Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?






2. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?






3. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






4. Which of the following is the limited broadcast address that is general for all networks and routers?






5. What is the minimum number of physical computers required to allow you to use a KMS key?






6. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






7. By default - the ___________ is configured as No Callback.






8. Which of the following is not a database function used to manage the DHCP database?






9. A computer running Server Core will allow you to launch which of the following consoles?






10. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






11. The process of obtaining an IP address for a computer name (for example - "ComputerA") is called __________.






12. DHCP frees system administrators from __________each host on the network.






13. The routing service included with Windows Server 2008 is better suited for __________.






14. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






15. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






16. Which feature allows recovery of operating system state - files - folders - and application data by periodically creating a snapshot of the full server or selected volumes?






17. Which of the following apply to all clients within a scope and are the most frequently used set of options?






18. This is not a component of DNS?






19. Which method is not a possibility when activating A MAK key?






20. RARP was essentially the opposite of what protocol?






21. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






22. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






23. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






24. If a system will be a DHCP server - what type of address should you set?






25. What is made up of free space from multiple physical disks?






26. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






27. To support and use the DHCP service across multiple subnets - routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.






28. What service provides the ability to use a Windows Server 2008 computer as a router - which passes network traffic from one TCP/IP network to another - as well as for remote access capabilities using either dial-up or VPN technology?






29. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class?






30. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






31. To ___________ - DNS servers store only the most recent updates.






32. Which zone enables a host to determine another host's name based on its IP address?






33. The key aspect of the DHCP process is that it is ________






34. This string does not represent the same IPv6 address?






35. The primary DNS server for a zone is not required to perform an ______________






36. Which of the following is a 32-bit integer representing the maximum time - in seconds - that a DNS server or client caches this resource record before it is discarded?






37. DNS zone file resource records are represented as __________.






38. Which operating system does not support dynamic disks?






39. Sent by clients via broadcast to locate a DHCP server per RFC 2131 - which message may include options that suggest values for the network address and lease duration?






40. After the client receives an offer from at least one DHCP server - it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.






41. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






42. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






43. You can configure the DNS Server role by using which console?






44. In what year was DNS introduced?






45. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






46. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






47. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






48. For best results - the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?






49. What computer provides DHCP configuration information to multiple clients?






50. If you inappropriately allowed network discovery in a public network environment (for example - an Internet cafe) - you would allow total strangers to see and access any ________ on your system.