Final Exam Study Exam 2 Flashcards

1
Q

What is the primary means of identifying network devices and services in a Windows Server 2008 network?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The DHCP relay agent listens for which messages that are broadcast from the client?

A

DHCPDiscover
DHCPRequest
DCHPInform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To support and use the DHCP service across multiple subnets, routers connecting each subnet should comply with the DHCP/BOOTP relay agent capabilities described in __________.

A

RFC 1542

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access Protection was introduced with which operating system?

A

Windows Server 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Windows Server 2008 (and all Microsoft operating systems going back to Windows 2000) supports which two types of hard disks?

A

basic and dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which operating system does not support dynamic disks?

A

Windows NT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers?

A

GPT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Reverse Address Resolution Protocol (RARP) was designed for what reason?

A

for diskless workstations that had no means of permanently storing their TCP/IP settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?

A

DHCPACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The IP addresses defined in a DHCP scope must be __________.

A

contiguous

associated with a subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.

A

255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not considered a top-level domain?

A

.nato

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active Directory–integrated zones follow what type of update model?

A

Multimaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?

A

3 Seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which zone enables a host to determine another host’s name based on its IP address?

A

reverse lookup zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three (3) routing protocols that can be added to the Routing and Remote Access service?

A

IGMP Router & Proxy
DHCP Relay agent
RIPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which column of the IP Routing Table indicates the gateway value for each routing table entry?

A

No. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which mutual authentication method offers encryption of both authentication data and connection data?

A

MS-CHAPv2

20
Q

By default, the Callback Options setting is configured as __________.

A

No Callback

21
Q

The File Services role and other storage-related features included with Windows Server 2008 provide tools that enable system administrators to address many problems on a scale appropriate to a large enterprise network. However, before you implement the role or begin using these tools, what should you spend some time thinking about?

A

your users’ needs and how these needs affect their file storage and sharing practices

22
Q

When you work with basic disks in Windows Server 2008, how many primary partitions can you create?

A

4

23
Q

What is the first step in designing a file-sharing strategy?

A

projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs

24
Q

Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network?

A

Share Permission

25
Q

What standardized, highly portable print job format is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems?

A

Enhanced Metafile (EMF)

26
Q

Which document management menu command enables users to send jobs to the printer, where they remain in the queue, unprocessed, until you select the same menu item again?

A

Printer > Use Printer Offline

27
Q

Which version of Windows automatically supports automatic policy-based printer deployments by default?

A

Windows 2008 Server

28
Q

How many possibilities of filter combinations exist in the Print Management Console?

A

more than 1,000

29
Q

Which of the following is the default view of the Reliability and Performance Monitor?

A

Resource

30
Q

In which node is Event Viewer located?

A

Diagnostics node

31
Q

Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.

A

support for Unix-based systems

32
Q

Server management includes all of the following with the exception of __________.

A

controlling download and installation behavior

33
Q

What are the four (4) Server management include

A

1) reviewing and changing configuration options
2) automatically or manually synchronizing the server
3) viewing the update status
4) backing up and restoring the server.

34
Q

Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?

A

Authentication exemption

35
Q

To set the Netsh IPSec context, what is the first command you enter at the command prompt?

A

NetSH

36
Q

Which type of attack is one in which a malicious user masquerades as the legitimate sender or recipient of network traffic?

A

identity spoofing

37
Q

What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?

A

main mode negotiations

38
Q

In a PKI, each user/computer possesses a piece of information that is known only to the individual user or computer that is called a __________.

A

Private Key

39
Q

Certificate templates can be used to automate the deployment of PKI certificates by controlling the __________.

A

security settings associated with each template

40
Q

Depending on the enforcement method in use, a NAP enforcement point can take a number of different forms, such as what?

A
  1. 802.1X-capable Wireless Access Point for 802.1X enforcement
  2. Health Registration Authority (HRA) that can obtain health certificates from client computers when the IPSec enforcement method is used
  3. Windows Server 2008 DHCP server for the DHCP enforcement method
41
Q

What is an optional component that can be deployed to allow non-compliant client computers to achieve network compliance and gain network access?

A

remediation server

42
Q

Which optional role service is part of the File Server role that allows administrators to configure advanced file server functionality such as disk quotas, file screens, and e-mail notifications of user quota activities?

A

File Server Resource Manager

43
Q

Shadow Copies of Shared Folders functionality is enabled at which level?

A

Volume

44
Q

The File Server Resource Manager console was first introduced in which product?

A

Windows Server 2003 R2

45
Q

Three options can be found on the Previous Versions tab for any snapshots listed. Which of the following is not an option?

A

Duplicated

46
Q

What are three options can be found on the Previous Versions tab for any snapshots listed.

A

Open, Copy, and Restore.