70-647 Flashcards
BIND
Berkeley Internet Name Darmon
DNS server
Bubbles
Teredo client.
Bubble messages create mapping’s for both computers in each other’s NAT routers.
Format Prefix FP
A sequence of bits that identify atheism address type
Forwarder
DNS system forwards name resolution requests to another DNS server specified by an administrator. Recursive not iterative queries
(Subsequent queries)
GlobalNamesZone
New DNS feature can resolve single-label names like those us d in NetBIOS
Global unicast address
IPv6 equivalent of registered IPv4 address - routable worldwide and unique on the Internet
ISATAP
Inter-Site Automatic Tunnel Addressing Protocol
TCP
Link that emulates an IPv6 link using IPv4 network
Iterative query
DNS query that responds immediately with the best information available
Link-local address
FD/FC:80
IPv6 equivalent APIPA address in IPv4 - Automatic Private IP Addressing
Network Address Translation
Group of workstations share single address
OUI
Organisationally Unique Identifier - first 24 bits of a MAC Address which identifies the company who made the adaptor
Proxy Server
Server on a private network forwards requests onto the internet using its own registered address
Recursive query
DNS server reviving the query takes full responsibility for resolving the name
Referral
Process in which a DNS server sends a name resolution request to another DNS server
Scope
IPv6 the size an address functionality area
SLAAC
Stateless Address Auto-configuration.
Process during which a computer assigns each interface a link local address
Teredo
Allows non IPv6 NAT routers to function as tunnel end points
Unique local Unicast Address
IPv6 equivalent of private network addresses in IPv4
WINS
Windows Internet Name System
App that registers NetBIOS names and IP addresses as computers connect to the network.
Zone Transfer
In DNS the process by which the server hosting the primary zone copies the primary zone database file to the secondary zone so the records match
Multiple server WSUS architecture assume remote sites are well connected. However some sites have relatively low-bandwidth connections. In cases like these it is best to limit updates (usually critical). A
Answer
WSUS server limits to critical updates being transferred to remote servers. (answer does not include spaces)
low-bandwidth
In the simplest configuration, a
Answer
WSUS server downloads updates from the Microsoft Update Site.
single
Select from the following, all of the problems associated with non-centralised updates. Select one or more: a. Efficient bandwidth use b. Heavy bandwidth utilisation c. Compliance d. Update approval e. Centralised reports
b. Heavy bandwidth utilisation
(Each O.S. is performing separate updates, which of course uses more network bandwidth.)
c. Compliance
(Default windows update settings provide no means for feedback to administrators.)
d. Update approval
(Each user on each computer must approve updates individually.)
In a basic configuration a single WSUS server can support how many clients? Select one: a. 25,000 b. 5,000 c. 10,000 d. 1,000 e. 50,000
25,000
Where would the administrator configure WSUS automatic updates easiest? Select one: a. Registry editor b. Using a GPO (Group policy) c. On each individual PC. d. On the server "Control panel"
Using a GPO (Group policy)
This question tests knowledge of where you would use WSUS and where you would not.
Match the following 2 statements with the correct answer:
Mobile workstations?
Small offices?
Mobile workstations – would not have access to a dedicated update server most of the time
Small offices – don’t really benefit as time configuring is greater than manual effort
The
Answer
WSUS server architecture is the same as a replica or autonomous server, except that instead of central servers transmitting updates directly to the downstream servers, administrators save updates to a shared medium.
disconnected
Match the following terms with the correct response.
An upstream WSUS server is:
A downstream WSUS server is:
An upstream WSUS server is: – where updates originate and are distributed.
A downstream WSUS server is: – a server that acquires updates and passes them to clients.
WSUS servers, function in much the same way as replica WSUS servers, except that remote administrators at each site are responsible for evaluating & approving updates.
Autonomous
In a
Answer
WSUS server configuration, one central WSUS server downloads updates from the Microsoft update website. Approved updates filter down to additional downstream servers. This model minimises internet traffic, offloading transmissions to the LAN instead.
replica
3 common examples of IP address tunneling are: Select one or more: a. SLARP b. 6 to 4 c. Teredo d. 4 to 6 e. ISATAP
6 to 4,
ISATAP,
Teredo
The address 180.76.5.136 is an example of which class of IP address? Write your answer in the following format: Class X
class b
How many bits are available for IPv6 subnetting?
Select one:
a. 16 bits (bits 48-64)
b. 8 bits (bits 16-32)
c. 32 bits (bits 32-64)
d. You can’t as you don’t need to subnet IPv6
a. 16 bits (bits 48-64)
Directly after the global routing prefix
The main reason for using “Dual stack” is to?
Select one:
a. Speed up data transfer
b. Improve performance
c. To force users to upgrade their client operating systems.
d. Make the transition from IPv4 to IPv6 as simple as possible.
Make the transition from IPv4 to IPv6 as simple as possible.
Generally speaking, where would Class A networks be used?
Select one or more:
a. Serial links.
b. The military; using a private address range.
c. ISP’s (RIR)
d. VERY large organisations
e. Networks that require a small number of addresses.
VERY large organisations, ISP’s (RIR), The military; using a private address range.
