70-642 Flashcards

1
Q

Which command is used to assign different lease durations for desktop and portable computers

A

The IPconfig /setclassID command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when can Kerberos authentication be used between two computers

A

When members are from the same domain, or when members are from domains with trust relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the class A address information

A
0.0.0.0- 126.255.255.255
8 bit network number
24 bit host number
126 subnets
16,777,216 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which industry-standard protocol can be used to encrypt any type of traffic between two endpoints

A

Internet protocol security (IPSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the user class option in dynamic host configuration protocol (DHCP)

A

You can group computers with similar configuration needs within one scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the class C information?

A
192.0.0.0- 223.255.255.254
24 bit network number
8 bit host number
2,097,152 subnets
254 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of IPv6 address is 2001: DB8:2A5C:F482:2B0:D0AF:FBE9:4943

A

A global unicast IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the private IP addresses

A

Class A 10.0.0.0 - 10.255.255.254
Class B 172.6.0.1 - 172.31.255.254
Class C 192.168.0.1 - 192.168.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the certificate-based isolation policy design differ from domain isolation policy design and server isolation policy design

A

Certificate-based isolation policy design uses certificates and can authenticate computers that use another operating system or are not domain members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which implementation of Internet protocol security (IP sac) provides data source authentication data integrity and anti-replay protection for the entire packet

A

IP SEC authentication header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the unspecified address (0:0:0:0:0:0:0:0 or::) indicate

A

It indicates the absence of an address. It is the equivalent to the IPV for unspecified address 0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many IPv6 subnets can be created from the subnet address prefix of /55 using the global routing prefix

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the address prefix for all site-local IPv6 addresses

A

FEC0::/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the class B address information

A
128.0.0.0 - 191.0.0.0
16 bit network number
16 bit host number
65,534 subnets
254 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the automatic private IP address (APIPA) range

A

169.254.0.0 /24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Internet protocol security (IPsec) policy attempts to communicate with other computers without using (IPsec), but will use (IPsec) to communicate with those computers that request (IPsec)

A

The client (respond only) (IPsec) policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why should you create DHCP reservation on all DHCP servers

A

To ensure that the computer for which the addresse is reserved receives the appropriate IP address regardless of which DHCP computer DHCP client contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which Internet protocol security (IPsec) policy only requests encrypted communication, but will allow unencrypted communication. If the other computer cannot communicate using (IPsec)

A

The server (request security) (IPsec) policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which command would add a persistent route to the 10.51.0.0/16 network that connects through the router interface of 10.23.0.1

A

Route -p add 10.51.0.0 mask 255.255.0.0 10.23.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which utility is used to troubleshoot NetBIOS name resolution problems

A

The Nbtstat command-line utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What routing protocol should you install on a Windows server 2008 are two server that is configured as a router to support multicasting applications

A

The IGMP routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which type of IPv6 address is used when communicating with neighboring nodes on the same subnet

A

A link-local address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which implementation of Internet protocol security (IPsec) provides data confidentiality data source authentication data integrity and anti-relay protection from part of the packet

A

(IPsec) encapsulating (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the netsh interface IPv6 install command do

A

It allows you to install IPv6 on computers running Windows XP SP1 or later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When using DHCP V6 how should you set the M and O flags to ensure that the clients receive IP addresses, but not configuration information

A

Set the M flag to 1 and the O to 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which scripting tool allows you to configure and monitor Windows server 2008 R2 networking components

A

The Netsh command-line scripting utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How many subnets could be created from this network ID or network number and associated subnet mask 129.168.10.0/28

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

If the global address prefix assigned is 3FFF: 2FFA: 3B:A000/52 and you need eight subnets are the eight subnetted address prefixes that can be used

A
3FFF:2FFA:3B:A000::/55
3FFF:2FFA:3B:A200::/55
3FFF:2FFA:3B:A400::/55
3FFF:2FFA:3B:A600::/55
3FFF:2FFA:3B:A800::/55
3FFF:2FFA:3B:AA00::/55
3FFF:2FFA:3B:AC00::/55
3FFF:2FFA:3B:AE00::/55
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What should you do to ensure that a DHCP server is automatically authorized when you add the server to the DHCP console for the first time

A

Install DHCP on a computer that is also running as a domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which command is used to remove a specific route or a number of routes

A

Route delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which, Netsh parameter is used to specify a context

A

The -c switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What must you do to ensure that your’s DHCP server is able to assign IP addresses to DHCP clients on the network

A

Authorize the DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In IPv6. What does the 0:0:0:0:0:0:0:1 or ::1 address indicate

A

A loopback interface transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the easiest way to configure dynamic host configuration protocol (DHCP) to assign different lease durations to computers in the same scope

A

Implement user classes in the zone for any computers that should receive a different lease duration configure the computers that need the new lease duration to be members of the new user class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which command is used to make changes to an existing route

A

Route change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which registry key can be edited to prevent users from making an IPv6 connection over nontitle (dial-up) connection

