Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. KMS works by counting the number of physical client computers requesting activation and then storing information on these computers in a table based on client machine identification (CMID) numbers - which are unique client IDs stored in the KMS datab






2. What tool can be used to view the data packets related to DNS activity?






3. A medium that uses glass fibers for transmitting data via light.






4. What network protocol is responsible for providing IP addresses dynamically for clients that need them?






5. Used to set a static IP address in your IP configuration that will be used if DHCP is not available.






6. To view the Teredo status after enabling Teredo






7. DHCP Audit Logs for IPv4 have the naming convention of ____






8. Which type of message is sent from a DHCP client to a DHCP server?






9. Server options doo not take precedence over scope options if they...






10. Protocol used by IPv6 clients for router discovery on a network - Can be used to manually configure your Windows Server 2008 server with a static IP address






11. Recieves a single then resends it at a higher level or power so that the single can travel farther distances between the start and end points of communication.






12. DHCP is based on _____ storage engine






13. What types of messages are used when a DHCP client renews its lease?






14. The Remote Server Administration Tools can be used to manage both _______________ of Windows Server 2008.






15. What is the default location for DHCP audit logs?






16. The word "News" in news.google.com or the word "maps" in maps.google.com






17. As a best practice - switches are used to connect clients on a subnet and routers are used to...






18. Choose the binary conversion that best matches the IP address - 192.168.100.212.






19. To use Windows System Image Manager and ImageX - you need to install the __________.






20. Can determine the network and host ID portions of an IP address.






21. Receiving the IP address of 169.254.100.1 is a good indication that your client cannot contact a ______ server.






22. The main GUI tool responsible for managing DNS - Allows you to add - delete - and modify all aspects of DNS.






23. Utility that determines whether a target host is on and responding to communication - Works by sending an ICMP echo request packet to the target - By default - sends a 32-byte packet four times before exiting.






24. When using the Windows Deployment services role to remotely deploy OSs via the network - what other services must be present?






25. You are using nslookup to troubleshoot a problem on a network server. After running the nslookup ns1.widgets.local command - you receive some unexpected responses. What command should you run instead?






26. Technologies are new to Windows Server 2008.






27. What are some of the the issues with APIPA addresses?






28. The zone that is authoritative for a specific domain and its name records.






29. These are required to propagate DHCP messages between routed subnets?






30. ImageX images can only be mounted in ____ - windows vista - and windows server 2003 with sp1.






31. The recommended tool for creating your image distribution shares and the unattend.xml answer file AND Gives you access to all the configurable settings in Windows Server 2008






32. How do you determine the running services on a system?






33. _____________ domain is the dot that's next to the top level domain (examples: .com - .gov and .org and so on)






34. ___ is a customizable/Limited 32-bit operating system that can be used for installation - troubleshooting and recovery of Windows Server 2008 and Windows Vista.






35. What is the 80/20 rule for splitting scopes between two DHCP servers for fault tolerance?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. The entire name for a specific host that needs to have a DNS record created.






37. The process of creating multiple smaller networks - or subnets - from an IP network address.






38. The future of IP on the Internet and on public and private networks - Advantages: Improved security - Improved autoconfiguration - Simplified routing






39. Which utility do you use to create answer files for unattended installations?






40. Queries where the client requires an answer from its DNS server.






41. Which utility do you use to generalize computers before imaging by removing specific information such as user settings and the security identifier?






42. ___is a command-line interface (CLI) used to manage roles and features for the ___ console.






43. You ________ have a valid Windows Server 2008 product key to install Windows Server 2008 Datacenter.






44. Read-only copy of a zone that obtains its resource records from the name servers that are authoritative for a particular zone.






45. You need to create a create a CIDR addressing scheme that meets the following criteria: You have a minimum of 8 Network address ranges - Each Network Address range supports at least 25 hosts - The address scheme is based on a private IP addressing






46. Industry standard of DNS servers on the Internet and networks running DNS on UNIX/Linux systems.






47. The only requirements for reservations is that it must be on every DHCP server and Redundancy should be in the _____ .






48. To enable Teredo for workgroup clients






49. Which of the following commands will clear the DNS server cache?






50. Describes the amount of data that can travel from one network point to another within a specified time.