Chapter 6 - Implement Domain Name System Flashcards
You are the administrator for your company network. You have a Windows Server 2016 Nano Server named Server1. You want to install the Domain Name System (DNS) Server role on Server1. What should you run?
A. The dns.exe command
B. The Enable-WindowsOptionalFeature cmdlet C. The Install-Package cmdlet
D. The optionalfeature.exe command
B. The Enable-WindowsOptionalFeature is used to add the DNS Server role to a Nano Server. The Enable-WindowsOptionalFeature cmdlet enables or restores an optional fea- ture in a Windows image.
You are the administrator for your company network. You have a Windows Server 2016 Hyper-V host. The host contains a virtual machine named VM1 that has resource metering enabled. What cmdlet should you run if you need to use resource metering to track the amount of network traffic that VM1 sends to the 10.0.0.0/8 network?
A. New-VMResourcePool
B. Set-VMNetworkAdapter
C. Set-VMNetworkAdapterRoutingDomainMapping D. Add-VMNetworkAdapterAcl
D. The Add-VMNetworkAdapterAcl cmdlet creates an access control list (ACL) to apply to the traffic through a virtual machine network adapter. When a virtual network adapter is created, there is no ACL on it. Given a list of IP-based ACL entries to be applied to traffic in the same direction, the longest match rule decides which one of the entries is most appropri- ate to apply to a specific packet.
You are the administrator for your company network. You have a Windows Server 2016 server named Server1 that is configured as a domain controller. You install the DNS Server role on Server1. You plan to store a DNS zone in a custom Active Directory partition. What should you use if you need to create a new Active Directory partition for the zone? A. dnscmd.exe B. Set-DnsServer C. dns.exe D. Active Directory Sites and Services
A. dnscmd.exe is a command-line tool for managing DNS servers. This utility is useful in scripting batch files to help automate routine DNS management tasks, or to perform simple unattended setup and configuration of new DNS servers on your network
You are the administrator for your company network. You have an IP Address Management (IPAM) deployment that is used to manage all of the DNS servers on the network. IPAM
is configured to use Group Policy provisioning. You discover that a user has added a new mail exchanger (MX) record to one of the DNS zones and you want to figure out which user added the record. You open Event Catalog on an IPAM server and discover that
the most recent event occurred yesterday. What should you do if you need to ensure that the operational events in the event catalog are never older than one hour?
A. From Task Scheduler, create a scheduled task that runs the Update-IpamServer cmdlet.
B. From Task Scheduler, modify the Microsoft\Windows\IPAM\Audit task.
C. From the properties on the DNS zone, modify the refresh interval.
D. From an IPAM_DNS Group Policy Object (GPO), modify the Group Policy refresh interval.
C. The refresh interval is the time in seconds that a secondary name server should wait between zone file update checks. The interval should not be so short that the primary name server is overwhelmed by the update checks and not so long that propagation of changes to the secondary name servers is delayed.
You are the administrator for your company network. You are discussing Group Policy Objects (GPOs) with a colleague. If you choose the Group Policy–based provisioning method for IPAM, you must also provide a GPO name prefix in the provisioning wizard. After you provide a GPO name prefix, the wizard will display the GPO names that must be created in domains that will be managed by IPAM. In the following PowerShell command, how many GPOs would be created?
Invoke-IpamGpoProvisioning -Domain abc.com -GpoPrefixName IPAM1-DelegatedGpoUser user1 -IpamServerFqdn ipam1.abc.com
A. 1 B. 2 C. 3 D. 4
C. This example creates three GPOs (IPAM1_DHCP, IPAM1_DNS, and IPAM1DC NPS) and links them to the abc.com domain. These GPOs enable access to the ipam1.abc.com server using the domain administrator account user1.
You are the administrator for your company network. What should you do if you need to modify the GPO prefix by IPAM?
A. Run the Invoke-IpamGpoProvisioning cmdlet.
B. Run the Set-IpamConfiguration cmdlet.
C. Click Provision the IPAM Server in Server Manager. D. Click Configure Server Discovery in Server Manager.
B. The Set-IpamConfiguration cmdlet modifies the IP Address Management (IPAM) server configuration, including the TCP port over which the computer that runs the IPAM Remote Server Administration Tools (RSAT) client connects and communicates with the computer that runs the IPAM server. The -GpoPrefix parameter specifies the unique Group Policy Object (GPO) prefix name that IPAM uses to create the Group Policy Objects. Use this parameter only when the value of the ProvisioningMethod parameter is set to Automatic.
