70-642 Net Infrastructure Config Flashcards

1
Q

The first attempt to break up IP addresses used?

A

Classfull Subnetting to provide address ranges of differing sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Prior to DNS what did computers use to map human-readable named to IP addresses?

A

HOSTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The method of breaking up IP address space into address ranges of flexible size is called?

A

CIDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What must each host on a TCP/IP network be configured with in order to communicate with other hosts?

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What format are IPv4 addresses most commonly written

A

Dotted-decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of activation key allows you to host an activation service locally within your own network?

A

KMS - Key Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which windows 2008 feature installs and configures wireless connections and wireless LAN profiles?

A

Wireless Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ability to use the installation process to fix problems with an existing windows server system is called?

A

Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Installation of the necessary components for a particular server role, with out the GUI and other software features is called?

A

Server Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What screen appears by default when the windows server 2008 operating system is first installed?

A

Initial config tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the feature that allows different users on different computers to access the internet at the same time?

A

Internet connection sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What single point of administration allows you to configure networking and firewall tasks on a windows server 2008?

A

Network and sharing centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The setting describing the network environment, such as home or public network, is called the?

A

Network Location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The network location setting controls the behaviour of?

A

Network Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary means of name resolution on Windows networks prior to the introduction of Windows 2000 and Active Directory?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which feature is used to perform backups and restores Windows volumes?

A

Windows Server Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Whoa I networking service is used to automatically associate NetBIOS names with IP addresses?

A

WINS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is used to manage the licensing process for the volume licenses of windows vista and windows server 2008

A

Volume Activation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A WHAT? will transfer all records within a zone from a primary server to a secondary server.

A

full zone transfer (AXFR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A WHAT? Record_ creates an alias for an existing A record.

A

CNAME Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A WHAT record is used by e-mail systems such as Microsoft Exchange to locate mail servers in different networks

A

Mail Exchanger (MX) record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WHAT domain allows IPv6 hosts to map host names to IP addresses.

A

ip6.arpa domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

contoso.com is an example of WHAT within the .com top-level domain.

A

second-level domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

WHAT application scope will replicate DNS data to all DNS servers within a domain.

A

DomainDNSZones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

WHAT stores DNS data in a text file on the server hard drive, rather than as part of Active Directory.

A

File-backed zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Each DNS record has WHAT that indicates the maximum time that a record will be cached by a DNS server before it is discarded.

A

Time to Live (TTL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A DNS server is considered WHAT for each zone that it hosts.

A

authoritative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A DNS domain name like .uk or .it is an example of WHAT domain.

A

Country code domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This DNS configuration item will forward DNS queries to different servers based on the domain name of the query.

a. Iterative forwarder
b. Recursive forwarder
c. Conditional forwarder
d. IPv6 forwarder

A

c.Conditional forwarder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This type of zone takes human-readable FQDNs and translates them into IP addresses.

a. Standard zone
b. Forward lookup zone
c. Reverse lookup zone
d. Inverse lookup zone

A

b.Forward lookup zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

This zone is used in combination with IP addresses to resolve queries for IPv4 IP addresses:

a. in.addr-arpa
b. in.addr-ipv4
c. in.addr-ipv4.arpa
d. in.ipv4.arpa

A

a.in.addr-arpa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The IPv6 DNS host record is referred to as a(n):

a. A record
b. AA record
c. AAA record
d. AAAA record

A

d.AAAA record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
A DNS server that hosts a primary or secondary zone containing a particular record can  issue the following response to a query for that record:
a.Authoritative answer
b.Non-authoritative answer
c.Referral answer
d.Non-referral answer
Questions
A

a.Authoritative answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

You can secure an Active Directory-integrated DNS server, zone, or record by applying the following to it:

a. System Access Control List
b. Security Access Control List
c. Discretionary Access Control List
d. Distributed Access Control List

A

c.Discretionary Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

This zone type contains only SOA, name server, and glue records for the relevant zone.

