1 out of 1 points DHCP frees system administrators from manually configuring each host on the network. Answer Selected Answer: Correct Answer: True True
Question 2
1 out of 1 points The smaller the network, the greater the benefit of using a dynamic address assignment. Answer Selected Answer: Correct Answer: False False
Question 3
0 out of 1 points DHCP provides three key benefits to those managing and maintaining a TCP/IP network. Answer Selected Answer: Correct Answer: True False
Question 4
1 out of 1 points The key aspect of the DHCP process is that it is dynamic. Answer Selected Answer: Correct Answer: True True
Question 5
1 out of 1 points
Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope. Answer Selected Answer: Correct Answer: True True
Question 6
1 out of 1 points The Reverse Address Resolution Protocol (RARP) was designed for what reason? Answer Selected Answer: Correct Answer: for diskless workstations that had no means of permanently storing their TCP/IP settings for diskless workstations that had no means of permanently storing their TCP/IP settings
Question 7
1 out of 1 points RARP was essentially the opposite of what protocol? Answer Selected Answer: ARP Correct Answer: ARP
Question 8
1 out of 1 points BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option? Answer Selected Answer: workstation settings Correct Answer:
workstation settings
Question 9
1 out of 1 points Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network? Answer Selected Answer: de-centralized administration Correct Answer: de-centralized administration
Question 10
1 out of 1 points The core function of DHCP is to __________. Answer Selected Answer: assign addresses Correct Answer: assign addresses
Question 11
1 out of 1 points What computer provides DHCP configuration information to multiple clients? Answer Selected Answer: DHCP server Correct Answer: DHCP server
Question 12
1 out of 1 points
Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address and lease duration? Answer Selected Answer: DHCPDISCOVER Correct Answer: DHCPDISCOVER
Question 13
1 out of 1 points Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide? Answer Selected Answer: DHCPACK Correct Answer: DHCPACK
Question 14
1 out of 1 points The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used? Answer Selected Answer: DHCPRELEASE Correct Answer: DHCPRELEASE
Question 15
1 out of 1 points All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.
Question 16
1 out of 1 points The broadcast DHCPREQUEST message contains all of the following information except __________. Answer Selected Answer: DNS information for the client Correct Answer: DNS information for the client
Question 17
1 out of 1 points A DHCP client will perform the initial lease process in all of the following situations with the exception of __________. Answer Selected Answer: after every reboot Correct Answer: after every reboot
Question 18
1 out of 1 points If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. Additional discovery attempts are made under what condition? Answer Selected Answer: All of the above
Question 19
1 out of 1 points The IP addresses defined in a DHCP scope must be __________. Answer Selected Answer: both A and B Correct Answer: both A and B
Question 20
1 out of 1 points Which of the following apply to all clients within a scope and are the most frequently used set of options? Answer Selected Answer: scope options Correct Answer: scope options
Question 21
1 out of 1 points Which of the following is not a database function used to manage the DHCP database? Answer Selected Answer: connect Correct Answer: connect
Question 22
1 out of 1 points
What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry? Answer Selected Answer: Correct Answer: You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer. You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer.
Question 23
1 out of 1 points Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%\System32\Dhcp directory after a system failure)? Answer Selected Answer: Temp.edb Correct Answer: Temp.edb
Question 24
1 out of 1 points The MAC address can be obtained by keying in __________ at the command line. Answer Selected Answer: ipconfig /all Correct Answer: ipconfig /all
Question 25
1 out of 1 points After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and
__________ as the destination address. Answer Selected Answer: 255.255.255.255 Correct Answer: 255.255.255.255
Question 26
10 out of 10 points
Match description to terminology.
Answer Question
The __________ Address Resolution Protocol was designed for diskless workstations that had no means of permanently storing their TCP/IP settings. RARP, as its name suggests, was essentially the opposite of Address Resolution Protocol. Using __________ File Transfer Protocol, a lightweight version of FTP that uses the UDP protocol, a workstation also can download an executable boot file from a BOOTP server. DHCP functions at the __________ layer of the Open System Interconnection (OSI) reference model. All DHCP messages are carried in User Datagram Protocol datagrams using the well-known port numbers 67 (from the server) and __________ (to the client). A DHCP client first attempts to reacquire its lease at half the lease time, which is known as __________.
Correct Match B.
Reverse
Selected Match B.
Reverse
C.
