Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. By using the Routing and Remote Access service - Windows Server 2008 can be configured as a _____________






2. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






3. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






4. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?






5. The process of obtaining an IP address for a computer name (for example - "ComputerA") is called __________.






6. What service provides the ability to use a Windows Server 2008 computer as a router - which passes network traffic from one TCP/IP network to another - as well as for remote access capabilities using either dial-up or VPN technology?






7. The broadcast DHCPREQUEST message contains all of the following information except __________.






8. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






9. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?






10. What computer provides DHCP configuration information to multiple clients?






11. By default - the ___________ is configured as No Callback.






12. Once a Server Core computer is installed - how can it be managed locally?






13. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






14. Which column of the IP Routing Table indicates the gateway value for each routing table entry?






15. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






16. Network Access Protection was introduced with which operating system?






17. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?






18. What type of zone might a DNS server host?






19. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






20. Which of the following is not a top-level domain name?






21. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?






22. Which of the following is not a benefit of DHCP?






23. Which of the following is the limited broadcast address that is general for all networks and routers?






24. When most _____________ - as in voice and video transmissions - VPN is not your best option.






25. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






26. Which option enables internal clients to connect to the Internet using a single - external IP address?






27. Which feature is an integral part of IPv6 - whereas it was an optional feature under IPv4?






28. Which zone enables a host to determine another host's name based on its IP address?






29. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?






30. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






31. What is the minimum number of physical computers required to allow you to use a KMS key?






32. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






33. DNS zone file resource records are represented as __________.






34. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






35. A Server Core installation includes which of the following programs?






36. Using DHCP relay agents ______ the need to have a DHCP server on every subnet.






37. DHCP is based heavily on which protocol?






38. RARP was essentially the opposite of what protocol?






39. Which of the following is not considered a top-level domain?






40. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






41. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






42. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






43. Which mutual authentication method offers encryption of both authentication data and connection data?






44. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?






45. If a system will be a DHCP server - what type of address should you set?






46. Which of the following is a 32-bit integer representing the maximum time - in seconds - that a DNS server or client caches this resource record before it is discarded?






47. Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks?






48. To ___________ - DNS servers store only the most recent updates.






49. The MAC address can be obtained by keying in __________ at the command line.






50. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?