Anda di halaman 1dari 28

CHAPTER 3:MANAGING THE DHCP ROLE

1 out of 1 points DHCP frees system administrators from manually configuring each host on the network. Answer Selected Answer: Correct Answer: True True

Question 2
1 out of 1 points The smaller the network, the greater the benefit of using a dynamic address assignment. Answer Selected Answer: Correct Answer: False False

Question 3
0 out of 1 points DHCP provides three key benefits to those managing and maintaining a TCP/IP network. Answer Selected Answer: Correct Answer: True False

Question 4
1 out of 1 points The key aspect of the DHCP process is that it is dynamic. Answer Selected Answer: Correct Answer: True True

Question 5
1 out of 1 points

Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope. Answer Selected Answer: Correct Answer: True True

Question 6
1 out of 1 points The Reverse Address Resolution Protocol (RARP) was designed for what reason? Answer Selected Answer: Correct Answer: for diskless workstations that had no means of permanently storing their TCP/IP settings for diskless workstations that had no means of permanently storing their TCP/IP settings

Question 7
1 out of 1 points RARP was essentially the opposite of what protocol? Answer Selected Answer: ARP Correct Answer: ARP

Question 8
1 out of 1 points BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option? Answer Selected Answer: workstation settings Correct Answer:

workstation settings

Question 9
1 out of 1 points Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network? Answer Selected Answer: de-centralized administration Correct Answer: de-centralized administration

Question 10
1 out of 1 points The core function of DHCP is to __________. Answer Selected Answer: assign addresses Correct Answer: assign addresses

Question 11
1 out of 1 points What computer provides DHCP configuration information to multiple clients? Answer Selected Answer: DHCP server Correct Answer: DHCP server

Question 12
1 out of 1 points

Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address and lease duration? Answer Selected Answer: DHCPDISCOVER Correct Answer: DHCPDISCOVER

Question 13
1 out of 1 points Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide? Answer Selected Answer: DHCPACK Correct Answer: DHCPACK

Question 14
1 out of 1 points The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used? Answer Selected Answer: DHCPRELEASE Correct Answer: DHCPRELEASE

Question 15
1 out of 1 points All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.

Answer Selected Answer: DHCPOFFER Correct Answer: DHCPOFFER

Question 16
1 out of 1 points The broadcast DHCPREQUEST message contains all of the following information except __________. Answer Selected Answer: DNS information for the client Correct Answer: DNS information for the client

Question 17
1 out of 1 points A DHCP client will perform the initial lease process in all of the following situations with the exception of __________. Answer Selected Answer: after every reboot Correct Answer: after every reboot

Question 18
1 out of 1 points If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. Additional discovery attempts are made under what condition? Answer Selected Answer: All of the above

Correct Answer: All of the above

Question 19
1 out of 1 points The IP addresses defined in a DHCP scope must be __________. Answer Selected Answer: both A and B Correct Answer: both A and B

Question 20
1 out of 1 points Which of the following apply to all clients within a scope and are the most frequently used set of options? Answer Selected Answer: scope options Correct Answer: scope options

Question 21
1 out of 1 points Which of the following is not a database function used to manage the DHCP database? Answer Selected Answer: connect Correct Answer: connect

Question 22
1 out of 1 points

What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry? Answer Selected Answer: Correct Answer: You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer. You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer.

Question 23
1 out of 1 points Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%\System32\Dhcp directory after a system failure)? Answer Selected Answer: Temp.edb Correct Answer: Temp.edb

Question 24
1 out of 1 points The MAC address can be obtained by keying in __________ at the command line. Answer Selected Answer: ipconfig /all Correct Answer: ipconfig /all

Question 25
1 out of 1 points After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and

__________ as the destination address. Answer Selected Answer: 255.255.255.255 Correct Answer: 255.255.255.255

Question 26
10 out of 10 points
Match description to terminology.

Answer Question
The __________ Address Resolution Protocol was designed for diskless workstations that had no means of permanently storing their TCP/IP settings. RARP, as its name suggests, was essentially the opposite of Address Resolution Protocol. Using __________ File Transfer Protocol, a lightweight version of FTP that uses the UDP protocol, a workstation also can download an executable boot file from a BOOTP server. DHCP functions at the __________ layer of the Open System Interconnection (OSI) reference model. All DHCP messages are carried in User Datagram Protocol datagrams using the well-known port numbers 67 (from the server) and __________ (to the client). A DHCP client first attempts to reacquire its lease at half the lease time, which is known as __________.

Correct Match B.
Reverse

Selected Match B.
Reverse

C.
Trivial

C.
Trivial

E.
Application

E.
Application

G.
68 68

G.