A

HKEY_LOCAL MACHINE/SYSTEM/currentcontrolset/services/TCPIP6/parameters/disabledcomponents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

If (IPsec) is not an option for encrypting data as it crosses the network. What can be used to encrypt data retrieved from an IIS server

A

A secure sockets layer (SSL) connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Why are all authentication methods considered safe (even clear tax). When you are using L2TP/IPsec as the remote access protocol

A

The authentication occurs AFTER the establishment of the secure tunnel so takes place within the tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which command is used to add a route

A

Route add

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which Netsh parameter is used to specify a remote computer to be monitored

A

The-r switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

If a DHCP server is connected to two subnets. What should you do to ensure that the DHCP server does NOT assign addresses on one of the subnets

A

Unbind DHCP from the network interface card (NIC) connected to the subnet to which you do not want to assign IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which IPv6 subneted address prefix would yield 25 subnets

A

/53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which console should you use to create a new Internet protocol security (IPsec) policy

A

The IP security policies console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which tool should you use to remove a filter from an Internet protocol security (IPsec) policy

A

The IP security policies tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which remote access protocol can be used to provide data integrity and security user and/or computer authentication and can be used with either certificates or pre-shared keys

A

L2TP/IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What should you configure on DHCP server to prevent getting IP addresses conflicts. After you restore your DHCP server from backup

A

Set the conflict detection value between the value of 1 and 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which Netsh parameter is used to specify an alias file to be executed

A

The -a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What different operations are available for RADIUS accounting logging

A

You can configure SQL server logging text file logging or combinations of these 2 logging types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

For IPv6 systems that cannot store any historical information for generating future interface identifier values. What is generated each time the IPv6 protocol is initialized

A

A new random interface identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What command will allow you to copy outbound and inbound firewall rules from a Windows server 2008 R2 server

A

Netsh advfirewall export and Netsh advfirewall import

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What should you do to ensure that all group policy settings are reapplied to a computer

A

Reboot the computer (some group policy settings require reboot of the computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the address prefix of all unique local IPv6 addresses

A

FC00::/7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

If you need to authenticate accounts that are not members of your domain or a trusted domain, which authentication method should you use when you need to ensure that all data, including the computer’s identity is encrypted

A

Certification authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

After installing the DHCP server in creating the scope and scope options what to additional configurations must be performed manually before the server can begin issuing addresses

A

Authorize the server and activate the scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

You have been issued in IPV for network address or network ID of 192.168.2.0 what subnet mask would allow for at least 60 hosts on each subnet

A

255.255.255.192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the address prefix for all link local IPv6 addresses

A

FE80::/64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

When editing the HKEY_LOCAL_MACHINE\SYSTEM\currentcontrolset\TCPIP6\parameters\disabledcomponents registry key to prevent users from making an IPv6 connection over a non-tunnel (dial-up) connection which of the 5 bits used to set the disabledcomponents registry key is utilized

A

Bit 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What does the -p parameter in the command route -p add 10.51.0.0 mask 255.255.0.0 space 10.23.0.1 accomplish

A

It causes the route to remain in the routing table, even when the computer is rebooted, also known as a persistent route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which utility should you used to compact the dynamic host configuration protocol (DHCP) database

A

The jetpack utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which utility is used to display protocol statistics and current’s TCP/IP connections

A

The NetStat command-line utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which subnet prefix could be placed on a server to allow it to communicate with all subnets in an IPv6 network where the subnet prefix on the subnet. It networks is/53

A

/48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What authentication mode settings can be used in a connection security rule when (IPsec) tunneling is used

A

Require inbound and outbound or require inbound and clear outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which Netsh parameter is used to specify a script file to be executed

A

The -f switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which type of IPv6 address is equivalent to the IPV for private address space

A

A unique-local address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the address prefix for currently assigned IPv6 global addresses

A

2000::/3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which for command should you run to compact the dynamic host configuration protocol (DHCP) database

A

CD %SYSTEMROOT%\SYSTEM32\DHCP
net stop dhcpserver
jetpack DHCP.mbd tempdatabse_name.mdb
net start dhcpserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What UDP ports must you open a firewall if you have a Windows deployment service (WDS) server on one subnet and an DHCP server on another subnet

A

Port 67 port 69 and port 4011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

When using DHCP to issue IPv6 addresses. What will be the result if the M flag is set to 0 and the capital O flag is set to 1

A

DHCP V6 will assign other configuration settings, but not addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which command is used to install IPv6 on Windows XP computers with no service packs installed

A

The IPv6 install command (which is been replaced by the Netsh tool for the later versions of Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which Internet protocol security (IPsec) policy requires that (IPsec) be used to protect all communication except for initial connection request

A

The secure server (require security) IPSEC policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which command displays a list of interfaces and active routes included in the routing table

A

The route print command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which commandline tool can be used to determine the server roles that are currently installed on Windows server 2008 R2 server core installation

A

Oclist.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which parameter of the dmscmd zoneadd command is used to create a secondary zone

