70-642 Flashcards
Which command is used to assign different lease durations for desktop and portable computers
The IPconfig /setclassID command
when can Kerberos authentication be used between two computers
When members are from the same domain, or when members are from domains with trust relationships
What is the class A address information
0.0.0.0- 126.255.255.255 8 bit network number 24 bit host number 126 subnets 16,777,216 addresses
Which industry-standard protocol can be used to encrypt any type of traffic between two endpoints
Internet protocol security (IPSEC)
What is the purpose of the user class option in dynamic host configuration protocol (DHCP)
You can group computers with similar configuration needs within one scope
What is the class C information?
192.0.0.0- 223.255.255.254 24 bit network number 8 bit host number 2,097,152 subnets 254 addresses
Which type of IPv6 address is 2001: DB8:2A5C:F482:2B0:D0AF:FBE9:4943
A global unicast IPv6 address
What are the private IP addresses
Class A 10.0.0.0 - 10.255.255.254
Class B 172.6.0.1 - 172.31.255.254
Class C 192.168.0.1 - 192.168.0.1
How does the certificate-based isolation policy design differ from domain isolation policy design and server isolation policy design
Certificate-based isolation policy design uses certificates and can authenticate computers that use another operating system or are not domain members
Which implementation of Internet protocol security (IP sac) provides data source authentication data integrity and anti-replay protection for the entire packet
IP SEC authentication header (AH)
What does the unspecified address (0:0:0:0:0:0:0:0 or::) indicate
It indicates the absence of an address. It is the equivalent to the IPV for unspecified address 0.0.0.0
How many IPv6 subnets can be created from the subnet address prefix of /55 using the global routing prefix
128
What is the address prefix for all site-local IPv6 addresses
FEC0::/10
What is the class B address information
128.0.0.0 - 191.0.0.0 16 bit network number 16 bit host number 65,534 subnets 254 addresses
What is the automatic private IP address (APIPA) range
169.254.0.0 /24
Which Internet protocol security (IPsec) policy attempts to communicate with other computers without using (IPsec), but will use (IPsec) to communicate with those computers that request (IPsec)
The client (respond only) (IPsec) policy
Why should you create DHCP reservation on all DHCP servers
To ensure that the computer for which the addresse is reserved receives the appropriate IP address regardless of which DHCP computer DHCP client contacts
Which Internet protocol security (IPsec) policy only requests encrypted communication, but will allow unencrypted communication. If the other computer cannot communicate using (IPsec)
The server (request security) (IPsec) policy
Which command would add a persistent route to the 10.51.0.0/16 network that connects through the router interface of 10.23.0.1
Route -p add 10.51.0.0 mask 255.255.0.0 10.23.0.1
Which utility is used to troubleshoot NetBIOS name resolution problems
The Nbtstat command-line utility
What routing protocol should you install on a Windows server 2008 are two server that is configured as a router to support multicasting applications
The IGMP routing protocol
Which type of IPv6 address is used when communicating with neighboring nodes on the same subnet
A link-local address
Which implementation of Internet protocol security (IPsec) provides data confidentiality data source authentication data integrity and anti-relay protection from part of the packet
(IPsec) encapsulating (ESP)
What does the netsh interface IPv6 install command do
It allows you to install IPv6 on computers running Windows XP SP1 or later
When using DHCP V6 how should you set the M and O flags to ensure that the clients receive IP addresses, but not configuration information
Set the M flag to 1 and the O to 0
Which scripting tool allows you to configure and monitor Windows server 2008 R2 networking components
The Netsh command-line scripting utility
How many subnets could be created from this network ID or network number and associated subnet mask 129.168.10.0/28
16
If the global address prefix assigned is 3FFF: 2FFA: 3B:A000/52 and you need eight subnets are the eight subnetted address prefixes that can be used
3FFF:2FFA:3B:A000::/55 3FFF:2FFA:3B:A200::/55 3FFF:2FFA:3B:A400::/55 3FFF:2FFA:3B:A600::/55 3FFF:2FFA:3B:A800::/55 3FFF:2FFA:3B:AA00::/55 3FFF:2FFA:3B:AC00::/55 3FFF:2FFA:3B:AE00::/55
What should you do to ensure that a DHCP server is automatically authorized when you add the server to the DHCP console for the first time
Install DHCP on a computer that is also running as a domain controller
Which command is used to remove a specific route or a number of routes
Route delete
Which, Netsh parameter is used to specify a context
The -c switch
What must you do to ensure that your’s DHCP server is able to assign IP addresses to DHCP clients on the network
Authorize the DHCP server
In IPv6. What does the 0:0:0:0:0:0:0:1 or ::1 address indicate
A loopback interface transfer
What is the easiest way to configure dynamic host configuration protocol (DHCP) to assign different lease durations to computers in the same scope
Implement user classes in the zone for any computers that should receive a different lease duration configure the computers that need the new lease duration to be members of the new user class
Which command is used to make changes to an existing route
Route change
Which registry key can be edited to prevent users from making an IPv6 connection over nontitle (dial-up) connection
HKEY_LOCAL MACHINE/SYSTEM/currentcontrolset/services/TCPIP6/parameters/disabledcomponents
