SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Windows Server Administration
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many active partitions can you have per hard drive?
1
Installing a printer
netsh
older versions
2. Shadow Copies of Shared Folders functionality is enabled at which level?
workstations
volume
Certificate Practice Statement
4
3. When restoring data in Windows Server 2008 - what types of restores can you can choose to perform?
print router
Windows print architecture
network traffic
files/folders/volumes
4. Regardless of the size of your network - your strategy for creating shared folders should consist of all the following information except what __________ you will use for the shares.
online file settings
64
keeping track of print devices
publication schedules
5. DHCP is the only __________ that can be deployed in a non-Active Directory environment.
file-sharing strategy
additional user experience features
NAP enforcement method
sharing and security
6. The IPSec NAP enforcement method relies on which type of PKI certificate to perform its enforcements?
health certificate
digital certificate
hard quota
Acquire Failures
7. The File Server Resource Manager console was first introduced in which product?
Windows Server 2003 R2
Certificate Practice Statement
Diagnostics node
DFS Replication
8. Which service responds to requests from clients concerning the revocation status of a particular certificate - sending back a digitally signed response indicating the certificate's current status?
480
by right-clicking on the file and selecting Restore previous versions
intermediate
Online Responder
9. A period of _______________ is necessary before you start implementation of a file server deployment.
hard quota
planning and design
a built-in network monitor.
SPI field
10. If Automatic Updates is configured to notify the user of updates that are ready to install - it checks to see whether a user with ____________ is logged on to the computer.
create event log entries
administrative privileges
virtual
NAP Agent
11. What are the IPSEC default settings for the key lifetime in minutes?
480
additional user experience features
Disk Configuration MMC snap-in
sharing and security
12. Which "middle-of-the-road" form of NTLM authentication was used to improve upon the security of LM Authentication?
Reliability and Performance Monitor
manually install
SPI field
NTLM Authentication
13. Server management includes all of the following with the exception of __________.
volume
controlling download and installation behavior
Automatically
netsh
14. How can users restore previous versions of files on the selected volumes?
enterprise
publication schedules
Duplicate
by right-clicking on the file and selecting Restore previous versions
15. What is the minimum amount of space you must allocate to store shadow copies?
300MB
quick mode negotiations
create multiple print users
File Server Resource Manager
16. For network users to be able to access a shared folder on an NTFS drive - you must grant them __________ permissions.
4
by right-clicking on the file and selecting Restore previous versions
both A & B
print router
17. Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
enforcement point
publication schedules
Printer > Pause Printing
self-enrollment
18. DHCP enforcement is the least secure enforcement method because a user can simply configure their computer with a static IP configuration to bypass any ___________ that is in place.
DHCP enforcement method
header of each packet
file server at each location
print router
19. NTFS quotas are limited to controlling storage on entire volumes on what basis?
Reliability and Performance Monitor
virtual
administrative privileges
per user
20. When the storage limit of your Shadow Copies of Shared Folders is reached - _______ of shadow copies will be deleted without any means of restoring them.
share permissions
older versions
performance counters
identity spoofing
21. What volume type consists of space on three or more physical disks - all of which must be dynamic disks?
partitioning drives
self-enrollment
online file settings
RAID-5
22. Just as with folder shares - what must clients have to access a shared printer?
health certificate
self-enrollment
proper permissions
cryptographic checksum
23. What file system provides the most granular user access control and also provides other advanced storage features - including file encryption and compression?
NTFS
NAP enforcement method
remediation server
by right-clicking on the file and selecting Restore previous versions
24. You can create your own ______
64
performance counters
volume
custom Data Collector Set
25. What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer - regardless of the actual application that is sending or receiving data?
System Monitor
planning and design
IPSec
64
26. If your organization has branch offices scattered around the world and uses relatively expensive wide area networking (WAN) links to connect them - it would probably be more economical to install a _____________ rather than having all of your users a
file server at each location
8
Security Parameters Index (SPI)
RAID-5
27. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume?
spanned
point-in-time
Directory Service
F10
28. Which of the following is not a privilege granted to certificate managers? modify Certificate Revocation List (CRL)
File Server Resource Manager
publication schedules
Windows PowerShell
write
29. Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.
compliance - autoremediation
security settings associated with each template
virtual
by right-clicking on the file and selecting Restore previous versions
30. Which of the following is not an option with the Print Services Management Console?
custom Data Collector Set
file server at each location
Installing a printer
hard quota
31. A maximum of how many shadow copies can be stored on a particular volume?
64
namespace server
publication schedules
health certificate
32. Updates that can be deployed via WSUS can include all of the following except __________.
4
Volume Shadow Copies
additional user experience features
Authentication exemption
33. If multiple servers run WSUS - the administrator controls which clients ___________ that run WSUS.
F10
access particular servers
Internet Printing role service
planning and design
34. To distribute the load of issuing certificates in a geographically dispersed location - an organization can have one or more __________ CAs.
intermediate
Printer > Use Printer Offline
System Monitor
server volume
35. Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
NTLM Authentication
Key Addition Failures
Authentication exemption
Online Responder
36. When you first launch Network Monitor - what key do you press to begin capturing network traffic?
64
Statement of Health
F10
System Monitor
37. Windows Server 2008 can support dynamic volumes as large as __________ terabytes.
Terminal Services Gateway (TS Gateway) enforcement
Automatically
Windows PowerShell
64
38. Print Server is the only ___________ that is required when you add the Print Services role
partitioning drives
DVD
online file settings
role service
39. A single computer cannot perform all of the roles in the______________
Windows print architecture
file-based
create multiple print users
NTFS
40. Generally speaking - a well-designed sharing strategy provides each user with all of the following resources except __________ storage space.
performance console
print router
virtual
Windows print architecture
41. Printing in Microsoft Windows typically involves all of the following components except a __________.
Kerberos v5 protocol
64
print router
volume
42. The NPS service combines each Statement of Health Response into what?
local machine
System Statement of Health Response
Macintosh and Linux computers
8
43. Shadow Copies protects against accidental file deletions that inconvenience users and administrators on a regular basis by using what type of fault tolerance?
Printer Sharing
file-based
point-in-time
role service
44. How many possibilities of filter combinations exist in the Print Management Console?
netsh
8
more than 1 -000
enterprise
45. Which digital document contains identifying information about a particular user - computer - service - and so on?
Disk Configuration MMC snap-in
digital certificate
print server
64
46. Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
60 - 86 -400
64
NAP Agent
print server
47. Which of the following is not a node found in the Print Management console?
sharing and security
network traffic
Windows NT
server volume
48. What does the Windows Server Backup feature use to perform file and volume-level backups?
Volume Shadow Copies
NTLM Authentication
self-enrollment
packet filtering and end-to-end security.
49. Each TCP/IP packet protected with IPSec contains a ______________in the form of a keyed hash.
a built-in network monitor.
power-cycling the unit
cryptographic checksum
virtual
50. In a PKI - each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.
private key
Installing a printer
Kerberos v5 protocol
digital certificate