You are the administrator for your company network. You have a Windows Server 2016 IPAM server named IPAM1 that manages 10 DHCP servers. You need to provide a user with the ability to track which clients receive which IP addresses from DHCP. The solution must minimize administrative privileges. To which group should you add this user? A. IPAM User B. IPAM MSM Administrators C. IPAM ASM Administrators D. IPAM IP Audit Administrators
B. The IPAM MSM Administrators are users who are in the IPAM Users IPAM security group and who have the privileges to manage DHCP and DNS server instance–specific information. Such users are Multi Server Management (MSM) Administrators.
You are the administrator for your company network. Your network contains an Active Directory domain that has a Windows Server 2016 server named Server1, which is a member server and has the DNS Server role installed. Automatic scavenging of state records is enabled, and the scavenging period is set to 10 days. All client computers dynamically register their names in the DNS zone on Server1. You discover that the names of multiple client computers that were removed from the network several weeks ago can still be resolved. What should you do if you need to configure Server1 to automatically remove the records of the client computers that have been offline for more than 10 days?
A. Run the dnscmd.exe command and specify the /AgeAllRecords parameter for the zone.
B. Modify the Zone Aging/Scavenging properties of the zone.
C. Set the Time to Live (TTL) value of all the records in the zone.
D. Set the Expires After value of the zone.
B. You will need to modify the Zone Aging and Scavenging properties. When you set zone- level properties for a specified zone, these settings apply only to that zone and its resource records. Unless you otherwise configure these zone-level properties, they inherit their default settings from comparable settings that AD DS maintains in the Aging and Scavenging properties for the DNS server.
You are the administrator for your company network. You have 2,000 devices, and
100 of these are mobile devices that have physical addresses beginning with 98-5F. You have a Windows Server 2016 DHCP server named Server1. What should you do if you need to ensure that the mobile devices register their host names by using a DNS suffix of mobile.abc.com?
A. Create a new filter from IPv4.
B. Create a reservation.
C. Modify the Conflict Detection Attempts setting from the properties of Scope1.
D. Run the DHCP Policy Configuration Wizard from IPv4.
E. Configure Name Protection from the properties of Scope1.
F. Configure the bindings from the properties of IPv4.
G. Create an exclusion range from the properties of Scope1.
H. Modify the properties of Ethernet from the Control Panel.
D. DHCP server in Windows Server 2016 allows you to group clients based on their fully qualified domain names. Using wildcards, you can use this criterion to group clients based on their DNS suffixes or based on their host names. Setting up the DNS suffix is done using the DHCP Policy Configuration Wizard.
You are the administrator for your company network. You and a colleague are discussing client reservations. With client reservations, you can reserve an IP address for permanent use by a DHCP client. Typically, you will need to do this if the client uses an IP address that was assigned using another method for TCP/IP configuration. If you are reserving an IP address for a new client, or an address that is different from its current one, you should verify that the address has not already been leased by the DHCP server. Reserving an IP address in a scope does not automatically force a client currently using that address to stop using it. So, what ipconfig command would you use if the address is already in use? A. ipconfig /release B. ipconfig /renew C. ipconfig /flushdns D. ipconfig /registerdns
A. ipconfig /release sends a DHCPRELEASE message to the DHCP server to release the current DHCP configuration and discard the IP address configuration. This parameter dis- ables TCP/IP for adapters configured to obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when you use ipconfig without param- eters.
You are the administrator for your company network. You and a colleague are discussing Domain Name System (DNS). The DNS Server service provides several types of zones. What zone type helps to keep delegated zone information current, improve name resolution, and simplify DNS administration, but is not an alternative for enhancing redundancy and load sharing?
A. Secondary zone B. Stub zone
C. Principal zone D. Primary zone
B. A stub zone is a copy of an authoritative DNS zone that only contains the records needed to reach the authoritative server. When a zone that is a DNS server hosts a stub zone, this DNS server is a source only for information about the authoritative name servers for this zone. The zone at this server must be obtained from another DNS server that hosts the zone. This DNS server must have network access to the remote DNS server to copy the authoritative name server information about the zone.
