Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. By default - the Callback Options setting is configured as __________.






2. For best results - the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?






3. Network Access Protection was introduced with which operating system?






4. The key aspect of the DHCP process is that it is ________






5. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.






6. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






7. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class?






8. Where would you find the Alternate Configuration tab?






9. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






10. The core function of DHCP is to __________.






11. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






12. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?






13. A computer running Server Core will allow you to launch which of the following consoles?






14. After the client receives an offer from at least one DHCP server - it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.






15. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






16. You can manage disks and partitions in Windows Server 2008 by using which tool?






17. Which zone enables a host to determine another host's name based on its IP address?






18. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






19. To ___________ - DNS servers store only the most recent updates.






20. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






21. A striped volume uses which type of striping to interleave data across the disks?






22. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






23. Which generic authentication method does not encrypt authentication data?






24. Which feature allows recovery of operating system state - files - folders - and application data by periodically creating a snapshot of the full server or selected volumes?






25. Which type of volume consists of free space contained on a single physical disk?






26. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






27. Which of the following is the limited broadcast address that is general for all networks and routers?






28. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






29. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






30. This is not a function of DHCP?






31. Which entries refer to a separate multicast route?






32. DHCP is based heavily on which protocol?






33. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?






34. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?






35. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






36. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?






37. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?






38. DNS zone file resource records are represented as __________.






39. What is made up of free space from multiple physical disks?






40. Which mutual authentication method offers encryption of both authentication data and connection data?






41. Which of the following is not a forward or reverse lookup zone type?






42. What type of zone might a DNS server host?






43. You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?






44. Once a Server Core computer is installed - how can it be managed locally?






45. Which of the following is not a database function used to manage the DHCP database?






46. Windows NT operating system does not support ___________






47. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?






48. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






49. Which column of the IP Routing Table indicates the gateway value for each routing table entry?






50. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?