SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Server management includes all of the following with the exception of __________.
Statement of Health
controlling download and installation behavior
intermediate
Windows print architecture
2. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
simpler
64
by right-clicking on the file and selecting Restore previous versions
480
3. How many active partitions can you have per hard drive?
1
digital certificate
more than 1 -000
Reliability and Performance Monitor
4. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Printer > Use Printer Offline
Isolation
NAP Agent
Online Responder
5. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
performance Monitor
administrative privileges
power-cycling the unit
Diagnostics node
6. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
private key
access particular servers
NAP enforcement method
Online Responder
7. To identify a specific SA for tracking purposes - a 32-bit number known as the ____________ is used.
Security Parameters Index (SPI)
full mesh
planning and design
file-sharing strategy
8. The NPS service combines each Statement of Health Response into what?
System Statement of Health Response
more than 1 -000
resource
partitions and drives
9. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
Printer > Use Printer Offline
manual
Setup
NAP enforcement method
10. A maximum of how many shadow copies can be stored on a particular volume?
Enroll ACL
mutual authentication
custom Data Collector Set
64
11. To share printers - which Network Sharing and Discovery setting must be turned on?
Printer Sharing
mutual authentication
digital certificate
Key Addition Failures
12. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
compliance - autoremediation
F10
additional user experience features
create multiple print users
13. IKE main mode has a default lifetime of __________ hours.
8
workstations
point-in-time
additional user experience features
14. Just as with folder shares - what must clients have to access a shared printer?
netsh
proper permissions
Macintosh and Linux computers
identity spoofing
15. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
keeping track of print devices
DHCP enforcement method
point-in-time
enterprise
16. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
NTFS
namespace server
Duplicate
simpler
17. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
local machine
NAP Agent
full mesh
18. The Authentication Header (AH) protocol does not provide _____________________
confidentiality and data encryption.
both A & B
network traffic
Reliability Monitor
19. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
proper permissions
60 - 86 -400
spanned
Macintosh and Linux computers
20. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
Certificate Practice Statement
additional user experience features
per user
21. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Volume Shadow Copies
controlling download and installation behavior
Windows NT
more than 1 -000
22. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
F10
Kerberos v5 protocol
enforcement point
file-based
23. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
mutual authentication
Printer > Use Printer Offline
7:00 am and 12:00 pm
access particular servers
24. Which field does the IPSec driver use to match the correct SA with the correct packet?
per user
SPI field
Duplicate
share permissions
25. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
confidentiality and data encryption.
Printer > Pause Printing
IPSec
DHCP enforcement method
26. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
Setup
digital certificate
publication schedules
power-cycling the unit
27. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
create event log entries
Online Responder
partitions and drives
power-cycling the unit
28. By default - the Print Management console displays only which of the following in its list of print servers?
Automatically
compliance - autoremediation
Key Addition Failures
local machine
29. A period of _______________ is necessary before you start implementation of a file server deployment.
planning and design
60 - 86 -400
create event log entries
proper permissions
30. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
quick mode negotiations
System Monitor
file server at each location
volume
31. A single computer cannot perform all of the roles in the______________
additional user experience features
controlling download and installation behavior
Directory Service
Windows print architecture
32. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
1
Automatically
partitioning drives
IPSec
33. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
additional user experience features
60 - 86 -400
Kerberos v5 protocol
simpler
34. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
Windows PowerShell
a built-in network monitor.
netsh
Windows Server 2003 R2
35. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
write
keeping track of print devices
performance Monitor
self-enrollment
36. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
Group Policy updates
workstations
files/folders/volumes
file server at each location
37. Which of the following is not a built-in Data Collector Set within Windows Server 2008?
self-enrollment
60 - 86 -400
System Monitor
Shadow Copies of Shared Folders
38. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
Certificate Practice Statement
Automatically
Directory Service
hard quota
39. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
local machine
additional user experience features
number of file servers
Macintosh and Linux computers
40. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
7:00 am and 12:00 pm
Statement of Health
Reliability and Performance Monitor
Authentication exemption
41. Which of the following is the default view of the Reliability and Performance Monitor?
manual
cryptographic checksum
hardware-related files that the computer uses to boot
resource
42. What is the default authentication protocol in an Active Directory network?
Kerberos v5
RAID-5
workstations
print server
43. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
Macintosh and Linux computers
virtual
active partition
44. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Shadow Copies of Shared Folders
partitions and drives
Windows Server 2008
administrative privileges
45. The system partition contains what types of files?
hardware-related files that the computer uses to boot
Security Parameters Index (SPI)
self-enrollment
60 - 86 -400
46. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
namespace server
virtual
System Monitor
Windows NT
47. NTFS quotas are limited to controlling storage on entire volumes on what basis?
Macintosh and Linux computers
per user
proper permissions
local machine
48. Windows Server 2008 does not include ______________
a built-in network monitor.
remediation server
custom Data Collector Set
performance Monitor
49. Windows automatically makes a user the owner of all files that he or she creates on a _____
server volume
publication schedules
NTLM Authentication
a built-in network monitor.
50. Which of the following is not a node found in the Print Management console?
sharing and security
digital certificate
print server
additional user experience features