+ All Categories
Home > Documents > Windows 2008 3 4 5

Windows 2008 3 4 5

Date post: 09-Nov-2014
Category:
Upload: surfer101
View: 106 times
Download: 0 times
Share this document with a friend
Description:
chapter 3 4 and 5 all one document
Popular Tags:
36
CHAPTER 3:MANAGING THE DHCP ROLE 1 out of 1 points DHCP frees system administrators from manually configuring each host on the network. Answer Selected Answer: Tr ue Correct Answer: Tr ue Question 2 1 out of 1 points The smaller the network, the greater the benefit of using a dynamic address assignment. Answer Selected Answer: Fa lse Correct Answer: Fa lse Question 3 0 out of 1 points DHCP provides three key benefits to those managing and maintaining a TCP/IP network. Answer Selected Answer: Tr ue Correct Answer: Fa lse Question 4
Transcript
Page 1: Windows 2008 3 4 5

CHAPTER 3:MANAGING THE DHCP ROLE

1 out of 1 points

DHCP frees system administrators from manually configuring each host on the network.Answer

Selected Answer:  True

Correct Answer:  True

Question 2

1 out of 1 points

The smaller the network, the greater the benefit of using a dynamic address assignment.Answer

Selected Answer:  False

Correct Answer:  False

Question 3

0 out of 1 points

DHCP provides three key benefits to those managing and maintaining a TCP/IP network.Answer

Selected Answer:  True

Correct Answer:  False

Question 4

1 out of 1 points

The key aspect of the DHCP process is that it is dynamic.Answer

Selected Answer:  True

Correct Answer:  True

Question 5

1 out of 1 points

Page 2: Windows 2008 3 4 5

Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope.Answer

Selected Answer:  True

Correct Answer:  True

Question 6

1 out of 1 points

The Reverse Address Resolution Protocol (RARP) was designed for what reason?Answer

Selected Answer: for diskless workstations that had no means of permanently storing

their TCP/IP settings

Correct Answer: for diskless workstations that had no means of permanently storing

their TCP/IP settings

Question 7

1 out of 1 points

RARP was essentially the opposite of what protocol?Answer

Selected Answer:ARP

Correct Answer:ARP

Question 8

1 out of 1 points

BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?Answer

Selected Answer:workstation settings

Correct Answer:workstation settings

Page 3: Windows 2008 3 4 5

Question 9

1 out of 1 points

Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?Answer

Selected Answer:de-centralized administration

Correct Answer:de-centralized administration

Question 10

1 out of 1 points

      The core function of DHCP is to __________.Answer

Selected Answer:assign addresses

Correct Answer:assign addresses

Question 11

1 out of 1 points

What computer provides DHCP configuration information to multiple clients?Answer

Selected Answer:DHCP server

Correct Answer:DHCP server

Question 12

1 out of 1 points

Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address and lease duration?Answer

Page 4: Windows 2008 3 4 5

Selected Answer:DHCPDISCOVER

Correct Answer:DHCPDISCOVER

Question 13

1 out of 1 points

Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?Answer

Selected Answer:DHCPACK

Correct Answer:DHCPACK

Question 14

1 out of 1 points

The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used?Answer

Selected Answer:DHCPRELEASE

Correct Answer:DHCPRELEASE

Question 15

1 out of 1 points

All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.Answer

Selected Answer:DHCPOFFER

Page 5: Windows 2008 3 4 5

Correct Answer:DHCPOFFER

Question 16

1 out of 1 points

The broadcast DHCPREQUEST message contains all of the following information except __________.Answer

Selected Answer:DNS information for the client

Correct Answer:DNS information for the client

Question 17

1 out of 1 points

     A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.Answer

Selected Answer:after every reboot

Correct Answer:after every reboot

Question 18

1 out of 1 points

If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. Additional discovery attempts are made under what condition?Answer

Selected Answer:All of the above

Correct Answer:All of the above

Question 19

Page 6: Windows 2008 3 4 5

1 out of 1 points

The IP addresses defined in a DHCP scope must be __________.Answer

Selected Answer:both A and B

Correct Answer:both A and B

Question 20

1 out of 1 points

Which of the following apply to all clients within a scope and are the most frequently used set of options?Answer

Selected Answer:scope options

Correct Answer:scope options

Question 21

1 out of 1 points

Which of the following is not a database function used to manage the DHCP database?Answer

Selected Answer:connect

Correct Answer:connect

Question 22

1 out of 1 points

What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry?Answer

Selected Answer: You must restore the DHCP server registry keys, or they must remain

Page 7: Windows 2008 3 4 5

intact from previous service operations on the server computer.

