Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ______ lists detailed information of events occurring on a specific day include: Date and Time - Event Description - IP address - Host name - Mac address






2. Because ___________________ - your environment must meet what requirements before you can install and use WDS? 1.The computer must be a member of an active directory domain. 2. Dynamic Host Configuration Protocol (DHCP) must be active and available






3. To enable Teredo for Active Directory clients






4. They are assigned a unique MAC address by the manufacturer - They allow devices to connect to a physical network.






5. _____________ domain is the dot that's next to the top level domain (examples: .com - .gov and .org and so on)






6. These are required to propagate DHCP messages between routed subnets?






7. The Local Area Network networks scale is used for highly-connected private networks like a...






8. License that grants to a user or computer device the right to access the server






9. MAC adresses are designed to be _______ and allow clients to communicate on certain networks.






10. KMS works by counting the number of physical client computers requesting activation and then storing information on these computers in a table based on client machine identification (CMID) numbers - which are unique client IDs stored in the KMS datab






11. IPv6 addresses are represented by ____-bit numbers that are broken into _____groups of hexadecimal numbers.






12. Configuring Clients for IPv4 and IPv6 - Configuration methods Stateless - generates own and stateful gets from a DHCP server.






13. In Active Directory domains - what does the DHCP server need before it can start assigning IP addresses?






14. This is a typical IPv6 Unique Local address.






15. This is a typical IPv6 Link Local address?






16. Your manager has asked you to research options for deploying three Web-based applications to your network to MSN-WEB-001. Also - the applications need to use directory-based authentication without adding a domain controller to your network. Which ste






17. What does entering the ipconfig /release command do?






18. DNS servers and _______ are server roles that are good candidates for using a manually configured IP address.






19. Uses source and destination addresses that are 128 bits - or 16 bytes - in length.






20. You can install DHCP using ______ on a full version of windows server 2008






21. The entire name for a specific host that needs to have a DNS record created.






22. Most commonly used protocols that work at the transport level of the OSI model.






23. You are using nslookup to troubleshoot a problem on a network server. After running the nslookup ns1.widgets.local command - you receive some unexpected responses. What command should you run instead?






24. Which extension is used for ImageX-based image files?






25. Server that has the DNS role installed - Does not hold a DNS zone so it is not authoritative for any DNS zones - Does it maintain any DNS records.






26. Retaining settings and applications is one reason for performing a(n) ____ installation instead of an upgrade installation.






27. In Active Directory domains DHCP servers must be Authorized before they can ____.






28. Which utility do you use to mount image files for adding device drivers and data?






29. Designed for installing - troubleshooting - and recovering Windows Server 2008 and Windows Vista - Benefits over MS-DOS - Windows PE supports NTFS 5.x file systems - Windows PE natively supports TCP/IP network and file sharing






30. In IPv6 - Automates the allocation of IP addresses through a server-based role.






31. KMS (key management services) is installed by default in windows server 2008 and windows vista. It uses the software license manager script (slmgr.vbs) for activation. The only requirement is that you must add your product key to the server hosting K






32. As noted the a switch is like a combination of a switch and router combined therefore; a switch spans layers of the OSI model. A device such as this is referred to as a _____






33. When using the Windows Deployment services role to remotely deploy OSs via the network - what other services must be present?






34. What types of messages are used when a DHCP client renews its lease?






35. If ISATAP is enabled and needs to be disabled (using netsh)






36. The zone that is authoritative for a specific domain and its name records.






37. Standard zones classifications






38. Tasks you can do with an image using ImageX






39. Queries where the client requires an answer from its DNS server.






40. Command-line tool for tracing the route between two nodes.






41. To determine the current state of ISATAP (using netsh).






42. __allows clients using computers with IPv6 to communicate over IPv4 networks. This is done by encapsulating the IPv_6_ packet inside of an IPv_4_ packet.






43. Routers forward packets between subnets or networks with differing IP address schemes by ____________ and using routing tables for determining the best destination route for the packets.






44. Technologies are new to Windows Server 2008.






45. You have been asked to review the licensing for a future Windows Server 2008 deployment at Ditka's Coffee Traders (DCT). Based on the following information - recommend the options that require the fewest CALs to be purchased by the client. Select two






46. In IPv6 - global addresses are globally routable.






47. DHCP Audit Logs for IPv6 have the naming convention of ____






48. This defines the type of hardware technology used for connecting the network nodes.






49. The word "News" in news.google.com or the word "maps" in maps.google.com






50. To capture a drive partition containing an operating system - you need to...