SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
write
files/folders/volumes
Duplicate
manual
2. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
local machine
64
older versions
Windows Server 2003 R2
3. Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
local machine
number of file servers
Online Responder
Isolation
4. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
virtual
Installing a printer
Shadow Copies of Shared Folders
full mesh
5. Once you have enabled Shadow Copies of Shared Folders for a particular volume - the default schedule will create a snapshot twice per day - seven days per week - at what times?
Windows Server 2003 R2
controlling download and installation behavior
additional user experience features
7:00 am and 12:00 pm
6. You can create your own ______
create event log entries
quick mode negotiations
custom Data Collector Set
role service
7. What allows traffic that is defined in one direction to also be defined in the opposite direction?
share permissions
mirroring
online file settings
workstations
8. Which of the following is the most frequently used view within the Reliability and Performance Monitor?
performance Monitor
write
Windows PowerShell
IPSec
9. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
compliance - autoremediation
performance counters
NAP Agent
network traffic
10. In the Reliability and Performance Monitor - which view provides information about system events that can affect a server's stability - including software installation and un-installation - as well as any application - operating system - or hardware
Reliability Monitor
print server
SPI field
header of each packet
11. To indicate the health status of a particular SHA - each SHA creates what kind of statement that it transmits to the NAP Agent?
Shadow Copies of Shared Folders
both A & B
Statement of Health
sharing and security
12. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
partitions and drives
sharing and security
4
performance counters
13. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
header of each packet
Reliability Monitor
Windows Server 2008
server volume
14. The Authentication Header (AH) protocol does not provide _____________________
confidentiality and data encryption.
partitions and drives
Group Policy updates
intermediate
15. How many active partitions can you have per hard drive?
header of each packet
proper permissions
DFS Replication
1
16. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
by right-clicking on the file and selecting Restore previous versions
Online Responder
Isolation
remediation server
17. Which security role is tasked with issuing and managing certificates - including approving certificate enrollment and revocation requests?
confidentiality and data encryption.
Windows Server 2008
file server at each location
Certificate Manager
18. To set printer priorities - you must do all of the following except __________.
create multiple print users
workstations
Reliability Monitor
Volume Shadow Copies
19. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
Group Policy updates
file server at each location
Internet Printing role service
administrative privileges
20. Which log should be the first place you look when you suspect a problem with Active Directory?
IPSec
security settings associated with each template
NTFS
Directory Service
21. A maximum of how many shadow copies can be stored on a particular volume?
64
NTFS
Reliability Monitor
enforcement point
22. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
performance counters
quick mode negotiations
cryptographic checksum
share permissions
23. Which of the following is not a tool that can help you proactively troubleshoot network problems?
Certificate Practice Statement
Shadow Copies of Shared Folders
60 - 86 -400
performance console
24. How many possibilities of filter combinations exist in the Print Management Console?
more than 1 -000
enterprise
Shadow Copies of Shared Folders
power-cycling the unit
25. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
create event log entries
quick mode negotiations
private key
Automatically
26. To install the _____________ - you must also install the Web Server (IIS) role
Internet Printing role service
4
enterprise
quick mode negotiations
27. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
file-based
SPI field
planning and design
spanned
28. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
enforcement point
Key Addition Failures
Printer > Pause Printing
power-cycling the unit
29. Just as with folder shares - what must clients have to access a shared printer?
F10
proper permissions
full mesh
access the shadow copies
30. Windows automatically makes a user the owner of all files that he or she creates on a _____
480
RAID-5
System Statement of Health Response
server volume
31. What standardized - highly portable print job format is the default format used by the Windows 2000 - Windows XP - and Windows Server 2003 print subsystems?
System Statement of Health Response
access particular servers
file server at each location
Enhanced Metafile (EMF)
32. Windows Server Backup supports the use of what type of media as backup destinations?
virtual
Statement of Health
additional user experience features
DVD
33. You cannot mark an existing dynamic disk as an ____________.
Kerberos v5 protocol
manually install
active partition
Kerberos v5
34. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
hard quota
Installing a printer
virtual
health certificate
35. By default - what topology do replication groups use?
RAID-5
full mesh
manual
resource
36. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
Acquire Failures
DVD
share permissions
file-based
37. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
sharing and security
online file settings
NTFS
create event log entries
38. Printing in Microsoft Windows typically involves all of the following components except a __________.
DVD
print router
packet filtering and end-to-end security.
Printer > Pause Printing
39. Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
Group Policy updates
Windows NT
Duplicate
main mode negotiations
40. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
power-cycling the unit
number of file servers
File Server Resource Manager
quick mode negotiations
41. Which process is used to establish trust between communicating systems - after which only trusted systems can communicate with each other?
mutual authentication
performance console
DHCP enforcement method
support for Unix-based systems
42. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
private key
file-based
300MB
print server
43. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
enforcement point
Directory Service
Automatically
planning and design
44. To share printers - which Network Sharing and Discovery setting must be turned on?
Enroll ACL
64
Printer Sharing
Installing a printer
45. What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
Printer Sharing
Enroll ACL
volume
main mode negotiations
46. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
number of file servers
support for Unix-based systems
Authentication exemption
main mode negotiations
47. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
Statement of Health
IPSec
Kerberos v5
Setup
48. Depending on the configuration item that is being monitored for _____________ may not be possible.
compliance - autoremediation
Disk Configuration MMC snap-in
Kerberos v5 protocol
planning and design
49. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
DVD
self-enrollment
files/folders/volumes
Installing a printer
50. Which field does the IPSec driver use to match the correct SA with the correct packet?
SPI field
System Monitor
identity spoofing
local machine