SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Just as with folder shares - what must clients have to access a shared printer?
DFS Replication
custom Data Collector Set
keeping track of print devices
proper permissions
2. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
manual
mutual authentication
performance counters
share permissions
3. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
Disk Configuration MMC snap-in
namespace server
Directory Service
older versions
4. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
intermediate
Statement of Health
4
active partition
5. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
health certificate
Kerberos v5 protocol
1
administrative privileges
6. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
Internet Printing role service
manually install
Kerberos v5 protocol
full mesh
7. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
power-cycling the unit
files/folders/volumes
compliance - autoremediation
Certificate Practice Statement
8. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
Windows PowerShell
network traffic
power-cycling the unit
Automatically
9. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
Key Addition Failures
point-in-time
netsh
intermediate
10. How many possibilities of filter combinations exist in the Print Management Console?
role service
more than 1 -000
sharing and security
Shadow Copies of Shared Folders
11. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
write
Printer > Use Printer Offline
Kerberos v5 protocol
volume
12. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
packet filtering and end-to-end security.
older versions
Security Parameters Index (SPI)
Windows print architecture
13. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
online file settings
System Monitor
write
support for Unix-based systems
14. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
Group Policy updates
Terminal Services Gateway (TS Gateway) enforcement
header of each packet
Directory Service
15. Which of the following is not a tool that can help you proactively troubleshoot network problems?
Online Responder
performance console
mirroring
IPSec
16. A single computer cannot perform all of the roles in the______________
file server at each location
by right-clicking on the file and selecting Restore previous versions
Windows print architecture
point-in-time
17. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
Certificate Manager
access the shadow copies
controlling download and installation behavior
share permissions
18. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
enforcement point
Group Policy updates
Online Responder
planning and design
19. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
System Monitor
60 - 86 -400
additional user experience features
private key
20. A maximum of how many shadow copies can be stored on a particular volume?
Setup
64
4
DHCP enforcement method
21. What is the minimum amount of space you must allocate to store shadow copies?
create multiple print users
mutual authentication
300MB
both A & B
22. Where is the checksum located?
header of each packet
both A & B
4
point-in-time
23. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
Reliability and Performance Monitor
create event log entries
Terminal Services Gateway (TS Gateway) enforcement
System Monitor
24. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
power-cycling the unit
access the shadow copies
DHCP enforcement method
RAID-5
25. A period of _______________ is necessary before you start implementation of a file server deployment.
planning and design
Printer > Pause Printing
files/folders/volumes
intermediate
26. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
file-based
Certificate Manager
write
keeping track of print devices
27. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Group Policy updates
administrative privileges
partitioning drives
identity spoofing
28. Server management includes all of the following with the exception of __________.
performance Monitor
controlling download and installation behavior
identity spoofing
System Statement of Health Response
29. What allows traffic that is defined in one direction to also be defined in the opposite direction?
enterprise
mirroring
Isolation
spanned
30. Which feature enables users to request their own PKI certificates - typically through a Web browser?
64
self-enrollment
64
Certificate Practice Statement
31. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
compliance - autoremediation
health certificate
point-in-time
partitioning drives
32. What feature allows users or computers to manually request a certificate based a template?
Printer > Pause Printing
digital certificate
support for Unix-based systems
Enroll ACL
33. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
virtual
volume
SPI field
number of file servers
34. Which log should be the first place you look when you suspect a problem with Active Directory?
60 - 86 -400
Reliability Monitor
proper permissions
Directory Service
35. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
partitions and drives
active partition
file-based
mirroring
36. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
Acquire Failures
by right-clicking on the file and selecting Restore previous versions
support for Unix-based systems
37. NTFS quotas are able to do which of the following?
Installing a printer
manual
volume
create event log entries
38. By default - what topology do replication groups use?
full mesh
DFS Replication
both A & B
Authentication exemption
39. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
Key Addition Failures
spanned
64
per user
40. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
private key
SPI field
Printer Sharing
Automatically
41. When preparing a hard disk for use - Windows Server 2008 file servers cannot use the same settings as _____________.
Diagnostics node
workstations
spanned
Statement of Health
42. To install the _____________ - you must also install the Web Server (IIS) role
Windows Server 2003 R2
Security Parameters Index (SPI)
Internet Printing role service
480
43. Windows Server Backup supports the use of what type of media as backup destinations?
Certificate Manager
Online Responder
DVD
more than 1 -000
44. What is the default authentication protocol in an Active Directory network?
print router
Kerberos v5
access the shadow copies
Kerberos v5 protocol
45. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
administrative privileges
print server
hardware-related files that the computer uses to boot
DHCP enforcement method
46. Which of the following is not an option with the Print Services Management Console?
Installing a printer
RAID-5
Acquire Failures
300MB
47. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
health certificate
network traffic
by right-clicking on the file and selecting Restore previous versions
4
48. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
DHCP enforcement method
60 - 86 -400
Key Addition Failures
49. What is one of the major problems for printing administrators on large enterprise networks?
spanned
create event log entries
1
keeping track of print devices
50. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
file server at each location
mirroring
DHCP enforcement method
Windows Server 2008