Final Exam Study Exam 3 Flashcards

1
Q

The process of obtaining an IP address for a computer name (for example, “Computer A”) is called __________.

A

name resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What service provides the ability to use a Windows Server 2008 computer as a router, which passes network traffic from one TCP/IP network to another, as well as for remote access capabilities using either dial-up or VPN technology?

A

Routing and Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. No additional discovery attempts are made except under what conditions?

A
  1. The network adapter is disabled and then enabled again.
  2. The TCP/IP settings for the adapter are changed, and DHCP remains enabled after these changes.
  3. Media (such as network cabling) is disconnected and then reconnected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHCP is based heavily on which protocol?

A

BOOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the host on a TCP/IP network should be configured with a number of mandatory and optional configuration items

A

subnet mask, default gateway, and WINS/DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is made up of free space from multiple physical disks?

A

spanned volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?

A

fresh or previously used media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can manage disks and partitions in Windows Server 2008 by using which tool?

A

Disk Management tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?

A

de-centralized administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The MAC address can be obtained by keying in __________ at the command line.

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry?

A

You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what year was DNS introduced?

A

1984

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?

A

standard primary zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where are zone transfers initiated?

A

secondary server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?

A

15 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which entries refer to a separate multicast route?

A

224.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?

A

basic encryption

18
Q

Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)?

A

MS-CHAPv1

19
Q

802.1X provides port-based security through the use of all of the following components with the exception of a(n) _________

A

verifier

20
Q

The system partition contains what types of files?

A

hardware-related files that the computer uses to boot

21
Q

Windows Server 2008 can support dynamic volumes as large as __________ terabytes.

A

64

22
Q

What file system provides the most granular user access control and also provides other advanced storage features, including file encryption and compression?

A

NTFS

23
Q

What server is responsible for maintaining the list of DFS (Distributed File System )shared folders and responding to user requests for those folders?

A

namespace server

24
Q

To share printers, which Network Sharing and Discovery setting must be turned on?

A

Printer Sharing

25
Q

What is the only role service that is required when you add the Print Services role?

A

Print Server

26
Q

With network-attached print devices, what is the primary deployment decision that the administrator must make?

A

which computer will function as the print server

27
Q

By default, the Print Management console displays only which of the following in its list of print servers?

A

local machine

28
Q

In the Reliability and Performance Monitor, which view provides information about system events that can affect a server’s stability, including software installation and un-installation, as well as any application, operating system, or hardware failures that have occurred over a particular time period?

A

Reliability Monitor

29
Q

Which log records events associated with server installation, adding and removing server roles, installing applications, and so forth?

A

Setup

30
Q

Which of the following is not a tool that can help you proactively troubleshoot network problems?

A

Performance console

31
Q

What are the IPSEC default settings for the key lifetime in minutes?

A

480 min

32
Q

Before secure data is sent, what must occur to determine the type of traffic to be secured and how it will be secured?

A

quick mode negotiations

33
Q

The command “set config property=ipsecloginterval value=value” can be set to what range of values?

A

60 – 86,400

34
Q

Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?

A

Kerberos v5 protocol

35
Q

Which service responds to requests from clients concerning the revocation status of a particular certificate, sending back a digitally signed response indicating the certificate’s current status?

A

Online Responder

36
Q

To indicate the health status of a particular SHA, each SHA creates what kind of statement that it transmits to the NAP Agent?

A

Statement of Health

37
Q

To distribute the load of issuing certificates in a geographically dispersed location, an organization can have one or more __________ CAs.

A

intermediate

38
Q

Which digital document contains identifying information about a particular user, computer, service, and so on?

A

digital certificate

39
Q

What does the Windows Server Backup feature use to perform file and volume-level backups?

A

Volume Shadow Copies

40
Q

Once you have enabled Shadow Copies of Shared Folders for a particular volume, the default schedule will create a snapshot twice per day, seven days per week, at what times?

A

7:00 am and 12:00 pm

41
Q

NTFS quotas are limited to controlling storage on entire volumes on what basis?

A

per user

42
Q

When restoring data in Windows Server 2008, what types of restores can you can choose to perform?

A

files/folders/volumes