Final Exam Study Exam 5 Flashcards

1
Q

Of the several key components of subnetting that are listed below, which is the most accurate description?

A

Systems within a subnet need not be burdened with information about external network addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The routing service included with Windows Server 2008 is better suited for __________.

A

A smaller network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPv4 addresses are commonly represented by using what type of notation?

A

Dottended Notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which feature is an integral part of IPv6, whereas it was an optional feature under IPv4?

A

IP Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of volume consists of free space contained on a single physical disk?

A

Simple Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Server Core installation includes which of the following programs?

A

Windows Notepad (can be launched from the command line)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?

A

File and Print Sharing Wizard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can configure network settings on a Windows Server 2008 computer by using a number of different tools which are?

A

Initial Configuration Tasks or the new Server Manager consoles, as well as the Windows command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which method is not a possibility when activating A MAK (Multi activation Key) key?

A

via Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The core function of DHCP is to __________.

A

assign addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.

A

DHCPOffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following apply to all clients within a scope and are the most frequently used set of options?

A

Scope Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not a forward or reverse lookup zone type?

A

integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded?

A

TTL (Time To Live)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.

A

domain controllers in the forest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries except __________.

A

Iterative

Simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you view the IP routing table?

A

Routing and Remote Access console

Command Prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the limited broadcast address that is general for all networks and routers?

A

255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet?

A

VPN - Virtual Private Network

20
Q

What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point?

A

Supplicant

21
Q

How many active partitions can you have per hard drive?

A

1, The system BIOS looks to the active partition for the boot files it uses to start the operating system.

22
Q

Regardless of the size of your network, your strategy for creating shared folders should consist of all the following information except what __________.

A

online file settings you will use for the shares

23
Q

For network users to be able to access a shared folder on an NTFS drive, you must grant them __________ permissions.

A

Share

NTFS

24
Q

The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.

A

DFS Replication

25
What computer (or standalone device) receives print jobs from clients and sends them to print devices that are either locally attached or connected to the network?
Print Server
26
Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?
Printer > Pause Printing
27
Which of the following is not  an option with the Print Services Management Console?
Installing a printer
28
Just as with folder shares, what must clients have to access a shared printer?
proper permissions
29
Which of the following is the most frequently used view within the Reliability and Performance Monitor?
Performance Monitor
30
Which of the following is not  a built-in Data Collector Set within Windows Server 2008?
System Monitor
31
When you first launch Network Monitor, what key do you press to begin capturing network traffic?
F10 to start and F11 to end
32
Which of the following is not  a category for the Windows operating system updates?
Group Policy updates
33
What are the following category for the Windows operating system updates?
recommended downloads, Windows tools, Internet and multimedia updates, Windows downloads, multilanguage features, and documentation.
34
What rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as membership in a particular Active Directory domain?
Isolation
35
Which “middle-of-the-road” form of NTLM authentication was used to improve upon the security of LM Authentication?
NTLM Authentication
36
Which process is used to establish trust between communicating systems, after which only trusted systems can communicate with each other?
mutual authentication
37
Which field does the IPSec driver use to match the correct SA with the correct packet?
SPI field (The IPSec driver uses the SPI field to match the correct SA with the correct packet.)
38
Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?
NAP Agent
39
Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?
Terminal Services Gateway (TS Gateway) enforcement
40
What feature allows users or computers to manually request a certificate based a template?
Enroll ACL
41
Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?
Online Responder
42
Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?
Shadow Copies of Shared Folders
43
What is the minimum amount of space you must allocate to store shadow copies?
300MB
44
A maximum of how many shadow copies can be stored on a particular volume?
64
45
Windows Server Backup supports the use of what type of media as backup destinations?
DVD