A

/Secondary master_IP_address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which type of DNS zone can be used to reduce the load on network bandwidth DNS replication and domain controllers are deployed at each location

A

In active directory-integrated zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

With commandline tool used to install all on Windows server 2008 R2 server core installation

A

ocsetup.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

In which two types of zones configure aging and scavenging of steel records

A

Primary zones or active directory integrated zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What command is used to immediately reflect changes made to a zone

A

Run the dnscmd command with the /zonerefresh option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Where is the DNS log stored

A

In the %systemroot%\system32\DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What are two ways to increase the size of the soccer pool size in a DNS server in order to prevent cache poisoning attacks

A

Use the dnscmd command with the /config and /socketpoolsize parameters. You can also use regedit to increase the value of the socket poolside’s registry key under HKEY_LOCAL_MACHINE\SYSTEM\currentcontrolset\services\DNS\parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which feature of DNS provides a mechanism for performing cleanup, removal of still records can accumulate in zone data

A

Aging and scavenging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is the purpose of the forwarders tab of the DNS servers properties dialog box

A

Allows an administrator to configure DNS servers to which requests for specific zone data should be forwarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which DNS zone type supports secure dynamic updates

A

Active directory integrated DNS zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which service dynamically maps NetBIOS names to IP addresses

A

Windows Internet name service (WINS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which DNS option uses DNS dynamic update to register the IP addresses and primary domain name of the computer in DNS

A

The register DNS connections addresses in DNS option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What feature of a Windows server 2008 are to DNS server forces the DNS server not to overwrite cached records for the duration of the time to live (TTL) value

A

Cache locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which IP config parameter clears the contents of the DNS cache

A

The /flushdns parameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the purpose of enable automatic scavenging of the stale records check box on the advanced tab of the DNS server’s property dialog box

A

To remove old records from the DNS zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

When more than one DNS server is configured on a DNS client how do you configure the client to contact the second DNS server listed first

A

Configure the IP address of the second DNS server as the first listed DNS server, and the IP address of the first DNS server is the second listed DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which option allows you to enable automatic scavenging of stale records on the DNS server

A

The enable automatic scavenging of stale records option in the advanced tab in the properties dialog box of the DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which command is used for manual dynamic registration of the DNS names and IP addresses that are configured at a computer

A

The IPconfig /register DNS command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which type of DNS resource record specifies the DNS server that is the authoritative data source for a domain

A

The start of authority (SOA) resource record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Where does the HOSTS file need to reside on a Windows 2008 server R2 server

A

The \windows\system32\drivers\etc folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which protocol helps resolve the name of neighboring computers without using a DNS server

A

Link-local multicast name resolution (LLMNR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which type of DNS resource record configures a host to use an alias name

A

A canonical name (CNAME) record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is the purpose of the root hints tab of the DNS servers property box

A

It allows DNS servers to discover authoritative servers that manage domains that are located at a higher level in the DNS domain namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What determines when the cached records expire

A

The time to live (TTL) specified on the DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which parameter of the dnscmd zoneadd command is used to create an active directory integrated zone

A

/dsprimary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which DNS server roles feature provides single label name resolution for large enterprise networks that do not contain a WINS server

A

The globalnames zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which type of DNS resource record specifies mail exchanger servers for a domain

A

Mail exchange (MX) resource records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What should you do if the root hints file on the DNS server is presenting DNS requests from being forwarded to the correct DNS server

A

Delete the root hints file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which type of WINS clients use a hybrid form of WINS resolution and attempt to use P-node resolution followed by b- node resolution

A

H-node clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Which two features must your domain controller support for DNS name resolution

A

SRV records and dynamic updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which type of WINS clients use broadcasts for WINS resolution

A

B-node clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which type of DNS records allow a DNS server to track network servers that offer special functionality such as domain controllers

A

SRV records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is the function of the DNS forwarder

A

The DNS forwarder allows the DNS server to delegate queries that it cannot answer based on its local zone information to another server on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Which type of DNS resource record is the IPv6 equivalent to an IPV four host (A) address

A

A quad-A (AAAA) record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which servers can process requests from DNS clients to update the zone when using active directory integrated zones

A

Any of the primary servers for the active directory integrated zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Which three types of DNS records are required to support DNS security (DNSsec) extensions

A
a public key (KEY) resource record.
a signature (SIG) resource record.
a next (NXT) resource record
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Which type of WINS clients use point-to-point connections to connect directly to an WINS server

A

P-node clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which type of DNS server does not perform zone transfers

A

The caching only DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which dnscmd command parameter deletes a root zone from the DNS server

A

These /zonedelete parameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What records are contained in a stub zone

A

Host (A) records for the DNS servers that are authoritative for the zone and (NS) records for the name servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Which DNS zone contains only the resource records necessary to identify the authoritative DNS servers for the actual zone replicates only the necessary records of a master zone, such as the secondary zone

A

A stub zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Which dnscmd command parameter deletes the root zone from active directory

A

The /dsdel parameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which files stored on a local computer can be populated with a list of host names and IP addresses as an alternative to DNS

