Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The 80/20 method can be skipped when____ shifts the entire scope to a Failover system if the primary server fails.






2. What are some of the the issues with APIPA addresses?






3. For installing roles and features in server core - you can use the ____ tool.






4. As noted the a switch is like a combination of a switch and router combined therefore; a switch spans layers of the OSI model. A device such as this is referred to as a _____






5. Windows server 2008 uses a single answer file using the ___ format.






6. When using the Windows Deployment services role to remotely deploy OSs via the network - what other services must be present?






7. You have just changed your DHCP options to include a new DNS server. Your clients have a lease duration of five days. If all of your clients can successfully renew their lease - what is the longest you have to wait for clients to have the new DHCP op






8. This application is not included in the Windows Desktop Experience feature?






9. A Hub works at what layer of the OSI model?






10. Lease Renewal - After 50% of the lease IP address is used - the client attempts to renew its lease with the DHCP server. Renewal Time Value if reffered to as____.






11. The Windows Automated Installation Kit is not ___________ as part of the Windows Deployment Services role installation.






12. The amount of time - or the duration - that an IP address is loaned to a DHCP client.






13. Server 2008 editions - Enterprise allows ____ VM guests to be hosted.






14. How do 64-bit versions of Windows Server 2008 differ from 32-bit versions?






15. What is the first Octet range for a Class A IP address - Max Hosts = 16 - 777 - 214?






16. You ________ have a valid Windows Server 2008 product key to install Windows Server 2008 Datacenter.






17. Responsible for establishing paths for data transfer through the network.






18. Allow one user to access server resources from unknown or multiple devices






19. Internal service for activating all computers in an enterprise network without requiring the computers to contact Microsoft






20. Advantages of using AD DS-integrated DNS zones over standard DNS zones.






21. You are responsible for deploying clients to a new four-story office building in Chicago. You are deploying 500 Windows Vista workstations - 30 network printers - and 5 Windows Server 2008 servers to this building. Your network administrator has prov






22. Which type of message is sent from a DHCP client to a DHCP server?






23. Uses source and destination addresses that are 128 bits - or 16 bytes - in length.






24. You have been asked to reconfigure the size of the DNS event log based on new information about your network environment. You have determined that your DNS servers handle 10 -000 events per day and you need to keep 14 days of information. Which of th






25. Calls into the help desk are reporting that users are receiving incorrect host name requests for your internal file server - files.widgets.local. It appears that the users with 10.1.1.10 - or NS1.widgets.local - as their preferred DNS server are havi






26. To determine the current state of ISATAP (using netsh).






27. What network protocol is responsible for providing IP addresses dynamically for clients that need them?






28. TCP/IP stack in Windows Server 2008 uses dual-layer architecture.






29. ___is a command-line interface (CLI) used to manage roles and features for the ___ console.






30. Used to set a static IP address in your IP configuration that will be used if DHCP is not available.






31. Allows IPv6 routers and hosts to communicate across IPv4 networks - requires a router that supports it - Interface ID is separated into two parts - First 32 bits are either 0:5efe for a private address or 200:5efe for a public address - Last 32 bits






32. Standard zones classifications






33. Based on an addressing scheme that uses unique 32-bit (4-byte) addresses.






34. TFTP and multicast are not based on ...






35. By default server 2008 servers and most client OSs are configured to DHCP Therefore; clients only need configuring if a ____ must be applied to it.






36. Uses tunneling of IPv6 packets over an IPv4 network - Stores the IPv4 address of the ISATAP router in bits 17 to 48 - Encapsulates only the IPv4 router's IP address - not the destination client.






37. Using nslookup in interactive mode - which of the following commands let you view all of the MX records for widgets.net stored on the DNS server - NS1.widgets.net?






38. In IPv6 - Automates the allocation of IP addresses through a server-based role.






39. DNS uses records to provide the information it stores in its database.






40. Read-only copy of a zone that obtains its resource records from the name servers that are authoritative for a particular zone.






41. The subnet mask that helps determine what portion of an IP address belongs to the network and what portion belongs to the...






42. ImageX is the command-line tool for ...






43. You are an administrator for a small company running a Windows Web Server 2008 as a Full installation on your network. Your boss has asked you to add the following items to the Web server: Simple company Web page - Financial application based on ASP






44. __uses ICMP requests to determine whether a target host is available






45. DHCP clients that use IPv6 are referred to as___






46. Allow a DNS client to resolve an FQDN to an IP address.






47. KMS works by counting the number of physical client computers requesting activation and then storing information on these computers in a table based on client machine identification (CMID) numbers - which are unique client IDs stored in the KMS datab






48. Responsible for bit-level transmission between network nodes.






49. Allows multiple computers to receive communication simultaneously - is an unreliable transport service used by Windows Deployment Service to install multiple images to clients across a network - works well on production networks without interfering w






50. What layer of the OSI model do MAC addresses work on?