Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To ___________ - DNS servers store only the most recent updates.






2. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






3. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






4. A static-routed IP environment is best suited to small - _________ - static IP internetworks.






5. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






6. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






7. What is the minimum number of physical computers required to allow you to use a KMS key?






8. Which zone enables a host to determine another host's name based on its IP address?






9. The routing service included with Windows Server 2008 is better suited for __________.






10. What is made up of free space from multiple physical disks?






11. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?






12. Which entries refer to a separate multicast route?






13. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?






14. DHCP frees system administrators from __________each host on the network.






15. DNS zone file resource records are represented as __________.






16. What type of zone might a DNS server host?






17. Which of the following is not a forward or reverse lookup zone type?






18. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.






19. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?






20. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






21. IPv4 addresses are commonly represented by using what type of notation?






22. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?






23. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






24. Which of the following apply to all clients within a scope and are the most frequently used set of options?






25. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






26. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?






27. The process of obtaining an IP address for a computer name (for example - "ComputerA") is called __________.






28. If a system will be a DHCP server - what type of address should you set?






29. DHCP is based heavily on which protocol?






30. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






31. Active Directory-integrated zones follow what type of update model?






32. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






33. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






34. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






35. Which of the following is the limited broadcast address that is general for all networks and routers?






36. RARP was essentially the opposite of what protocol?






37. You can configure the DNS Server role by using which console?






38. The core function of DHCP is to __________.






39. For best results - the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?






40. Which type of volume consists of free space contained on a single physical disk?






41. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?






42. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






43. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






44. To support and use the DHCP service across multiple subnets - routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.






45. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






46. You can manage disks and partitions in Windows Server 2008 by using which tool?






47. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






48. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






49. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






50. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?