A

The hosts file

116
Q

What is the term for setting both the M and O flags to 1

A

DHCPV6 stateful

117
Q

How do you restrict zone transfers to only certain DNS servers

A

Configure the allow zone transfers only to servers listed on the names servers option on a zone

118
Q

Which type of DNS resource record contains the service type protocol priority and weight

A

A service (SRV) record

119
Q

What should you do to ensure that the DNS servers will query the WINS servers in the DNS server is unable to resolve a hosting

A

Enter the IP address of the WINS servers in the WINS tab of the DNS zones properties dialog box

120
Q

Which parameter of the dnscmd command is used to change the DNS zone type

A

Zoneresettype

121
Q

What should you do to prevent DNS zone information from being replicated to an anonymous computer

A

Specify the DNS servers were zone information will be replicated on the zone transfers tab

122
Q

Which two methods would allow the service (SRV) records for a domain controller to be re-created

A

Restart the domain controller or restart the netlogon service on the domain controller

123
Q

What should you do to ensure that both IP addresses and other configuration settings are automatically allocated to DHCP clients

A

Set both the M and O flags, 1 in the router advertisements

124
Q

Which DNS radio button option would cause any suffixes listed in the box below the radio button to be appended to DNS queries

A

The append these DNS suffixes radio button

125
Q

If multiple entries for a server type exist which DNS entry is contacted first by the DNS server

A

The entry with the lowest priority value

126
Q

Which replication method is faster and more efficient: directory replication or standard DNS replication

A

Directory replication

127
Q

Which DNS zone when configured on a DNS server that hosts a parent zone can updated list of authoritative DNS servers for a child zone

A

A stub zone

128
Q

What determines how long a DNS server caches a query result for a specified amount of time

A

The time to live (TTL) value

129
Q

What feature of a Windows server 2008 R2 DNS server ensures data integrity provides origin authority and authenticates denial of existence

130
Q

How should you configure the priority for mail exchanger (MX) resource records while configuring load-balancing for edge transport servers installed running exchange 2010 in Windows server 2008 R2

A

You should configure each MX resource record with the same priority

131
Q

Which DNS option will allow you to add a DNS suffix automatically to any DNS query you execute

A

The append primary and connection specific DNS suffixes option

132
Q

Which option causes the resolver to perform name devolution on the primary DNS suffix

A

The appended parent suffixes of the primary DNS suffix checkbox

133
Q

What should you do if you want to allow a user to manage an active directory integrated zone

A

Give the user the appropriate permissions to the zone

134
Q

What do men can reset the contents of the DNS resolver cache

A

Run the IPconfig /flushDNS command

135
Q

One of the four new features provided by the DNS server role in Windows server 2008 R2

A

Background zone loading IPv6 support, support for read-only domain controllers (RODC) and the globalname zone

136
Q

Which type of WINS replication, since any changes to the database to the replication partners

A

WINS push replication

137
Q

Which DHCP option code should you use to specify that the DHCP server should all obtain a computers fully qualified domain name (FQDN) so that the DHCP server can dynamically update DNS

A

DHCP option code 81

138
Q

What is the purpose of the interfaces tab of the DNS servers property dialog box

A

Allows an administrator to configure more than one IP address in which the DNS server will listen for DNS requests

139
Q

Which type of WINS replication request the changes to the database from the replication partner

A

WINS pull replication

140
Q

What is the purpose of the zone transfers tab of the DNS zone’s properties dialog box

A

To configure the servers that receive zone transfers

141
Q

Which parameter of the dnscmd zoneadd command is used to create a primary zone

A

/Primary /file file_name

142
Q

Which type of DNS server does not host any zones

A

Caching-only DNS server

143
Q

When a root zone exists on the DNS server. What must be done when you want to configure DNS forwarding

A

Delete the root zone

144
Q

What should you enable in the default domain controllers policy to audit and active directory integrated zone

A

Enable audit directory service access and enable auditing on the active directory integrated zone

145
Q

With DNSSEC what element performs the validation of the signature when a digital signature is sent in response to a query

A

The trust anchor

146
Q

What is the purpose of the name servers tab of the DNS zones properties dialog box

A

It configures other DNS servers that are authoritative for the zone

147
Q

Which type of WINS client choose a hybrid form of WINS resolution and attempt B-node resolution followed by P-node resolution

A

M-node clients

148
Q

Which dnscmd command parameter should you use to delete a zone

A

/Zonedelete

149
Q

In order to provide enhanced security against cache poisoning attacks, what percentage of the DNS cache is locked

150
Q

What is the purpose of the do not use recursion for this domain checkbox on the forwarders tab of the DNS servers property dialog box

A

It configures the DNS server to only use forwarders and do not attempt any further recursion. If the forwarders fail

151
Q

Which parameter of the dnscmd command is used to reload the zone

A

/Zonereload

152
Q

Which parameter of the dnscmd command is used to create a new zone

153
Q

When should you use a caching only DNS server

A

When you want the server to only store resource records information from other DNS servers caching only servers are not authoritative for any DNS zone

