Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used?






2. You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?






3. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.






4. Which of the following is not a database function used to manage the DHCP database?






5. When most _____________ - as in voice and video transmissions - VPN is not your best option.






6. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






7. DHCP frees system administrators from __________each host on the network.






8. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






9. Which of the following is the limited broadcast address that is general for all networks and routers?






10. Network Access Protection was introduced with which operating system?






11. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?






12. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






13. After the client receives an offer from at least one DHCP server - it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.






14. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






15. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






16. The core function of DHCP is to __________.






17. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






18. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?






19. Which generic authentication method does not encrypt authentication data?






20. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?






21. Which entries refer to a separate multicast route?






22. The routing service included with Windows Server 2008 is better suited for __________.






23. This string does not represent the same IPv6 address?






24. What computer provides DHCP configuration information to multiple clients?






25. By default - the ___________ is configured as No Callback.






26. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.






27. Which zone enables a host to determine another host's name based on its IP address?






28. The MAC address can be obtained by keying in __________ at the command line.






29. The broadcast DHCPREQUEST message contains all of the following information except __________.






30. IPv4 addresses are commonly represented by using what type of notation?






31. Which of the following is not a top-level domain name?






32. RARP was essentially the opposite of what protocol?






33. Which mutual authentication method offers encryption of both authentication data and connection data?






34. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






35. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?






36. Active Directory-integrated zones follow what type of update model?






37. Which of the following is not a forward or reverse lookup zone type?






38. Which of the following apply to all clients within a scope and are the most frequently used set of options?






39. A striped volume uses which type of striping to interleave data across the disks?






40. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






41. Which option enables internal clients to connect to the Internet using a single - external IP address?






42. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






43. Which of the following is a 32-bit integer representing the maximum time - in seconds - that a DNS server or client caches this resource record before it is discarded?






44. This is not a component of DNS?






45. Which method is not a possibility when activating A MAK key?






46. Which feature allows recovery of operating system state - files - folders - and application data by periodically creating a snapshot of the full server or selected volumes?






47. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






48. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






49. DHCP is based heavily on which protocol?






50. In what year was DNS introduced?