Vous êtes sur la page 1sur 7

Midterm Study Guide 1. Which of the following is not a benefit of DHCP? 1. portability of workstations 2.

Which of the following is not a component of DNS? 2. DNS relay agent 3. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class? 3. Class C 4. Which of the following is not a function of DHCP? 4. transmitting data from one network to another 5. If a system will be a DHCP server, what type of address should you set? 5. static IP address 6. What is the minimum number of physical computers required to allow you to use a KMS key? 6. 25 Vista and five Windows Server 2008 computers 7. A striped volume uses which type of striping to interleave data across the disks? 7. RAID-0 8. A computer running Server Core will allow you to launch which of the following consoles? 8. Windows Registry Editor 9. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option? 9. workstation settings 10. The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used? 10. DHCPRELEASE 11. Which of the following is not a database function used to manage the DHCP database? 11. connect 12. A DHCP client will perform the initial lease process in all of the following situations with the exception of __________. 12. after every reboot 13. In a Windows Server 2008 network, the primary means of locating network devices and network services is through the use of __________. 13. DNS 14. DNS zone file resource records are represented as __________. 14. text entries 15. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone? 15. stub zone 16. After sending a zone transfer request, which option shows how long (in seconds) the zones secondary server waits before sending another request? 16. Retry 17. For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)? 17. 10 18. Of the four types of routes that can be found in a routing table, which of the following cannot be found? 18. client routes

19. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme? 19. Challenge Handshake Authentication Protocol (CHAP) 20. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option? 20. Client Must Supply an IP Address 21. What is the primary means of identifying network devices and services in a Windows Server 2008 network? 21. DNS 22. The DHCP relay agent listens for which messages that are broadcast from the client? 22. All of the above DHCPDISCOVER DHCPREQUEST DHCPINFORM 23. To support and use the DHCP service across multiple subnets, routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________. 23. RFC 1542 24. Network Access Protection was introduced with which operating system? 24. Windows Server 2008 25. Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks? 25. basic and dynamic 26. You can configure the DNS Server role by using which console? 26. Server Manager 27. Which operating system does not support dynamic disks? 27. Windows NT 28. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers? 28. GPT 29. The Reverse Address Resolution Protocol (RARP) was designed for what reason? 29. for diskless workstations that had no means of permanently storing their TCP/IP settings 30. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide? 30. DHCPACK 31. The IP addresses defined in a DHCP scope must be __________. 31. both A and B 32. After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address. 32. 255.255.255.255 33. Which of the following is not considered a top-level domain? 33. .nato 34. Active Directoryintegrated zones follow what type of update model? 34. multimaster 35. What is the length of time that the DNS service waits before retrying a query made during a recursive lookup? 35. 3 seconds 36. Which zone enables a host to determine another hosts name based on its IP

address? 36. reverse lookup zone 37. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________. 37. OSPF 38. Which column of the IP Routing Table indicates the gateway value for each routing table entry? 38. third 39. Which mutual authentication method offers encryption of both authentication data and connection data? 39. MS-CHAPv2 40. By default, the Callback Options setting is configured as __________. 40. No Callback 41. The process of obtaining an IP address for a computer name (for example, ComputerA) is called __________. 41. name resolution 42. What service provides the ability to use a Windows Server 2008 computer as a router, which passes network traffic from one TCP/IP network to another, as well as for remote access capabilities using either dial-up or VPN technology? 42. Routing and Remote Access 43. If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. No additional discovery attempts are made except under what conditions? 43. All of the above: The network adapter is disabled and then enabled again, The TCP/IP settings for the adapter are changed with DHCP enabled after these changes, AND Media is disconnected and then reconnected. 44. DHCP is based heavily on which protocol? 44. BOOTP 45. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following? 45. routing method 46. What is made up of free space from multiple physical disks? 46. spanned volume 47. Best practices when installing Windows Server 2008 recommends installing the software onto which type of media? 47. fresh or previously used media 48. You can manage disks and partitions in Windows Server 2008 by using which tool? 48. Disk Management tools 49. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network? 49. de-centralized administration 50. The MAC address can be obtained by keying in __________ at the command line. 50. ipconfig /all 51. What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry?

