Final Flashcards
What service does Dynamic Host Configuration Protocol (DHCP) provide?
Resolves web addresses to IP addresses
Resolves NetBIOS names to host names
Configures the IP address and other TCP/IP settings on network computers
Blocks unsolicited inbound traffic from entering the network perimeter
Configures the IP address and other TCP/IP settings on network computers
For DHCP address allocation, by how much is network traffic reduced related to periodic lease renewal messages when switching from dynamic allocation to automatic allocation?
Dynamic address allocation does not require periodic lease renewal messages.
None, because both address allocation methods require periodic lease renewal messages
50 percent because automatic allocation cuts the periodic messages in half
100 percent because dynamic address allocation requires periodic lease renewal messages whereas automatic does not
100 percent because dynamic address allocation requires periodic lease renewal messages whereas automatic does not
What is the first packet sent to a DHCP server when a computer boots up?
DHCPINFORM
DHCPDISCOVER
DHCPOFFER
DHCPACK
DHCPDISCOVER
How does a DHCP client communicate which offered IP address it will accept from which DHCP server?
The client sends a DHCPREQUEST message to the server.
The client selects the closest server and beeps audibly to accept the offer.
The client sends a DHCPACK message to all servers with the IP address of the chosen DHCP server.
The client sends a DHCPREQUEST message to all servers with the IP address of the chosen DHCP server.
The client sends a DHCPREQUEST message to all servers with the IP address of the chosen DHCP server.
What is the default lease period for DHCP dynamic address allocation?
96 hours
3.5 days
4.5 days
8 days
8 days
What are the advantages of using a distributed DHCP infrastructure?
Large convergence of network traffic
All the client/server network traffic is local, so minimal DHCP traffic on routers
Reduced administrative burden with fewer DHCP servers
Clients have ready access to DHCP servers
All the client/server network traffic is local, so minimal DHCP traffic on routers
Clients have ready access to DHCP servers
Before a DHCP server can hand out addresses, which of the following steps must be completed? (Choose two answers.)
A DHCP scope must be created and activated.
Correct!
The DHCP server must be created and authorized.
The DHCP server must be put in the trusted list on the client computers.
The DHCP server must be installed by an Enterprise Administrator.
A DHCP scope must be created and activated.
The DHCP server must be created and authorized.
Which of the following steps must be completed in order to do ensure a network printer is assigned the same address through the DHCP server?
Create a reservation in the DHCP scope.
Create an exclusion in the DHCP scope.
Create a special scope on the DHCP server.
Define the DHCP server on the client in the Advanced TCP/IP Advanced Settings.
Create a reservation in the DHCP scope.
What kinds of servers should NOT be DHCP clients?
Servers on a subnet outside the broadcast domain of the DHCP server
DHCP servers
Domain controllers, Internet web servers, and DHCP servers
DHCP relay agents
Domain controllers, Internet web servers, and DHCP servers
What is the key benefit of DHCP manual IP address allocation over manually configuring the IP address by person?
The DHCP server then contains a centralized list of permanently assigned addresses.
The DHCP server might pass on more information than just an IP address.
This prevents accidental duplication of permanently assigned IP addresses.
This manually assigned address is officially known as a reservation.
This prevents accidental duplication of permanently assigned IP addresses.
What are the servers at the top of the DNS hierarchy called?
Down-level servers
Authoritative sources
Root servers
Forwarders
Root servers
The domain name part of a DNS name is _______ and consists of two or more words, separated by ______.
peer-based; periods
hierarchical; commas
unranked; commas
hierarchical; periods
hierarchical; periods
When using DNS for name resolution only, why should a company consider using DNS servers outside the network perimeter?
Less administration
Less internal traffic
Fewer servers in the communications server rack
Less traffic crossing the network perimeter
Less traffic crossing the network perimeter
Who is responsible for the ratification of new top-level domains?
Internet Corporation for Assigned Names and Numbers (ICANN)
Network Solutions, Inc. (NSI, formerly known as InterNIC)
Internet Assigned Numbers Authority (IANA)
Contoso.com
Internet Corporation for Assigned Names and Numbers (ICANN)
Concerning DNS, what is negative caching?
When a DNS server receives incorrect information about a host
When a DNS server receives obsolete information about a host
When a DNS server receives information about a non-existent host
When a DNS server forwards incorrect information about a host
When a DNS server receives information about a non-existent host
What is the default TTL for a Windows Server 2012 R2 DNS server?
1 hour
12 hours
5 minutes
36 hours
1 hour
You registered the domain name contoso.com. The FQDNs seattle.contoso.com and halifax.contoso.com are examples of different _____.
subdomains of contoso.com
second-level domains
top-level domains
IP addresses
subdomains of contoso.com
Concerning DNS domain hierarchy, what are examples of global top-level domains?
.com, .net, .org
.mil, .gov, .edu
.aero, .name, .pro
.ca, .cz, .kr
.com, .net, .org
What is the primary purpose of name caching?