154
Q

Which command should you use to install the DNS server role on a Windows server 2008 server R2 core computer

A

Start /w ocsetup DNS-server-core-role

155
Q

Which parameter of the dnscmd command is used to empty the contents of the DNS resolver cache on a DNS server

A

Clearcache

156
Q

What is the purpose of the WINS tab of the DNS zones properties dialog box

A

It configures WINS lookup when a DNS server cannot resolve the name

157
Q

Which type of DNS resource record maps. An IP address to a hostname

A

A pointer (PTR) record

158
Q

Which feature of a Windows server 2008 R2 DNS server randomly picks a source port from a pool of available sockets that it opens when the DNS service starts in order to prevent cache poisoning attacks

A

Socket pooling

159
Q

Which technology allows you to create policies that define the required software and configuration of a computer that connects to the network

A

Network access protection (NAP)

160
Q

Which operating system supports network access protection (NAP) at the NAP client

A

Windows Vista, Windows 7, Windows server 2008 Windows 2008 R2 or Windows XP with service pack 3

161
Q

What should you do to disable IPv6 on all the local area network (LAN) interfaces, connections and tunnel interfaces of a Windows server 2008 R2 computer

A

Access the following registry node: HKEY_LOCAL_MACHINE\SYSTEM\currentcontrol set\services\TCPIPv6\parameters\disabledcomponents.
At a registry value of 0XFF with a DWORD registry type

162
Q

Which new virtual private network (VPN) tunnel protocol is included in Windows server 2008, to prevent VPN connectivity issues

A

Secure socket tunneling protocol (SSTP)

163
Q

What happens if you create an outbound rule for TCP/IP port 25, Windows firewall with advanced security on a Windows server 2008 R2 computer

A

The Windows server 2008 R2 computer will be unable to establish connections to the other computers across TCP port 25

164
Q

Which routing and remote access service (RRAS) feature should you configure on a Windows server 2008 R2 computer that is set up as an answering router in order to specify a time to allow the calling router access to the answering router

A

Dial-in hours

165
Q

Which of syndication method is used by the Remote Desktop connection to enhance security by reducing the risk of denial of service (DoS) attacks

A

Network level authentication (NLA)

166
Q

Which authentication protocol is supported by point-to-point protocol (PPP)-based connections in Windows server 2008 R2

A

Protected extensible authentication protocol-Microsoft challenge. Handshake authentication protocol version 2 (PEAP-MS-CHAPv2) and P EAP-transport layer security (PEAP-TLS)

167
Q

Which temporary wireless profile can be used by Windows server 2008 R 2 wireless computer to connect to a secure wireless network and joined to an active directory domain automatically

A

Bootstrap wireless profile

168
Q

Which virtual private network (VPN) tunneling protocol should you use in a Windows server 2008R2 network to ensure a successful connection for capital VPN clients and servers behind NAT routers, firewalls, or web proxies

A

Secure socket tunneling protocol (SSTP)

169
Q

Which 2 types of mappings are stored in a NAT translation table

A

Dynamic mappings and static mappings

170
Q

Which of the decay protocol should you use to implement a smart card infrastructure for virtual private network (VPN) remote access

A

Extensible authentication protocol-transport level security (EAP-TLS)

171
Q

Which wizard should you use to configure extensible authentication protocol-transport level security (EAP-TLS) to implement a smart card infrastructure for virtual private network (VPN) remote access

A

New remote access policy wizard

172
Q

What should you do to disable IPv6 on your local area network (LA and) interfaces and connections except on tunnel interfaces of the Windows server 2008 R2 computer

A

Open the local area connection properties and clear the Internet protocol version 6 (TCP/IPV6) checkbox in the list under the disconnection uses the following items section

173
Q

Which profile type is applied when a computer is connected to a private network, but not a domain environment

A

A private profile

174
Q

Which server role or roles should you install on a Windows server 2008 R2 computer to configure it as a dial-up and virtual private network (VPN) site to site demanded dial router

A

The network policy and access services role along with the routing and remote access service (RRAS)

175
Q

Which 3 authentication protocols are not supported by the point-to-point protocol (PPP)-based connections in Windows server 2008 R2

A

Shiva’s password authentication protocol (SPAP), extensible authentication protocol message digest algorithm 5-challenge handshake authentication protocol (EAP-MD5-CHAP), and MS CHAP version 1

176
Q

Which server role in Windows server 2008 and Windows server 2008 R2 allows you to install routing and remote access service (RRAS)

A

Network policy and access services

177
Q

Which checkbox in the connection tab for the default properties of a wireless network allows a Windows server 2008 R2 computer to send a probe request to discover if the nonbroadcast network is in range

A

The connect even if the network is not broadcasting checkbox

178
Q

Which Windows server 2008 feature can be configured to require that antivirus software is installed and up-to-date

A

A network health policy configured on a network policy server (NPS)