D.
T1 T1

D. F.
authorize

F. Active Directory must be present to __________ DHCP servers and block unauthorized servers. authorize
To allow for the possibility that some IP addresses in the scope I. might already be assigned and in use, the DHCP administrator exclusion can specify a(n) __________ range, which is one or more IP addresses in the scope that are not handed out to DHCP clients.

I.
exclusion

H. The DHCP server database in the Windows Server 2008 family uses the Joint __________ Technology storage engine. Engine
A(n) __________ file indicates the location of the last information that was successfully written from the transaction logs to the database. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an

H.
Engine

A.
checkpoint

A.
checkpoint

J.

J.

available address __________ within the scope.

pool

pool

Question 27
9 out of 10 points
Match description to terminology.

Answer Question
DHCP is defined by the Internet Engineering Task Force (IETF) in which two Requests for Comments?

Correct Match B.
2131 and 2132

Selected Match B.
2131 and 2132

All DHCP messages are carried in what protocol?

D.
UDP

D.
UDP

What is either a host or IP router that listens for DHCP (and BOOTP) client messages being broadcast on a subnet and then forwards those DHCP messages to a DHCP server?

L.
DHCP relay agent

L.
DHCP relay agent

When the DHCP client and DHCP server are on the same subnet, what is a message sent by the DHCP Server? What is a type of DHCP option in Windows Server 2008?

H.
DHCPACK

H.
DHCPACK

E.
class

C.
1542 and 2606

When creating a reservation, what must you know for each device for which you are reserving an address?

I.
MAC address

I.
MAC address

What is another name for a unauthorized DHCP server?

K.
rogue DHCP

K.
rogue DHCP

Since the advent of TCP/IP, several solutions have been F. developed to address the challenge of configuring TCP/IP BOOTP settings for organizations with a large number of workstations. Name one of the solutions. What will happen if you install a DHCP server on a network without Active Directory? What is a requirement of a DHCP reservation?

F.
BOOTP

J.
No authorization

J.
No authorization

A.

A.

Within the scope

Within the scope

CHAPTER 4: MANAGING THE DNS ROLE

1 out of 1 points To conserve disk space, DNS servers store only the most recent updates. Answer Selected Answer: Correct Answer: True True

Question 2
1 out of 1 points The primary DNS server for a zone is not required to perform an incremental zone transfer. Answer Selected Answer: Correct Answer: True True

Question 3
1 out of 1 points For replication of Active Directoryintegrated zones, DNS notification is needed. Answer Selected Answer: Correct Answer: False False

Question 4
1 out of 1 points Scavenging is enabled by default. Answer

Selected Answer: Correct Answer:

False False

Question 5
0 out of 1 points As long as the TTL for a cached resource record does not expire, a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records. Answer Selected Answer: Correct Answer: False True

Question 6
1 out of 1 points In a Windows Server 2008 network, the primary means of locating network devices and network services is through the use of __________. Answer Selected Answer: DNS Correct Answer: DNS

Question 7
1 out of 1 points In what year was DNS introduced? Answer Selected Answer: 1984 Correct Answer: 1984

Question 8
1 out of 1 points

Which of the following is not considered a top-level domain? Answer Selected Answer: .nato Correct Answer: .nato

Question 9
1 out of 1 points What type of zone might a DNS server host? Answer Selected Answer: primary Correct Answer: primary

Question 10
1 out of 1 points Which of the following is not a forward or reverse lookup zone type? Answer Selected Answer: integrated Correct Answer: integrated

Question 11
1 out of 1 points Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed? Answer Selected Answer: standard primary zone Correct Answer:

standard primary zone

Question 12
1 out of 1 points Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone? Answer Selected Answer: stub zone Correct Answer: stub zone

Question 13
1 out of 1 points Which zone enables a host to determine another hosts name based on its IP address? Answer Selected Answer: reverse lookup zone Correct Answer: reverse lookup zone

Question 14
1 out of 1 points What are two types of Active Directoryintegrated zones? Answer Selected Answer: forward and reverse Correct Answer: forward and reverse

Question 15
1 out of 1 points

Active Directoryintegrated zones follow what type of update model? Answer Selected Answer: multimaster Correct Answer: multimaster

Question 16
1 out of 1 points Where are zone transfers initiated? Answer Selected Answer: secondary server Correct Answer: secondary server

Question 17
1 out of 1 points Which operating system does not support zone transfers? Answer Selected Answer: Windows NT Correct Answer: Windows NT

Question 18
1 out of 1 points DNS zone file resource records are represented as __________. Answer Selected Answer: text entries Correct Answer: text entries

Question 19
1 out of 1 points Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded? Answer Selected Answer: TTL Correct Answer: TTL

