Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If ISATAP is enabled and needs to be disabled (using netsh)






2. Tunnels that can be created - Router-to-router - Host-to-router and router-to-host - Host-to-host.






3. Routers forward packets between subnets or networks with differing IP address schemes by ____________ and using routing tables for determining the best destination route for the packets.






4. Server options doo not take precedence over scope options if they...






5. Choose the binary conversion that best matches the IP address - 192.168.100.212.






6. Responsible for defining the syntax that two network hosts use to communicate.






7. You are using nslookup to troubleshoot a problem on a network server. After running the nslookup ns1.widgets.local command - you receive some unexpected responses. What command should you run instead?






8. What are in the 1st two octets that APIPA addresses always start with?






9. You are an administrator for a medium-sized business called Terrapin Technologies. Currently - you are running a Windows Server 2003 environment with Windows Server 2003 Active Directory. Your boss has asked you to look into using the Windows Server






10. What is the first Octet range for a Class C IP address - Max Hosts = 254?






11. One of the two most common types of networks (other is LAN) - They cover a relatively broad geographic area and often uses transmission facilities provided by common carriers such as telephone companies - it can cover one city to another city or to a






12. To view the Teredo status after enabling Teredo






13. When using the ping utility - how do you use ping for testing name resolution to the target of Server01.abc.com at 192.168.100.100?






14. _______ organized into the following domains: root domain (.) - top-level domain (TLD) - second-level domain - and sub-domain.






15. Teredo ___________ is used on IPv4 networks currently using NAT.






16. This defines the type of hardware technology used for connecting the network nodes.






17. The connection of two or more networks with layer three devices is referred to as an internet-works. The three distinct types of inter-networks : extranet - ____ - and Internet.






18. What is the first Octet range for a Class B IP address - Max Hosts = 65 - 534?






19. For disaster recovery - manual DHCP backups should be stored ___






20. The amount of time a client keeps an IP address before releasing it.






21. To recieve IP address and configuration informationfrom an IPv6 router is referred to as_____






22. ___is a command-line interface (CLI) used to manage roles and features for the ___ console.






23. Within a normal network - all network nodes connect to one or more switches which are connected to a ___ for connectivity to other subnets or the internet - also needed for forwarding traffic to other subnets or public networks in this situation - wo






24. Default location for DHCP installation is _____






25. Responsible for bit-level transmission between network nodes. Cabling and connection types are defined at this layer.






26. What is the first Octet range for a Class A IP address - Max Hosts = 16 - 777 - 214?






27. Utility that determines whether a target host is on and responding to communication - Works by sending an ICMP echo request packet to the target - By default - sends a 32-byte packet four times before exiting.






28. Your manager has asked you to research options for deploying three Web-based applications to your network to MSN-WEB-001. Also - the applications need to use directory-based authentication without adding a domain controller to your network. Which ste






29. ______ configuration is often used for devices that need a static IP






30. __uses ICMP requests to determine whether a target host is available






31. The Remote Server Administration Tools can be used to manage both _______________ of Windows Server 2008.






32. Provides updated DNS record information to secondary servers.






33. The range of IP addresses and related configuration information available by request from a DHCP client.






34. As noted the a switch is like a combination of a switch and router combined therefore; a switch spans layers of the OSI model. A device such as this is referred to as a _____






35. Although Sysprep resets the activation of windows server 2008 - you can only reactivate windows server 2008 __ times.






36. What is the 80/20 rule for splitting scopes between two DHCP servers for fault tolerance?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. Server 2008 editions - Data center allows ____ VM guests to be hosted.






38. Ensures the reliability of the physical layer at Link 1. Responsible for adjacent network nodes such as - hubs & switches.






39. In IPv6 - intended only for communications within the local subnetwork (IP4 Equivalent APIPA 169.254.1.0) fe80::.






40. What tool is used to view messages - warnings - or errors specific to the DNS Server role in Windows Server 2008?






41. Windows server 2008 does an automated back-up every 60mins to the ___






42. _____ is used to change the server name - modify domain membership - and turn on a remote desktop






43. ___ connects to one or more network segments - works on the Data Link/Layer 2 of the OSI model. This device uses MAC addresses for managing traffic as well as learns from the traffic it processes so it can associate a port with the specific MAC addre






44. A characteristic of networks that categorizes needs on the needs of a functional relationships between nodes - e.g. client-server - work group or peer-to-peer.






45. What type of media cannot be used to run Windows PE?






46. The Server Core version of Windows Server 2008 Enterprise edition ______ be upgraded to the Full installation without a complete reinstallation of the OS.






47. MAC adresses are designed to be _______ and allow clients to communicate on certain networks.






48. The word "News" in news.google.com or the word "maps" in maps.google.com






49. KMS (key management services) is installed by default in windows server 2008 and windows vista. It uses the software license manager script (slmgr.vbs) for activation. The only requirement is that you must add your product key to the server hosting K






50. Intervals DHCP clients use to perform lease renewals