If (IPsec) is not an option for encrypting data as it crosses the network. What can be used to encrypt data retrieved from an IIS server
A secure sockets layer (SSL) connection
Why are all authentication methods considered safe (even clear tax). When you are using L2TP/IPsec as the remote access protocol
The authentication occurs AFTER the establishment of the secure tunnel so takes place within the tunnel
Which command is used to add a route
Route add
Which Netsh parameter is used to specify a remote computer to be monitored
The-r switch
If a DHCP server is connected to two subnets. What should you do to ensure that the DHCP server does NOT assign addresses on one of the subnets
Unbind DHCP from the network interface card (NIC) connected to the subnet to which you do not want to assign IP addresses
Which IPv6 subneted address prefix would yield 25 subnets
/53
Which console should you use to create a new Internet protocol security (IPsec) policy
The IP security policies console
Which tool should you use to remove a filter from an Internet protocol security (IPsec) policy
The IP security policies tool
Which remote access protocol can be used to provide data integrity and security user and/or computer authentication and can be used with either certificates or pre-shared keys
L2TP/IPSEC
What should you configure on DHCP server to prevent getting IP addresses conflicts. After you restore your DHCP server from backup
Set the conflict detection value between the value of 1 and 3
Which Netsh parameter is used to specify an alias file to be executed
The -a switch
What different operations are available for RADIUS accounting logging
You can configure SQL server logging text file logging or combinations of these 2 logging types
For IPv6 systems that cannot store any historical information for generating future interface identifier values. What is generated each time the IPv6 protocol is initialized
A new random interface identifier
What command will allow you to copy outbound and inbound firewall rules from a Windows server 2008 R2 server
Netsh advfirewall export and Netsh advfirewall import
What should you do to ensure that all group policy settings are reapplied to a computer
Reboot the computer (some group policy settings require reboot of the computer)
What is the address prefix of all unique local IPv6 addresses
FC00::/7
If you need to authenticate accounts that are not members of your domain or a trusted domain, which authentication method should you use when you need to ensure that all data, including the computer’s identity is encrypted
Certification authentication
After installing the DHCP server in creating the scope and scope options what to additional configurations must be performed manually before the server can begin issuing addresses
Authorize the server and activate the scope
You have been issued in IPV for network address or network ID of 192.168.2.0 what subnet mask would allow for at least 60 hosts on each subnet
255.255.255.192
What is the address prefix for all link local IPv6 addresses
FE80::/64
When editing the HKEY_LOCAL_MACHINE\SYSTEM\currentcontrolset\TCPIP6\parameters\disabledcomponents registry key to prevent users from making an IPv6 connection over a non-tunnel (dial-up) connection which of the 5 bits used to set the disabledcomponents registry key is utilized
Bit 4
What does the -p parameter in the command route -p add 10.51.0.0 mask 255.255.0.0 space 10.23.0.1 accomplish
It causes the route to remain in the routing table, even when the computer is rebooted, also known as a persistent route
Which utility should you used to compact the dynamic host configuration protocol (DHCP) database
The jetpack utility
Which utility is used to display protocol statistics and current’s TCP/IP connections
The NetStat command-line utility
Which subnet prefix could be placed on a server to allow it to communicate with all subnets in an IPv6 network where the subnet prefix on the subnet. It networks is/53
/48
What authentication mode settings can be used in a connection security rule when (IPsec) tunneling is used
Require inbound and outbound or require inbound and clear outbound
Which Netsh parameter is used to specify a script file to be executed
The -f switch
Which type of IPv6 address is equivalent to the IPV for private address space
A unique-local address
What is the address prefix for currently assigned IPv6 global addresses
2000::/3
Which for command should you run to compact the dynamic host configuration protocol (DHCP) database
CD %SYSTEMROOT%\SYSTEM32\DHCP
net stop dhcpserver
jetpack DHCP.mbd tempdatabse_name.mdb
net start dhcpserver
What UDP ports must you open a firewall if you have a Windows deployment service (WDS) server on one subnet and an DHCP server on another subnet
Port 67 port 69 and port 4011
When using DHCP to issue IPv6 addresses. What will be the result if the M flag is set to 0 and the capital O flag is set to 1
DHCP V6 will assign other configuration settings, but not addresses
Which command is used to install IPv6 on Windows XP computers with no service packs installed
The IPv6 install command (which is been replaced by the Netsh tool for the later versions of Windows)
Which Internet protocol security (IPsec) policy requires that (IPsec) be used to protect all communication except for initial connection request
The secure server (require security) IPSEC policy
Which command displays a list of interfaces and active routes included in the routing table
The route print command
Which commandline tool can be used to determine the server roles that are currently installed on Windows server 2008 R2 server core installation
Oclist.exe
Which parameter of the dmscmd zoneadd command is used to create a secondary zone
/Secondary master_IP_address