Question 20
1 out of 1 points After sending a zone transfer request, which option shows how long (in seconds) the zones secondary server waits before sending another request? Answer Selected Answer: Retry Correct Answer: Retry

Question 21
0 out of 1 points What is the length of time that the DNS service waits before retrying a query made during a recursive lookup? Answer Selected Answer: 5 seconds Correct Answer: 3 seconds

Question 22
0 out of 1 points

What is the length of time that the DNS service waits before failing a recursive lookup that has been retried? Answer Selected Answer: 3 seconds Correct Answer: 15 seconds

Question 23
1 out of 1 points A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________. Answer Selected Answer: domain controllers in the forest Correct Answer: domain controllers in the forest

Question 24
1 out of 1 points You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries __________. Answer Selected Answer: both B and C Correct Answer: both B and C

Question 25
1 out of 1 points Nslookup can be used for which of the following? Answer Selected Answer: all of the above

Correct Answer: all of the above

Question 26
10 out of 10 points Match description to technology name. Answer Question
A DNS zone stored in Active Directory can take advantage of increased security by modifying its __________ access control list.

Correct Match C.

Selected Match C.

discretionary discretionary

B. An Active Directoryintegrated __________ lookup zone is used for resolving an IP address to a name and reverse is similar to the standard in-addr.arpa zone.
A DNS server on a network is designated as a(n) J. __________ by having the other DNS servers in the forwarder network forward the queries they cannot resolve locally to that DNS server. __________ forwarding enables a DNS server to forward queries to other DNS servers based on the DNS domain names in the queries.

B.
reverse

J.
forwarder

A.
Conditional

A.
Conditional

The __________ command uses the local server to get I. the address of the server to which it must switch. lserver __________ is provided as a built-in command-line tool for managing DNS servers in Windows Server 2008.

I.
lserver

G.
Dnscmd

G.
Dnscmd

DNS round __________ is a load-balancing mechanism used by DNS servers to share and distribute network resource loads.
The process of mapping an IP address to a computer name is called name __________. You can add additional NS records by using DNS Manager or the __________ command-line tool.

E.
robin

E.
robin

F.
resolution

F.
resolution

D.
dnscmd

D.
dnscmd

When you are in interactive mode, you can also use the __________ command to configure Nslookup options that determine how the resolver carries out queries.

H.
Set

H.
Set

Question 27
8 out of 8 points Match the description to the terminology. Answer Question What is a hierarchical, tree-structured list of DNS host names, starting at an unnamed root that is used for all DNS operations?
What is a read-only copy of the standard primary DNS zone?

Correct Match C. DNS namespace A.


standard secondary zone

Selected Match C. DNS namespace A.


standard secondary zone

What are zones that are stored in Active Directory referred to as?

D. Active Directory integrated zones

D. Active Directory integrated zones E. zone transfer H. DNS Notify F. SOA B. MX G.


SRV

What is the complete or partial transfer of all data in a zone from the primary DNS server hosting the zone to a secondary DNS server hosting a copy of the zone? What is an update to the original DNS protocol specification that permits a means of initiating notification to secondary servers when zone changes occur? What resource record indicates the starting point or original point of authority for information stored in a zone?

E. zone transfer H. DNS Notify F. SOA

What type of resource record specifies a B. server that is willing to act as a mail server for MX a DNS name? What resource records enable you to specify G. the location of servers that provide a specific SRV network service over a specific protocol and in a specific domain?

CHAPTER 5:ROUTING AND REMOTE ACCESS


Question 1
0 out of 1 points When most traffic is synchronous, as in voice and video transmissions, VPN is your best option. Answer Selected Answer: Correct Answer: True False

Question 2
0 out of 1 points By default, the Callback Options setting is configured as No Callback. Answer Selected Answer: Correct Answer: False True

Question 3
1 out of 1 points By using the Routing and Remote Access service, Windows Server 2008 can be configured as a router and remote access server. Answer Selected Answer: Correct Answer: True True

Question 4
1 out of 1 points A hub examines the destination and source address of an incoming data frame and forwards the frame to the appropriate destination port according to the destination address. Answer Selected Answer: False

Correct Answer:

False

Question 5
1 out of 1 points A static-routed IP environment is best suited to small, single-path, static IP internetworks. Answer Selected Answer: Correct Answer: True True

Question 6
1 out of 1 points Routers are considered components of which layer? Answer Selected Answer: layer 3 Correct Answer: layer 3

Question 7
1 out of 1 points For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)? Answer Selected Answer: 10 Correct Answer: 10

Question 8
0 out of 1 points Windows Server 2008 includes all of the following routing protocols that can be added

to the Routing and Remote Access service with the exception of __________. Answer Selected Answer: DHCP Relay Agent Correct Answer: OSPF

