Test your basic knowledge |

Windows 2008 Server Network Infrastructure

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?






2. Routers are considered components of which layer?






3. By using the Routing and Remote Access service - Windows Server 2008 can be configured as a _____________






4. Which of the following is not a top-level domain name?






5. A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.






6. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?






7. What are two types of Active Directory-integrated zones?






8. DHCP is based heavily on which protocol?






9. Which mutual authentication method offers encryption of both authentication data and connection data?






10. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.






11. The primary DNS server for a zone is not required to perform an ______________






12. You can configure the DNS Server role by using which console?






13. If a system will be a DHCP server - what type of address should you set?






14. Which feature allows recovery of operating system state - files - folders - and application data by periodically creating a snapshot of the full server or selected volumes?






15. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install?






16. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?






17. The process of obtaining an IP address for a computer name (for example - "ComputerA") is called __________.






18. What computer provides DHCP configuration information to multiple clients?






19. One benefit of the_____________ of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy.






20. As long as the TTL for a ___________ does not expire - a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.






21. What is made up of free space from multiple physical disks?






22. When most _____________ - as in voice and video transmissions - VPN is not your best option.






23. Windows NT operating system does not support ___________






24. This is not a function of DHCP?






25. To comply with RFC 1542 and provide relay agent support - each router must be able to recognize __________.






26. Using DHCP relay agents ______ the need to have a DHCP server on every subnet.






27. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?






28. Network Access Protection was introduced with which operating system?






29. Sent by clients via broadcast to locate a DHCP server per RFC 2131 - which message may include options that suggest values for the network address and lease duration?






30. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.






31. DNS zone file resource records are represented as __________.






32. In what year was DNS introduced?






33. Once a DHCP scope is defined and exclusion ranges are applied - the remaining addresses form what is called an ________ within the scope.






34. The Reverse Address Resolution Protocol (RARP) was designed for ___________ that had no means of permanently storing their TCP/IP settings






35. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients - such as Windows 95 and Windows 98)?






36. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.






37. IPv4 addresses are commonly represented by using what type of notation?






38. By default - the Callback Options setting is configured as __________.






39. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?






40. Which of the following is not a forward or reverse lookup zone type?






41. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks - thus improving the read performance of the volume?






42. Which method is not a possibility when activating A MAK key?






43. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class?






44. You can manage disks and partitions in Windows Server 2008 by using which tool?






45. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?






46. A static-routed IP environment is best suited to small - _________ - static IP internetworks.






47. After the client receives an offer from at least one DHCP server - it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.






48. Which type of volume consists of free space contained on a single physical disk?






49. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?






50. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?