Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You have been asked to reconfigure the size of the DNS event log based on new information about your network environment. You have determined that your DNS servers handle 10 -000 events per day and you need to keep 14 days of information. Which of th






2. Active Directory Services domain controllers use which replication model.






3. ____ validates the DHCP database by comparing it with the registry of the operating system.






4. What types of messages are used when a DHCP client moves to another subnet?






5. Responsible for providing user services.






6. Protocol used by IPv6 clients for router discovery on a network - Can be used to manually configure your Windows Server 2008 server with a static IP address






7. DHCP servers use this to determine if a DHCP client has an IP reservation.






8. Clients use UDP port_68 to send and receive DHCP server broadcast communication while the DHCP server uses port____ in the process






9. Workgroup and domain installations of DHCP do not require the ________________ before IP addresses can be allocated.






10. Because ___________________ - your environment must meet what requirements before you can install and use WDS? 1.The computer must be a member of an active directory domain. 2. Dynamic Host Configuration Protocol (DHCP) must be active and available






11. A group of protocols that works together to provide network services.






12. Using the ___ image format you can modify images by adding or removing files. This connects an NTFS folder to the selected image. After mounting - you can use windows explorer or the command prompt to work with the files.






13. Ensures the reliability of the physical layer at Link 1. Responsible for adjacent network nodes such as - hubs & switches.






14. Used to set a static IP address in your IP configuration that will be used if DHCP is not available.






15. CIDR notation of _______ will divide the IP address 192.168.100.0 into 16 networks with 16 hosts.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


16. IPv6 counterpart of the IP4 local address but is not routable in the global IPv6 Internet fd00::.






17. Within a normal network - all network nodes connect to one or more switches which are connected to a ___ for connectivity to other subnets or the internet - also needed for forwarding traffic to other subnets or public networks in this situation - wo






18. dcpromo.exe automatically creates and delegates the forest root domain DNS zone - or the first domain in your forest. It also creates the ____.






19. What layer of the OSI model does DHCP use and why?






20. Protocols that work at the network layer of the OSI model






21. License of choice in situations where many users access resources from a few client computers






22. The future of IP on the Internet and on public and private networks - Advantages: Improved security - Improved autoconfiguration - Simplified routing






23. When DHCP performs a ___ it also saves DHCP leases - options - scopes - and reservations






24. From network adapter settings to roles and domain membership You can...






25. For clients that support Dynamic DNS - what records are updated in a DNS zone?






26. What is the first Octet range for a Class A IP address - Max Hosts = 16 - 777 - 214?






27. Flexibility - Centralized administration - Scalability - Ease of use






28. They are used in DHCP to give a DHCP client a static IP address without manually configuring the address on the client.






29. You have been asked to review the licensing for a future Windows Server 2008 deployment at Ditka's Coffee Traders (DCT). Based on the following information - recommend the options that require the fewest CALs to be purchased by the client. Select two






30. DHCP Audit Logs for IPv4 have the naming convention of ____






31. Used for transferring images across the network. It is the key component of the Preboot eXecution Environment - the backbone of WDS. It's traffic is connectionless in nature - meaning the sequence of data packets or data grams is not guaranteed.






32. Command-line tool for displaying network connection information such as routing tables.






33. IPv6 addresses are represented by ____-bit numbers that are broken into _____groups of hexadecimal numbers.






34. Command to install the Terminal Services role on a Windows Server 2008 server.






35. DHCP client service is responsible for the DHCP configuration process on a client machine. The service initiates _____ while windows server 2008 is running.






36. What network protocol is responsible for providing IP addresses dynamically for clients that need them?






37. Describes the amount of data that can travel from one network point to another within a specified time.






38. The Remote Server Administration Tools can be used to manage both _______________ of Windows Server 2008.






39. Use _______ from the command to view a clients detailed IP information.






40. Which utility do you use to mount image files for adding device drivers and data?






41. On a ______- each port cannot use the full bandwidth (100 Mbps) without affecting other ports.






42. To enable ISATAP (using netsh)






43. TCP/IP stack in Windows Server 2008 uses dual-layer architecture.






44. To add WINS to Windows Server 2008 - In Server Manager - click Add Features to add WINS - WINS resolves this...






45. Prepares an installation of Windows for imaging and deployment by -Modifying a system to create a new SID and other unique information the next time it starts - -Removes user and computer-specific information that should not be transferred to new ima






46. Command-line tool for tracing the route between two nodes.






47. Uses source and destination addresses that are 128 bits - or 16 bytes - in length.






48. Which utility do you use to generalize computers before imaging by removing specific information such as user settings and the security identifier?






49. You cannot ______to install Active Directory Domain Services on a Server Core version of Windows Server 2008 Standard edition.






50. Its Primary function is to translate human-readable host names - assists the flow of e-mail - Provides mail exchanger records that tell a Simple Mail Transfer Protocol (SMTP) server where to send an e-mail message.