CHAPTER 3:MANAGING THE DHCP ROLE 1 out of 1 points DHCP frees system administrators from manually configuring each host on the network. Answer Selected Answer: Tr ue Correct Answer: Tr ue Question 2 1 out of 1 points The smaller the network, the greater the benefit of using a dynamic address assignment. Answer Selected Answer: Fa lse Correct Answer: Fa lse Question 3 0 out of 1 points DHCP provides three key benefits to those managing and maintaining a TCP/IP network. Answer Selected Answer: Tr ue Correct Answer: Fa lse Question 4
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
CHAPTER 3:MANAGING THE DHCP ROLE
1 out of 1 points
DHCP frees system administrators from manually configuring each host on the network.Answer
Selected Answer: True
Correct Answer: True
Question 2
1 out of 1 points
The smaller the network, the greater the benefit of using a dynamic address assignment.Answer
Selected Answer: False
Correct Answer: False
Question 3
0 out of 1 points
DHCP provides three key benefits to those managing and maintaining a TCP/IP network.Answer
Selected Answer: True
Correct Answer: False
Question 4
1 out of 1 points
The key aspect of the DHCP process is that it is dynamic.Answer
Selected Answer: True
Correct Answer: True
Question 5
1 out of 1 points
Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope.Answer
Selected Answer: True
Correct Answer: True
Question 6
1 out of 1 points
The Reverse Address Resolution Protocol (RARP) was designed for what reason?Answer
Selected Answer: for diskless workstations that had no means of permanently storing
their TCP/IP settings
Correct Answer: for diskless workstations that had no means of permanently storing
their TCP/IP settings
Question 7
1 out of 1 points
RARP was essentially the opposite of what protocol?Answer
Selected Answer:ARP
Correct Answer:ARP
Question 8
1 out of 1 points
BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?Answer
Selected Answer:workstation settings
Correct Answer:workstation settings
Question 9
1 out of 1 points
Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?Answer
Selected Answer:de-centralized administration
Correct Answer:de-centralized administration
Question 10
1 out of 1 points
The core function of DHCP is to __________.Answer
Selected Answer:assign addresses
Correct Answer:assign addresses
Question 11
1 out of 1 points
What computer provides DHCP configuration information to multiple clients?Answer
Selected Answer:DHCP server
Correct Answer:DHCP server
Question 12
1 out of 1 points
Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address and lease duration?Answer
Selected Answer:DHCPDISCOVER
Correct Answer:DHCPDISCOVER
Question 13
1 out of 1 points
Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?Answer
Selected Answer:DHCPACK
Correct Answer:DHCPACK
Question 14
1 out of 1 points
The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used?Answer
Selected Answer:DHCPRELEASE
Correct Answer:DHCPRELEASE
Question 15
1 out of 1 points
All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast __________.Answer
Selected Answer:DHCPOFFER
Correct Answer:DHCPOFFER
Question 16
1 out of 1 points
The broadcast DHCPREQUEST message contains all of the following information except __________.Answer
Selected Answer:DNS information for the client
Correct Answer:DNS information for the client
Question 17
1 out of 1 points
A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.Answer
Selected Answer:after every reboot
Correct Answer:after every reboot
Question 18
1 out of 1 points
If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. Additional discovery attempts are made under what condition?Answer
Selected Answer:All of the above
Correct Answer:All of the above
Question 19
1 out of 1 points
The IP addresses defined in a DHCP scope must be __________.Answer
Selected Answer:both A and B
Correct Answer:both A and B
Question 20
1 out of 1 points
Which of the following apply to all clients within a scope and are the most frequently used set of options?Answer
Selected Answer:scope options
Correct Answer:scope options
Question 21
1 out of 1 points
Which of the following is not a database function used to manage the DHCP database?Answer
Selected Answer:connect
Correct Answer:connect
Question 22
1 out of 1 points
What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry?Answer
Selected Answer: You must restore the DHCP server registry keys, or they must remain
intact from previous service operations on the server computer.
Correct Answer: You must restore the DHCP server registry keys, or they must remain
intact from previous service operations on the server computer.
Question 23
1 out of 1 points
Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%\System32\Dhcp directory after a system failure)?Answer
Selected Answer:Temp.edb
Correct Answer:Temp.edb
Question 24
1 out of 1 points
The MAC address can be obtained by keying in __________ at the command line.Answer
Selected Answer:ipconfig /all
Correct Answer:ipconfig /all
Question 25
1 out of 1 points
After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address.Answer
Selected Answer:255.255.255.255
Correct Answer:
255.255.255.255
Question 26
10 out of 10 points
Match description to terminology.Answer
QuestionCorrect Match
Selected Match
The __________ Address Resolution Protocol was designed for diskless workstations that had no means of permanently storing their TCP/IP settings. RARP, as its name suggests, was essentially the opposite of Address Resolution Protocol.
B.Reverse
B.Reverse
Using __________ File Transfer Protocol, a lightweight version of FTP that uses the UDP protocol, a workstation also can download an executable boot file from a BOOTP server.
