Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The 80/20 method can be skipped when____ shifts the entire scope to a Failover system if the primary server fails.






2. This network protocol is not supported in Windows Server 2008






3. ____________ is used instead of Base-10 numbering in IP addressing.






4. For disaster recovery - manual DHCP backups should be stored ___






5. ___has replaced the ___in Windows Server 2008 as a method for deploying images across your network.






6. In IPv6 - intended only for communications within the local subnetwork (IP4 Equivalent APIPA 169.254.1.0) fe80::.






7. Used to set a static IP address in your IP configuration that will be used if DHCP is not available.






8. Uses tunneling of IPv6 packets over an IPv4 network - Stores the IPv4 address of the ISATAP router in bits 17 to 48 - Encapsulates only the IPv4 router's IP address - not the destination client.






9. Can determine the network and host ID portions of an IP address.






10. A limited 32-bit operating system based on the Windows Server 2008 and Windows Vista SP1






11. How do you stop a service on a system?






12. A key difference between a primary zone and a secondary zone: primary zone - ________ - secondary zone - Write.






13. Allows IPv6 routers and hosts to communicate across IPv4 networks - requires a router that supports it - Interface ID is separated into two parts - First 32 bits are either 0:5efe for a private address or 200:5efe for a public address - Last 32 bits






14. The Local Area Network networks scale is used for highly-connected private networks like a...






15. Gets its updates from the master zone transfer partner specified on the Zone Transfer tab in DNS.






16. Responsible for bit-level transmission between network nodes. Cabling and connection types are defined at this layer.






17. License of choice in situations where many users access resources from a few client computers






18. What is the proper syntax for initiating a looping ping to the IP address of 192.168.100.100?






19. These technologies improves the installation process in Windows Server 2008






20. Hyper-V can be installed on these editions of Windows Server 2008.






21. When using the Windows Deployment services role to remotely deploy OSs via the network - what other services must be present?






22. An example of a ___________: A DNS client requesting the best answer that its DNS server can provide.






23. To enable Teredo for Active Directory clients






24. Not available or routable on the Internet - Used by administrators deploying internal networks.






25. ______________ can be done through the GUI using Server Manager






26. On a ______- each port cannot use the full bandwidth (100 Mbps) without affecting other ports.






27. For installing roles and features in server core - you can use the ____ tool.






28. To add WINS to Windows Server 2008 - In Server Manager - click Add Features to add WINS - WINS resolves this...






29. Advantages of using AD DS-integrated DNS zones over standard DNS zones.






30. ______ lists detailed information of events occurring on a specific day include: Date and Time - Event Description - IP address - Host name - Mac address






31. There are _________________in an Active Directory domain that is writeable. The rest are read-only.






32. The range of IP addresses and related configuration information available by request from a DHCP client.






33. They are assigned a unique MAC address by the manufacturer - They allow devices to connect to a physical network.






34. Based on an addressing scheme that uses unique 32-bit (4-byte) addresses.






35. Describes the amount of data that can travel from one network point to another within a specified time.






36. IPv4 addresses are represented by ____-bit numbers that are broken into _____ octets using dotted decimal notation.






37. From network adapter settings to roles and domain membership You can...






38. After DHCP is installed - you must configure _____ for DHCP clients to receive addresses.






39. ___is the new scripting and command-line interface for Windows Server 2008






40. This is a typical IPv6 Unique Local address.






41. Which type of message tells a client that its lease renewal request has been refused?






42. What types of messages are used during an initial lease request?






43. The Server Core version of Windows Server 2008 Enterprise edition ______ be upgraded to the Full installation without a complete reinstallation of the OS.






44. You cannot use the __________for 32-bit and 64-bit versions of Windows Server 2008.






45. The Windows Automated Installation Kit is not ___________ as part of the Windows Deployment Services role installation.






46. KMS works by counting the number of physical client computers requesting activation and then storing information on these computers in a table based on client machine identification (CMID) numbers - which are unique client IDs stored in the KMS datab






47. You are responsible for deploying clients to a new four-story office building in Chicago. You are deploying 500 Windows Vista workstations - 30 network printers - and 5 Windows Server 2008 servers to this building. Your network administrator has prov






48. Calls into the help desk are reporting that users are receiving incorrect host name requests for your internal file server - files.widgets.local. It appears that the users with 10.1.1.10 - or NS1.widgets.local - as their preferred DNS server are havi






49. Server 2008 editions - Standard allows ___ VM guests to be hosted.






50. This defines the type of hardware technology used for connecting the network nodes.