Trivial
C.
Trivial
E.
Application
E.
Application
G.
68 68
G.
D.
T1 T1
D. F.
authorize
F. Active Directory must be present to __________ DHCP servers and block unauthorized servers. authorize
To allow for the possibility that some IP addresses in the scope I. might already be assigned and in use, the DHCP administrator exclusion can specify a(n) __________ range, which is one or more IP addresses in the scope that are not handed out to DHCP clients.
I.
exclusion
H. The DHCP server database in the Windows Server 2008 family uses the Joint __________ Technology storage engine. Engine
A(n) __________ file indicates the location of the last information that was successfully written from the transaction logs to the database. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an
H.
Engine
A.
checkpoint
A.
checkpoint
J.
J.
pool
pool
Question 27
9 out of 10 points
Match description to terminology.
Answer Question
DHCP is defined by the Internet Engineering Task Force (IETF) in which two Requests for Comments?
Correct Match B.
2131 and 2132
Selected Match B.
2131 and 2132
D.
UDP
D.
UDP
What is either a host or IP router that listens for DHCP (and BOOTP) client messages being broadcast on a subnet and then forwards those DHCP messages to a DHCP server?
L.
DHCP relay agent
L.
DHCP relay agent
When the DHCP client and DHCP server are on the same subnet, what is a message sent by the DHCP Server? What is a type of DHCP option in Windows Server 2008?
H.
DHCPACK
H.
DHCPACK
E.
class
C.
1542 and 2606
When creating a reservation, what must you know for each device for which you are reserving an address?
I.
MAC address
I.
MAC address
K.
rogue DHCP
K.
rogue DHCP
Since the advent of TCP/IP, several solutions have been F. developed to address the challenge of configuring TCP/IP BOOTP settings for organizations with a large number of workstations. Name one of the solutions. What will happen if you install a DHCP server on a network without Active Directory? What is a requirement of a DHCP reservation?
F.
BOOTP
J.
No authorization
J.
No authorization
A.
A.
1 out of 1 points To conserve disk space, DNS servers store only the most recent updates. Answer Selected Answer: Correct Answer: True True
Question 2
1 out of 1 points The primary DNS server for a zone is not required to perform an incremental zone transfer. Answer Selected Answer: Correct Answer: True True
Question 3
1 out of 1 points For replication of Active Directoryintegrated zones, DNS notification is needed. Answer Selected Answer: Correct Answer: False False
Question 4
1 out of 1 points Scavenging is enabled by default. Answer
False False
Question 5
0 out of 1 points As long as the TTL for a cached resource record does not expire, a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records. Answer Selected Answer: Correct Answer: False True
Question 6
1 out of 1 points In a Windows Server 2008 network, the primary means of locating network devices and network services is through the use of __________. Answer Selected Answer: DNS Correct Answer: DNS
Question 7
1 out of 1 points In what year was DNS introduced? Answer Selected Answer: 1984 Correct Answer: 1984
Question 8
1 out of 1 points
Which of the following is not considered a top-level domain? Answer Selected Answer: .nato Correct Answer: .nato
Question 9
1 out of 1 points What type of zone might a DNS server host? Answer Selected Answer: primary Correct Answer: primary
Question 10
1 out of 1 points Which of the following is not a forward or reverse lookup zone type? Answer Selected Answer: integrated Correct Answer: integrated
Question 11
1 out of 1 points Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed? Answer Selected Answer: standard primary zone Correct Answer:
Question 12
1 out of 1 points Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone? Answer Selected Answer: stub zone Correct Answer: stub zone
Question 13
1 out of 1 points Which zone enables a host to determine another hosts name based on its IP address? Answer Selected Answer: reverse lookup zone Correct Answer: reverse lookup zone
Question 14
1 out of 1 points What are two types of Active Directoryintegrated zones? Answer Selected Answer: forward and reverse Correct Answer: forward and reverse
Question 15
1 out of 1 points
Active Directoryintegrated zones follow what type of update model? Answer Selected Answer: multimaster Correct Answer: multimaster
Question 16
1 out of 1 points Where are zone transfers initiated? Answer Selected Answer: secondary server Correct Answer: secondary server
Question 17
1 out of 1 points Which operating system does not support zone transfers? Answer Selected Answer: Windows NT Correct Answer: Windows NT
Question 18
1 out of 1 points DNS zone file resource records are represented as __________. Answer Selected Answer: text entries Correct Answer: text entries
Question 19
1 out of 1 points Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded? Answer Selected Answer: TTL Correct Answer: TTL
Question 20
1 out of 1 points After sending a zone transfer request, which option shows how long (in seconds) the zones secondary server waits before sending another request? Answer Selected Answer: Retry Correct Answer: Retry
Question 21
0 out of 1 points What is the length of time that the DNS service waits before retrying a query made during a recursive lookup? Answer Selected Answer: 5 seconds Correct Answer: 3 seconds
Question 22
0 out of 1 points
What is the length of time that the DNS service waits before failing a recursive lookup that has been retried? Answer Selected Answer: 3 seconds Correct Answer: 15 seconds
Question 23
1 out of 1 points A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________. Answer Selected Answer: domain controllers in the forest Correct Answer: domain controllers in the forest
Question 24
1 out of 1 points You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries __________. Answer Selected Answer: both B and C Correct Answer: both B and C
Question 25
1 out of 1 points Nslookup can be used for which of the following? Answer Selected Answer: all of the above
Question 26
10 out of 10 points Match description to technology name. Answer Question
A DNS zone stored in Active Directory can take advantage of increased security by modifying its __________ access control list.
