Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Clients are sporadically having trouble connecting to your internal Web site at intranet.widgets.local. Round-robin DNS is used to load balance your Web site on three servers: Web1.widgets.local - Web2.widgets.local - and Web3.widgets.local. You susp






2. __uses ICMP requests to determine whether a target host is available






3. What types of messages are used when a DHCP client renews its lease?






4. ___ is a new recovery environment built into windows server 2008 and based on windows PE 2.0. It is a complete diagnostic and recovery solution as well as a platform for building your own recovery solutions.






5. Provides the following information - Location of services it needs - Network protocol needed to access the previously mentioned services - Domain services it provides.






6. MAC adresses are designed to be _______ and allow clients to communicate on certain networks.






7. Windows server 2008 uses a single answer file using the ___ format.






8. Allows you to combine two or more subnetworks into a larger supernetwork.






9. ___has replaced the ___in Windows Server 2008 as a method for deploying images across your network.






10. IPv6 addresses are represented by ____-bit numbers that are broken into _____groups of hexadecimal numbers.






11. This Active Directory service container cannot be linked to a Group Policy Object






12. In Active Directory domains DHCP servers must be Authorized before they can ____.






13. Can be used to create a user account






14. Responsible for establishing paths for data transfer through the network.






15. Tunnels that can be created - Router-to-router - Host-to-router and router-to-host - Host-to-host.






16. Default location for DHCP installation is _____






17. Command to install the Terminal Services role on a Windows Server 2008 server.






18. KMS works by counting the number of physical client computers requesting activation and then storing information on these computers in a table based on client machine identification (CMID) numbers - which are unique client IDs stored in the KMS datab






19. Command-line tool for displaying network connection information such as routing tables.






20. KMS (key management services) is installed by default in windows server 2008 and windows vista. It uses the software license manager script (slmgr.vbs) for activation. The only requirement is that you must add your product key to the server hosting K






21. Which can be used in place of WINS on networks that require the resolution of NetBIOS names?






22. The portion of the namespace to the right of the host name.






23. DHCP servers use this to determine if a DHCP client has an IP reservation.






24. Enabling Teredo with netsh commands: To determine the current state of Teredo






25. Using the ___ image format you can modify images by adding or removing files. This connects an NTFS folder to the selected image. After mounting - you can use windows explorer or the command prompt to work with the files.






26. Within a normal network - all network nodes connect to one or more switches which are connected to a ___ for connectivity to other subnets or the internet - also needed for forwarding traffic to other subnets or public networks in this situation - wo






27. ___is a command-line interface (CLI) used to manage roles and features for the ___ console.






28. The amount of time - or the duration - that an IP address is loaned to a DHCP client.






29. With ___ you can start a computer from a network or removable media - which provides network resources and other resources necessary to install and trouble shoot windows vista. You can also use it to boot a server and create an image file using Image






30. Which extension is used for ImageX-based image files?






31. You ________ have a valid Windows Server 2008 product key to install Windows Server 2008 Datacenter.






32. ____ validates the DHCP database by comparing it with the registry of the operating system.






33. You are responsible for deploying clients to a new four-story office building in Chicago. You are deploying 500 Windows Vista workstations - 30 network printers - and 5 Windows Server 2008 servers to this building. Your network administrator has prov






34. ___ connects to one or more network segments - works on the Data Link/Layer 2 of the OSI model. This device uses MAC addresses for managing traffic as well as learns from the traffic it processes so it can associate a port with the specific MAC addre






35. Ensures the reliability of the physical layer at Link 1. Responsible for adjacent network nodes such as - hubs & switches.






36. DHCP clients that use IPv6 are referred to as___






37. TCP/IP stack in Windows Server 2008 uses dual-layer architecture.






38. When installing AD DS and creating the 1st DC in a forest - it is considered a best practice to install the DNS role when you run AD DS installation or ____.






39. WANs commonly run through an ____ which allocates WAN connections for private networks.






40. It refers to how networks occupy geographic space such as ranging from a small home office to a network that covers multiple locations and continents.






41. These are required to propagate DHCP messages between routed subnets?






42. Industry standard of DNS servers on the Internet and networks running DNS on UNIX/Linux systems.






43. A characteristic of networks that categorizes needs on the needs of a functional relationships between nodes - e.g. client-server - work group or peer-to-peer.






44. How do you stop a service on a system?






45. You need to create a create a CIDR addressing scheme that meets the following criteria: You have a minimum of 8 Network address ranges - Each Network Address range supports at least 25 hosts - The address scheme is based on a private IP addressing






46. Server 2008 editions - Standard allows ___ VM guests to be hosted.






47. The subnet mask that helps determine what portion of an IP address belongs to the network and what portion belongs to the...






48. To capture a drive partition containing an operating system - you need to...






49. How does WDS help the multicast process?






50. When DHCP performs a ___ it also saves DHCP leases - options - scopes - and reservations