Which type of DNS zone can be used to reduce the load on network bandwidth DNS replication and domain controllers are deployed at each location
In active directory-integrated zone
With commandline tool used to install all on Windows server 2008 R2 server core installation
ocsetup.exe
In which two types of zones configure aging and scavenging of steel records
Primary zones or active directory integrated zones
What command is used to immediately reflect changes made to a zone
Run the dnscmd command with the /zonerefresh option
Where is the DNS log stored
In the %systemroot%\system32\DNS
What are two ways to increase the size of the soccer pool size in a DNS server in order to prevent cache poisoning attacks
Use the dnscmd command with the /config and /socketpoolsize parameters. You can also use regedit to increase the value of the socket poolside’s registry key under HKEY_LOCAL_MACHINE\SYSTEM\currentcontrolset\services\DNS\parameters
Which feature of DNS provides a mechanism for performing cleanup, removal of still records can accumulate in zone data
Aging and scavenging
What is the purpose of the forwarders tab of the DNS servers properties dialog box
Allows an administrator to configure DNS servers to which requests for specific zone data should be forwarded
Which DNS zone type supports secure dynamic updates
Active directory integrated DNS zones
Which service dynamically maps NetBIOS names to IP addresses
Windows Internet name service (WINS)
Which DNS option uses DNS dynamic update to register the IP addresses and primary domain name of the computer in DNS
The register DNS connections addresses in DNS option
What feature of a Windows server 2008 are to DNS server forces the DNS server not to overwrite cached records for the duration of the time to live (TTL) value
Cache locking
Which IP config parameter clears the contents of the DNS cache
The /flushdns parameter
What is the purpose of enable automatic scavenging of the stale records check box on the advanced tab of the DNS server’s property dialog box
To remove old records from the DNS zone
When more than one DNS server is configured on a DNS client how do you configure the client to contact the second DNS server listed first
Configure the IP address of the second DNS server as the first listed DNS server, and the IP address of the first DNS server is the second listed DNS server
Which option allows you to enable automatic scavenging of stale records on the DNS server
The enable automatic scavenging of stale records option in the advanced tab in the properties dialog box of the DNS server
Which command is used for manual dynamic registration of the DNS names and IP addresses that are configured at a computer
The IPconfig /register DNS command
Which type of DNS resource record specifies the DNS server that is the authoritative data source for a domain
The start of authority (SOA) resource record
Where does the HOSTS file need to reside on a Windows 2008 server R2 server
The \windows\system32\drivers\etc folder
Which protocol helps resolve the name of neighboring computers without using a DNS server
Link-local multicast name resolution (LLMNR)
Which type of DNS resource record configures a host to use an alias name
A canonical name (CNAME) record
What is the purpose of the root hints tab of the DNS servers property box
It allows DNS servers to discover authoritative servers that manage domains that are located at a higher level in the DNS domain namespace
What determines when the cached records expire
The time to live (TTL) specified on the DNS server
Which parameter of the dnscmd zoneadd command is used to create an active directory integrated zone
/dsprimary
Which DNS server roles feature provides single label name resolution for large enterprise networks that do not contain a WINS server
The globalnames zone
Which type of DNS resource record specifies mail exchanger servers for a domain
Mail exchange (MX) resource records
What should you do if the root hints file on the DNS server is presenting DNS requests from being forwarded to the correct DNS server
Delete the root hints file
Which type of WINS clients use a hybrid form of WINS resolution and attempt to use P-node resolution followed by b- node resolution
H-node clients
Which two features must your domain controller support for DNS name resolution
SRV records and dynamic updates
Which type of WINS clients use broadcasts for WINS resolution
B-node clients
Which type of DNS records allow a DNS server to track network servers that offer special functionality such as domain controllers
SRV records
What is the function of the DNS forwarder
The DNS forwarder allows the DNS server to delegate queries that it cannot answer based on its local zone information to another server on the network
Which type of DNS resource record is the IPv6 equivalent to an IPV four host (A) address
A quad-A (AAAA) record
Which servers can process requests from DNS clients to update the zone when using active directory integrated zones
Any of the primary servers for the active directory integrated zone
Which three types of DNS records are required to support DNS security (DNSsec) extensions
a public key (KEY) resource record. a signature (SIG) resource record. a next (NXT) resource record
Which type of WINS clients use point-to-point connections to connect directly to an WINS server
P-node clients
Which type of DNS server does not perform zone transfers
The caching only DNS server
Which dnscmd command parameter deletes a root zone from the DNS server
These /zonedelete parameter
What records are contained in a stub zone
Host (A) records for the DNS servers that are authoritative for the zone and (NS) records for the name servers
