Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Not available or routable on the Internet - Used by administrators deploying internal networks.






2. In IPv6 - Automates the allocation of IP addresses through a server-based role.






3. A key difference between a primary zone and a secondary zone: primary zone - ________ - secondary zone - Write.






4. You are an administrator for a medium-sized business called Terrapin Technologies. Currently - you are running a Windows Server 2003 environment with Windows Server 2003 Active Directory. Your boss has asked you to look into using the Windows Server






5. Tunnels that can be created - Router-to-router - Host-to-router and router-to-host - Host-to-host.






6. What responsibility does the domain controller locator function perform on an Active Directory client?






7. Recieves a single then resends it at a higher level or power so that the single can travel farther distances between the start and end points of communication.






8. How does WDS help the multicast process?






9. Teredo allows IPv6 hosts to communicate over IPv4 networks that use NAT - Works only with NAT implementations that support UDP port translation - Should always be implemented with a...






10. Which of the following commands is used to start the process of creating a domain controller on a Windows Server 2008 computer with AD DS already instead?






11. ______ configuration is often used for devices that need a static IP






12. Binding time Value - After 87.5% of the leased IP time is used - Binding Time is reffered to as T2 - the client attempts to renew its lease IP again. If it fails the client broadcasts DHCP Discover to any other _____ on the network.






13. By default server 2008 servers and most client OSs are configured to DHCP Therefore; clients only need configuring if a ____ must be applied to it.






14. What is the first Octet range for a Class A IP address - Max Hosts = 16 - 777 - 214?






15. You are responsible for deploying clients to a new four-story office building in Chicago. You are deploying 500 Windows Vista workstations - 30 network printers - and 5 Windows Server 2008 servers to this building. Your network administrator has prov






16. What is the default lease length used by a scope in Windows Server 2008?






17. What does entering the ipconfig /release command do?






18. Your manager has asked you to research options for deploying three Web-based applications to your network to MSN-WEB-001. Also - the applications need to use directory-based authentication without adding a domain controller to your network. Which ste






19. The entire name for a specific host that needs to have a DNS record created.






20. Uses source and destination addresses that are 128 bits - or 16 bytes - in length.






21. What layer of the OSI model does DHCP use and why?






22. You can install DHCP using ______ on a full version of windows server 2008






23. A medium that uses glass fibers for transmitting data via light.






24. To add WINS to Windows Server 2008 - In Server Manager - click Add Features to add WINS - WINS resolves this...






25. This Active Directory service container cannot be linked to a Group Policy Object






26. This defines the type of hardware technology used for connecting the network nodes.






27. ______ lists detailed information of events occurring on a specific day include: Date and Time - Event Description - IP address - Host name - Mac address






28. Maps IP addresses to host names.






29. Responsible for communications between adjacent network nodes.






30. Can be used to create a user account






31. They are assigned a unique MAC address by the manufacturer - They allow devices to connect to a physical network.






32. Netsh is __________ you can use to configure DHCP options.






33. DNS Zones categorized under...






34. The zone that is authoritative for a specific domain and its name records.






35. The main GUI tool responsible for managing DNS - Allows you to add - delete - and modify all aspects of DNS.






36. Industry standard of DNS servers on the Internet and networks running DNS on UNIX/Linux systems.






37. KMS (key management services) is installed by default in windows server 2008 and windows vista. It uses the software license manager script (slmgr.vbs) for activation. The only requirement is that you must add your product key to the server hosting K






38. What tool can be used to view the data packets related to DNS activity?






39. Hyper-V_ is Microsoft's newest server virtualization platform. It requires a(n) ___ version of Server 2008.






40. Used to map the hops a packet must make to reach a target.






41. This application is not included in the Windows Desktop Experience feature?






42. It refers to how networks occupy geographic space such as ranging from a small home office to a network that covers multiple locations and continents.






43. There are _________________in an Active Directory domain that is writeable. The rest are read-only.






44. Describes the amount of data that can travel from one network point to another within a specified time.






45. Which type of options can be set in the DHCP console?






46. In IPv6 - intended only for communications within the local subnetwork (IP4 Equivalent APIPA 169.254.1.0) fe80::.






47. Responsible for establishing paths for data transfer through the network.






48. Intervals DHCP clients use to perform lease renewals






49. Used for transferring images across the network. It is the key component of the Preboot eXecution Environment - the backbone of WDS. It's traffic is connectionless in nature - meaning the sequence of data packets or data grams is not guaranteed.






50. A characteristic of networks that categorizes needs on the needs of a functional relationships between nodes - e.g. client-server - work group or peer-to-peer.