Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






2. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class?






3. Which of the following apply to all clients within a scope and are the most frequently used set of options?






4. DHCP is based heavily on which protocol?






5. Which type of volume consists of free space contained on a single physical disk?






6. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?






7. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






8. A Server Core installation includes which of the following programs?






9. To support and use the DHCP service across multiple subnets - routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.






10. IPv6 uses 128 bits - or 16 bytes - for addressing - thus providing 2128 (about ______) unique addresses.






11. Which feature allows recovery of operating system state - files - folders - and application data by periodically creating a snapshot of the full server or selected volumes?






12. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






13. What are two types of Active Directory-integrated zones?






14. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






15. Which of the following is not a top-level domain name?






16. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






17. A striped volume uses which type of striping to interleave data across the disks?






18. Of the four types of routes that can be found in a routing table - which of the following cannot be found?






19. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






20. By default - the ___________ is configured as No Callback.






21. The key aspect of the DHCP process is that it is ________






22. By using the Routing and Remote Access service - Windows Server 2008 can be configured as a _____________






23. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?






24. Using DHCP relay agents ______ the need to have a DHCP server on every subnet.






25. Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks?






26. Which mutual authentication method offers encryption of both authentication data and connection data?






27. Which method is not a possibility when activating A MAK key?






28. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






29. When most _____________ - as in voice and video transmissions - VPN is not your best option.






30. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






31. The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used?






32. You can manage disks and partitions in Windows Server 2008 by using which tool?






33. The broadcast DHCPREQUEST message contains all of the following information except __________.






34. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which is not an option?






35. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






36. What service provides the ability to use a Windows Server 2008 computer as a router - which passes network traffic from one TCP/IP network to another - as well as for remote access capabilities using either dial-up or VPN technology?






37. The MAC address can be obtained by keying in __________ at the command line.






38. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






39. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






40. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.






41. Which entries refer to a separate multicast route?






42. What computer provides DHCP configuration information to multiple clients?






43. If a system will be a DHCP server - what type of address should you set?






44. You can configure the DNS Server role by using which console?






45. Which column of the IP Routing Table indicates the gateway value for each routing table entry?






46. Active Directory-integrated zones follow what type of update model?






47. Which generic authentication method does not encrypt authentication data?






48. For best results - the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?






49. By default - the Callback Options setting is configured as __________.






50. Where would you find the Alternate Configuration tab?