Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RARP was essentially the opposite of what protocol?






2. Which type of volume consists of free space contained on a single physical disk?






3. Which generic authentication method does not encrypt authentication data?






4. This is not a function of DHCP?






5. The MAC address can be obtained by keying in __________ at the command line.






6. Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks?






7. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






8. By default - the ___________ is configured as No Callback.






9. Which zone enables a host to determine another host's name based on its IP address?






10. The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used?






11. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?






12. A striped volume uses which type of striping to interleave data across the disks?






13. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






14. Which operating system does not support dynamic disks?






15. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






16. If you inappropriately allowed network discovery in a public network environment (for example - an Internet cafe) - you would allow total strangers to see and access any ________ on your system.






17. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






18. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?






19. You can manage disks and partitions in Windows Server 2008 by using which tool?






20. Where would you find the Alternate Configuration tab?






21. Which feature allows recovery of operating system state - files - folders - and application data by periodically creating a snapshot of the full server or selected volumes?






22. The primary DNS server for a zone is not required to perform an ______________






23. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






24. Which entries refer to a separate multicast route?






25. What is the minimum number of physical computers required to allow you to use a KMS key?






26. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






27. A computer running Server Core will allow you to launch which of the following consoles?






28. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?






29. DNS zone file resource records are represented as __________.






30. Which option enables internal clients to connect to the Internet using a single - external IP address?






31. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?






32. Which column of the IP Routing Table indicates the gateway value for each routing table entry?






33. Which mutual authentication method offers encryption of both authentication data and connection data?






34. This is not a component of DNS?






35. DHCP is based heavily on which protocol?






36. Which of the following is not a top-level domain name?






37. Which of the following is not considered a top-level domain?






38. Which of the following is not a forward or reverse lookup zone type?






39. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






40. This string does not represent the same IPv6 address?






41. By using the Routing and Remote Access service - Windows Server 2008 can be configured as a _____________






42. Once a Server Core computer is installed - how can it be managed locally?






43. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






44. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






45. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






46. Which of the following is not a database function used to manage the DHCP database?






47. IPv4 addresses are commonly represented by using what type of notation?






48. Which of the following apply to all clients within a scope and are the most frequently used set of options?






49. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?






50. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?