Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WAN connections often use connections that have ____ speeds than LAN connections.






2. _____________ domain is the dot that's next to the top level domain (examples: .com - .gov and .org and so on)






3. You are an administrator for a small company running a Windows Web Server 2008 as a Full installation on your network. Your boss has asked you to add the following items to the Web server: Simple company Web page - Financial application based on ASP






4. DNS uses records to provide the information it stores in its database.






5. CIDR notation of _______ will divide the IP address 192.168.100.0 into 16 networks with 16 hosts.


6. Routers forward packets between subnets or networks with differing IP address schemes by ____________ and using routing tables for determining the best destination route for the packets.






7. TCP/IP stack in Windows Server 2008 uses dual-layer architecture.






8. The process of creating multiple smaller networks - or subnets - from an IP network address.






9. To capture a drive partition containing an operating system - you need to...






10. What network protocol is responsible for providing IP addresses dynamically for clients that need them?






11. The subnet mask that helps determine what portion of an IP address belongs to the network and what portion belongs to the...






12. Teredo ___________ is used on IPv4 networks currently using NAT.






13. Allow a DNS client to resolve an FQDN to an IP address.






14. Hyper-V_ is Microsoft's newest server virtualization platform. It requires a(n) ___ version of Server 2008.






15. Responsible for bit-level transmission between network nodes.






16. The Local Area Network networks scale is used for highly-connected private networks like a...






17. The amount of time a client keeps an IP address before releasing it.






18. IPv4 addresses are represented by ____-bit numbers that are broken into _____ octets using dotted decimal notation.






19. Which command-line utility do you use to manage product activation and licensing in Windows Server 2008?






20. Allows multiple computers to receive communication simultaneously - is an unreliable transport service used by Windows Deployment Service to install multiple images to clients across a network - works well on production networks without interfering w






21. You have been given a server with the following hardware specifications: Processor: Quad-Core Processor 64-bit - Memory: 8 GB - Available Disk Space: 135 GB - Drive: CD-ROM Drive - Given these specifications - can you install Windows Server 2008






22. ImageX is the command-line tool for ...






23. This defines the type of hardware technology used for connecting the network nodes.






24. An example of a ___________: A DNS client requesting the best answer that its DNS server can provide.






25. ____________ is used instead of Base-10 numbering in IP addressing.






26. The Server Core version of the Windows Server 2008 Enterprise edition cannot be upgraded to the Full version without...






27. Mounting a .wim file as a read/write volume requires ___






28. _____ is used to change the server name - modify domain membership - and turn on a remote desktop






29. Enabling Teredo with netsh commands: To determine the current state of Teredo






30. IPv6 counterpart of the IP4 local address but is not routable in the global IPv6 Internet fd00::.






31. Set of rules to exchange messages with other Internet points at the information packet level - Guarantees the delivery of packets.






32. The word "News" in news.google.com or the word "maps" in maps.google.com






33. Protocol used by IPv6 clients for router discovery on a network - Can be used to manually configure your Windows Server 2008 server with a static IP address






34. This network protocol is not supported in Windows Server 2008






35. Command line utilities that can be used to map the network route between two hosts.






36. ______ lists detailed information of events occurring on a specific day include: Date and Time - Event Description - IP address - Host name - Mac address






37. When DHCP performs a ___ it also saves DHCP leases - options - scopes - and reservations






38. DHCP clients that use IPv6 are referred to as___






39. Resolves IP address to host names for DNS clients.






40. Used to map the hops a packet must make to reach a target.






41. To use Windows System Image Manager and ImageX - you need to install the __________.






42. Often referred to as static configuration or a static IP addresses.






43. Servers used to resolve names






44. You need to create a create a CIDR addressing scheme that meets the following criteria: You have a minimum of 8 Network address ranges - Each Network Address range supports at least 25 hosts - The address scheme is based on a private IP addressing






45. How do you determine the running services on a system?






46. Teredo allows IPv6 hosts to communicate over IPv4 networks that use NAT - Works only with NAT implementations that support UDP port translation - Should always be implemented with a...






47. Zone transfers from the master to the secondary server come in these varieties






48. Provide IP address pointers to top-level DNS servers - Provide referral answers to queries in a DNS server's quest to resolve an unknown domain name request - When configured - a DNS server can perform queries when it receives domain name requests fo






49. Describes the amount of data that can travel from one network point to another within a specified time.






50. If ISATAP is enabled and needs to be disabled (using netsh)