Final Exam Study Exam 3 Flashcards

1
Q

The process of obtaining an IP address for a computer name (for example, “Computer A”) is called __________.

A

name resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What service provides the ability to use a Windows Server 2008 computer as a router, which passes network traffic from one TCP/IP network to another, as well as for remote access capabilities using either dial-up or VPN technology?

A

Routing and Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. No additional discovery attempts are made except under what conditions?

A
  1. The network adapter is disabled and then enabled again.
  2. The TCP/IP settings for the adapter are changed, and DHCP remains enabled after these changes.
  3. Media (such as network cabling) is disconnected and then reconnected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHCP is based heavily on which protocol?

A

BOOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the host on a TCP/IP network should be configured with a number of mandatory and optional configuration items

A

subnet mask, default gateway, and WINS/DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is made up of free space from multiple physical disks?

A

spanned volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Best practices when installing Windows Server 2008 recommends installing the software onto which type of media?

A

fresh or previously used media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can manage disks and partitions in Windows Server 2008 by using which tool?

A

Disk Management tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?

A

de-centralized administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The MAC address can be obtained by keying in __________ at the command line.

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry?

A

You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what year was DNS introduced?

A

1984

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?

A

standard primary zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where are zone transfers initiated?

A

secondary server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?

A

15 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which entries refer to a separate multicast route?

A

224.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?

A

basic encryption

18
Q

Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)?

19
Q

802.1X provides port-based security through the use of all of the following components with the exception of a(n) _________

20
Q

The system partition contains what types of files?

A

hardware-related files that the computer uses to boot

21
Q

Windows Server 2008 can support dynamic volumes as large as __________ terabytes.

22
Q

What file system provides the most granular user access control and also provides other advanced storage features, including file encryption and compression?

23
Q

What server is responsible for maintaining the list of DFS (Distributed File System )shared folders and responding to user requests for those folders?

A

namespace server

24
Q

To share printers, which Network Sharing and Discovery setting must be turned on?

A

Printer Sharing

25
What is the only role service that is required when you add the Print Services role?
Print Server
26
With network-attached print devices, what is the primary deployment decision that the administrator must make?
which computer will function as the print server
27
By default, the Print Management console displays only which of the following in its list of print servers?
local machine
28
In the Reliability and Performance Monitor, which view provides information about system events that can affect a server’s stability, including software installation and un-installation, as well as any application, operating system, or hardware failures that have occurred over a particular time period?
Reliability Monitor
29
Which log records events associated with server installation, adding and removing server roles, installing applications, and so forth?
Setup
30
Which of the following is not  a tool that can help you proactively troubleshoot network problems?
Performance console
31
What are the IPSEC default settings for the key lifetime in minutes?
480 min
32
Before secure data is sent, what must occur to determine the type of traffic to be secured and how it will be secured?
quick mode negotiations
33
The command “set config property=ipsecloginterval value=value” can be set to what range of values?
60 – 86,400
34
Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
Kerberos v5 protocol
35
Which service responds to requests from clients concerning the revocation status of a particular certificate, sending back a digitally signed response indicating the certificate’s current status?
Online Responder
36
To indicate the health status of a particular SHA, each SHA creates what kind of statement that it transmits to the NAP Agent?
Statement of Health
37
To distribute the load of issuing certificates in a geographically dispersed location, an organization can have one or more __________ CAs.
intermediate
38
Which digital document contains identifying information about a particular user, computer, service, and so on?
digital certificate
39
What does the Windows Server Backup feature use to perform file and volume-level backups?
Volume Shadow Copies
40
Once you have enabled Shadow Copies of Shared Folders for a particular volume, the default schedule will create a snapshot twice per day, seven days per week, at what times?
7:00 am and 12:00 pm
41
NTFS quotas are limited to controlling storage on entire volumes on what basis?
per user
42
When restoring data in Windows Server 2008, what types of restores can you can choose to perform?
files/folders/volumes