51. You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer. 52. In what year was DNS introduced? 52. 1984 53. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed? 53. standard primary zone 54. Where are zone transfers initiated? 54. secondary server 55. What is the length of time that the DNS service waits before failing a recursive lookup that has been retried? 55. 15 seconds 56. Which entries refer to a separate multicast route? 56. 224.0.0.0 57. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key? 57. basic encryption 58. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)? 58. MS-CHAPv1 59. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________. 59. verifier 60. Which of the following is not a top-level domain name? 60. .corp 61. To comply with RFC 1542 and provide relay agent support, each router must be able to recognize __________. 61. BOOTP and DHCP protocol messages and relay them appropriately 62. Where would you find the Alternate Configuration tab? 62. Internet Protocol Properties page 63. Which of the following strings does not represent the same IPv6 address? 63. 192.168.1.101 64. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks, thus improving the read performance of the volume? 64. striped volume 65. Once a Server Core computer is installed, how can it be managed locally? 65. command-line utilities 66. Which feature allows recovery of operating system state, files, folders, and application data by periodically creating a snapshot of the full server or selected volumes? 66. Windows Server Backup 67. The default installation of Windows Server 2008 Enterprise Edition allows you to install 17 different server roles. Which of the following is not a role that you can install? 67. System File Services 68. RARP was essentially the opposite of what protocol? 68. ARP

69. What computer provides DHCP configuration information to multiple clients? 69. DHCP server 70. The broadcast DHCPREQUEST message contains all of the following information except __________. 70. DNS information for the client 71. Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address and lease duration? 71. DHCPDISCOVER 72. What type of zone might a DNS server host? 72. primary 73. What are two types of Active Directoryintegrated zones? 73. forward and reverse 74. Which operating system does not support zone transfers? 74. Windows NT 75. Nslookup can be used for which of the following? 75. all of the above: resolving queries, specifying DNS server, and resolving IP addresses to host names 76. Routers are considered components of which layer? 76. layer 3 77. Which option enables internal clients to connect to the Internet using a single, external IP address? 77. network address translation 78. Which generic authentication method does not encrypt authentication data? 78. Shiva Password Authentication Protocol (SPAP) 79. An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items? 79. all of the above: conditions, constraints, and Settings 80. Of the several key components of subnetting that are listed below, which is the most accurate description? 80. Systems within a subnet need not be burdened with information about external network addressing. 81. The routing service included with Windows Server 2008 is better suited for __________. 81. a smaller network 82. IPv4 addresses are commonly represented by using what type of notation? 82. dotted-decimal 83. Which feature is an integral part of IPv6, whereas it was an optional feature under IPv4? 83. IP security 84. Which type of volume consists of free space contained on a single physical disk? 84. simple volume 85. A Server Core installation includes which of the following programs? 85. Windows Notepad 86. You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following? 86. File and Print Sharing Wizard 87. Which method is not a possibility when activating A MAK key? 87. e-Mail

88. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________. 88. DHCPOFFER 89. Which of the following apply to all clients within a scope and are the most frequently used set of options? 89. scope options 90. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%\System32\Dhcp directory after a system failure)? 90. Temp.edb 91. Which of the following is not a forward or reverse lookup zone type? 91. integrated 92. Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded? 92. TTL 93. A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________. 93. domain controllers in the forest 94. You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries except __________. 94. iterative 95. How can you view the IP routing table? 95. BOTH Routing and Remote Access console OR command prompt 96. Which of the following is the limited broadcast address that is general for all networks and routers? 96. 255.255.255.255 97. What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet? 97. virtual private network 98. What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point? 98. Supplicant True/False 1. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. True 2. DHCP cannot dynamically allocate an IP address from a pool of addresses and then reclaim it when it is no longer needed. False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. True 4. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. True 5. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope. True 6. To conserve disk space, DNS servers store only the most recent updates. True

7. The primary DNS server for a zone is not required to perform an incremental zone transfer. True 8. Scavenging is enabled by default. False 9. By using the Routing and Remote Access service, Windows Server 2008 can be configured as a router and remote access server. True 10. A hub examines the destination and source address of an incoming data frame and forwards the frame to the appropriate destination port according to the destination address. False 11. A static-routed IP environment is best suited to small, single-path, static IP internetworks. True

Vous aimerez peut-être aussi