Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hyper-V_ is Microsoft's newest server virtualization platform. It requires a(n) ___ version of Server 2008.






2. You need to create a create a CIDR addressing scheme that meets the following criteria: You have a minimum of 8 Network address ranges - Each Network Address range supports at least 25 hosts - The address scheme is based on a private IP addressing






3. What is the default location for DHCP audit logs?






4. For clients that support Dynamic DNS - what records are updated in a DNS zone?






5. If ISATAP is enabled and needs to be disabled (using netsh)






6. Can determine the network and host ID portions of an IP address.






7. Technologies are new to Windows Server 2008.






8. Used to map the hops a packet must make to reach a target.






9. IPv6 addresses are represented by ____-bit numbers that are broken into _____groups of hexadecimal numbers.






10. The entire name for a specific host that needs to have a DNS record created.






11. Intervals DHCP clients use to perform lease renewals






12. How does WDS help the multicast process?






13. Server 2008 editions - Enterprise allows ____ VM guests to be hosted.






14. _____ is used to change the server name - modify domain membership - and turn on a remote desktop






15. Tunnels that can be created - Router-to-router - Host-to-router and router-to-host - Host-to-host.






16. Responsible for establishing process-to-process communications between networked hosts.






17. KMS (key management services) is installed by default in windows server 2008 and windows vista. It uses the software license manager script (slmgr.vbs) for activation. The only requirement is that you must add your product key to the server hosting K






18. DHCP Audit Logs for IPv4 have the naming convention of ____






19. Which command-line utility do you use to manage product activation and licensing in Windows Server 2008?






20. What is the first Octet range for a Class C IP address - Max Hosts = 254?






21. License of choice in situations where many users access resources from a few client computers






22. Command line utilities that can be used to map the network route between two hosts.






23. In IPv6 - intended only for communications within the local subnetwork (IP4 Equivalent APIPA 169.254.1.0) fe80::.






24. What is the default directory for the DHCP database files?






25. You have been asked to reconfigure the size of the DNS event log based on new information about your network environment. You have determined that your DNS servers handle 10 -000 events per day and you need to keep 14 days of information. Which of th






26. What are in the 1st two octets that APIPA addresses always start with?






27. Command-line tool for tracing the route between two nodes.






28. Binding time Value - After 87.5% of the leased IP time is used - Binding Time is reffered to as T2 - the client attempts to renew its lease IP again. If it fails the client broadcasts DHCP Discover to any other _____ on the network.






29. What tool is used to view messages - warnings - or errors specific to the DNS Server role in Windows Server 2008?






30. The future of IP on the Internet and on public and private networks - Advantages: Improved security - Improved autoconfiguration - Simplified routing






31. The recommended tool for creating your image distribution shares and the unattend.xml answer file AND Gives you access to all the configurable settings in Windows Server 2008






32. You have been asked to review the licensing for a future Windows Server 2008 deployment at Ditka's Coffee Traders (DCT). Based on the following information - recommend the options that require the fewest CALs to be purchased by the client. Select two






33. Windows Server 2008 uses the ____ to perform DNS queries on behalf of the client.






34. What types of messages are used when a DHCP client moves to another subnet?






35. The Windows Automated Installation Kit is not ___________ as part of the Windows Deployment Services role installation.






36. ___is a command-line interface (CLI) used to manage roles and features for the ___ console.






37. How do 64-bit versions of Windows Server 2008 differ from 32-bit versions?






38. What are some of the the issues with APIPA addresses?






39. Responsible for delivering messages between networked hosts.






40. Standard zones classifications






41. __uses ICMP requests to determine whether a target host is available






42. Designed for installing - troubleshooting - and recovering Windows Server 2008 and Windows Vista - Benefits over MS-DOS - Windows PE supports NTFS 5.x file systems - Windows PE natively supports TCP/IP network and file sharing






43. How do you stop a service on a system?






44. The practice of ___ Designing - implementing - and managing a collection of computers and devices or a network.






45. Provides the following information - Location of services it needs - Network protocol needed to access the previously mentioned services - Domain services it provides.






46. Provides updated DNS record information to secondary servers.






47. This is a typical IPv6 Link Local address?






48. The only requirements for reservations is that it must be on every DHCP server and Redundancy should be in the _____ .






49. Within a normal network - all network nodes connect to one or more switches which are connected to a ___ for connectivity to other subnets or the internet - also needed for forwarding traffic to other subnets or public networks in this situation - wo






50. Routers forward packets between subnets or networks with differing IP address schemes by ____________ and using routing tables for determining the best destination route for the packets.