You are the administrator for your company network. You and a colleague are discussing DNS queries. The following is an example of DNS query results that are performed from a DNS client computer using the Resolve-DnsName cmdlet:
resolve-dnsname -name finance.secure.abc.com -type A -server dns1.abc.com
What extra parameter should you use if you want to include the DO bit in a DNS query
to make sure the client is DNSSEC-aware and that it is okay for the DNS server to return DNSSEC data in a response?
A. -DnssecCd
B. -DnssecOk
C. -DnsOnly
D. -LlmnrOnly
B. The -DnssecOk parameter sets the DNSSEC OK bit for this query. When DO=1, the client indicates that it is able to receive DNSSEC data if available. Because the secure.abc.com zone is signed, an RRSIG resource record is included with the DNS response when DO=1.
You are the administrator for your company network. You and a colleague are discussing socket pools. The socket pool enables a DNS server to use source port randomization when issuing DNS queries. What command offers the greatest protection?
A. dnscmd /config /socketpoolsize 0
B. dnscmd /config /socketpoolsize 1
C. dnscmd /config /socketpoolsize 1000
D. dnscmd /config /socketpoolsize 1000 /socketpoolexcludedportranges 1-65535
C. The DNS socket pool enables a DNS server to use source port randomization when it issues DNS queries. When the DNS service starts, the server chooses a source port from a pool of sockets that are available for issuing queries. Instead of using a predicable source port, the DNS server uses a random port number that it selects from the DNS socket pool. The DNS socket pool makes cache-tampering attacks more difficult because a malicious user must correctly guess both the source port of a DNS query and a random transaction ID to successfully run the attack. When you configure the DNS socket pool, you can choose a size value from 0 to 10,000. The larger the value, the greater the protection you will have against DNS spoofing attacks
You are the administrator for your company network. You have a Windows Server 2016 server named Server1 that has the DHCP Server and the Windows Deployment Service (WDS) server roles installed. Server1 is located on the same subnet as client computers. You need to ensure that clients can perform a PXE boot from Server1. Which IPv4 options should you configure in DHCP? (Choose two.) A. 003 Router B. 006 DNS Servers C. 015 DNS Domain Name D. 060 Option 60 E. 066 Boot Server Host Name
D, E. When setting DHCP options for WDS PXE booting, you will want to use 060 Option 60, which is the client identifier. You should set this to the string PXEClient. This only applies if DHCP is on the same server as Windows Deployment Services. You will also want to use O66 Boot Server Host Name, which is the boot server’s host name.
You are the administrator for your company network. You have two Windows Server 2016 DNS servers named Server1 and Server2. All client computers run Windows 10 and are configured to use Server1 for DNS name resolution. Server2 hosts a primary zone named abc.com. Your network recently experienced several DNS spoofing attacks. What should you do to prevent further attacks from succeeding on Server2? (Choose two.)
A. Configure the abc.com zone to be Active Directory integrated.
B. Sign the abc.com zone.
C. Configure DNS Cache locking.
D. Configure Response Rate Limiting (RRL).
B, C. DNS attacks can be very serious in a company. Shutting down a DNS server or even changing the records can prevent your users from accessing proper information. By sign- ing the zone, you allow DNS to use certificates, and by locking the DNS cache, you prevent hackers from changing cache entries. These simple steps can help administrators secure their DNS servers.
You are the administrator for your company network. You have a Windows Server 2016 DHCP server named Server1 that has the following scopes configured:
Scope Name Address Pool Default Gateway DNS Server
Desktops 192.168.0.0/24 192.168.0.1 192.168.0.140
Visitors 192.168.0.1/24 192.168.1.1 192.168.0.140
All other scope settings are set to the default values. There are no available address spaces for another scope to be created. Your network has 150 desktop computers that have access to the corporate network. Your company also provides visitors with Wi-Fi access to the network. There can be up to 200 visitors each day. What should you do to ensure that you have enough address spaces for Visitors?
