SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
point-in-time
Online Responder
Security Parameters Index (SPI)
manual
2. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
Setup
Diagnostics node
NTLM Authentication
quick mode negotiations
3. The Authentication Header (AH) protocol does not provide _____________________
confidentiality and data encryption.
Windows Server 2008
remediation server
Volume Shadow Copies
4. Windows Server Backup supports the use of what type of media as backup destinations?
64
performance counters
DVD
partitioning drives
5. You cannot mark an existing dynamic disk as an ____________.
active partition
security settings associated with each template
Certificate Manager
partitions and drives
6. Print Server is the only ___________ that is required when you add the Print Services role
resource
enterprise
full mesh
role service
7. What are the IPSEC default settings for the key lifetime in minutes?
self-enrollment
480
Windows print architecture
create multiple print users
8. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
main mode negotiations
enforcement point
proper permissions
9. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
intermediate
7:00 am and 12:00 pm
Kerberos v5
power-cycling the unit
10. What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?
remediation server
enterprise
a built-in network monitor.
64
11. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
enforcement point
share permissions
Setup
NAP enforcement method
12. To share printers - which Network Sharing and Discovery setting must be turned on?
access the shadow copies
virtual
Printer Sharing
number of file servers
13. By default - the Print Management console displays only which of the following in its list of print servers?
server volume
Certificate Manager
local machine
netsh
14. The first step in designing a ______________ - projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs
8
Isolation
file-sharing strategy
Disk Configuration MMC snap-in
15. A single computer cannot perform all of the roles in the______________
Certificate Practice Statement
Windows NT
file-based
Windows print architecture
16. Do not use Tunnel mode when you require _________________
packet filtering and end-to-end security.
Acquire Failures
enterprise
Disk Configuration MMC snap-in
17. If you wish to perform backups from the command line - what will you need to install?
Kerberos v5
Windows PowerShell
create event log entries
active partition
18. What does the Windows Server Backup feature use to perform file and volume-level backups?
spanned
Volume Shadow Copies
a built-in network monitor.
both A & B
19. How many active partitions can you have per hard drive?
remediation server
create multiple print users
health certificate
1
20. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
file server at each location
Internet Printing role service
System Statement of Health Response
RAID-5
21. To set printer priorities - you must do all of the following except __________.
performance Monitor
create multiple print users
file server at each location
Acquire Failures
22. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
header of each packet
main mode negotiations
print server
administrative privileges
23. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
60 - 86 -400
local machine
controlling download and installation behavior
role service
24. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
64
Certificate Practice Statement
Group Policy updates
manually install
25. NTFS quotas are able to do which of the following?
create event log entries
remediation server
controlling download and installation behavior
volume
26. Which CA integrates with an Active Directory domain and can use certificate templates to allow autoenrollment of digital certificates - as well as store the certificates themselves within the Active Directory database?
create multiple print users
simpler
enterprise
performance Monitor
27. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
spanned
file server at each location
network traffic
hard quota
28. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
Certificate Practice Statement
NAP Agent
8
point-in-time
29. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
Setup
mutual authentication
IPSec
private key
30. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
custom Data Collector Set
netsh
System Monitor
IPSec
31. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
both A & B
digital certificate
publication schedules
F10
32. What feature allows users or computers to manually request a certificate based a template?
write
Enroll ACL
NTLM Authentication
manual
33. A period of _______________ is necessary before you start implementation of a file server deployment.
performance Monitor
simpler
partitions and drives
planning and design
34. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Printer > Pause Printing
Enroll ACL
partitioning drives
hardware-related files that the computer uses to boot
35. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
custom Data Collector Set
volume
enforcement point
namespace server
36. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
additional user experience features
Authentication exemption
Printer > Use Printer Offline
NAP Agent
37. To stop a job that is currently printing - you must clear the print device's memory (by resetting it or ____________) - as well as clear the job from the queue.
power-cycling the unit
NTLM Authentication
cryptographic checksum
64
38. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
access particular servers
performance console
Macintosh and Linux computers
namespace server
39. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
file server at each location
Acquire Failures
health certificate
older versions
40. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
identity spoofing
4
active partition
Terminal Services Gateway (TS Gateway) enforcement
41. Which of the following prohibits users from consuming any disk space beyond the allotted amount?
Shadow Copies of Shared Folders
keeping track of print devices
enforcement point
hard quota
42. You can create your own ______
identity spoofing
custom Data Collector Set
manual
Macintosh and Linux computers
43. Just as with folder shares - what must clients have to access a shared printer?
proper permissions
digital certificate
Authentication exemption
Certificate Manager
44. A server that operates the NAP Enforcement Server components is referred to as a NAP __________.
enforcement point
older versions
confidentiality and data encryption.
manually install
45. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
intermediate
NAP enforcement method
Enroll ACL
mirroring
46. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
DFS Replication
Terminal Services Gateway (TS Gateway) enforcement
health certificate
header of each packet
47. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
NAP enforcement method
60 - 86 -400
DHCP enforcement method
Windows PowerShell
48. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
Certificate Manager
Internet Printing role service
mutual authentication
support for Unix-based systems
49. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
private key
performance console
server volume
main mode negotiations
50. How many possibilities of filter combinations exist in the Print Management Console?
7:00 am and 12:00 pm
power-cycling the unit
more than 1 -000
4