Correct Answer: You must restore the DHCP server registry keys, or they must remain

intact from previous service operations on the server computer.

Question 23

1 out of 1 points

    Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%\System32\Dhcp directory after a system failure)?Answer

Selected Answer:Temp.edb

Correct Answer:Temp.edb

Question 24

1 out of 1 points

The MAC address can be obtained by keying in __________ at the command line.Answer

Selected Answer:ipconfig /all

Correct Answer:ipconfig /all

Question 25

1 out of 1 points

After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.Answer

Selected Answer:255.255.255.255

Correct Answer:

Page 8: Windows 2008 3 4 5

255.255.255.255

Question 26

10 out of 10 points

Match description to terminology.Answer

QuestionCorrect Match

Selected Match

The __________ Address Resolution Protocol was designed for diskless workstations that had no means of permanently storing their TCP/IP settings. RARP, as its name suggests, was essentially the opposite of Address Resolution Protocol.

B.Reverse

 B.Reverse

Using __________ File Transfer Protocol, a lightweight version of FTP that uses the UDP protocol, a workstation also can download an executable boot file from a BOOTP server.

C.Trivial

 C.Trivial

DHCP functions at the __________ layer of the Open System Interconnection (OSI) reference model.

E.Application

 E.Application

All DHCP messages are carried in User Datagram Protocol datagrams using the well-known port numbers 67 (from the server) and __________ (to the client).

G.68

 G.68

A DHCP client first attempts to reacquire its lease at half the lease time, which is known as __________.

D.T1

 D.T1

     Active Directory must be present to __________ DHCP servers and block unauthorized servers.

F.authorize

 F.authorize

To allow for the possibility that some IP addresses in the scope might already be assigned and in use, the DHCP administrator can specify a(n) __________ range, which is one or more IP addresses in the scope that are not handed out to DHCP clients.

I.exclusion

 I.exclusion

     The DHCP server database in the Windows Server 2008 family uses the Joint __________ Technology storage engine.

H.Engine

 H.Engine

A(n) __________ file indicates the location of the last information that was successfully written from the transaction logs to the database.

A.checkpoint

 A.checkpoint

Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address __________ within the scope.

J.pool

 J.pool

Question 27

9 out of 10 points

Page 9: Windows 2008 3 4 5

Match description to terminology.

Answer

QuestionCorrect Match

Selected Match

DHCP is defined by the Internet Engineering Task Force (IETF) in which two Requests for Comments?

B.

2131 and 2132

 B.

2131 and 2132

All DHCP messages are carried in what protocol? D.

UDP

 D.

UDP

What is either a host or IP router that listens for DHCP (and BOOTP) client messages being broadcast on a subnet and then forwards those DHCP messages to a DHCP server?

L.

DHCP relay agent

 L.

DHCP relay agent

When the DHCP client and DHCP server are on the same subnet, what is a message sent by the DHCP Server?

H.DHCPACK

 H.DHCPACK

What is a type of DHCP option in Windows Server 2008? E.class

 C.1542 and 2606

When creating a reservation, what must you know for each device for which you are reserving an address?

I.

MAC address

 I.

MAC address

What is another name for a unauthorized DHCP server? K.rogue DHCP

 K.rogue DHCP

Since the advent of TCP/IP, several solutions have been developed to address the challenge of configuring TCP/IP settings for organizations with a large number of workstations. Name one of the solutions.

F.BOOTP

 F.BOOTP

What will happen if you install a DHCP server on a network without Active Directory?

J.No authorization

 J.No authorization

What is a requirement of a DHCP reservation? A.

Within the scope

 A.