Name caching saves an extraordinary amount of time for the user.
Name caching greatly reduces traffic on the company network.
Name caching validates why you should deploy caching-only servers.
Name caching enables the second name resolution request for the same name to bypass the referral process.
Name caching enables the second name resolution request for the same name to bypass the referral process.
What is the primary benefit of a DNS forwarder?
Exchanging iterative queries for recursive queries across the network perimeter
Reducing the traffic and making efficient use of available bandwidth across the network perimeter
Making the most of iterative queries to other DNS servers
Reducing the burden on the Internet’s root name servers
Reducing the traffic and making efficient use of available bandwidth across the network perimeter
What DNS server represents the top of the DNS hierarchy?
Root name server
Caching-only server
Forwarder
Authoritative source
Root name server
What DNS server is responsible for maintaining a particular domain’s resource records?
Root name server
Caching-only server
Forwarder
Authoritative source
Authoritative source
What is the process of granting the user access only to the resources he or she is permitted to use?
Authentication
Authorization
Importing a user object to Active Directory
Registering the SRV
Authorization
What defines what objects exist as well as what attributes are associated with any object in the Active Directory?
Active Directory administrator
Active Directory global directory
Active Directory root user
Active Directory schema
Active Directory schema
Active Directory keeps a naming convention for the domain that mirrors ______.
DHCP
WINS
DNS
files and folders
DNS
If an administrator creates a domain tree in an Active Directory forest, and then creates a separate and different domain tree, what is the relationship between the two domain trees?
Completely different security entities, creating two Active Directory forests
Different security entities, within one Active Directory forest
Same security entity as one Active Directory forest, bidirectional trust between domain trees
No trust between domain trees in an Active Directory forest
Same security entity as one Active Directory forest, bidirectional trust between domain trees
What is the global catalog?
The schema that lists what objects and attributes exist in the AD DS forest
An index of all AD DS objects in a forest
A list of all domain controllers currently available
A matrix of all domains, sites, and domain controllers
An index of all AD DS objects in a forest
What is an important difference between groups and OUs?
An OU can represent the various divisions of your organization.
Group membership can be a subset of an OU.
OUs are a security entity.
Group memberships are independent of the domain’s tree structure.
Group memberships are independent of the domain’s tree structure.
For Server Core installations, how does Windows Server 2012 R2 differ from Windows Server 2008 when installing the AD DS role and promoting the system to a domain controller?
Windows Server 2012 R2 now allows administrators to use Dcpromo.exe.
Windows Server 2012 R2 now allows administrators to use PowerShell.
Windows Server 2012 R2 permits administrators to use answer files for unattended DC installations.
Windows Server 2012 R2 recommends administrators use Install from Media.
Windows Server 2012 R2 now allows administrators to use PowerShell.
Which of the following features allows you to create virtual machines on a leased cloud resource?
Windows Intune
Hyper-V on a Cloud
Office 365
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
What administrative division in Active Directory is defined as a collection of subnets that have good connectivity between them to facilitate the replication process?
Forests
Locations
Domains
Sites
Sites
When is an Active Directory site topology created?
Site topology is started upon initial installation of the Active Directory.
Site topology starts when you finalize the links and subnets configuration.
Creation of sites and its topology is dependent on link costs.
Site topology is manually configured dependent on WAN bandwidth and transmission speed.
Site topology is manually configured dependent on WAN bandwidth and transmission speed.
An Active Directory _____ consists of one or more separate domain trees.
organizational unit
group
domain
forest
forest
What is a container object that functions in a subordinate capacity to a domain, and still inherits policies and permissions from its parent objects?
Organizational unit
Group
Domain
Forest
Organizational unit
Resource access for individuals takes place through their ______.
computer accounts
user accounts
authentication
shared folders
user accounts
What are the two built-in user accounts are created on a computer running Windows Server 2012 R2?
system and guest
default and guest
domain administrator and local administrator
administrator and guest
administrator and guest
What you call the process of confirming a user’s identity by using a known value such as a password, a smart card, or a fingerprint?
authorization
permission
delegation
authentication
authentication
The LDIFDE.exe utility is most similar to what other utility?
Microsoft Excel
Active Directory Administrative Center (ADAC)
CSVDE.exe
Dsadd.exe
CSVDE.exe
Which of the following guidelines are NOT best practice for securing the Administrator account?
Renaming the Administrator account name so as not to distinguish it from non-administrative accounts
At least seven characters length and strong complexity for the account password
Using the Administrator account for daily, non-administrative tasks
Share the administrator account with only a few, necessary individuals
Using the Administrator account for daily, non-administrative tasks
What user creation tool incorporates new features such as the Active Directory Recycle Bin and fine-grained password policies?
Active Directory Users and Computers console
Windows PowerShell
Active Directory Administrative Center (ADAC)
LDIFDE.exe
Active Directory Administrative Center (ADAC)