Correct Match C.
Selected Match C.
discretionary discretionary
B. An Active Directoryintegrated __________ lookup zone is used for resolving an IP address to a name and reverse is similar to the standard in-addr.arpa zone.
A DNS server on a network is designated as a(n) J. __________ by having the other DNS servers in the forwarder network forward the queries they cannot resolve locally to that DNS server. __________ forwarding enables a DNS server to forward queries to other DNS servers based on the DNS domain names in the queries.
B.
reverse
J.
forwarder
A.
Conditional
A.
Conditional
The __________ command uses the local server to get I. the address of the server to which it must switch. lserver __________ is provided as a built-in command-line tool for managing DNS servers in Windows Server 2008.
I.
lserver
G.
Dnscmd
G.
Dnscmd
DNS round __________ is a load-balancing mechanism used by DNS servers to share and distribute network resource loads.
The process of mapping an IP address to a computer name is called name __________. You can add additional NS records by using DNS Manager or the __________ command-line tool.
E.
robin
E.
robin
F.
resolution
F.
resolution
D.
dnscmd
D.
dnscmd
When you are in interactive mode, you can also use the __________ command to configure Nslookup options that determine how the resolver carries out queries.
H.
Set
H.
Set
Question 27
8 out of 8 points Match the description to the terminology. Answer Question What is a hierarchical, tree-structured list of DNS host names, starting at an unnamed root that is used for all DNS operations?
What is a read-only copy of the standard primary DNS zone?
What are zones that are stored in Active Directory referred to as?
What is the complete or partial transfer of all data in a zone from the primary DNS server hosting the zone to a secondary DNS server hosting a copy of the zone? What is an update to the original DNS protocol specification that permits a means of initiating notification to secondary servers when zone changes occur? What resource record indicates the starting point or original point of authority for information stored in a zone?
What type of resource record specifies a B. server that is willing to act as a mail server for MX a DNS name? What resource records enable you to specify G. the location of servers that provide a specific SRV network service over a specific protocol and in a specific domain?