179
Q

Which checkbox in the connection tab for the default properties of a wireless network allows a Windows server 2008 are 2 computer to send a probe request to wireless networks that are configured to not broadcast theSSID provided that the computer is configured for automatic connection

A

The connect automatically when this wireless network is in range check box

180
Q

Which port numbers should be enabled on the firewall. If you want to establish VPN communications to Windows server 2008 R2 computer using IP security (IPSEC) authentication header (AH) and encapsulating security payload (ESP)

A

Ports 50 and 51

181
Q

Which port numbers should be enabled on the firewall to ensure that’s PPTP connections can be made over a VPN connection

A

Ports 47 and 1723

182
Q

Which Windows firewall option ensures that remote computers cannot connect to a computer on which the option is enabled

A

The block all incoming connection option

183
Q

Which network service. Should you install on a Windows server 2008 R2 computer to configure it as an IPV 4 router for connecting subnets of a private network

A

The routing and remote access service of the network policy and access services role

184
Q

Which authentication method does the Remote Desktop connection provide to complete the user authentication process before a full Remote Desktop connection is established

A

Network level authentication (NLA)

185
Q

Which type of network address translation (NAT) mapping ensures that the NAT table entry is deleted after a certain amount of time

A

Dynamic mappings

186
Q

Which profile type supplied when a computer is directly connected to the Internet

A

A public profile

187
Q

Which technology in Windows server 2008 and Windows server 2008 R2 can be deployed as a network access protection (NAP) health policy server

A

Network policy server (NPS)

188
Q

Which 3 components or roles must be installed for Windows server 2008 R2 to function as a network access protection (NAP) server using VPN enforcement

A

Network policy server (NPS)
routing and remote access service (RRAS)
dynamic host configuration protocol (DHCP) server

189
Q

Which network service in Windows server provides dial-up and virtual private network (VPN) services

A

Routing and remote access service (RRAS)

190
Q

Which 3 settings are required to support a bootstrap wireless profile for a wireless Windows server 2008 R2 computer

A

Protected extensible authentication protocol-Microsoft challenge handshake authentication protocol version 2 (PEAP-MS-CHAPv2) authentication.
Single sign-on enabled.
Validate RADIUS server certificate disabled

191
Q

Which routing and remote access service (RRAS) feature should you can figure on a Windows server 2008 R2 computer that is configured at a calling router in order to prevent connections at unwanted times

A

Dial-out hours

192
Q

To recover a full server that have one disk and one volume, should the new hard disk be as big as the old disk or as big as the old volume

A

As big as the old disk

193
Q

Which VSadmin.exe tool parameter is used to restore volume using a shadow copy

A

The revert shadow parameter

194
Q

Which command line utility is used to create and manage quotas. Auto apply quotas and quota templates

A

dirquota.exe

195
Q

What must you do to open an encrypted file that was transferred from another computer to a Windows server 2008 R2 file server

A

Export the EFS to think it from the source computer and import the EFS computer to the Windows server 2008 R2 file server

196
Q

Which type of filter is used to monitor the print server and its status

A

A printer filter

197
Q

Which console includes a version of the print management console that can only be used to manage the local computer

A

The server manager console

198
Q

Which utilities can you use to migrate print queues printer settings printer ports and language monitors from Windows server 2003 servers to Windows server 2008 R2 servers

A

The printer migration wizard and the printbrm.exe command-line tool

199
Q

Which command line utility is used to create and manage file screens file screen exceptions file screen templates and file groups

A

filescrn.exe

200
Q

Which scripts should be used when you want to deploy scripts based on user accounts

A

Logon scripts

201
Q

When creating a RAID 1 or RAID 5 set on a Windows server 2008 R2 computer which type of disc is required: basic or dynamic

A

The disc type must be a dynamic disk. If the disk is basic, it must be converted to dynamic

202
Q

Which service is used to protect information through persistent usage policies

A

Active directory rights management services (RMS)

203
Q

Which command-line utility is used to create and manage quotas and quota templates

A

The dirquota.exe command-line utility

204
Q

What type of file management task in file server resource manager will automatically move all files that match specific criteria to a user-defined expiration directory

A

File expiration task

205
Q

Command-line utility allows you to write a script. That backs up the SharePoint portal server databases on a schedule

A

The spsbackup.exe utility

206
Q

Which Roth is used by distributed file system (DFS) to locate the root target link target or a client

A

DFS site discovery

207
Q

Which command should be used on Windows server 2008 R2 computer to create a daily backup schedule and modify an existing backup schedule

A

The wbaadmin enabled backup command

208
Q

What ports have to open on a branch cash clients firewall. If it is configured in hosted cache mode

A

TCP port 80

209
Q

When you use a remote shared folder at the storage destination for schedule backups. What happens to the previous backup

A

It is erased by the current backup

210
Q

How do you make a standard user “delegated print administrator”

A

Assign the user the allow-manage server permission on the print server

211
Q

What feature and the DFS in Windows server 2008 R2 enables administrators to configure DFS services to be highly available