C.Trivial
C.Trivial
DHCP functions at the __________ layer of the Open System Interconnection (OSI) reference model.
E.Application
E.Application
All DHCP messages are carried in User Datagram Protocol datagrams using the well-known port numbers 67 (from the server) and __________ (to the client).
G.68
G.68
A DHCP client first attempts to reacquire its lease at half the lease time, which is known as __________.
D.T1
D.T1
Active Directory must be present to __________ DHCP servers and block unauthorized servers.
F.authorize
F.authorize
To allow for the possibility that some IP addresses in the scope might already be assigned and in use, the DHCP administrator can specify a(n) __________ range, which is one or more IP addresses in the scope that are not handed out to DHCP clients.
I.exclusion
I.exclusion
The DHCP server database in the Windows Server 2008 family uses the Joint __________ Technology storage engine.
H.Engine
H.Engine
A(n) __________ file indicates the location of the last information that was successfully written from the transaction logs to the database.
A.checkpoint
A.checkpoint
Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address __________ within the scope.
J.pool
J.pool
Question 27
9 out of 10 points
Match description to terminology.
Answer
QuestionCorrect Match
Selected Match
DHCP is defined by the Internet Engineering Task Force (IETF) in which two Requests for Comments?
B.
2131 and 2132
B.
2131 and 2132
All DHCP messages are carried in what protocol? D.
UDP
D.
UDP
What is either a host or IP router that listens for DHCP (and BOOTP) client messages being broadcast on a subnet and then forwards those DHCP messages to a DHCP server?
L.
DHCP relay agent
L.
DHCP relay agent
When the DHCP client and DHCP server are on the same subnet, what is a message sent by the DHCP Server?
H.DHCPACK
H.DHCPACK
What is a type of DHCP option in Windows Server 2008? E.class
C.1542 and 2606
When creating a reservation, what must you know for each device for which you are reserving an address?
I.
MAC address
I.
MAC address
What is another name for a unauthorized DHCP server? K.rogue DHCP
K.rogue DHCP
Since the advent of TCP/IP, several solutions have been developed to address the challenge of configuring TCP/IP settings for organizations with a large number of workstations. Name one of the solutions.
F.BOOTP
F.BOOTP
What will happen if you install a DHCP server on a network without Active Directory?
J.No authorization
J.No authorization
What is a requirement of a DHCP reservation? A.
Within the scope
A.
Within the scope
CHAPTER 4: MANAGING THE DNS ROLE
1 out of 1 points
To conserve disk space, DNS servers store only the most recent updates.Answer
Selected Answer: True
Correct Answer: True
Question 2
1 out of 1 points
The primary DNS server for a zone is not required to perform an incremental zone transfer.Answer
Selected Answer: True
Correct Answer: True
Question 3
1 out of 1 points
For replication of Active Directory–integrated zones, DNS notification is needed.Answer
Selected Answer: False
Correct Answer: False
Question 4
1 out of 1 points
Scavenging is enabled by default.Answer
Selected Answer: False
Correct Answer: False
Question 5
0 out of 1 points
As long as the TTL for a cached resource record does not expire, a DNS server can continue to cache and use the resource record again when answering queries by its clients that match these resource records.
Answer
Selected Answer: False
Correct Answer: True
Question 6
1 out of 1 points
In a Windows Server 2008 network, the primary means of locating network devices and network services is through the use of __________.Answer
Selected Answer:DNS
Correct Answer:DNS
Question 7
1 out of 1 points
In what year was DNS introduced?Answer
Selected Answer:1984
Correct Answer:1984
Question 8
1 out of 1 points
Which of the following is not considered a top-level domain?Answer
Selected Answer:.nato
Correct Answer:.nato
Question 9
1 out of 1 points
What type of zone might a DNS server host?Answer
Selected Answer:primary
Correct Answer:primary
Question 10
1 out of 1 points
Which of the following is not a forward or reverse lookup zone type?Answer
Selected Answer:integrated
Correct Answer:integrated
Question 11
1 out of 1 points
Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed?Answer
Selected Answer:standard primary zone
Correct Answer:standard primary zone
Question 12
1 out of 1 points
Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?Answer
Selected Answer:stub zone
Correct Answer:stub zone
Question 13
1 out of 1 points
Which zone enables a host to determine another host’s name based on its IP address?Answer
Selected Answer:reverse lookup zone
Correct Answer:reverse lookup zone
Question 14
1 out of 1 points
What are two types of Active Directory–integrated zones?Answer
Selected Answer:forward and reverse
Correct Answer:forward and reverse
Question 15
1 out of 1 points
Active Directory–integrated zones follow what type of update model?Answer
Selected Answer:multimaster
Correct Answer:multimaster
Question 16
1 out of 1 points
Where are zone transfers initiated?Answer
Selected Answer:secondary server
Correct Answer:secondary server
Question 17
1 out of 1 points
Which operating system does not support zone transfers?Answer
Selected Answer:Windows NT
Correct Answer:Windows NT
Question 18
1 out of 1 points
DNS zone file resource records are represented as __________.Answer
Selected Answer:text entries