a. Secondary zone
b. Stub zone
c. Primary zone
d. Caching-only zone

A

b.Stub zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data from a primary zone is transmitted to secondary zones using the following:

a. Zone transfer
b. Zone transmission
c. DNS Zone
d. Active Directory replication

A

a.Zone transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

These contain the names and IP addresses of the DNS servers authoritative for the root zone.

a. “.” zone
b. Top-level zone
c. Root Hints
d. Root Cache

A

c.Root Hints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The following feature is available only on Active Directory-integrated DNS zones:

a. Dynamic updates
b. Incremental zone transfers
c. Reverse lookup zones
d. Secure dynamic updates

A

d.Secure dynamic updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This type of router is well-suited for a small organization with low levels of network traffic utilization

A

i. software-based router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

This is used as the Windows Server 2008 implementation of a RADIUS server

A

Network Policy Server (NPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

802.1X is used to configure this for both wired and wireless network connections.

A

e. network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The IP address 255.255.255.255 represents WHAT in the IP Routing table.

a. Loopback address
b. Limited broadcast address
c. Directly-attached network route
d. Default route

A

b.Limited broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

If an IP Routing Table contains two routes to the same destination network, the route with the lowest WHAT will be selected first.

a. Weight
b. Metric
c. GUID
d. Priority

A

b.Metric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In an 802.1X infrastructure, an NPS or RADIUS server performs the role of the:

a. Applicant
b. Supplicant
c. Authorization Server (AS)
d. Authenticator

A

c.Authorization Server (AS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The following route is used by a computer’s default gateway to send traffic to remote networks:

a. Default route
b. Limited broadcast address
c. Broadcast address
d. Default interface

A

a.Default route

46
Q

The DFS Replication engine uses a form of replication called?

A

Multiple master replication

47
Q

In the Distributed File System, the actual shared folders referred to by the virtual folders in the namespace are known as?

A

Targets

48
Q

DFS Replication relies on a protocol called WHAT for file replication.

A

Remote Differential Compression (RDC)

49
Q

A DFS replication topology in which every server replicates with every other server is called a WHAT topology.

A

Full mesh

50
Q

The basic file-sharing capabilities of a Windows server are provided by the WHAT service.

A

Server

51
Q

To keep a DFS folder’s multiple targets synchronized, you must create a WHAT?

A

Replication group

52
Q

The WHAT allows you to simplify the view of file shares located across multiple servers as they appear to your user base.

A

Distributed File Service (DFS)

53
Q

A WHAT appears to the operating system as though it is a physically separate disk and can host an operating system

A

Primary partition

54
Q

A WHAT enables you to limit DFS replication traffic to specific pairs of members.

A

Hub/spoke topology

55
Q

A DFS WHAT enables you to create a single directory tree that contains references to shared folders located on multiple separate file servers.

A

Namespace

56
Q

An alternative to the multimaster replication model used in DFS is:

a. Unilateral replication
b. Single master replication
c. Flat namespace replication
d. Hierarchical namespace replication

A

b.Single master replication

57
Q

A server in a replication group is referred to as a:

a. Namespace
b. Namespace server
c. Member
d. Root target

A

c.Member

58
Q

This refers to the ability of DFS clients to revert back to folder targets that have been unavailable due to server or network outages.

a. Client failback
b. Server failback
c. Namespace failback
d. Target failback

A

a.Client failback

59
Q

A disk partition that can hold data but not an operating system is called a(n):

a. Primary partition
b. Boot partition
c. System partition
d. Extended partition

A

d.Extended partition

60
Q

This DFS component is responsible for maintaining a list of DFS shared folders and responding to user requests for those folders.

a. Folder target
b. Member server
c. Namespace server
d. Root server

A

c.Namespace server

61
Q

A DFS __________ contains a virtual representation of the shared folders on all DFS target servers.