Which DNS zone contains only the resource records necessary to identify the authoritative DNS servers for the actual zone replicates only the necessary records of a master zone, such as the secondary zone
A stub zone
Which dnscmd command parameter deletes the root zone from active directory
The /dsdel parameter
Which files stored on a local computer can be populated with a list of host names and IP addresses as an alternative to DNS
The hosts file
What is the term for setting both the M and O flags to 1
DHCPV6 stateful
How do you restrict zone transfers to only certain DNS servers
Configure the allow zone transfers only to servers listed on the names servers option on a zone
Which type of DNS resource record contains the service type protocol priority and weight
A service (SRV) record
What should you do to ensure that the DNS servers will query the WINS servers in the DNS server is unable to resolve a hosting
Enter the IP address of the WINS servers in the WINS tab of the DNS zones properties dialog box
Which parameter of the dnscmd command is used to change the DNS zone type
Zoneresettype
What should you do to prevent DNS zone information from being replicated to an anonymous computer
Specify the DNS servers were zone information will be replicated on the zone transfers tab
Which two methods would allow the service (SRV) records for a domain controller to be re-created
Restart the domain controller or restart the netlogon service on the domain controller
What should you do to ensure that both IP addresses and other configuration settings are automatically allocated to DHCP clients
Set both the M and O flags, 1 in the router advertisements
Which DNS radio button option would cause any suffixes listed in the box below the radio button to be appended to DNS queries
The append these DNS suffixes radio button
If multiple entries for a server type exist which DNS entry is contacted first by the DNS server
The entry with the lowest priority value
Which replication method is faster and more efficient: directory replication or standard DNS replication
Directory replication
Which DNS zone when configured on a DNS server that hosts a parent zone can updated list of authoritative DNS servers for a child zone
A stub zone
What determines how long a DNS server caches a query result for a specified amount of time
The time to live (TTL) value
What feature of a Windows server 2008 R2 DNS server ensures data integrity provides origin authority and authenticates denial of existence
DNSSEC
How should you configure the priority for mail exchanger (MX) resource records while configuring load-balancing for edge transport servers installed running exchange 2010 in Windows server 2008 R2
You should configure each MX resource record with the same priority
Which DNS option will allow you to add a DNS suffix automatically to any DNS query you execute
The append primary and connection specific DNS suffixes option
Which option causes the resolver to perform name devolution on the primary DNS suffix
The appended parent suffixes of the primary DNS suffix checkbox
What should you do if you want to allow a user to manage an active directory integrated zone
Give the user the appropriate permissions to the zone
What do men can reset the contents of the DNS resolver cache
Run the IPconfig /flushDNS command
One of the four new features provided by the DNS server role in Windows server 2008 R2
Background zone loading IPv6 support, support for read-only domain controllers (RODC) and the globalname zone
Which type of WINS replication, since any changes to the database to the replication partners
WINS push replication
Which DHCP option code should you use to specify that the DHCP server should all obtain a computers fully qualified domain name (FQDN) so that the DHCP server can dynamically update DNS
DHCP option code 81
What is the purpose of the interfaces tab of the DNS servers property dialog box
Allows an administrator to configure more than one IP address in which the DNS server will listen for DNS requests
Which type of WINS replication request the changes to the database from the replication partner
WINS pull replication
What is the purpose of the zone transfers tab of the DNS zone’s properties dialog box
To configure the servers that receive zone transfers
Which parameter of the dnscmd zoneadd command is used to create a primary zone
/Primary /file file_name
Which type of DNS server does not host any zones
Caching-only DNS server
When a root zone exists on the DNS server. What must be done when you want to configure DNS forwarding
Delete the root zone
What should you enable in the default domain controllers policy to audit and active directory integrated zone
Enable audit directory service access and enable auditing on the active directory integrated zone
With DNSSEC what element performs the validation of the signature when a digital signature is sent in response to a query
The trust anchor
What is the purpose of the name servers tab of the DNS zones properties dialog box
It configures other DNS servers that are authoritative for the zone
Which type of WINS client choose a hybrid form of WINS resolution and attempt B-node resolution followed by P-node resolution
M-node clients
Which dnscmd command parameter should you use to delete a zone
/Zonedelete
In order to provide enhanced security against cache poisoning attacks, what percentage of the DNS cache is locked
100%
What is the purpose of the do not use recursion for this domain checkbox on the forwarders tab of the DNS servers property dialog box
It configures the DNS server to only use forwarders and do not attempt any further recursion. If the forwarders fail
Which parameter of the dnscmd command is used to reload the zone
/Zonereload
Which parameter of the dnscmd command is used to create a new zone
