Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mounting a .wim file as a read/write volume requires ___






2. This is not a commonly used network topology?






3. As a best practice - switches are used to connect clients on a subnet and routers are used to...






4. Most commonly used protocols that work at the transport level of the OSI model.






5. Utility that determines whether a target host is on and responding to communication - Works by sending an ICMP echo request packet to the target - By default - sends a 32-byte packet four times before exiting.






6. In Active Directory domains DHCP servers must be Authorized before they can ____.






7. Can be used to create a user account






8. How often does windows server 2008 perform an automated backup of the DHCP database?






9. Retaining settings and applications is one reason for performing a(n) ____ installation instead of an upgrade installation.






10. What is the proper syntax for initiating a looping ping to the IP address of 192.168.100.100?






11. IPv4 addresses are represented by ____-bit numbers that are broken into _____ octets using dotted decimal notation.






12. What types of messages are used during an initial lease request?






13. A limited 32-bit operating system based on the Windows Server 2008 and Windows Vista SP1






14. The amount of time a client keeps an IP address before releasing it.






15. Zone transfers from the master to the secondary server come in these varieties






16. The practice of ___ Designing - implementing - and managing a collection of computers and devices or a network.






17. Clients are sporadically having trouble connecting to your internal Web site at intranet.widgets.local. Round-robin DNS is used to load balance your Web site on three servers: Web1.widgets.local - Web2.widgets.local - and Web3.widgets.local. You susp






18. If ISATAP is enabled and needs to be disabled (using netsh)






19. Using nslookup in interactive mode - which of the following commands let you view all of the MX records for widgets.net stored on the DNS server - NS1.widgets.net?






20. In IPv6 - Allow clients on the same subnet to communicate without DHCP or manual configuration - The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0. A clien






21. ImageX _________________ all changes you make to a mounted image






22. Allows multiple computers to receive communication simultaneously - is an unreliable transport service used by Windows Deployment Service to install multiple images to clients across a network - works well on production networks without interfering w






23. With ___ you can start a computer from a network or removable media - which provides network resources and other resources necessary to install and trouble shoot windows vista. You can also use it to boot a server and create an image file using Image






24. You need to create a create a CIDR addressing scheme that meets the following criteria: You have a minimum of 8 Network address ranges - Each Network Address range supports at least 25 hosts - The address scheme is based on a private IP addressing






25. Based on an addressing scheme that uses unique 32-bit (4-byte) addresses.






26. DHCP client service is responsible for the DHCP configuration process on a client machine. The service initiates _____ while windows server 2008 is running.






27. DNS servers and _______ are server roles that are good candidates for using a manually configured IP address.






28. DHCP clients that use IPv6 are referred to as___






29. An example of a ___________: A DNS client requesting the best answer that its DNS server can provide.






30. Commonly used on servers where a dynamic IP address would affect network resources.






31. Image X can only be used for capturing and applying full images of an OS. It cannot be used to _______________. It supports only .wim file type unlike the third party applications for imaging.






32. Binding time Value - After 87.5% of the leased IP time is used - Binding Time is reffered to as T2 - the client attempts to renew its lease IP again. If it fails the client broadcasts DHCP Discover to any other _____ on the network.






33. How often do automatic backups of the DHCP database occur?






34. What are in the 1st two octets that APIPA addresses always start with?






35. The Server Core version of Windows Server 2008 Enterprise edition ______ be upgraded to the Full installation without a complete reinstallation of the OS.






36. Intervals DHCP clients use to perform lease renewals






37. Uses tunneling of IPv6 packets over an IPv4 network - Stores the IPv4 address of the ISATAP router in bits 17 to 48 - Encapsulates only the IPv4 router's IP address - not the destination client.






38. ___ is a new recovery environment built into windows server 2008 and based on windows PE 2.0. It is a complete diagnostic and recovery solution as well as a platform for building your own recovery solutions.






39. Receiving the IP address of 169.254.100.1 is a good indication that your client cannot contact a ______ server.






40. Server options doo not take precedence over scope options if they...






41. The zone that is authoritative for a specific domain and its name records.






42. Responsible for bit-level transmission between network nodes. Cabling and connection types are defined at this layer.






43. TFTP and multicast are not based on ...






44. Used for transferring images across the network. It is the key component of the Preboot eXecution Environment - the backbone of WDS. It's traffic is connectionless in nature - meaning the sequence of data packets or data grams is not guaranteed.






45. Queries where the client requires an answer from its DNS server.






46. Industry standard of DNS servers on the Internet and networks running DNS on UNIX/Linux systems.






47. ______________ can be done through the GUI using Server Manager






48. Resolves IP address to host names for DNS clients.






49. What tool is used to view messages - warnings - or errors specific to the DNS Server role in Windows Server 2008?






50. What does entering the ipconfig /release command do?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests