following?
Shadow Copies of Shared Folders
Security Parameters Index (SPI)
create event log entries
write
16. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
file server at each location
access particular servers
Automatically
enforcement point
17. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
publication schedules
performance Monitor
60 - 86 -400
Terminal Services Gateway (TS Gateway) enforcement
18. Printing in Microsoft Windows typically involves all of the following components except a __________.
full mesh
print router
packet filtering and end-to-end security.
enforcement point
19. What are the IPSEC default settings for the key lifetime in minutes?
Terminal Services Gateway (TS Gateway) enforcement
netsh
480
Authentication exemption
20. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
DFS Replication
publication schedules
DVD
1
21. Windows Server 2008 does not include ______________
main mode negotiations
intermediate
a built-in network monitor.
file-sharing strategy
22. What is the default authentication protocol in an Active Directory network?
online file settings
support for Unix-based systems
F10
Kerberos v5
23. The NPS service combines each Statement of Health Response into what?
spanned
identity spoofing
System Statement of Health Response
online file settings
24. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
confidentiality and data encryption.
8
mirroring
25. Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?
identity spoofing
7:00 am and 12:00 pm
remediation server
online file settings
26. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
hardware-related files that the computer uses to boot
Enhanced Metafile (EMF)
IPSec
write
27. To set printer priorities - you must do all of the following except __________.
Windows Server 2008
300MB
create multiple print users
self-enrollment
28. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
both A & B
main mode negotiations
resource
manually install
29. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Isolation
performance Monitor
file server at each location
enterprise
30. NTFS quotas are limited to controlling storage on entire volumes on what basis?
per user
Reliability and Performance Monitor
performance Monitor
mirroring
31. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
Security Parameters Index (SPI)
4
Macintosh and Linux computers
File Server Resource Manager
32. By default - the Print Management console displays only which of the following in its list of print servers?
local machine
number of file servers
Installing a printer
hard quota
33. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
manually install
health certificate
more than 1 -000
partitioning drives
34. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
Acquire Failures
Volume Shadow Copies
mutual authentication
number of file servers
35. Which of the following is not a category for the Windows operating system updates?
Group Policy updates
Terminal Services Gateway (TS Gateway) enforcement
power-cycling the unit
Certificate Practice Statement
36. In which view can you view the counters associated with Data Collector Sets?
self-enrollment
Windows PowerShell
performance Monitor
Automatically
37. Windows automatically makes a user the owner of all files that he or she creates on a _____
older versions
File Server Resource Manager
server volume
online file settings
38. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
remediation server
Enhanced Metafile (EMF)
Acquire Failures
Internet Printing role service
39. The File Server Resource Manager console was first introduced in which product?
Windows Server 2003 R2
Windows PowerShell
print server
8
40. Which of the following are the specific processes or events that you want to track?
Diagnostics node
Kerberos v5
hardware-related files that the computer uses to boot
performance counters
41. Which of the following provides a detailed explanation of how a particular Certification Authority manages certificates and keys?
create multiple print users
NTFS
Kerberos v5
Certificate Practice Statement
42. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Certificate Practice Statement
Setup
older versions
print server
43. What allows traffic that is defined in one direction to also be defined in the opposite direction?
Statement of Health
File Server Resource Manager
Kerberos v5
mirroring
44. What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
Authentication exemption
main mode negotiations
file-based
45. Which of the following is not an option with the Print Services Management Console?
Installing a printer
performance Monitor
NTLM Authentication
sharing and security
46. Which of the following is not a tool that can help you proactively troubleshoot network problems?
performance Monitor
performance console
local machine
more than 1 -000
47. Which of the following is the default view of the Reliability and Performance Monitor?
resource
local machine
Shadow Copies of Shared Folders
partitions and drives
48. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
NAP Agent
enforcement point
network traffic
Online Responder
49. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
older versions
NAP Agent
File Server Resource Manager
write
50. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
print server
point-in-time
Windows NT
480