A. Configure a superscope that contains the Visitors scope.
B. For the Visitors scope, run the DHCP Split Scope Configuration Wizard.
C. Run Set-DhcpServer4Scope –Name Mobile –LeaseDuration 0.02:00:00.
D. Run Set-DhcpServer4Scope –ActivatePolicies $True –Name Mobile –MaxBootPClients 200.
A. A DHCP superscope is a collection of individual scopes that are grouped together for administrative purposes. This configuration allows client computers to receive an IP address from multiple logical subnets even when the clients are located on the same physical
subnet. You can create a superscope only if you have already created two or more IP scopes in DHCP. You can use the New Superscope Wizard to select the scopes that you wish
to combine to create a superscope. A DHCP superscope is useful if a scope runs out of addresses, and you cannot add more addresses from the subnet.
You are the administrator for your company network. You have a DHCP server named Server1. Server1 has an IPv4 scope that serves 75 client computers that run Windows 10. When you review the address leases in the DHCP console, you discover that there are several leases for devices that you do not recognize. What should you do if you need to ensure that only the 75 Windows 10 computers can obtain a lease from the scope?
A. Run the Add-DhcpServerv4ExclusionRange cmdlet.
B. Create a DHCP policy for the scope.
C. Create and enable a DHCP filter.
D. Run the Add-DhcpServerv4OptionDefinition cmdlet.
B. DHCP polices allow an administrator to determine scope for specific types of equipment coming in that correspond to different characteristics. An administrator needs to ensure that different types of devices are provisioned appropriately for network connectivity. You want different types of clients to get IP addresses from different IP address ranges within the subnet. By specifying a different IP address range for different device types, you can more easily identify and manage devices on the network.
You are the administrator for your company network.You have Windows Server 2016 servers named Server1 and DHCP1. DHCP1 contains an IPv4 scope named Scope1. You have 1,000 client computers. You need to configure Server1 to lease IP addresses for Scope1. The solution must ensure that Server1 is used to respond to up to 30 percent of the DHCP client requests only. On Server1, you install the DHCP Server role. What should you do next?
A. Run the Configure Failover Wizard from the DHCP console.
B. Create a superscope from the DHCP console.
C. Install the Network Load Balancing (NLB) feature from Server Manager.
D. Install the Failover Clustering feature from Server Manager.
A. The next step is to run the Configure Failover Wizard from the DHCP console. The Load Balance Percentage feature specifies the percentage of the IP address range to reserve for each server in the failover relationship. Each server will use its assigned range of addresses prior to assuming control over the entire IP address range of a scope when the other server transitions into a “partner down” state and the Maximum Client Lead Time passes
You are the administrator for your company network. You have a DHCP server named Server1 that has three network cards. Each network card is configured to use a static IP address. Each network card connects to a different network segment. Server1 has an IPv4 scope named Scope1. What should you do if you need to ensure that Server1 only uses one network card when leasing IP addresses in Scope1?
A. Create a reservation.
B. Modify the Conflict Detection Attempts setting from the properties of Scope1.
C. Create a new filter from IPv4.
D. Configure Name Protection from the properties of Scope1.
E. Create an exclusion range from the properties of Scope1.
F. Run the DHCP Policy Configuration Wizard from IPv4.
G. Configure the bindings from the properties of IPv4.
H. Modify the properties of Ethernet from the Control Panel.
G. By default, the service bindings on the server depend on whether the first network con- nection is configured dynamically or statically for TCP/IP. Since the question uses a manu- ally specified IP address, the connection is enabled in the service bindings on the server. The DHCP server will bind to the first static IP address configured on each adapter.
You are the administrator for your company network. You have a DHCP server named Server1 that has an IPv4 scope named Scope1. Users report that when they turn on their computers it takes a long time to access the network. You validate that it takes a long time for the computers to receive an IP address from Server1. You monitor the network traffic and discover that Server1 issues five ping commands on the network before leasing an
IP address. What should you do if you need to reduce the amount of time it takes for the computers to receive an IP address?
A. Create a reservation.
B. Modify the Conflict Detection Attempts setting from the properties of Scope1.
C. Create a new filter from IPv4.
D. Configure Name Protection from the properties of Scope1.
E. Create an exclusion range from the properties of Scope1.
F. Run the DHCP Policy Configuration Wizard from IPv4.
G. Configure the bindings from the properties of IPv4.
H. Modify the properties of Ethernet from the Control Panel.
B. When conflict detection attempts are set, the DHCP server uses the ping process to test available scope IP addresses before including these addresses in DHCP lease offers to cli- ents. A successful ping means the IP address is in use on the network. Therefore, the DHCP server does not offer to lease the address to a client. If the ping request fails and times out, the IP address is not in use on the network. In this case, the DHCP server offers to lease the address to a client.
You are the administrator for your company network. Your network contains Windows and non-Windows devices. You have a DHCP server named Server1 that has an IPv4 scope named Scope1. What should you do if you need to prevent a client computer that uses the same name as an existing registration from updating the registration?
A. Create a reservation.
B. Modify the Conflict Detection Attempts setting from the properties of Scope1.
C. Create a new filter from IPv4.
D. Configure Name Protection from the properties of Scope1.
E. Create an exclusion range from the properties of Scope1.
F. Run the DHCP Policy Configuration Wizard from IPv4.
G. Configure the bindings from the properties of IPv4.
H. Modify the properties of Ethernet from the Control Panel
D. Name squatting occurs when a non-Windows-based computer registers in Domain Name System (DNS) with a name that is already registered to a Windows-based computer. The use of name protection in Windows Server prevents name squatting by non-Windows- based computers. Name squatting does not present a problem on a homogeneous Windows network where Active Directory Domain Services (AD DS) can be used to reserve a name for a single user or computer. Name protection can be configured for IPv4 and IPv6 at the network adapter level or scope level. Name protection settings configured at the scope level take precedence over the setting at the IPv4 or IPv6 level.
You re the administrator for your company network. You have an Active Directory forest
that contains 30 servers and 6,000 client computers. You deploy a new DHCP server that runs Windows Server 2016. What command should you run if you need to retrieve the list of the authorized DHCP servers?
A. Get-DhcpServerDatabase
B. Netstat -p IP -s -a
C. Get-DhcpServerInDC
D. Show-ADAuthenticationPolicyExpression-AllowedToAuthenticateTo
C. The Get-DhcpServerInDC cmdlet retrieves the list of authorized computers that run the Dynamic Host Configuration Protocol (DHCP) server service from Active Directory. Only a computer that runs a DHCP server service that is authorized in Active Directory can lease IP addresses on the network.
You are the administrator for your company network. You have a DHCP server named Server1. Server1 has an IPv4 scope that contains 100 addresses for a subnet named
Subnet1. Subnet1 provides guest access to the Internet. There are never more than 20 client computers on Subnet1 simultaneously; however, the computers that connect to Subnet1 are rarely the same computers. You discover that some client computers are unable to access the network. The computers that are having connection issues have IP addresses in the range
of 169.254.0.0/16. What should you do if you need to ensure that all of the computers can connect successfully to the network and access the Internet?
A. Modify the lease duration.
B. Configure Network Access Protection (NAP) integration on the existing scope. C. Create a new scope that uses IP addresses in the range of 169.254.0.0/16.
D. Modify the scope options.
A. The correct answer is to modify the lease duration; 169.254.0.0/16 is an APIPA address. You cannot create a DHCP scope in that range. Every computer that is connected to a net- work needs an IP address so that it can send and receive data over the network. Each net- work has a limited number of addresses to assign to devices. The total number of addresses varies based on the network configuration. The network administrator determines the DHCP lease time. The optimum length depends on the number and kinds of devices on the network. A network with more dynamic clients than IP addresses might require a shorter lease period so that addresses are recycled more frequently.
You are the administrator for your company network. Your network contains an Active Directory domain. The domain contains a Windows Server 2016 server named Server1 that has IPAM installed. IPAM is configured to use the Group Policy–based provisioning method. The prefix for the IPAM Group Policy Objects (GPOs) is IP. From Group Policy Management, you manually rename the IPAM GPOs to have a prefix of IPAM. What should you do if you need to modify the GPO prefix used by IPAM?
A. Run the Invoke-IpamGpoProvisioning cmdlet.
B. Click Configure Server Discovery in Server Manager. C. Click Provision the IPAM Server in Server Manager. D. Run the Set-IpamConfiguration cmdlet.
D. The Set-IpamConfiguration cmdlet modifies the IP Address Management (IPAM) server configuration, including the TCP port over which the computer that runs the IPAM Remote Server Administration Tools (RSAT) client connects and communicates with the computer that runs the IPAM server.
You are the administrator for your company network. Your network contains one Active Directory domain named abc.com that contains an IPAM server named Server1. Server1 manages several DHCP and DNS servers. From Server Manager on Server1, you create a custom role for IPAM. What should you do if you need to assign the role to a group named IP_Admins?
A. Run the Add-Member cmdlet using PowerShell.
B. Run the Set-IpamConfiguration cmdlet using PowerShell. C. Create an access policy using Server Manager.
D. Create an access scope using Server Manager.
C. A role is a collection of IPAM operations. You can associate a role with a user or group in Windows using an access policy. Several built-in roles are provided, but you can also create customized roles to meet your requirements. You can create an access policy for a specific user or for a user group in Active Directory. When you create an access policy, you must select either a built-in IPAM role or a custom role that you have created.
You are the administrator for your company network. Your network contains an Active Directory domain that contains a Windows Server 2016 DNS server named Server1. All domain computers use Server1 for DNS. You sign the domain by using DNSSEC. What should you configure in Group Policy if you need to configure the domain computers to validate DNS responses for records? A. Name Resolution Policy Table (NRPT) B. Network List Manager Policies C. Network Access Protection (NAP) D. Public Key Policy
A. The Name Resolution Policy Table (NRPT) provides a means for configuring both DNSSEC and DirectAccess policies. It is stored in Group Policy, so its settings can be applied at the domain, site, OU, or local level. Before a security-aware DNS client issues a query, it checks the NRPT to determine whether DNSSEC should be used.
You are the administrator for your company network. Your network contains an Active Directory forest. Users frequently access the website of an external partner company. The URL of the website is http://partners.abc.com. The partner company informs you that it will perform maintenance on its web server and that the IP address of the web server will change. After the change is complete, the users on your internal network report that they fail to access the website. However, some users who work from home report that
they are able to access the website. You need to ensure that your DNS servers can resolve partners.abc.com to the correct IP address immediately. What should you do?
A. Run dnscmd and specify the CacheLockingPercent parameter.
B. Run Set-DnsServerGlobalQueryLockList.
C. Run ipconfig and specify the Renew parameter.
D. Run Set-DnsServerCache.
D. The Set-DnsServerCache cmdlet modifies cache settings for a Domain Name System (DNS) server. When using the -LockingPercent parameter, it specifies a percentage of the original Time to Live (TTL) value that caching can consume. Cache locking is configured as a percent value. By default, the cache locking percent value is 100. This value means that the DNS server will not overwrite cached entries for the entire duration of the TTL.
You are the administrator for your company network. What should you run if you need to verify whether a DNS response from a DNS server is signed by DNSSEC? A. dnscmd.exe B. nslookup.exe C. Get-NetIPAddress D. Resolve-DnsName
D. The Resolve-DnsName cmdlet performs a DNS query for the specified name. This cmd- let is functionally similar to the Nslookup tool, which allows users to query for names. The Resolve-DnsName cmdlet will return a maximum of 25 A and AAAA records from NS servers.
You are the administrator for your company network. You have a Windows Server 2016 DNS server named Server1. You need to disable recursion on Server1. What are three possible ways to achieve this goal? (Choose three.)
A. Create a reverse lookup zone named 0.in-addr.arpa.
B. Create a forward lookup zone named GlobalNames.
C. From DNS Manager, modify the advanced properties of Server1.
D. From DNS Manager, modify the forwarders properties of Server1.
E. Create a forward lookup zone named “”.
F. Run dnscmd.exe and specify the /config parameter
C, E, F. To disable recursion on the DNS server:
1. Open DNS Manager.
2. In the console tree, right-click the applicable DNS server; then click Properties.
3. Click the Advanced tab.
4. In Server Options, select the Disable Recursion check box, and then click OK.
Disable recursion on DNS servers that do not respond to DNS clients directly and that are not configured with forwarders. A DNS server requires recursion only if it responds to recursive queries from DNS clients or if it is configured with a forwarder. DNS servers use iterative queries to communicate with each other. The DNS server has root DNS servers in its configuration, so it returns the root DNS server details each time it is queried for a non- existent domain name. To prevent this, we need to create a forward lookup zone with the name “”.
Another option is to run dnscmd.exe with the /config parameter. dnscmd.exe is a command-line interface for managing the DNS servers. Using dnscmd.exe and specifying the /config parameter will reset the DNS server or zone configuration and allow you to dis- able recursion.