/Zoneadd
When should you use a caching only DNS server
When you want the server to only store resource records information from other DNS servers caching only servers are not authoritative for any DNS zone
Which command should you use to install the DNS server role on a Windows server 2008 server R2 core computer
Start /w ocsetup DNS-server-core-role
Which parameter of the dnscmd command is used to empty the contents of the DNS resolver cache on a DNS server
Clearcache
What is the purpose of the WINS tab of the DNS zones properties dialog box
It configures WINS lookup when a DNS server cannot resolve the name
Which type of DNS resource record maps. An IP address to a hostname
A pointer (PTR) record
Which feature of a Windows server 2008 R2 DNS server randomly picks a source port from a pool of available sockets that it opens when the DNS service starts in order to prevent cache poisoning attacks
Socket pooling
Which technology allows you to create policies that define the required software and configuration of a computer that connects to the network
Network access protection (NAP)
Which operating system supports network access protection (NAP) at the NAP client
Windows Vista, Windows 7, Windows server 2008 Windows 2008 R2 or Windows XP with service pack 3
What should you do to disable IPv6 on all the local area network (LAN) interfaces, connections and tunnel interfaces of a Windows server 2008 R2 computer
Access the following registry node: HKEY_LOCAL_MACHINE\SYSTEM\currentcontrol set\services\TCPIPv6\parameters\disabledcomponents.
At a registry value of 0XFF with a DWORD registry type
Which new virtual private network (VPN) tunnel protocol is included in Windows server 2008, to prevent VPN connectivity issues
Secure socket tunneling protocol (SSTP)
What happens if you create an outbound rule for TCP/IP port 25, Windows firewall with advanced security on a Windows server 2008 R2 computer
The Windows server 2008 R2 computer will be unable to establish connections to the other computers across TCP port 25
Which routing and remote access service (RRAS) feature should you configure on a Windows server 2008 R2 computer that is set up as an answering router in order to specify a time to allow the calling router access to the answering router
Dial-in hours
Which of syndication method is used by the Remote Desktop connection to enhance security by reducing the risk of denial of service (DoS) attacks
Network level authentication (NLA)
Which authentication protocol is supported by point-to-point protocol (PPP)-based connections in Windows server 2008 R2
Protected extensible authentication protocol-Microsoft challenge. Handshake authentication protocol version 2 (PEAP-MS-CHAPv2) and P EAP-transport layer security (PEAP-TLS)
Which temporary wireless profile can be used by Windows server 2008 R 2 wireless computer to connect to a secure wireless network and joined to an active directory domain automatically
Bootstrap wireless profile
Which virtual private network (VPN) tunneling protocol should you use in a Windows server 2008R2 network to ensure a successful connection for capital VPN clients and servers behind NAT routers, firewalls, or web proxies
Secure socket tunneling protocol (SSTP)
Which 2 types of mappings are stored in a NAT translation table
Dynamic mappings and static mappings
Which of the decay protocol should you use to implement a smart card infrastructure for virtual private network (VPN) remote access
Extensible authentication protocol-transport level security (EAP-TLS)
Which wizard should you use to configure extensible authentication protocol-transport level security (EAP-TLS) to implement a smart card infrastructure for virtual private network (VPN) remote access
New remote access policy wizard
What should you do to disable IPv6 on your local area network (LA and) interfaces and connections except on tunnel interfaces of the Windows server 2008 R2 computer
Open the local area connection properties and clear the Internet protocol version 6 (TCP/IPV6) checkbox in the list under the disconnection uses the following items section
Which profile type is applied when a computer is connected to a private network, but not a domain environment
A private profile
Which server role or roles should you install on a Windows server 2008 R2 computer to configure it as a dial-up and virtual private network (VPN) site to site demanded dial router
The network policy and access services role along with the routing and remote access service (RRAS)
Which 3 authentication protocols are not supported by the point-to-point protocol (PPP)-based connections in Windows server 2008 R2
Shiva’s password authentication protocol (SPAP), extensible authentication protocol message digest algorithm 5-challenge handshake authentication protocol (EAP-MD5-CHAP), and MS CHAP version 1
Which server role in Windows server 2008 and Windows server 2008 R2 allows you to install routing and remote access service (RRAS)
Network policy and access services
Which checkbox in the connection tab for the default properties of a wireless network allows a Windows server 2008 R2 computer to send a probe request to discover if the nonbroadcast network is in range
The connect even if the network is not broadcasting checkbox
Which Windows server 2008 feature can be configured to require that antivirus software is installed and up-to-date
A network health policy configured on a network policy server (NPS)
Which checkbox in the connection tab for the default properties of a wireless network allows a Windows server 2008 are 2 computer to send a probe request to wireless networks that are configured to not broadcast theSSID provided that the computer is configured for automatic connection
