Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Server Core installation includes which of the following programs?






2. DNS zone file resource records are represented as __________.






3. RARP was essentially the opposite of what protocol?






4. Active Directory-integrated zones follow what type of update model?






5. What type of zone might a DNS server host?






6. The broadcast DHCPREQUEST message contains all of the following information except __________.






7. IPv4 addresses are commonly represented by using what type of notation?






8. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?






9. What is the minimum number of physical computers required to allow you to use a KMS key?






10. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






11. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






12. What service provides the ability to use a Windows Server 2008 computer as a router - which passes network traffic from one TCP/IP network to another - as well as for remote access capabilities using either dial-up or VPN technology?






13. As long as the TTL for a ___________ does not expire - a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.






14. DHCP is based heavily on which protocol?






15. To support and use the DHCP service across multiple subnets - routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.






16. Which of the following apply to all clients within a scope and are the most frequently used set of options?






17. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






18. Once a Server Core computer is installed - how can it be managed locally?






19. Which of the following is not a database function used to manage the DHCP database?






20. The key aspect of the DHCP process is that it is ________






21. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






22. The core function of DHCP is to __________.






23. Which of the following is not considered a top-level domain?






24. You can configure the DNS Server role by using which console?






25. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






26. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?






27. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






28. Which mutual authentication method offers encryption of both authentication data and connection data?






29. In what year was DNS introduced?






30. Which generic authentication method does not encrypt authentication data?






31. For best results - the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?






32. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






33. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?






34. Using DHCP relay agents ______ the need to have a DHCP server on every subnet.






35. The process of obtaining an IP address for a computer name (for example - "ComputerA") is called __________.






36. What is the primary means of identifying network devices and services in a Windows Server 2008 network?






37. Which feature is an integral part of IPv6 - whereas it was an optional feature under IPv4?






38. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.






39. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






40. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






41. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






42. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?






43. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






44. When most _____________ - as in voice and video transmissions - VPN is not your best option.






45. A computer running Server Core will allow you to launch which of the following consoles?






46. If you inappropriately allowed network discovery in a public network environment (for example - an Internet cafe) - you would allow total strangers to see and access any ________ on your system.






47. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






48. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?






49. A static-routed IP environment is best suited to small - _________ - static IP internetworks.






50. You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?