A

Windows failover clusters

212
Q

What can you use to generate a storage report on a Windows server 2008 R2 file server to identify duplicate files and dormant files

A

File server resource manager

213
Q

Which quota type will notify you, once the threshold limit is reached that will allow users to store data on the shared folder as long as the shared folder is not full

A

Soft quota

214
Q

What ports have to open on a branch cash client firewall. If it is configured in distributed cache mode

A

TCP port 80 and UDP port 3072

215
Q

Which command should be used to enable access-based enumeration in a namespace

A

The dfsutil property abde enable \ command

216
Q

Which quoted type should be used to ensure that users are not able to store more data threshold limit

A

Hard quota

217
Q

Which command is used to create a hard link for a folder in Windows server 2008 R2

A

The mklink /H C:\FLDR1 D:\FLDR1 command

218
Q

Which mode is used to ensure that the distributed file system (DFS) root servers poll their closest domain controller every hour to discover updates to the namespace

A

Scalability mode

219
Q

Which command-line tool can be used to administer the volume shadow copy service (VSS) on a Windows server 2008 R2 computer

A

The vssadmin.exe tool

220
Q

Which operating system support print driver isolation

A

Windows 7 and Windows server 2008 R2

221
Q

In which folder is the print management console available on computers running Windows Vista, Windows 7, Windows 2008, or Windows server 2008 R2

A

The administrative tools folder

222
Q

Which print driver isolation mode allows each print driver loaded into its own process space

223
Q

What kind of files cannot be classified with file server resource manager (FSRM) file classification

A

Encrypted files

224
Q

Which tool should be used in Windows server 2008 are two to configure a printer filter to run a script that restarts the principal or service

A

The print management tool

225
Q

Which command is used to create a directory symbolic link for a folder in Windows server 2008 R2

A

The mklink /D C:\FLDR1 D:\FLDR1 command

226
Q

Which command is used in Windows server 2008 R2 to configure volume shadow copy service (VSS)

A

The diskshadow command

227
Q

Which switch of the dfsrdiag.exe command computes and displays the hash value that is generated by the DFS replication service for a particular file

A

dfsrdiag.exe filehash

228
Q

What switch of the dfsrdiag.exe command provides a summary of the replication status across all connections on the specified replication group member

A

dfsrdiag.exe replstate

229
Q

Which command is used in Windows server 2008 R2 configure the context options mode and metadata file. When using volume shadow copy service (VSS)

A

The diskshadow set command

230
Q

Went to diagnostic reports can you create for DFS replication

A

Propagation report and health report

231
Q

When bitlocker is used with data drives which file systems can the drive formatted with

A

exFAT, FAT16, FAT32 or NTFS file systems

232
Q

Which utility can be used to read the printer connection settings from group policy and assign the appropriate connection to the computer

A

The pushprinterconnections.exe utility

233
Q

Which command-line utility can perform disk-related tasks that are normally performed in disk management

A

Diskpart.exe

234
Q

What feature in Windows server 2008 and Windows server 2008 R2 automatically changes your default printer. When you change networks

A

Location-aware printing

235
Q

Which tool can be used on a Windows server 2008 R2 computer to manage the printers on the network

A

The print management tool

236
Q

Which print driver isolation mode allows all print drivers to be loaded into a single shared process space that is separate from the spooler process

237
Q

Which file screening method can ensure that the user is not able to store a particular file that has been classified as a member of the blocked group

A

Active screening

238
Q

Which distributed file system (DFS) functionality enables users to see only files and folders in the DFS namespace which they have permission to access

A

Access-based enumeration

239
Q

How can you allow DFS clients read-only access to DFS shares without changing permissions or setting complicated ACLs

A

Use read-only replicated folders

240
Q

What is the purpose of disk quotas

A

To manage the amount of hard drive space that an individual can use

241
Q

When bitlocker is used with operating system drives which file systems can the drive be formatted with

A

The NTFS file system only

242
Q

Which command-line utility is used to configure report parameters and generate storage reports on demand

A

storrept.exe

243
Q

Which command line tool is used to backup and restore Windows SharePoint services, websites and my site personal sites

A

Thestsadm.exe command-line tool

244
Q

Which command is used to create a directory junction for a folder in Windows server 2008 R2

A

The mklink /J C:FLDR1 D:\FLDR1 command

245
Q

What settings and shared folders prevents the display of folders or other shared resources that the user does not have rights to access

A

Access-based enumeration (ABE)

246
Q

What service ensures that any NTFS permission changes you make on one member of the replicas that are automatically replicated to the other members

A

File replication service (FRS)

247
Q

What She statement should you use with the nmcap.exe command to capture only packets that are used with the Remote Desktop services to file named test.cap

A

nmcap /network * /capture quote (TCP.port = = 3389)” /file test.cap

248
Q

Which option in Windows server 2008 R2 be used to ensure that events are delivered to the collector computer as soon as possible

A

The minimize latencyevent delivery optimization option

249
Q

If you configure port 8524 as the custom port for HTTPS on a Windows server update services (WSUS) server which port will it automatically use for HTTP

