Final Exam Study Exam 5 Flashcards

1
Q

Of the several key components of subnetting that are listed below, which is the most accurate description?

A

Systems within a subnet need not be burdened with information about external network addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The routing service included with Windows Server 2008 is better suited for __________.

A

A smaller network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPv4 addresses are commonly represented by using what type of notation?

A

Dottended Notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which feature is an integral part of IPv6, whereas it was an optional feature under IPv4?

A

IP Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of volume consists of free space contained on a single physical disk?

A

Simple Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Server Core installation includes which of the following programs?

A

Windows Notepad (can be launched from the command line)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can configure network settings on a Windows Server 2008 computer by using a number of different tools with the exception of which of the following?

A

File and Print Sharing Wizard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can configure network settings on a Windows Server 2008 computer by using a number of different tools which are?

A

Initial Configuration Tasks or the new Server Manager consoles, as well as the Windows command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which method is not a possibility when activating A MAK (Multi activation Key) key?

A

via Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The core function of DHCP is to __________.

A

assign addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.

A

DHCPOffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following apply to all clients within a scope and are the most frequently used set of options?

A

Scope Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not a forward or reverse lookup zone type?

A

integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded?

A

TTL (Time To Live)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.

A

domain controllers in the forest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries except __________.

A

Iterative

Simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you view the IP routing table?

A

Routing and Remote Access console

Command Prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the limited broadcast address that is general for all networks and routers?

A

255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet?

A

VPN - Virtual Private Network

20
Q

What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point?

A

Supplicant

21
Q

How many active partitions can you have per hard drive?

A

1, The system BIOS looks to the active partition for the boot files it uses to start the operating system.

22
Q

Regardless of the size of your network, your strategy for creating shared folders should consist of all the following information except what __________.

A

online file settings you will use for the shares

23
Q

For network users to be able to access a shared folder on an NTFS drive, you must grant them __________ permissions.

A

Share

NTFS

24
Q

The Distributed File System (DFS) implemented in the Windows Server 2008 File Services role includes two technologies: DFS Namespaces and __________.

A

DFS Replication

25
Q

What computer (or standalone device) receives print jobs from clients and sends them to print devices that are either locally attached or connected to the network?

A

Print Server

26
Q

Which document management menu command causes the print server to stop sending jobs to the print device until you resume it by selecting the same menu item again?

A

Printer > Pause Printing

27
Q

Which of the following is not an option with the Print Services Management Console?

A

Installing a printer

28
Q

Just as with folder shares, what must clients have to access a shared printer?

A

proper permissions

29
Q

Which of the following is the most frequently used view within the Reliability and Performance Monitor?

A

Performance Monitor

30
Q

Which of the following is not a built-in Data Collector Set within Windows Server 2008?

A

System Monitor

31
Q

When you first launch Network Monitor, what key do you press to begin capturing network traffic?

A

F10 to start and F11 to end

32
Q

Which of the following is not a category for the Windows operating system updates?

A

Group Policy updates

33
Q

What are the following category for the Windows operating system updates?

A

recommended downloads, Windows tools, Internet and multimedia updates, Windows downloads, multilanguage features, and documentation.

34
Q

What rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as membership in a particular Active Directory domain?

A

Isolation

35
Q

Which “middle-of-the-road” form of NTLM authentication was used to improve upon the security of LM Authentication?

A

NTLM Authentication

36
Q

Which process is used to establish trust between communicating systems, after which only trusted systems can communicate with each other?

A

mutual authentication

37
Q

Which field does the IPSec driver use to match the correct SA with the correct packet?

A

SPI field (The IPSec driver uses the SPI field to match the correct SA with the correct packet.)

38
Q

Who maintains information about the health of the NAP client computer and transmits information between the NAP Enforcement Clients and the System Health Agents?

A

NAP Agent

39
Q

Which enforcement method allows authorized remote users to connect to resources on an internal corporate or private network from any Internet-connected device?

A

Terminal Services Gateway (TS Gateway) enforcement

40
Q

What feature allows users or computers to manually request a certificate based a template?

A

Enroll ACL

41
Q

Which element of Active Directory Certificate Services utilizes the Online Certificate Status Protocol to act in response to client requests?

A

Online Responder

42
Q

Which Windows feature allows users to perform self-service restores of previous versions of files and folders in case of accidental deletion or unwanted modifications?

A

Shadow Copies of Shared Folders

43
Q

What is the minimum amount of space you must allocate to store shadow copies?

A

300MB

44
Q

A maximum of how many shadow copies can be stored on a particular volume?

A

64

45
Q

Windows Server Backup supports the use of what type of media as backup destinations?

A

DVD