Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which utility do you use to mount image files for adding device drivers and data?






2. What tool is used to view messages - warnings - or errors specific to the DNS Server role in Windows Server 2008?






3. Clients use UDP port_68 to send and receive DHCP server broadcast communication while the DHCP server uses port____ in the process






4. What responsibility does the domain controller locator function perform on an Active Directory client?






5. Internal service for activating all computers in an enterprise network without requiring the computers to contact Microsoft






6. What type of media cannot be used to run Windows PE?






7. DNS servers and _______ are server roles that are good candidates for using a manually configured IP address.






8. What types of messages are used when a DHCP client renews its lease?






9. Most commonly used protocols that work at the transport level of the OSI model.






10. Server 2008 editions - Enterprise allows ____ VM guests to be hosted.






11. ___is a command-line interface (CLI) used to manage roles and features for the ___ console.






12. IPv4 addresses are represented by ____-bit numbers that are broken into _____ octets using dotted decimal notation.






13. To determine the current state of ISATAP (using netsh).






14. TFTP and multicast are not based on ...






15. In IPv6 - Automates the allocation of IP addresses through a server-based role.






16. Based on an addressing scheme that uses unique 32-bit (4-byte) addresses.






17. Which utility do you use to generalize computers before imaging by removing specific information such as user settings and the security identifier?






18. Resolves IP address to host names for DNS clients.






19. Flexibility - Centralized administration - Scalability - Ease of use






20. Which tools in Windows Server 2008 can be used to enable global name zones?






21. ____ validates the DHCP database by comparing it with the registry of the operating system.






22. KMS works by counting the number of physical client computers requesting activation and then storing information on these computers in a table based on client machine identification (CMID) numbers - which are unique client IDs stored in the KMS datab






23. _______ organized into the following domains: root domain (.) - top-level domain (TLD) - second-level domain - and sub-domain.






24. ___ is a customizable/Limited 32-bit operating system that can be used for installation - troubleshooting and recovery of Windows Server 2008 and Windows Vista.






25. Using the ___ image format you can modify images by adding or removing files. This connects an NTFS folder to the selected image. After mounting - you can use windows explorer or the command prompt to work with the files.






26. As noted the a switch is like a combination of a switch and router combined therefore; a switch spans layers of the OSI model. A device such as this is referred to as a _____






27. The recommended tool for creating your image distribution shares and the unattend.xml answer file AND Gives you access to all the configurable settings in Windows Server 2008






28. The connection of two or more networks with layer three devices is referred to as an internet-works. The three distinct types of inter-networks : extranet - ____ - and Internet.






29. Which type of message tells a client that its lease renewal request has been refused?






30. On a ______- each port cannot use the full bandwidth (100 Mbps) without affecting other ports.






31. KMS (key management services) is installed by default in windows server 2008 and windows vista. It uses the software license manager script (slmgr.vbs) for activation. The only requirement is that you must add your product key to the server hosting K






32. DNS Zones categorized under...






33. Responsible for establishing process-to-process communications between networked hosts.






34. Binding time Value - After 87.5% of the leased IP time is used - Binding Time is reffered to as T2 - the client attempts to renew its lease IP again. If it fails the client broadcasts DHCP Discover to any other _____ on the network.






35. Command-line tool for tracing the route between two nodes.






36. _____________ domain is the dot that's next to the top level domain (examples: .com - .gov and .org and so on)






37. The practice of ___ Designing - implementing - and managing a collection of computers and devices or a network.






38. To use Windows System Image Manager and ImageX - you need to install the __________.






39. They are used in DHCP to give a DHCP client a static IP address without manually configuring the address on the client.






40. Choose the binary conversion that best matches the IP address - 192.168.100.212.






41. IPv6 counterpart of the IP4 local address but is not routable in the global IPv6 Internet fd00::.






42. DHCP is based on _____ storage engine






43. The process of creating multiple smaller networks - or subnets - from an IP network address.






44. DHCP Audit Logs for IPv6 have the naming convention of ____






45. It refers to how networks occupy geographic space such as ranging from a small home office to a network that covers multiple locations and continents.






46. What is the default lease length used by a scope in Windows Server 2008?






47. Windows Server 2008 uses the ____ to perform DNS queries on behalf of the client.






48. Windows server 2008 uses a single answer file using the ___ format.






49. DHCP clients that use IPv6 are referred to as___






50. A characteristic of networks that categorizes needs on the needs of a functional relationships between nodes - e.g. client-server - work group or peer-to-peer.