SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
Disk Configuration MMC snap-in
File Server Resource Manager
keeping track of print devices
role service
2. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
proper permissions
administrative privileges
Setup
full mesh
3. If you wish to perform backups from the command line - what will you need to install?
confidentiality and data encryption.
print server
Shadow Copies of Shared Folders
Windows PowerShell
4. A period of _______________ is necessary before you start implementation of a file server deployment.
header of each packet
IPSec
simpler
planning and design
5. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
write
netsh
older versions
Statement of Health
6. Which of the following is not a category for the Windows operating system updates?
Group Policy updates
self-enrollment
RAID-5
Windows print architecture
7. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
remediation server
60 - 86 -400
NAP Agent
DVD
8. The process of deploying and configuring a simple file server using Windows Server 2008 includes many of the most basic server administration tasks - including all of the following except __________.
Kerberos v5 protocol
partitioning drives
access particular servers
Printer > Use Printer Offline
9. Depending on the configuration item that is being monitored for _____________ may not be possible.
a built-in network monitor.
compliance - autoremediation
File Server Resource Manager
DFS Replication
10. In which view can you view the counters associated with Data Collector Sets?
manually install
64
performance Monitor
Volume Shadow Copies
11. Windows Server Backup supports the use of what type of media as backup destinations?
Windows print architecture
partitions and drives
DVD
60 - 86 -400
12. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
power-cycling the unit
server volume
Enroll ACL
4
13. You cannot mark an existing dynamic disk as an ____________.
proper permissions
active partition
mutual authentication
power-cycling the unit
14. What tool can you use to perform disk-related tasks such as initializing disks - selecting a partition style - converting basic disks to dynamic disks - and more?
Disk Configuration MMC snap-in
480
cryptographic checksum
publication schedules
15. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
Diagnostics node
Authentication exemption
Windows Server 2008
older versions
16. The Authentication Header (AH) protocol does not provide _____________________
a built-in network monitor.
workstations
confidentiality and data encryption.
Statement of Health
17. Updates that can be deployed via WSUS can include all of the following except __________.
DVD
partitions and drives
Windows PowerShell
additional user experience features
18. How many active partitions can you have per hard drive?
both A & B
confidentiality and data encryption.
1
Duplicate
19. Which of the following is not a tool that can help you proactively troubleshoot network problems?
server volume
Authentication exemption
performance console
enterprise
20. What feature allows users or computers to manually request a certificate based a template?
quick mode negotiations
Diagnostics node
Enroll ACL
remediation server
21. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
NTLM Authentication
mirroring
Reliability Monitor
Installing a printer
22. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
performance counters
performance console
workstations
intermediate
23. A single computer cannot perform all of the roles in the______________
300MB
Internet Printing role service
Windows print architecture
header of each packet
24. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
private key
spanned
performance counters
a built-in network monitor.
25. What does the Windows Server Backup feature use to perform file and volume-level backups?
mirroring
Volume Shadow Copies
hard quota
Disk Configuration MMC snap-in
26. What rule allows you to restrict inbound and outbound connections based on certain sets of criteria - such as membership in a particular Active Directory domain?
Certificate Practice Statement
server volume
administrative privileges
Isolation
27. By default - the Print Management console displays only which of the following in its list of print servers?
header of each packet
spanned
Kerberos v5 protocol
local machine
28. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
Enroll ACL
Windows Server 2008
partitions and drives
F10
29. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
Windows print architecture
60 - 86 -400
role service
Authentication exemption
30. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
file server at each location
IPSec
Windows PowerShell
4
31. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
remediation server
7:00 am and 12:00 pm
support for Unix-based systems
Printer > Use Printer Offline
32. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
quick mode negotiations
Internet Printing role service
health certificate
Installing a printer
33. Server management includes all of the following with the exception of __________.
File Server Resource Manager
Directory Service
keeping track of print devices
controlling download and installation behavior
34. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
Internet Printing role service
security settings associated with each template
manual
Group Policy updates
35. Which of the following are the specific processes or events that you want to track?
performance counters
keeping track of print devices
local machine
hard quota
36. The File Server Resource Manager console was first introduced in which product?
cryptographic checksum
Windows Server 2003 R2
spanned
server volume
37. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
digital certificate
System Statement of Health Response
planning and design
DFS Replication
38. What is the minimum amount of space you must allocate to store shadow copies?
role service
300MB
IPSec
performance Monitor
39. To set printer priorities - you must do all of the following except __________.
create multiple print users
Security Parameters Index (SPI)
300MB
Windows Server 2008
40. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
mutual authentication
64
Directory Service
namespace server
41. Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
Setup
Statement of Health
300MB
42. The command "set config property=ipsecloginterval value=value" can be set to what range of values?
netsh
60 - 86 -400
NTLM Authentication
300MB
43. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
files/folders/volumes
Macintosh and Linux computers
write
Isolation
44. Just as with folder shares - what must clients have to access a shared printer?
Volume Shadow Copies
File Server Resource Manager
Enroll ACL
proper permissions
45. What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
Internet Printing role service
local machine
identity spoofing
Key Addition Failures
46. NTFS quotas are able to do which of the following?
create event log entries
Key Addition Failures
publication schedules
Statement of Health
47. To install the _____________ - you must also install the Web Server (IIS) role
performance Monitor
Internet Printing role service
header of each packet
write
48. The version of Network Monitor that is built into Windows Server 2008 cannot capture 100 percent of the ____________ available to the network interface.
System Statement of Health Response
network traffic
share permissions
Isolation
49. When the restore operation finds files and folders in the recovery location - the restore can do one of three things. Which of the following is not an option?
digital certificate
network traffic
64
write
50. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
Directory Service
spanned
hard quota
DVD