Within the scope

CHAPTER 4: MANAGING THE DNS ROLE

Page 10: Windows 2008 3 4 5

1 out of 1 points

To conserve disk space, DNS servers store only the most recent updates.Answer

Selected Answer:  True

Correct Answer:  True

Question 2

1 out of 1 points

The primary DNS server for a zone is not required to perform an incremental zone transfer.Answer

Selected Answer:  True

Correct Answer:  True

Question 3

1 out of 1 points

For replication of Active Directory–integrated zones, DNS notification is needed.Answer

Selected Answer:  False

Correct Answer:  False

Question 4

1 out of 1 points

Scavenging is enabled by default.Answer

Selected Answer:  False

Correct Answer:  False

Question 5

0 out of 1 points

As long as the TTL for a cached resource record does not expire, a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.

Page 11: Windows 2008 3 4 5

Answer

Selected Answer:  False

Correct Answer:  True

Question 6

1 out of 1 points

In a Windows Server 2008 network, the primary means of locating network devices and network services is through the use of __________.Answer

Selected Answer:DNS

Correct Answer:DNS

Question 7

1 out of 1 points

In what year was DNS introduced?Answer

Selected Answer:1984

Correct Answer:1984

Question 8

1 out of 1 points

Which of the following is not considered a top-level domain?Answer

Selected Answer:.nato

Correct Answer:.nato

Question 9

Page 12: Windows 2008 3 4 5

1 out of 1 points

What type of zone might a DNS server host?Answer

Selected Answer:primary

Correct Answer:primary

Question 10

1 out of 1 points

Which of the following is not a forward or reverse lookup zone type?Answer

Selected Answer:integrated

Correct Answer:integrated

Question 11

1 out of 1 points

Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?Answer

Selected Answer:standard primary zone

Correct Answer:standard primary zone

Question 12

1 out of 1 points

Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?Answer

Selected Answer:stub zone

Page 13: Windows 2008 3 4 5

Correct Answer:stub zone

Question 13

1 out of 1 points

Which zone enables a host to determine another host’s name based on its IP address?Answer

Selected Answer:reverse lookup zone

Correct Answer:reverse lookup zone

Question 14

1 out of 1 points

What are two types of Active Directory–integrated zones?Answer

Selected Answer:forward and reverse

Correct Answer:forward and reverse

Question 15

1 out of 1 points

Active Directory–integrated zones follow what type of update model?Answer

Selected Answer:multimaster

Correct Answer:multimaster

Question 16

1 out of 1 points

Page 14: Windows 2008 3 4 5

Where are zone transfers initiated?Answer

Selected Answer:secondary server

Correct Answer:secondary server

Question 17

1 out of 1 points

Which operating system does not support zone transfers?Answer

Selected Answer:Windows NT

Correct Answer:Windows NT

Question 18

1 out of 1 points

DNS zone file resource records are represented as __________.Answer

Selected Answer:text entries

Correct Answer:text entries

Question 19

1 out of 1 points

Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded?Answer

Selected Answer:TTL

Correct Answer:TTL

Page 15: Windows 2008 3 4 5

Question 20

1 out of 1 points

After sending a zone transfer request, which option shows how long (in seconds) the zone’s secondary server waits before sending another request?Answer

Selected Answer:Retry

Correct Answer:Retry

Question 21

0 out of 1 points

What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?Answer

Selected Answer:5 seconds

Correct Answer:3 seconds

Question 22

0 out of 1 points

What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?Answer

Selected Answer:3 seconds

Correct Answer:15 seconds

Question 23

1 out of 1 points

Page 16: Windows 2008 3 4 5

A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.Answer

Selected Answer:domain controllers in the forest

Correct Answer:domain controllers in the forest

Question 24

1 out of 1 points

You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries __________.Answer

Selected Answer:both B and C

Correct Answer:both B and C

Question 25

1 out of 1 points

Nslookup can be used for which of the following?Answer

Selected Answer:all of the above

Correct Answer:all of the above

Question 26

10 out of 10 points

Match description to technology name.Answer

QuestionCorrect Match

Selected Match

A DNS zone stored in Active Directory can take C.  C.

Page 17: Windows 2008 3 4 5

advantage of increased security by modifying its __________ access control list.

discretionary discretionary

An Active Directoryintegrated __________ lookup zone is used for resolving an IP address to a name and is similar to the standard in-addr.arpa zone.

B.reverse

 B.reverse

A DNS server on a network is designated as a(n) __________ by having the other DNS servers in the network forward the queries they cannot resolve locally to that DNS server.

J.forwarder

 J.forwarder

__________ forwarding enables a DNS server to forward queries to other DNS servers based on the DNS domain names in the queries.