250
Q

Into which mode does network monitor placed the network adapter of the computer to capture network frames

A

Promiscuous mode

251
Q

Which option in Windows reliability and performance monitor should be selected to start reliability monitor

A

Monitoring tools reliability monitor

252
Q

What three things must you do to ensure that certain computers receive updates from a WSUS server via client-side targeting

A
  1. specify how you are going to assign computers to the computer groups.
  2. create the computer group in WSUS
  3. move the computers into groups
253
Q

Which feature in Windows server is a reserved area in memory for holding incoming data

A

A capture buffer

254
Q

Which relationship should be used when you have two windows software update service (WSUS) servers and you want one WSUS sever to receive updates from another WSUS server

A

And upstream/downstream WSUS relationship

255
Q

Which service in Windows server 2008 and Windows server 2008 are to provide access to WMI data and enables the bank collection and subscription to events

A

Windows remote management (WinRM) service

256
Q

Which service in Windows server 2008 are two supports logging events querying events, describing to events, archiving event logs and managing event metadata

A

Windows event log service

257
Q

What command translate Windows events into SNMP traps

A

The evntcmd command

258
Q

Which feature in Windows server 2008 are two allows roaming Windows software update service (WSUS) clients can be directed to the closest WSUS server based on IP subnets

A

Netmask ordering

259
Q

Which file contains the source computers from which the events should be collected

A

The subscription file

260
Q

Which tool is used in Windows server 2008 R2 to retrieve information about event logs and publishers

A

The wevtutil tool

261
Q

Which option in Windows server compares the network traffic with a defined set of criteria and copies frames that meet the criteria to the temporary capture file

A

The capture filter

262
Q

In which mode does the network adapter card copy all frames the Passover the network to a local buffer, regardless of the destination address

A

Promiscuous mode

263
Q

What number value in the system stability index is the most stable weighted measurement

A

10 is the most stable

264
Q

Which Windows update classification downloads only the updates related to non-security bugs

A

Critical updates

265
Q

Which feature in Windows 7 and Windows server 2008 R2 enables you to collect copies of events from multiple remote computers and store them locally

A

Event viewer subscriptions

266
Q

Which view is simply a filtered view of all event viewer data for a particular log

A

A custom view

267
Q

Which service in Windows server 2008 R2 allows processes to start under alternate credentials

A

The secondary logon service

268
Q

Which option in network monitor can be used to specify the types of display data such as protocols and computer addresses that you want to save to a file

A

Display filters

269
Q

Which setting in a group policy object should you configure to ensure that Windows 7, or Windows 2008 R2 computer receives updates from a WSUS server named server01.nutex.com

A

The specify intranet Microsoft update service location policy-setting under the computer configuration\policies\administrative templates\Windows components\Windows update node

270
Q

Which driver should be installed on the computers. If you want to manage the network traffic remotely

A

Network of monitor driver

271
Q

What capture statement should you use with theNMCap.exe command to capture every packet except those used with Remote Desktop services to a file named test.

A

nmcap /network * /capture “!(TCP.port = = 3389)” /file test.cap

272
Q

When using client-side targeting for Windows updates audio ensure that the client is assigned to the target group

A

Assign the computers to the target group by using either group policy or registry keys

273
Q

Which feature in network monitor in Windows servers 2008 and Windows server 2008 R2 should be used to monitor network traffic data. When a program or batch file is running

A

A capture trigger

274
Q

Which file is used to install network monitor

A

netmonsetup.exe

275
Q

Which command is used to start Windows reliability and performance monitor in the resource view page

A

The perfmon.exe command

276
Q

Which command should be run at an elevated command prompt to ensure that the computer is configured as the collector computer for event viewer subscriptions

A

The wecutil qc command

277
Q

Why should you NOT initially set a connection security rule to require authentication for inbound and outbound connections in a GPO

A

You want to ensure that all computers can communicate with IPsec with the request authentication for inbound and outbound connections setting before using require mode

278
Q

Which service in Windows server 2008 R2 allows a remote user to access the registry

A

The remote registry service

279
Q

Which option should be selected from performance monitor to view the properties of a data collector set

A

The open properties for this data collector set option

280
Q

Which checkbox should be selected in Windows reliability and performance monitor to allow all the data collectors to finish recording the latest values before the data collector set is stopped

A

The stop when all data collectors have finished checkbox

281
Q

Which URL could you configure in the domain policy to set clients to establish an SSL connection to a Windows server update service (WSUS) server named VerigonWSUS if the service resides in the default website

A

https://VerigonWSUS

282
Q

Which tool is used in Windows server 2008 R2 to manage event subscriptions

A

The wecsvc tool

283
Q

What Windows update classification downloads updates to virus or other definition files

A

Definition updates

284
Q

Which command should be run at an elevated command prompt to ensure that the computers are configured as source computers for event viewer subscriptions

A

The winrm quickconfig command

285
Q

Which tool in Windows server can be used to monitor your entire network and check the traffic being transmitted between the computers in the network

A

Network monitor