The connect automatically when this wireless network is in range check box
Which port numbers should be enabled on the firewall. If you want to establish VPN communications to Windows server 2008 R2 computer using IP security (IPSEC) authentication header (AH) and encapsulating security payload (ESP)
Ports 50 and 51
Which port numbers should be enabled on the firewall to ensure that’s PPTP connections can be made over a VPN connection
Ports 47 and 1723
Which Windows firewall option ensures that remote computers cannot connect to a computer on which the option is enabled
The block all incoming connection option
Which network service. Should you install on a Windows server 2008 R2 computer to configure it as an IPV 4 router for connecting subnets of a private network
The routing and remote access service of the network policy and access services role
Which authentication method does the Remote Desktop connection provide to complete the user authentication process before a full Remote Desktop connection is established
Network level authentication (NLA)
Which type of network address translation (NAT) mapping ensures that the NAT table entry is deleted after a certain amount of time
Dynamic mappings
Which profile type supplied when a computer is directly connected to the Internet
A public profile
Which technology in Windows server 2008 and Windows server 2008 R2 can be deployed as a network access protection (NAP) health policy server
Network policy server (NPS)
Which 3 components or roles must be installed for Windows server 2008 R2 to function as a network access protection (NAP) server using VPN enforcement
Network policy server (NPS)
routing and remote access service (RRAS)
dynamic host configuration protocol (DHCP) server
Which network service in Windows server provides dial-up and virtual private network (VPN) services
Routing and remote access service (RRAS)
Which 3 settings are required to support a bootstrap wireless profile for a wireless Windows server 2008 R2 computer
Protected extensible authentication protocol-Microsoft challenge handshake authentication protocol version 2 (PEAP-MS-CHAPv2) authentication.
Single sign-on enabled.
Validate RADIUS server certificate disabled
Which routing and remote access service (RRAS) feature should you can figure on a Windows server 2008 R2 computer that is configured at a calling router in order to prevent connections at unwanted times
Dial-out hours
To recover a full server that have one disk and one volume, should the new hard disk be as big as the old disk or as big as the old volume
As big as the old disk
Which VSadmin.exe tool parameter is used to restore volume using a shadow copy
The revert shadow parameter
Which command line utility is used to create and manage quotas. Auto apply quotas and quota templates
dirquota.exe
What must you do to open an encrypted file that was transferred from another computer to a Windows server 2008 R2 file server
Export the EFS to think it from the source computer and import the EFS computer to the Windows server 2008 R2 file server
Which type of filter is used to monitor the print server and its status
A printer filter
Which console includes a version of the print management console that can only be used to manage the local computer
The server manager console
Which utilities can you use to migrate print queues printer settings printer ports and language monitors from Windows server 2003 servers to Windows server 2008 R2 servers
The printer migration wizard and the printbrm.exe command-line tool
Which command line utility is used to create and manage file screens file screen exceptions file screen templates and file groups
filescrn.exe
Which scripts should be used when you want to deploy scripts based on user accounts
Logon scripts
When creating a RAID 1 or RAID 5 set on a Windows server 2008 R2 computer which type of disc is required: basic or dynamic
The disc type must be a dynamic disk. If the disk is basic, it must be converted to dynamic
Which service is used to protect information through persistent usage policies
Active directory rights management services (RMS)
Which command-line utility is used to create and manage quotas and quota templates
The dirquota.exe command-line utility
What type of file management task in file server resource manager will automatically move all files that match specific criteria to a user-defined expiration directory
File expiration task
Command-line utility allows you to write a script. That backs up the SharePoint portal server databases on a schedule
The spsbackup.exe utility
Which Roth is used by distributed file system (DFS) to locate the root target link target or a client
DFS site discovery
Which command should be used on Windows server 2008 R2 computer to create a daily backup schedule and modify an existing backup schedule
The wbaadmin enabled backup command
What ports have to open on a branch cash clients firewall. If it is configured in hosted cache mode
TCP port 80
When you use a remote shared folder at the storage destination for schedule backups. What happens to the previous backup
It is erased by the current backup
How do you make a standard user “delegated print administrator”
Assign the user the allow-manage server permission on the print server
What feature and the DFS in Windows server 2008 R2 enables administrators to configure DFS services to be highly available
Windows failover clusters
What can you use to generate a storage report on a Windows server 2008 R2 file server to identify duplicate files and dormant files
File server resource manager
Which quota type will notify you, once the threshold limit is reached that will allow users to store data on the shared folder as long as the shared folder is not full