Question 9
1 out of 1 points How can you view the IP routing table? Answer Selected Answer: both A & B Correct Answer: both A & B

Question 10
1 out of 1 points Which entries refer to a separate multicast route? Answer Selected Answer: 224.0.0.0 Correct Answer: 224.0.0.0

Question 11
0 out of 1 points Which of the following is the limited broadcast address that is general for all networks and routers? Answer Selected Answer: Correct Answer: 255.255.255.255 [None Given]

Question 12
1 out of 1 points Which column of the IP Routing Table indicates the gateway value for each routing table entry? Answer Selected Answer: third Correct Answer: third

Question 13
0 out of 1 points Of the four types of routes that can be found in a routing table, which of the following cannot be found? Answer Selected Answer: directly attached network routes Correct Answer: client routes

Question 14
1 out of 1 points Which option enables internal clients to connect to the Internet using a single, external IP address? Answer Selected Answer: network address translation Correct Answer: network address translation

Question 15
1 out of 1 points

What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet? Answer Selected Answer: virtual private network Correct Answer: virtual private network

Question 16
1 out of 1 points An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items? Answer Selected Answer: all of the above Correct Answer: all of the above

Question 17
1 out of 1 points What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key? Answer Selected Answer: basic encryption Correct Answer: basic encryption

Question 18
1 out of 1 points Which mutual authentication method offers encryption of both authentication data and connection data? Answer Selected Answer:

MS-CHAPv2 Correct Answer: MS-CHAPv2

Question 19
0 out of 1 points Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme? Answer Selected Answer: Correct Answer: Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) Challenge Handshake Authentication Protocol (CHAP)

Question 20
0 out of 1 points Which generic authentication method does not encrypt authentication data? Answer Selected Answer: Shiva Password Authentication Protocol (SPAP) Correct Answer: Password Authentication Protocol (PAP)

Question 21
1 out of 1 points 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________. Answer Selected Answer: verifier Correct Answer: verifier

Question 22
1 out of 1 points What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point? Answer Selected Answer: supplicant Correct Answer: supplicant

Question 23
1 out of 1 points Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)? Answer Selected Answer: MS-CHAPv1 Correct Answer: MS-CHAPv1

Question 24
1 out of 1 points One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option? Answer Selected Answer: Client Must Supply an IP Address Correct Answer: Client Must Supply an IP Address

Question 25
1 out of 1 points

By default, the Callback Options setting is configured as __________. Answer Selected Answer: No Callback Correct Answer: No Callback

Question 26
10 out of 10 points Match the description with terminology. Answer Question
Open __________ Path First was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks. The first column in the routing table indicates the network __________. The final column in the routing table corresponds to the routing table entrys __________. For remote network routes, the __________-Hop field is a local routers IP address. The __________ protocol translates internal, private IP addresses to external, public IP addresses and vice versa.

Correct Match H.
Shortest

Selected Match H.
Shortest

A.
destination

A.
destination

J.
metric

J.
metric

B.
Next

B.
Next

E.
NAT

E.
NAT

After a user submits credentials to create a remote access connection, the remote access connection must be authorized by a Windows Server 2008 server running the Network __________ Server RRAS role service. __________ is the process of verifying that an entity or object is who or what it claims to be. As a final step in configuring the Network Policy Server to provide authentication, authorization, and accounting for your remote access clients,

D.
Policy

D.
Policy

F. I.
accounting

F. I.
accounting

Authentication Authentication

you will also need to configure __________.


__________ addresses include specific subnet broadcast addresses, such as 192.168.0.255. You can view the IP routing table by using the Routing and Remote Access console or the __________ prompt.

G.
Broadcast

G.
Broadcast

C.
command

C.
command

Question 27
8 out of 8 points Match the descripton to terminology. Answer Question
802.1X provides port-based security through the use of an Authentication Server and what in another other components? What is one encryption options available in the Encryption tab?

Correct Match E.
supplicant

Selected Match E.
supplicant

H.
None

H.
None

802.1X can allow or deny access on the basis of a G. physical port (such as someone plugging into a single wall port based jack using an Ethernet cable) or a logical port (such as one or more people connecting to a wireless access point using the WiFi cards in one or more laptops or handheld devices). This occurs because 802.1x is based on what? What is a rule for evaluating remote connections?

G.
port based

B. NPS Network Policy

B. NPS Network Policy F.


RADIUS

What type of server can be used to centralize remote access authentication, authorization, and logging? What protocol enables private networks to connect to the Internet?

F.
RADIUS

C. NAT

C. NAT A.
OSPF

What was designed to address the scalability limitations of A. RIP to create a routing protocol that could be used on OSPF significantly larger networks?

What is a route to a specific IP address?

D.

D.

host route host route

Anda mungkin juga menyukai