A.Conditional

 A.Conditional

The __________ command uses the local server to get the address of the server to which it must switch.

I.lserver

 I.lserver

__________ is provided as a built-in command-line tool for managing DNS servers in Windows Server 2008.

G.

Dnscmd

 G.

Dnscmd

     DNS round __________ is a load-balancing mechanism used by DNS servers to share and distribute network resource loads.

E.robin

 E.robin

The process of mapping an IP address to a computer name is called name __________.

F.resolution

 F.resolution

You can add additional NS records by using DNS Manager or the __________ command-line tool.

D.dnscmd

 D.dnscmd

     When you are in interactive mode, you can also use the __________ command to configure Nslookup options that determine how the resolver carries out queries.

H.Set

 H.Set

Question 27

8 out of 8 points

Match the description to the terminology.Answer

Question Correct Match Selected Match

    What is a hierarchical, tree-structured list of DNS host names, starting at an unnamed root that is used for all DNS operations?

C.

DNS namespace

 C.

DNS namespace

Page 18: Windows 2008 3 4 5

What is a read-only copy of the standard primary DNS zone?

A.standard secondary zone

 A.standard secondary zone

      What are zones that are stored in Active Directory referred to as?

D.

Active Directory–integrated zones

 D.

Active Directory–integrated zones

What is the complete or partial transfer of all data in a zone from the primary DNS server hosting the zone to a secondary DNS server hosting a copy of the zone?

E.

zone transfer

 E.

zone transfer

What is an update to the original DNS protocol specification that permits a means of initiating notification to secondary servers when zone changes occur?

H.

DNS Notify

 H.

DNS Notify

What resource record indicates the starting point or original point of authority for information stored in a zone?

F.

SOA

 F.

SOA

What type of resource record specifies a server that is willing to act as a mail server for a DNS name?

B.MX

 B.MX

What resource records enable you to specify the location of servers that provide a specific network service over a specific protocol and in a specific domain?

G.SRV

 G.SRV

CHAPTER 5:ROUTING AND REMOTE ACCESS

Question 1

0 out of 1 points

When most traffic is synchronous, as in voice and video transmissions, VPN is your best option.Answer

Selected Answer:  True

Correct Answer:  False

Page 19: Windows 2008 3 4 5

Question 2

0 out of 1 points

By default, the Callback Options setting is configured as No Callback.Answer

Selected Answer:  False

Correct Answer:  True

Question 3

1 out of 1 points

By using the Routing and Remote Access service, Windows Server 2008 can be configured as a router and remote access server.Answer

Selected Answer:  True

Correct Answer:  True

Question 4

1 out of 1 points

A hub examines the destination and source address of an incoming data frame and forwards the frame to the appropriate destination port according to the destination address.Answer

Selected Answer:  False

Correct Answer:  False

Question 5

1 out of 1 points

A static-routed IP environment is best suited to small, single-path, static IP internetworks.Answer

Selected Answer:  True

Correct Answer:  True

Question 6

Page 20: Windows 2008 3 4 5

1 out of 1 points

Routers are considered components of which layer?Answer

Selected Answer:layer 3

Correct Answer:layer 3

Question 7

1 out of 1 points

For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?Answer

Selected Answer:10

Correct Answer:10

Question 8

0 out of 1 points

Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.Answer

Selected Answer:DHCP Relay Agent

Correct Answer:OSPF

Question 9

1 out of 1 points

How can you view the IP routing table?Answer

Selected Answer:

Page 21: Windows 2008 3 4 5

both A & B

Correct Answer:both A & B

Question 10

1 out of 1 points

Which entries refer to a separate multicast route?Answer

Selected Answer:224.0.0.0

Correct Answer:224.0.0.0

Question 11

0 out of 1 points

Which of the following is the limited broadcast address that is general for all networks and routers?Answer

Selected Answer:    [None Given]

Correct Answer:255.255.255.255

Question 12

1 out of 1 points

Which column of the IP Routing Table indicates the gateway value for each routing table entry?Answer

Selected Answer:third

Correct Answer:third

Question 13

Page 22: Windows 2008 3 4 5

0 out of 1 points

Of the four types of routes that can be found in a routing table, which of the following cannot be found?Answer

Selected Answer:directly attached network routes

Correct Answer:client routes

Question 14

1 out of 1 points

Which option enables internal clients to connect to the Internet using a single, external IP address?Answer

