Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The core function of DHCP is to __________.






2. Network Access Protection was introduced with which operating system?






3. The primary DNS server for a zone is not required to perform an ______________






4. The MAC address can be obtained by keying in __________ at the command line.






5. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.






6. Which of the following is the limited broadcast address that is general for all networks and routers?






7. Which of the following apply to all clients within a scope and are the most frequently used set of options?






8. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






9. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






10. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






11. What computer provides DHCP configuration information to multiple clients?






12. You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?






13. The routing service included with Windows Server 2008 is better suited for __________.






14. Which of the following is not considered a top-level domain?






15. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?






16. What are two types of Active Directory-integrated zones?






17. Which of the following is not a top-level domain name?






18. As long as the TTL for a ___________ does not expire - a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.






19. DHCP is based heavily on which protocol?






20. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






21. The broadcast DHCPREQUEST message contains all of the following information except __________.






22. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?






23. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






24. The process of obtaining an IP address for a computer name (for example - "ComputerA") is called __________.






25. Which method is not a possibility when activating A MAK key?






26. ICS turns your computer into a router so that other computers on the ________ can access its Internet connection.






27. Using DHCP relay agents ______ the need to have a DHCP server on every subnet.






28. Which entries refer to a separate multicast route?






29. By default - the Callback Options setting is configured as __________.






30. A striped volume uses which type of striping to interleave data across the disks?






31. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?






32. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






33. RARP was essentially the opposite of what protocol?






34. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






35. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






36. When most _____________ - as in voice and video transmissions - VPN is not your best option.






37. After sending a zone transfer request - which option shows how long (in seconds) the zone's secondary server waits before sending another request?






38. Sent by clients via broadcast to locate a DHCP server per RFC 2131 - which message may include options that suggest values for the network address and lease duration?






39. Which of the following is not a database function used to manage the DHCP database?






40. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






41. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.






42. Where would you find the Alternate Configuration tab?






43. Which column of the IP Routing Table indicates the gateway value for each routing table entry?






44. What is made up of free space from multiple physical disks?






45. Which mutual authentication method offers encryption of both authentication data and connection data?






46. Which type of volume consists of free space contained on a single physical disk?






47. Which feature is an integral part of IPv6 - whereas it was an optional feature under IPv4?






48. Once a Server Core computer is installed - how can it be managed locally?






49. If you inappropriately allowed network discovery in a public network environment (for example - an Internet cafe) - you would allow total strangers to see and access any ________ on your system.






50. Routers are considered components of which layer?