Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Routers are considered components of which layer?






2. What is the primary means of identifying network devices and services in a Windows Server 2008 network?






3. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






4. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






5. Which mutual authentication method offers encryption of both authentication data and connection data?






6. By default - the Callback Options setting is configured as __________.






7. Which of the following is not considered a top-level domain?






8. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






9. Network Access Protection was introduced with which operating system?






10. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?






11. Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks?






12. DNS zone file resource records are represented as __________.






13. DHCP is based heavily on which protocol?






14. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?






15. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






16. The primary DNS server for a zone is not required to perform an ______________






17. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






18. Which of the following is the limited broadcast address that is general for all networks and routers?






19. As long as the TTL for a ___________ does not expire - a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.






20. A static-routed IP environment is best suited to small - _________ - static IP internetworks.






21. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






22. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?






23. A striped volume uses which type of striping to interleave data across the disks?






24. In what year was DNS introduced?






25. Windows NT operating system does not support ___________






26. A computer running Server Core will allow you to launch which of the following consoles?






27. The broadcast DHCPREQUEST message contains all of the following information except __________.






28. You can configure the DNS Server role by using which console?






29. Which entries refer to a separate multicast route?






30. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?






31. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






32. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






33. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






34. What computer provides DHCP configuration information to multiple clients?






35. Which zone enables a host to determine another host's name based on its IP address?






36. RARP was essentially the opposite of what protocol?






37. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






38. You can manage disks and partitions in Windows Server 2008 by using which tool?






39. A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.






40. Which generic authentication method does not encrypt authentication data?






41. The MAC address can be obtained by keying in __________ at the command line.






42. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?






43. Which of the following is not a top-level domain name?






44. What is the minimum number of physical computers required to allow you to use a KMS key?






45. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






46. Which option enables internal clients to connect to the Internet using a single - external IP address?






47. By default - the ___________ is configured as No Callback.






48. Which of the following is not a benefit of DHCP?






49. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






50. What service provides the ability to use a Windows Server 2008 computer as a router - which passes network traffic from one TCP/IP network to another - as well as for remote access capabilities using either dial-up or VPN technology?