Soft quota
What ports have to open on a branch cash client firewall. If it is configured in distributed cache mode
TCP port 80 and UDP port 3072
Which command should be used to enable access-based enumeration in a namespace
The dfsutil property abde enable \ command
Which quoted type should be used to ensure that users are not able to store more data threshold limit
Hard quota
Which command is used to create a hard link for a folder in Windows server 2008 R2
The mklink /H C:\FLDR1 D:\FLDR1 command
Which mode is used to ensure that the distributed file system (DFS) root servers poll their closest domain controller every hour to discover updates to the namespace
Scalability mode
Which command-line tool can be used to administer the volume shadow copy service (VSS) on a Windows server 2008 R2 computer
The vssadmin.exe tool
Which operating system support print driver isolation
Windows 7 and Windows server 2008 R2
In which folder is the print management console available on computers running Windows Vista, Windows 7, Windows 2008, or Windows server 2008 R2
The administrative tools folder
Which print driver isolation mode allows each print driver loaded into its own process space
Isolated
What kind of files cannot be classified with file server resource manager (FSRM) file classification
Encrypted files
Which tool should be used in Windows server 2008 are two to configure a printer filter to run a script that restarts the principal or service
The print management tool
Which command is used to create a directory symbolic link for a folder in Windows server 2008 R2
The mklink /D C:\FLDR1 D:\FLDR1 command
Which command is used in Windows server 2008 R2 to configure volume shadow copy service (VSS)
The diskshadow command
Which switch of the dfsrdiag.exe command computes and displays the hash value that is generated by the DFS replication service for a particular file
dfsrdiag.exe filehash
What switch of the dfsrdiag.exe command provides a summary of the replication status across all connections on the specified replication group member
dfsrdiag.exe replstate
Which command is used in Windows server 2008 R2 configure the context options mode and metadata file. When using volume shadow copy service (VSS)
The diskshadow set command
Went to diagnostic reports can you create for DFS replication
Propagation report and health report
When bitlocker is used with data drives which file systems can the drive formatted with
exFAT, FAT16, FAT32 or NTFS file systems
Which utility can be used to read the printer connection settings from group policy and assign the appropriate connection to the computer
The pushprinterconnections.exe utility
Which command-line utility can perform disk-related tasks that are normally performed in disk management
Diskpart.exe
What feature in Windows server 2008 and Windows server 2008 R2 automatically changes your default printer. When you change networks
Location-aware printing
Which tool can be used on a Windows server 2008 R2 computer to manage the printers on the network
The print management tool
Which print driver isolation mode allows all print drivers to be loaded into a single shared process space that is separate from the spooler process
Shared
Which file screening method can ensure that the user is not able to store a particular file that has been classified as a member of the blocked group
Active screening
Which distributed file system (DFS) functionality enables users to see only files and folders in the DFS namespace which they have permission to access
Access-based enumeration
How can you allow DFS clients read-only access to DFS shares without changing permissions or setting complicated ACLs
Use read-only replicated folders
What is the purpose of disk quotas
To manage the amount of hard drive space that an individual can use
When bitlocker is used with operating system drives which file systems can the drive be formatted with
The NTFS file system only
Which command-line utility is used to configure report parameters and generate storage reports on demand
storrept.exe
Which command line tool is used to backup and restore Windows SharePoint services, websites and my site personal sites
Thestsadm.exe command-line tool
Which command is used to create a directory junction for a folder in Windows server 2008 R2
The mklink /J C:FLDR1 D:\FLDR1 command
What settings and shared folders prevents the display of folders or other shared resources that the user does not have rights to access
Access-based enumeration (ABE)
What service ensures that any NTFS permission changes you make on one member of the replicas that are automatically replicated to the other members
File replication service (FRS)
What She statement should you use with the nmcap.exe command to capture only packets that are used with the Remote Desktop services to file named test.cap
nmcap /network * /capture quote (TCP.port = = 3389)” /file test.cap
Which option in Windows server 2008 R2 be used to ensure that events are delivered to the collector computer as soon as possible
The minimize latencyevent delivery optimization option
If you configure port 8524 as the custom port for HTTPS on a Windows server update services (WSUS) server which port will it automatically use for HTTP
8523
Into which mode does network monitor placed the network adapter of the computer to capture network frames
Promiscuous mode
Which option in Windows reliability and performance monitor should be selected to start reliability monitor
Monitoring tools reliability monitor
What three things must you do to ensure that certain computers receive updates from a WSUS server via client-side targeting
- specify how you are going to assign computers to the computer groups.