In order to use IPv6 across your entire network, the following devices must be configured correctly: Select one or more: a. Modems b. Switches c. Hardware firewalls d. Client machines e. Routers
Routers, Switches, Client machines, Hardware firewalls
What service must be enabled in order to audit AD DS activity?
Select one:
a. The Audit directory service access policy in the Default Domain Controllers Policy GPO.
b. TheAudit management service accesspolicy in the Default Domain Controllers Policy GPO.
c. TheAudit forest service accesspolicy in the Default Domain Controllers Policy GPO.
d. TheMonitor directory service accesspolicy in the Default Domain Controllers Policy GPO.
The Audit directory service access policy in the Default Domain Controllers Policy GPO.
The purpose of setting the domain and forest functional levels is:
Select one:
a. to activate features that have been introduced in successive versions of Windows Server.
b. to force the administrators to install the latest Windows Servers.
c. to tell the administrators what the oldest version of Windows Server is in the forest/domain.
d. to tell the administrators what the latest version of Windows Server is in the forest/domain.
to activate features that have been introduced in successive versions of Windows Server.
Administrative isolation is:
Select one:
a. when an individual is granted complete administration over some part of a domain.
b. when an individual is granted complete administration control over some part of a forest.
c. when an individual has complete and exclusive control over some part of a forest.
d. when an individual has complete and exclusive control over some part of a domain.
when an individual has complete and exclusive control over some part of a forest
Which of the following is a Service Management Role? Select one: a. Help Desk Operators b. Replication Monitoring Operators c. Business Unit Administrators d. Workstation Administrators
Replication Monitoring Operators
Common reasons for creating OUs is (2 answers):
Select one or more:
a. to gain access to resources in another domain.
b. to make the structure of the OUs reflect the company’s organizational chart.
c. to gain access to resources in another forest.
d. to delegate administrative control over parts of the enterprise.
to delegate administrative control over parts of the enterprise.,
to make the structure of the OUs reflect the company’s organizational chart.
The restricted-access forest model …
Select one:
a. is achieved by setting up a two-way trust to the restricted forest.
b. is intended for an enterprise with a business unit that must remain completely isolated from the rest of the network.
c. is achieved by setting up a one-way non transitive trust to the restricted forest.
d. is used for an enterprise with some parts which must have restricted access from the remainder of the network.
is intended for an enterprise with a business unit that must remain completely isolated from the rest of the network.
A shortcut trust is used:
Select one:
a. to speed the process of logging on between child domains of separate trees in the same forest.
b. to enable a child domain in one tree to log on to a child domain in another tree in the same forest.
c. to enable a child domain in one tree to log on to a child domain in another tree in different forests.
d. to speed the process of logging on between child domains of separate trees in different forests.
to speed the process of logging on between child domains of separate trees in the same forest.
Perimeter networks are often created:
Select one:
a. to host Internet servers so that they are accessible from the internet, but are isolated from the internal network.
b. to isolate elements of an enterprise by business units.
c. to isolate elements of an enterprise by geographical areas.
d. and always contain a separate forest.
to host Internet servers so that they are accessible from the internet, but are isolated from the internal network.
The group nesting strategy is often referred to as?
Answer:
AGGUDLP
Accounts–>Global groups–>Other global groups–>Universal groups–>Domain local groups–>Permissions.
If the forest root domain is irretrievably lost then…
Select one:
a. only the tree for which it is the root will be affected. Other trees in the forest will be unaffected.
b. The role of forest root domain should be reassigned to another domain
c. It has no operational effect on the forest.
d. The forest has to be rebuilt from scratch.
The forest has to be rebuilt from scratch.
The term latency (in relation to sites) means?
Select one:
a. The replication schedule
b. The time it takes for replication to propagate to all DC’s.
c. The replication interval
d. The response time of the server
The time it takes for replication to propagate to all DC’s.
The location of all servers by default in "AD Sites & Services" is: Select one: a. 1st Site b. Default Site c. Default-First-Site-Name d. Default e. Servers
Default-First-Site-Name
It is important to remember the hyphens
Which of the following statements are true, relating to site link bridging?
Select one or more:
a. Is enabled by default
b. Must involve more than 2 sites
c. Must be configured manually
d. Can only involve 2 sites
e. Treats all site links as equally available
f. Enables administrators to customise replication traffic.
Must involve more than 2 sites, Is enabled by default, Treats all site links as equally available
Which of the following statements are true regarding; Intra-site replication?
Select one or more:
a. Traffic is compressed
b. Replication occurs according to a schedule
c. Is uncompressed
d. Rarely needs configuring
e. Requires creation and configuration of site links
Is uncompressed,
Rarely needs configuring
According to the textbook 70-647, the single site model assumes that DC's are: Select one: a. Co-located b. High powered c. Running Server2008 d. Well connected
Well connected
Good. The assumption is that speeds exceed 512Kbps (most ADSL/WAN links do)
The definition of a “Site” in active directory is:
Select one:
a. A descriptor of the speed available on a LAN\WAN link
b. A collection of DC’s from various forests
c. A term that defines domain boundaries.
d. An area of active directory network in which all of the domain controllers are well connected.
d. An area of active directory network in which all of the domain controllers are well connected.
Textbook answer from page 69