Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which option enables internal clients to connect to the Internet using a single - external IP address?






2. Which of the following is the limited broadcast address that is general for all networks and routers?






3. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






4. Where are zone transfers initiated?






5. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






6. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?






7. If you inappropriately allowed network discovery in a public network environment (for example - an Internet cafe) - you would allow total strangers to see and access any ________ on your system.






8. If a system will be a DHCP server - what type of address should you set?






9. Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks?






10. Routers are considered components of which layer?






11. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?






12. Which of the following is not a database function used to manage the DHCP database?






13. Where would you find the Alternate Configuration tab?






14. DHCP is based heavily on which protocol?






15. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






16. A computer running Server Core will allow you to launch which of the following consoles?






17. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?






18. What service provides the ability to use a Windows Server 2008 computer as a router - which passes network traffic from one TCP/IP network to another - as well as for remote access capabilities using either dial-up or VPN technology?






19. Which column of the IP Routing Table indicates the gateway value for each routing table entry?






20. Which of the following is not a top-level domain name?






21. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class?






22. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






23. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






24. What type of zone might a DNS server host?






25. In a Windows Server 2008 network - the primary means of locating network devices and network services is through the use of __________.






26. What term refers to the device that is seeking access to the network - such as a laptop attempting to access a wireless access point?






27. What is made up of free space from multiple physical disks?






28. A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.






29. Which feature is an integral part of IPv6 - whereas it was an optional feature under IPv4?






30. RARP was essentially the opposite of what protocol?






31. What type of connectivity creates a secure point-to-point connection across either a private network or a public network - such as the Internet?






32. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?






33. A static-routed IP environment is best suited to small - _________ - static IP internetworks.






34. By default - the Callback Options setting is configured as __________.






35. What is the minimum number of physical computers required to allow you to use a KMS key?






36. Which generic authentication method does not encrypt authentication data?






37. To support and use the DHCP service across multiple subnets - routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.






38. DHCP frees system administrators from __________each host on the network.






39. The MAC address can be obtained by keying in __________ at the command line.






40. What is the primary means of identifying network devices and services in a Windows Server 2008 network?






41. This is not a component of DNS?






42. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






43. This is not a function of DHCP?






44. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






45. IPv4 addresses are commonly represented by using what type of notation?






46. After the client receives an offer from at least one DHCP server - it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.






47. Which of the following is a 32-bit integer representing the maximum time - in seconds - that a DNS server or client caches this resource record before it is discarded?






48. The broadcast DHCPREQUEST message contains all of the following information except __________.






49. The process of obtaining an IP address for a computer name (for example - "ComputerA") is called __________.






50. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following?