Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






2. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?






3. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class?






4. In what year was DNS introduced?






5. Which column of the IP Routing Table indicates the gateway value for each routing table entry?






6. Where would you find the Alternate Configuration tab?






7. This is not a component of DNS?






8. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?






9. Which zone enables a host to determine another host's name based on its IP address?






10. The MAC address can be obtained by keying in __________ at the command line.






11. When most _____________ - as in voice and video transmissions - VPN is not your best option.






12. A static-routed IP environment is best suited to small - _________ - static IP internetworks.






13. What is the primary means of identifying network devices and services in a Windows Server 2008 network?






14. Which of the following is not a top-level domain name?






15. After the client receives an offer from at least one DHCP server - it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.






16. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






17. Which entries refer to a separate multicast route?






18. To support and use the DHCP service across multiple subnets - routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.






19. You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?






20. For best results - the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?






21. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?






22. A computer running Server Core will allow you to launch which of the following consoles?






23. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?






24. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






25. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






26. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






27. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






28. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






29. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?






30. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






31. Which generic authentication method does not encrypt authentication data?






32. Network Access Protection was introduced with which operating system?






33. The primary DNS server for a zone is not required to perform an ______________






34. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






35. Which of the following is the limited broadcast address that is general for all networks and routers?






36. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






37. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






38. Which of the following is not considered a top-level domain?






39. A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.






40. To ___________ - DNS servers store only the most recent updates.






41. A Server Core installation includes which of the following programs?






42. IPv4 addresses are commonly represented by using what type of notation?






43. Which option enables internal clients to connect to the Internet using a single - external IP address?






44. Which mutual authentication method offers encryption of both authentication data and connection data?






45. As long as the TTL for a ___________ does not expire - a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.






46. By default - the ___________ is configured as No Callback.






47. Active Directory-integrated zones follow what type of update model?






48. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?






49. What is the minimum number of physical computers required to allow you to use a KMS key?






50. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.