Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DHCP is based heavily on which protocol?






2. A Server Core installation includes which of the following programs?






3. Because the software is installed into a single partition - the specified _______________ actually apply to the space within the partition being used and not to the total drive size.






4. Sent by clients via broadcast to locate a DHCP server per RFC 2131 - which message may include options that suggest values for the network address and lease duration?






5. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






6. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






7. Which mutual authentication method offers encryption of both authentication data and connection data?






8. Which of the following is not a top-level domain name?






9. The key aspect of the DHCP process is that it is ________






10. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?






11. As long as the TTL for a ___________ does not expire - a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.






12. To support and use the DHCP service across multiple subnets - routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.






13. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






14. Which entries refer to a separate multicast route?






15. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






16. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






17. Which option enables internal clients to connect to the Internet using a single - external IP address?






18. Which of the following is the limited broadcast address that is general for all networks and routers?






19. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






20. What is the primary means of identifying network devices and services in a Windows Server 2008 network?






21. IPv4 addresses are commonly represented by using what type of notation?






22. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






23. What type of zone might a DNS server host?






24. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






25. A static-routed IP environment is best suited to small - _________ - static IP internetworks.






26. Active Directory-integrated zones follow what type of update model?






27. If you inappropriately allowed network discovery in a public network environment (for example - an Internet cafe) - you would allow total strangers to see and access any ________ on your system.






28. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






29. Which operating system does not support dynamic disks?






30. Once a Server Core computer is installed - how can it be managed locally?






31. What is the minimum number of physical computers required to allow you to use a KMS key?






32. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






33. Which feature is an integral part of IPv6 - whereas it was an optional feature under IPv4?






34. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.






35. Using DHCP relay agents ______ the need to have a DHCP server on every subnet.






36. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?






37. Windows NT operating system does not support ___________






38. By default - the Callback Options setting is configured as __________.






39. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






40. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






41. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?






42. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%System32Dhcp directory after a system failure)?






43. What is made up of free space from multiple physical disks?






44. A striped volume uses which type of striping to interleave data across the disks?






45. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






46. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






47. Where are zone transfers initiated?






48. By default - the ___________ is configured as No Callback.






49. Which of the following is not a benefit of DHCP?






50. Which of the following is not considered a top-level domain?