SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Updates that can be deployed via WSUS can include all of the following except __________.
additional user experience features
identity spoofing
access particular servers
a built-in network monitor.
2. What server is responsible for maintaining the list of DFS shared folders and responding to user requests for those folders?
private key
namespace server
additional user experience features
NAP enforcement method
3. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
Kerberos v5 protocol
F10
Online Responder
create event log entries
4. The _______________ is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools.
a built-in network monitor.
spanned
Reliability and Performance Monitor
Windows Server 2008
5. You don't need to ____________ the Print Management console when you add the Print Services role to the computer.
Duplicate
point-in-time
60 - 86 -400
manually install
6. Print Server is the only ___________ that is required when you add the Print Services role
Windows NT
Certificate Manager
role service
performance counters
7. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
online file settings
by right-clicking on the file and selecting Restore previous versions
point-in-time
self-enrollment
8. IKE main mode has a default lifetime of __________ hours.
print router
8
packet filtering and end-to-end security.
F10
9. The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.
Windows NT
point-in-time
power-cycling the unit
DFS Replication
10. Which log should be the first place you look when you suspect a problem with Active Directory?
create event log entries
Directory Service
Certificate Practice Statement
packet filtering and end-to-end security.
11. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
planning and design
7:00 am and 12:00 pm
NAP Agent
Directory Service
12. Shadow Copies of Shared Folders creates files that are stored on file shares on Windows Server 2003 or Windows Server 2008 file servers by using what type of copies?
Diagnostics node
a built-in network monitor.
point-in-time
access particular servers
13. A maximum of how many shadow copies can be stored on a particular volume?
64
Security Parameters Index (SPI)
7:00 am and 12:00 pm
cryptographic checksum
14. To share printers - which Network Sharing and Discovery setting must be turned on?
both A & B
Printer Sharing
file server at each location
300MB
15. Do not use Tunnel mode when you require _________________
netsh
resource
packet filtering and end-to-end security.
publication schedules
16. Depending on the configuration item that is being monitored for _____________ may not be possible.
Key Addition Failures
file server at each location
file-based
compliance - autoremediation
17. What is one of the major problems for printing administrators on large enterprise networks?
Kerberos v5 protocol
keeping track of print devices
NTFS
Windows PowerShell
18. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
hard quota
Authentication exemption
Certificate Manager
Windows NT
19. When you install additional hard disk drives on a file server - the Windows Server 2008 setup program does not ___________ performs all of the preparation tasks.
Automatically
enforcement point
per user
write
20. The system partition contains what types of files?
64
Macintosh and Linux computers
NAP enforcement method
hardware-related files that the computer uses to boot
21. Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas - file screens - and e-mail notifications of user quota activities?
File Server Resource Manager
digital certificate
Kerberos v5 protocol
share permissions
22. Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
Printer > Pause Printing
simpler
Setup
support for Unix-based systems
23. If you wish to perform backups from the command line - what will you need to install?
NAP enforcement method
Windows PowerShell
DFS Replication
access the shadow copies
24. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?
partitions and drives
mirroring
share permissions
Setup
25. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses these types of _____________: primary partitions - extended partitions - and logical disks
confidentiality and data encryption.
Diagnostics node
partitions and drives
additional user experience features
26. How can users restore previous versions of files on the selected volumes?
64
share permissions
by right-clicking on the file and selecting Restore previous versions
64
27. Which of the following are the specific processes or events that you want to track?
NTLM Authentication
System Monitor
performance counters
performance Monitor
28. When you work with basic disks in Windows Server 2008 - how many primary partitions can you create?
4
netsh
publication schedules
Windows PowerShell
29. Which of the following is the default view of the Reliability and Performance Monitor?
full mesh
private key
resource
RAID-5
30. What allows traffic that is defined in one direction to also be defined in the opposite direction?
Kerberos v5
Online Responder
mirroring
NAP Agent
31. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
files/folders/volumes
custom Data Collector Set
Setup
access the shadow copies
32. By default - the Print Management console displays only which of the following in its list of print servers?
Authentication exemption
Key Addition Failures
hardware-related files that the computer uses to boot
local machine
33. Within each site - the _____________ you need can depend on your users' needs and how these needs affect their file storage and sharing practices.
older versions
DHCP enforcement method
additional user experience features
number of file servers
34. To set the Netsh IPSec context - what is the first command you enter at the command prompt?
netsh
older versions
Installing a printer
F10
35. Before secure data is sent - what must occur to determine the type of traffic to be secured and how it will be secured?
quick mode negotiations
both A & B
Acquire Failures
main mode negotiations
36. Which log records events associated with server installation - adding and removing server roles - installing applications - and so forth?
quick mode negotiations
Terminal Services Gateway (TS Gateway) enforcement
DFS Replication
Setup
37. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
manual
partitioning drives
Installing a printer
spanned
38. Windows Server 2008 - Windows Vista - and Windows XP with Service Pack 3 all have a built-in NAP client - and third-party vendors can use the NAP API to write additional clients for additional operating systems - such as _______________
compliance - autoremediation
Macintosh and Linux computers
8
header of each packet
39. The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
System Statement of Health Response
Windows Server 2008
header of each packet
enforcement point
40. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
NAP enforcement method
Online Responder
1
Kerberos v5
41. Which document management menu command enables users to send jobs to the printer - where they remain in the queue - unprocessed - until you select the same menu item again?
Windows Server 2003 R2
Printer > Use Printer Offline
write
simpler
42. Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
security settings associated with each template
Acquire Failures
hardware-related files that the computer uses to boot
volume
43. NTFS quotas are able to do which of the following?
security settings associated with each template
Acquire Failures
Printer Sharing
create event log entries
44. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
64
Printer > Pause Printing
publication schedules
intermediate
45. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
cryptographic checksum
System Statement of Health Response
quick mode negotiations
workstations
46. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
64
controlling download and installation behavior
7:00 am and 12:00 pm
47. What feature allows users or computers to manually request a certificate based a template?
File Server Resource Manager
cryptographic checksum
Enroll ACL
NAP Agent
48. Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
Terminal Services Gateway (TS Gateway) enforcement
netsh
digital certificate
main mode negotiations
49. Which feature enables users to request their own PKI certificates - typically through a Web browser?
online file settings
self-enrollment
files/folders/volumes
local machine
50. In which view can you view the counters associated with Data Collector Sets?
Printer > Pause Printing
packet filtering and end-to-end security.
performance Monitor
active partition