Selected Answer:network address translation

Correct Answer:network address translation

Question 15

1 out of 1 points

What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet?Answer

Selected Answer:virtual private network

Correct Answer:virtual private network

Question 16

1 out of 1 points

An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items?Answer

Page 23: Windows 2008 3 4 5

Selected Answer:all of the above

Correct Answer:all of the above

Question 17

1 out of 1 points

What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?Answer

Selected Answer:basic encryption

Correct Answer:basic encryption

Question 18

1 out of 1 points

Which mutual authentication method offers encryption of both authentication data and connection data?Answer

Selected Answer:MS-CHAPv2

Correct Answer:MS-CHAPv2

Question 19

0 out of 1 points

Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?Answer

Selected Answer: Extensible Authentication Protocol-Message Digest 5 Challenge

Handshake Authentication Protocol (EAP-MD5 CHAP)

Correct

Page 24: Windows 2008 3 4 5

Answer: Challenge Handshake Authentication Protocol (CHAP)

Question 20

0 out of 1 points

Which generic authentication method does not encrypt authentication data?Answer

Selected Answer:Shiva Password Authentication Protocol (SPAP)

Correct Answer:Password Authentication Protocol (PAP)

Question 21

1 out of 1 points

802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.Answer

Selected Answer:verifier

Correct Answer:verifier

Question 22

1 out of 1 points

What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point?Answer

Selected Answer:supplicant

Correct Answer:supplicant

Question 23

1 out of 1 points

Page 25: Windows 2008 3 4 5

Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)?Answer

Selected Answer:MS-CHAPv1

Correct Answer:MS-CHAPv1

Question 24

1 out of 1 points

One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option?Answer

Selected Answer:Client Must Supply an IP Address

Correct Answer:Client Must Supply an IP Address

Question 25

1 out of 1 points

By default, the Callback Options setting is configured as __________.Answer

Selected Answer:No Callback

Correct Answer:No Callback

Question 26

10 out of 10 points

Match the description with terminology.

Answer

Question Correct Selected

Page 26: Windows 2008 3 4 5

Match Match

Open __________ Path First was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks.

H.Shortest

 H.Shortest

The first column in the routing table indicates the network __________.

A.destination

 A.destination

The final column in the routing table corresponds to the routing table entry’s __________.

J.metric

 J.metric

For remote network routes, the __________-Hop field is a local router’s IP address.

B.Next

 B.Next

The __________ protocol translates internal, private IP addresses to external, public IP addresses and vice versa.

E.NAT

 E.NAT

     After a user submits credentials to create a remote access connection, the remote access connection must be authorized by a Windows Server 2008 server running the Network __________ Server RRAS role service.

D.Policy

 D.Policy

     __________ is the process of verifying that an entity or object is who or what it claims to be.

F.Authentication

 F.Authentication

As a final step in configuring the Network Policy Server to provide authentication, authorization, and accounting for your remote access clients, you will also need to configure

__________.

I.accounting

 I.accounting

__________ addresses include specific subnet broadcast addresses, such as 192.168.0.255.

G.Broadcast

 G.Broadcast

You can view the IP routing table by using the Routing and Remote Access console or the __________ prompt.

C.command

 C.command

Question 27

8 out of 8 points

Match the descripton to terminology.Answer

Question Correct Selected

Page 27: Windows 2008 3 4 5

Match Match

802.1X provides port-based security through the use of an Authentication Server and what in another other components?

E.supplicant

 E.supplicant

What is one encryption options available in the Encryption tab?

H.None

 H.None

802.1X can allow or deny access on the basis of a physical port (such as someone plugging into a single wall jack using an Ethernet cable) or a logical port (such as one or more people connecting to a wireless access point using the WiFi cards in one or more laptops or handheld devices). This occurs because 802.1x is based on what?

G.port based

 G.port based

What is a rule for evaluating remote connections? B.

NPS Network Policy

 B.

NPS Network Policy

What type of server can be used to centralize remote access authentication, authorization, and logging?

F.RADIUS

 F.RADIUS

What protocol enables private networks to connect to the Internet?

C.NAT

 C.NAT

What was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks?

A.OSPF

 A.OSPF

      What is a route to a specific IP address? D.

host route

 D.

host route


Recommended