Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?






2. Which generic authentication method does not encrypt authentication data?






3. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






4. What is the minimum number of physical computers required to allow you to use a KMS key?






5. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?






6. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?






7. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class?






8. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






9. A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.






10. After the client receives an offer from at least one DHCP server - it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.






11. This is not a component of DNS?






12. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






13. Which type of volume consists of free space contained on a single physical disk?






14. What type of zone might a DNS server host?






15. The primary DNS server for a zone is not required to perform an ______________






16. Windows NT operating system does not support ___________






17. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






18. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






19. Which of the following is not a forward or reverse lookup zone type?






20. Which zone enables a host to determine another host's name based on its IP address?






21. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?






22. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






23. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






24. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






25. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






26. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






27. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






28. IPv4 addresses are commonly represented by using what type of notation?






29. The MAC address can be obtained by keying in __________ at the command line.






30. Which feature allows recovery of operating system state - files - folders - and application data by periodically creating a snapshot of the full server or selected volumes?






31. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






32. You can configure the DNS Server role by using which console?






33. You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?






34. Where are zone transfers initiated?






35. This is not a function of DHCP?






36. If you inappropriately allowed network discovery in a public network environment (for example - an Internet cafe) - you would allow total strangers to see and access any ________ on your system.






37. What service provides the ability to use a Windows Server 2008 computer as a router - which passes network traffic from one TCP/IP network to another - as well as for remote access capabilities using either dial-up or VPN technology?






38. Which of the following is not a database function used to manage the DHCP database?






39. Network Access Protection was introduced with which operating system?






40. RARP was essentially the opposite of what protocol?






41. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.






42. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.






43. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






44. Which method is not a possibility when activating A MAK key?






45. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






46. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?






47. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






48. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






49. What computer provides DHCP configuration information to multiple clients?






50. Which of the following is a 32-bit integer representing the maximum time - in seconds - that a DNS server or client caches this resource record before it is discarded?