a. Directory
b. Namespace
c. Target
d. Member

A

b.Namespace

62
Q

The Distributed File System uses the following replication model to keep servers in a replication group up to date:

a. Multiple Master Replication
b. Single Master Replication
c. Root Master Replication
d. Distributed Master Replication

A

a.Multiple Master Replication

63
Q

In this topology, every member of a DFS replication group replicates with every other member, for full replication connectivity.

a. Hub and spoke replication
b. Complete replication
c. Direct replication
d. Full mesh replication

A

d.Full mesh replication

64
Q

The following service is required on a Windows Server 2008 server in order to enable file sharing:

a. Workstation Service
b. SMB Service
c. IIS Service
d. Server Service

A

d.Server Service

65
Q

To enable replication for a DFS folder with multiple folder targets, you must create the following:

a. Replication group
b. Replication target
c. Replication folders
d. Replication servers

A

a.Replication group

66
Q

A WHAT is the software interface through which a computer communicates with a print device.

A

Printer

67
Q

When you connect a single print server to multiple print devices, you create what is called a WHAT?

A

Pinter pool

68
Q

By default, all printers assign the Allow Print permission to the WHAT special identity, which enables all users to access the printer and manage their own documents.

A

Everyone

69
Q

Users with the WHAT permission can go beyond just manipulating queued documents; they can reconfigure the printer itself.

A

Manage Printers

70
Q

The WHAT is the default print format used by the Windows 2000, Windows XP, and Windows Server 2003 operating systems.

A

Enhanced Metafile Format (EMF)

71
Q

A WHAT is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device.

A

Printer driver

72
Q

The WHAT allows clients to print documents using HTTP traffic over an intranet or the World Wide Web.

A

Internet Printing Protocol (IPP)

73
Q

Users with the WHAT permission to a printer have the ability to pause, resume, restart, and cancel their own documents, but not documents created by any other user.

A

Print

74
Q

WHAT such as Printer Not Ready are a useful way for administrators to determine what printers need attention throughout a Windows Server 2008 network.

A

Custom filters

75
Q

Which printer permission allows users to pause, resume, restart and cancel all users’ documents, and to control job settings for all documents?

a. Print
b. Manage Documents
c. Manage Printers
d. Full Control

A

b.Manage Documents

76
Q

What kind of print device is connected to a TCP/IP network, either directly or through another computer?

a. Print server
b. Local print device
c. Network-attached print device
d. Print queue

A

a.Print server

77
Q

What can you create to connect a single print server to multiple print devices?

a. Print server
b. Print queue
c. Network printer
d. Printer pool

A

d.Printer pool

78
Q

This custom view in the Event Viewer collects Critical, Error, and Warning events from all logs on a particular server.

A

Administrative Events

79
Q

This capture mode enables Network Monitor to listen to all traffic that is being passed on a particular network segment.

A

promiscuous mode

80
Q

This type of forwarded event is initiated by the server acting as the event repository.

A

collector initiated

81
Q

This is the command-line method of launching the Performance Monitor MMC snap-in.

A

perfmon

82
Q

This log provides a view of events related to software that has been installed on a Windows server computer.

A

Application Log

83
Q

This is collected to provide a real-time view into the behavior and performance of a server and its applications.

A

event trace data

84
Q

This allows you to organize a set of performance counters, event traces, and system configuration data into a single reusable configuration item.

A

Data Collector Set

85
Q

This view of the Windows Event Viewer allows you to configure a Windows Server 2008 computer to act as a repository for Event Viewer entries from one or more remote computers.

a. WSUS
b. Windows Catalog
c. Network Monitor
d. Forwarded Events

A

d. Forwarded Events

86
Q

The following user group can view both real-time and historical data within the Performance Monitor console, but cannot create or modify Data Collector Sets:

a. Performance Monitor Users
b. Performance Log Users
c. Power Users
d. Users

A

a.Performance Monitor Users

87
Q

In order to collect events from remote computers that match the criteria of one or more event filters that you define, you will create one or more of the following:

a. Custom View
b. Subscription
c. Forwarded Event
d. Event Viewer

A

b. Subscription

88
Q

What protocol does the Windows Event Viewer use to configure event forwarding?