- create the computer group in WSUS
- move the computers into groups
Which feature in Windows server is a reserved area in memory for holding incoming data
A capture buffer
Which relationship should be used when you have two windows software update service (WSUS) servers and you want one WSUS sever to receive updates from another WSUS server
And upstream/downstream WSUS relationship
Which service in Windows server 2008 and Windows server 2008 are to provide access to WMI data and enables the bank collection and subscription to events
Windows remote management (WinRM) service
Which service in Windows server 2008 are two supports logging events querying events, describing to events, archiving event logs and managing event metadata
Windows event log service
What command translate Windows events into SNMP traps
The evntcmd command
Which feature in Windows server 2008 are two allows roaming Windows software update service (WSUS) clients can be directed to the closest WSUS server based on IP subnets
Netmask ordering
Which file contains the source computers from which the events should be collected
The subscription file
Which tool is used in Windows server 2008 R2 to retrieve information about event logs and publishers
The wevtutil tool
Which option in Windows server compares the network traffic with a defined set of criteria and copies frames that meet the criteria to the temporary capture file
The capture filter
In which mode does the network adapter card copy all frames the Passover the network to a local buffer, regardless of the destination address
Promiscuous mode
What number value in the system stability index is the most stable weighted measurement
10 is the most stable
Which Windows update classification downloads only the updates related to non-security bugs
Critical updates
Which feature in Windows 7 and Windows server 2008 R2 enables you to collect copies of events from multiple remote computers and store them locally
Event viewer subscriptions
Which view is simply a filtered view of all event viewer data for a particular log
A custom view
Which service in Windows server 2008 R2 allows processes to start under alternate credentials
The secondary logon service
Which option in network monitor can be used to specify the types of display data such as protocols and computer addresses that you want to save to a file
Display filters
Which setting in a group policy object should you configure to ensure that Windows 7, or Windows 2008 R2 computer receives updates from a WSUS server named server01.nutex.com
The specify intranet Microsoft update service location policy-setting under the computer configuration\policies\administrative templates\Windows components\Windows update node
Which driver should be installed on the computers. If you want to manage the network traffic remotely
Network of monitor driver
What capture statement should you use with theNMCap.exe command to capture every packet except those used with Remote Desktop services to a file named test.
nmcap /network * /capture “!(TCP.port = = 3389)” /file test.cap
When using client-side targeting for Windows updates audio ensure that the client is assigned to the target group
Assign the computers to the target group by using either group policy or registry keys
Which feature in network monitor in Windows servers 2008 and Windows server 2008 R2 should be used to monitor network traffic data. When a program or batch file is running
A capture trigger
Which file is used to install network monitor
netmonsetup.exe
Which command is used to start Windows reliability and performance monitor in the resource view page
The perfmon.exe command
Which command should be run at an elevated command prompt to ensure that the computer is configured as the collector computer for event viewer subscriptions
The wecutil qc command
Why should you NOT initially set a connection security rule to require authentication for inbound and outbound connections in a GPO
You want to ensure that all computers can communicate with IPsec with the request authentication for inbound and outbound connections setting before using require mode
Which service in Windows server 2008 R2 allows a remote user to access the registry
The remote registry service
Which option should be selected from performance monitor to view the properties of a data collector set
The open properties for this data collector set option
Which checkbox should be selected in Windows reliability and performance monitor to allow all the data collectors to finish recording the latest values before the data collector set is stopped
The stop when all data collectors have finished checkbox
Which URL could you configure in the domain policy to set clients to establish an SSL connection to a Windows server update service (WSUS) server named VerigonWSUS if the service resides in the default website
https://VerigonWSUS
Which tool is used in Windows server 2008 R2 to manage event subscriptions
The wecsvc tool
What Windows update classification downloads updates to virus or other definition files
Definition updates
Which command should be run at an elevated command prompt to ensure that the computers are configured as source computers for event viewer subscriptions
The winrm quickconfig command
Which tool in Windows server can be used to monitor your entire network and check the traffic being transmitted between the computers in the network
Network monitor