Question 2
0 out of 1 points By default, the Callback Options setting is configured as No Callback. Answer Selected Answer: Correct Answer: False True
Question 3
1 out of 1 points By using the Routing and Remote Access service, Windows Server 2008 can be configured as a router and remote access server. Answer Selected Answer: Correct Answer: True True
Question 4
1 out of 1 points A hub examines the destination and source address of an incoming data frame and forwards the frame to the appropriate destination port according to the destination address. Answer Selected Answer: False
Correct Answer:
False
Question 5
1 out of 1 points A static-routed IP environment is best suited to small, single-path, static IP internetworks. Answer Selected Answer: Correct Answer: True True
Question 6
1 out of 1 points Routers are considered components of which layer? Answer Selected Answer: layer 3 Correct Answer: layer 3
Question 7
1 out of 1 points For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)? Answer Selected Answer: 10 Correct Answer: 10
Question 8
0 out of 1 points Windows Server 2008 includes all of the following routing protocols that can be added
to the Routing and Remote Access service with the exception of __________. Answer Selected Answer: DHCP Relay Agent Correct Answer: OSPF
Question 9
1 out of 1 points How can you view the IP routing table? Answer Selected Answer: both A & B Correct Answer: both A & B
Question 10
1 out of 1 points Which entries refer to a separate multicast route? Answer Selected Answer: 224.0.0.0 Correct Answer: 224.0.0.0
Question 11
0 out of 1 points Which of the following is the limited broadcast address that is general for all networks and routers? Answer Selected Answer: Correct Answer: 255.255.255.255 [None Given]
Question 12
1 out of 1 points Which column of the IP Routing Table indicates the gateway value for each routing table entry? Answer Selected Answer: third Correct Answer: third
Question 13
0 out of 1 points Of the four types of routes that can be found in a routing table, which of the following cannot be found? Answer Selected Answer: directly attached network routes Correct Answer: client routes
Question 14
1 out of 1 points Which option enables internal clients to connect to the Internet using a single, external IP address? Answer Selected Answer: network address translation Correct Answer: network address translation
Question 15
1 out of 1 points
What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet? Answer Selected Answer: virtual private network Correct Answer: virtual private network
Question 16
1 out of 1 points An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items? Answer Selected Answer: all of the above Correct Answer: all of the above
Question 17
1 out of 1 points What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key? Answer Selected Answer: basic encryption Correct Answer: basic encryption
Question 18
1 out of 1 points Which mutual authentication method offers encryption of both authentication data and connection data? Answer Selected Answer:
Question 19
0 out of 1 points Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme? Answer Selected Answer: Correct Answer: Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) Challenge Handshake Authentication Protocol (CHAP)
Question 20
0 out of 1 points Which generic authentication method does not encrypt authentication data? Answer Selected Answer: Shiva Password Authentication Protocol (SPAP) Correct Answer: Password Authentication Protocol (PAP)
Question 21
1 out of 1 points 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________. Answer Selected Answer: verifier Correct Answer: verifier
Question 22
1 out of 1 points What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point? Answer Selected Answer: supplicant Correct Answer: supplicant
Question 23
1 out of 1 points Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)? Answer Selected Answer: MS-CHAPv1 Correct Answer: MS-CHAPv1
Question 24
1 out of 1 points One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option? Answer Selected Answer: Client Must Supply an IP Address Correct Answer: Client Must Supply an IP Address
Question 25
1 out of 1 points
By default, the Callback Options setting is configured as __________. Answer Selected Answer: No Callback Correct Answer: No Callback
Question 26
10 out of 10 points Match the description with terminology. Answer Question
Open __________ Path First was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks. The first column in the routing table indicates the network __________. The final column in the routing table corresponds to the routing table entrys __________. For remote network routes, the __________-Hop field is a local routers IP address. The __________ protocol translates internal, private IP addresses to external, public IP addresses and vice versa.
Correct Match H.
Shortest
Selected Match H.
Shortest
A.
destination
A.
destination
J.
metric
J.
metric
B.
Next
B.
Next
E.
NAT
E.
NAT
After a user submits credentials to create a remote access connection, the remote access connection must be authorized by a Windows Server 2008 server running the Network __________ Server RRAS role service. __________ is the process of verifying that an entity or object is who or what it claims to be. As a final step in configuring the Network Policy Server to provide authentication, authorization, and accounting for your remote access clients,
D.
Policy
D.
Policy
F. I.
accounting
F. I.
accounting
Authentication Authentication
G.
Broadcast
G.
Broadcast
C.
command
C.
command
Question 27
8 out of 8 points Match the descripton to terminology. Answer Question
802.1X provides port-based security through the use of an Authentication Server and what in another other components? What is one encryption options available in the Encryption tab?
Correct Match E.
supplicant
Selected Match E.
supplicant
H.
None
H.
None
802.1X can allow or deny access on the basis of a G. physical port (such as someone plugging into a single wall port based jack using an Ethernet cable) or a logical port (such as one or more people connecting to a wireless access point using the WiFi cards in one or more laptops or handheld devices). This occurs because 802.1x is based on what? What is a rule for evaluating remote connections?
G.
port based
What type of server can be used to centralize remote access authentication, authorization, and logging? What protocol enables private networks to connect to the Internet?
F.
RADIUS
C. NAT
C. NAT A.
OSPF
What was designed to address the scalability limitations of A. RIP to create a routing protocol that could be used on OSPF significantly larger networks?
D.
D.