a. ARP
b. RPC over IP
c. WS-DirectoryServices
d. WS-Management

A

d. WS-Management

89
Q

This is a new Event Log in Windows Server 2008, used to capture information regarding operating system and application installations and un-installations.

a. Application Log
b. System Log
c. Setup Log
d. Administrative Events

A

d. Administrative Events

90
Q

The following service allows you to configure a single server as a repository of Event Viewer information for multiple computers:

a. Windows Server Update Service
b. Windows Event Collector Service
c. Windows Event Viewer
d. Windows Event Forwarder

A

b. Windows Event Collector Service

91
Q

The following allows you to display only those packets matching a particular set of criterion among a larger set of packets that have been captured by Network Monitor:

a. Capture Filter
b. Event Filter
c. Custom View
d. Display Filter

A

d. Display Filter

92
Q

The following is a server-side component within WSUS that retrieves the latest critical updates from the Windows Update Web site:

a. Content Synchronization Service
b. Microsoft Update
c. Performance Monitor
d. Event Forwarder

A

a.Content Synchronization Service

93
Q

The WHAT was configured in Windows 2000, Windows Server 2003, and Windows XP IPSec policies to ensure that the computer responds to requests for secure communication.

A

Default response rule

94
Q

A WHAT attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic.

A

Identity spoofing

95
Q

The strongest form of NT LAN Manager authentication is WHAT?

A

NTLMv2 authentication

96
Q

IPSec WHAT is used to provide end-to-end security, in which both hosts support IPSec using the same authentication protocols.

A

Transport mode

97
Q

WHAT connection security rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as membership in a particular Active Directory domain.

A

Isolation

98
Q

Microsoft Network Monitor is an example of a real-world WHAT?

A

Packet sniffer

99
Q

The Windows Firewall with Advanced Security MMC snap-in allows you to integrate IPSec into the Windows Firewall by configuring one or more WHAT?

A

Connection Security Rules

100
Q

The default WHAT for IPSec connections in an Active Directory environment is the Kerberos v5 protocol.

A

Authentication method

101
Q

Each Windows Firewall exception can be configured with a specific WHAT to control which computers the local computer will accept connections from.

A

Scope

102
Q

A WHAT must occur before secure traffic can be sent, in order to determine the type of traffic to be secured and how it will be secured

A

Quick mode negotiation

103
Q
  1. The following protocol provides confidentiality (in addition to authentication, integrity, and anti-replay) for the IP payload:
    a. Encapsulating Security Payload (ESP)
    b. Authentication header (AH)
    c. NTLMv2
    d. LM
A

a.Encapsulating Security Payload (ESP)

104
Q

This suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is sending or receiving data.

a. ESP
b. IKE
c. IPSec
d. NTLM

A

c. IPSec

105
Q
  1. The following is a value contained in a received IKE message that is used to help identify the corresponding main mode SA:
    a. Cookie
    b. Cache
    c. Exception
    d. ISAKMP
A

a. Cookie

106
Q
  1. This Connection Security Rule allows you to specify one or more computers that do not need to be authenticated in order to pass traffic.
    a. Isolation
    b. Server-to-server
    c. Tunnel
    d. Authentication exemption
A

d. Authentication exemption

107
Q

The following NTLM Authentication type is disabled by default in Windows Server 2003 and Windows Server 2008 servers; it should not be used in a production environment as it is weak and can be easily hacked by malicious users:

a. NTLMv2 authentication
b. NTLM authentication
c. LM authentication
d. Kerberos v5 authentication

A

c. LM authentication

108
Q

PKI

A

public key infrastructure

109
Q

NAP

A

Network Access Protection

110
Q

CA

A

Certification authority

111
Q

IKE

A

Internet Key Exchange

112
Q

DNS MMC

A

Microsoft Management Console