You are the administrator for your company network. You have a Windows Server 2016 DHCP server named Server1. You have a single IP subnet. Server1 has an IPv4 scope named Scope1. Scope1 has an IP address range of 10.0.1.10 to 10.0.1.200 and a length of 24 bits. What should you do if you need to create a second logical IP network on the subnet? The subnet will use an IP address range of 10.0.2.10 to 10.0.2.200 and a length of 24 bits.
A. Create a second scope and then run the DHCP Split-Scope Configuration Wizard.
B. Create a superscope and then configure an exclusion range in Scope1.
C. Create a new scope and then modify the IPv4 bindings.
D. Create a second scope and then create a superscope.
D. Before a DHCP server can provide clients with IP addresses, the server must be config- ured with a scope. A scope is a range of IP addresses that can be leased to DHCP clients on a given subnet. You can also create a second type of scope known as a superscope. In an environment that has multiple logical IP subnets defined on a single physical network, superscopes allow a DHCP server to assign leases to clients on multiple subnets.
You are the administrator for your company network. You are implementing a new network. The network contains a Windows Server 2016 DHCP server named DHCP1 that contains a scope named Scope1 for the 192.168.0/24 subnet. Your company has the following policies:
■✓ All server addresses must be excluded from DHCP scopes.
■✓ All client computers must receive IP addresses from Scope1.
■✓ All Windows servers must have IP addresses in the range of 192.168.0.200 to 192.168.0.240.
■✓ All other network devices must have IP addresses in the range of 192.168.0.180 to 192.168.0.199.
You deploy a print device named Print1. What command should you run if you need to ensure that Print1 adheres to the policies for allocating IP addresses?
A. Add-DhcpServerv4Reservation
B. Add-DhcpServerv4Lease
C. Add-DhcpServerv4ExclusionRange D. Add-DhcpServerv4Filter
C. The Add-DhcpServerv4ExclusionRange cmdlet adds a range of excluded IP addresses for an IPv4 scope. The excluded IP addresses are not leased out by the Dynamic Host Con- figuration Protocol (DHCP) server service to any DHCP clients. The only exception to this is reservation. If an IP address is reserved, the same IP address is leased to the designated client even if it falls in the exclusion range.
You are the administrator for your company network. Your network contains an Active Directory domain named abc.com. The domain contains two Windows Server 2016 serv- ers named Server1 and Server2. Server1 has IPAM installed. Server2 has Microsoft System Center 2016 Virtual Machine Manager (VMM) installed. You need to integrate IPAM and VMM. What type of object should you create on Server1? A. Access Policy B. Network Service C. User Role D. Service Template
A. Virtual Machine Manager (VMM) must be granted permission to view and modify IP address space in IPAM and to perform remote management of the IPAM server. VMM uses a Run As account to provide these permissions to the IPAM network service plug-in. The Run As account must be configured with appropriate permissions on the IPAM server. To assign permissions to the VMM user account, in the upper navigation pane of the IPAM server console, click Access Control. Then right-click Access Policies in the lower naviga- tion pane and click Add Access Policy.
You are the administrator for your company network. You and a colleague are discussing the use of network IDs. Because the network ID bits must always be chosen in a contiguous fashion from the high-order bits, a shorthand way of expressing a subnet mask is to denote the number of bits that define the network ID as a network prefix using the network prefix notation: /. What is the network prefix for Class B? A. /8 B. /16 C. /24 D. /64
B. Network prefixes are determined directly from the subnet mask of the network. A Class B subnet mask would be 255.255.0.0. To determine the network prefix on a Class B subnet, you would need to convert each octet of the subnet mask to a binary value. So for Class B it would be 11111111.11111111.00000000.00000000. Count the consecutive 1s to determine the prefix. So, the answer would be /16.
You are the administrator for your company network. You and a colleague are discussing private IP address ranges as specified by the Internet Request for Comments (RFC) 1918. Which of the following is not a recognized private IP address range as specified by RFC 1918? A. 10.0.0.0–10.255.255.255 B. 128.24.0.0–128.24.255.255 C. 172.16.0.0–172.31.255.255 D. 192.168.0.0–192.168.255.255
B. RFC 1918 was used to create the standards by which networking equipment assigns IP addresses in a private network. A private network can use a single public IP address. The RFC reserves the following ranges of IP addresses that cannot be routed on the Internet:
■■ 10.0.0.0 - 10.255.255.255 (10/8 prefix)
■■ 172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
■■ 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)