Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DHCP Audit Logs for IPv6 have the naming convention of ____






2. With ___ you can start a computer from a network or removable media - which provides network resources and other resources necessary to install and trouble shoot windows vista. You can also use it to boot a server and create an image file using Image






3. Responsible for communications between adjacent network nodes.






4. A new recovery environment built into Windows Server 2008 and based on Windows PE 2.0 - A complete diagnostic and recovery solution - A platform for building your own recovery solutions






5. Which command can you use to mount an image using ImageX?






6. On a ______- each port cannot use the full bandwidth (100 Mbps) without affecting other ports.






7. __allows clients using computers with IPv6 to communicate over IPv4 networks. This is done by encapsulating the IPv_6_ packet inside of an IPv_4_ packet.






8. Which of the following commands will clear the DNS server cache?






9. Resolves IP address to host names for DNS clients.






10. What tool is used to view messages - warnings - or errors specific to the DNS Server role in Windows Server 2008?






11. These are required to propagate DHCP messages between routed subnets?






12. Server 2008 editions - Standard allows ___ VM guests to be hosted.






13. WAN connections often use connections that have ____ speeds than LAN connections.






14. Using the ___ image format you can modify images by adding or removing files. This connects an NTFS folder to the selected image. After mounting - you can use windows explorer or the command prompt to work with the files.






15. Which extension is used for ImageX-based image files?






16. The recommended tool for creating your image distribution shares and the unattend.xml answer file AND Gives you access to all the configurable settings in Windows Server 2008






17. CIDR notation of _______ will divide the IP address 192.168.100.0 into 16 networks with 16 hosts.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. Teredo allows IPv6 hosts to communicate over IPv4 networks that use NAT - Works only with NAT implementations that support UDP port translation - Should always be implemented with a...






19. ___ connects to one or more network segments - works on the Data Link/Layer 2 of the OSI model. This device uses MAC addresses for managing traffic as well as learns from the traffic it processes so it can associate a port with the specific MAC addre






20. You have been asked to reconfigure the size of the DNS event log based on new information about your network environment. You have determined that your DNS servers handle 10 -000 events per day and you need to keep 14 days of information. Which of th






21. DHCP is based on _____ storage engine






22. Using nslookup in interactive mode - which of the following commands let you view all of the MX records for widgets.net stored on the DNS server - NS1.widgets.net?






23. For installing roles and features in server core - you can use the ____ tool.






24. Protocol used by IPv6 clients for router discovery on a network - Can be used to manually configure your Windows Server 2008 server with a static IP address






25. Responsible for bit-level transmission between network nodes.






26. The portion of the namespace to the right of the host name.






27. Based on an addressing scheme that uses unique 32-bit (4-byte) addresses.






28. Protocols that work at the network layer of the OSI model






29. Can be used to create a user account






30. Image X can only be used for capturing and applying full images of an OS. It cannot be used to _______________. It supports only .wim file type unlike the third party applications for imaging.






31. Clients are sporadically having trouble connecting to your internal Web site at intranet.widgets.local. Round-robin DNS is used to load balance your Web site on three servers: Web1.widgets.local - Web2.widgets.local - and Web3.widgets.local. You susp






32. This is a typical IPv6 Link Local address?






33. KMS (key management services) is installed by default in windows server 2008 and windows vista. It uses the software license manager script (slmgr.vbs) for activation. The only requirement is that you must add your product key to the server hosting K






34. A Hub works at what layer of the OSI model?






35. You need the ___ to configure windows server 2008 as a relay agent






36. To enable Teredo for workgroup clients






37. There are _________________in an Active Directory domain that is writeable. The rest are read-only.






38. Set of rules to exchange messages with other Internet points at the information packet level - Guarantees the delivery of packets.






39. Which utility do you use to mount image files for adding device drivers and data?






40. The subnet mask that helps determine what portion of an IP address belongs to the network and what portion belongs to the...






41. ___has replaced the ___in Windows Server 2008 as a method for deploying images across your network.






42. For disaster recovery - manual DHCP backups should be stored ___






43. Windows Server 2008 uses the ____ to perform DNS queries on behalf of the client.






44. What is the syntax used to stop the DHCP Server service?






45. Which component would you install on a Windows Server 2008 server to manage the deployment of OS images over the network?






46. The 80/20 method can be skipped when____ shifts the entire scope to a Failover system if the primary server fails.






47. Command to install the Terminal Services role on a Windows Server 2008 server.






48. What is the 80/20 rule for splitting scopes between two DHCP servers for fault tolerance?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. You are responsible for deploying clients to a new four-story office building in Chicago. You are deploying 500 Windows Vista workstations - 30 network printers - and 5 Windows Server 2008 servers to this building. Your network administrator has prov






50. ______ lists detailed information of events occurring on a specific day include: Date and Time - Event Description - IP address - Host name - Mac address