Correct Answer:text entries
Question 19
1 out of 1 points
Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded?Answer
Selected Answer:TTL
Correct Answer:TTL
Question 20
1 out of 1 points
After sending a zone transfer request, which option shows how long (in seconds) the zone’s secondary server waits before sending another request?Answer
Selected Answer:Retry
Correct Answer:Retry
Question 21
0 out of 1 points
What is the length of time that the DNS service waits before retrying a query made during a recursive lookup?Answer
Selected Answer:5 seconds
Correct Answer:3 seconds
Question 22
0 out of 1 points
What is the length of time that the DNS service waits before failing a recursive lookup that has been retried?Answer
Selected Answer:3 seconds
Correct Answer:15 seconds
Question 23
1 out of 1 points
A conditional forwarder in an Active Directory environment can be replicated to any of the following except all __________.Answer
Selected Answer:domain controllers in the forest
Correct Answer:domain controllers in the forest
Question 24
1 out of 1 points
You can use the DNS console to manually or automatically test DNS servers by submitting all of the following queries __________.Answer
Selected Answer:both B and C
Correct Answer:both B and C
Question 25
1 out of 1 points
Nslookup can be used for which of the following?Answer
Selected Answer:all of the above
Correct Answer:all of the above
Question 26
10 out of 10 points
Match description to technology name.Answer
QuestionCorrect Match
Selected Match
A DNS zone stored in Active Directory can take C. C.
advantage of increased security by modifying its __________ access control list.
discretionary discretionary
An Active Directoryintegrated __________ lookup zone is used for resolving an IP address to a name and is similar to the standard in-addr.arpa zone.
B.reverse
B.reverse
A DNS server on a network is designated as a(n) __________ by having the other DNS servers in the network forward the queries they cannot resolve locally to that DNS server.
J.forwarder
J.forwarder
__________ forwarding enables a DNS server to forward queries to other DNS servers based on the DNS domain names in the queries.
A.Conditional
A.Conditional
The __________ command uses the local server to get the address of the server to which it must switch.
I.lserver
I.lserver
__________ is provided as a built-in command-line tool for managing DNS servers in Windows Server 2008.
G.
Dnscmd
G.
Dnscmd
DNS round __________ is a load-balancing mechanism used by DNS servers to share and distribute network resource loads.
E.robin
E.robin
The process of mapping an IP address to a computer name is called name __________.
F.resolution
F.resolution
You can add additional NS records by using DNS Manager or the __________ command-line tool.
D.dnscmd
D.dnscmd
When you are in interactive mode, you can also use the __________ command to configure Nslookup options that determine how the resolver carries out queries.
H.Set
H.Set
Question 27
8 out of 8 points
Match the description to the terminology.Answer
Question Correct Match Selected Match
What is a hierarchical, tree-structured list of DNS host names, starting at an unnamed root that is used for all DNS operations?
C.
DNS namespace
C.
DNS namespace
What is a read-only copy of the standard primary DNS zone?
A.standard secondary zone
A.standard secondary zone
What are zones that are stored in Active Directory referred to as?
D.
Active Directory–integrated zones
D.
Active Directory–integrated zones
What is the complete or partial transfer of all data in a zone from the primary DNS server hosting the zone to a secondary DNS server hosting a copy of the zone?
E.
zone transfer
E.
zone transfer
What is an update to the original DNS protocol specification that permits a means of initiating notification to secondary servers when zone changes occur?
H.
DNS Notify
H.
DNS Notify
What resource record indicates the starting point or original point of authority for information stored in a zone?
F.
SOA
F.
SOA
What type of resource record specifies a server that is willing to act as a mail server for a DNS name?
B.MX
B.MX
What resource records enable you to specify the location of servers that provide a specific network service over a specific protocol and in a specific domain?
G.SRV
G.SRV
CHAPTER 5:ROUTING AND REMOTE ACCESS
Question 1
0 out of 1 points
When most traffic is synchronous, as in voice and video transmissions, VPN is your best option.Answer
Selected Answer: True
Correct Answer: False
Question 2
0 out of 1 points
By default, the Callback Options setting is configured as No Callback.Answer
Selected Answer: False
Correct Answer: True
Question 3
1 out of 1 points
By using the Routing and Remote Access service, Windows Server 2008 can be configured as a router and remote access server.Answer
Selected Answer: True
Correct Answer: True
Question 4
1 out of 1 points
A hub examines the destination and source address of an incoming data frame and forwards the frame to the appropriate destination port according to the destination address.Answer
Selected Answer: False
Correct Answer: False
Question 5
1 out of 1 points
A static-routed IP environment is best suited to small, single-path, static IP internetworks.Answer
Selected Answer: True
Correct Answer: True
Question 6
1 out of 1 points
Routers are considered components of which layer?Answer
Selected Answer:layer 3
Correct Answer:layer 3
Question 7
1 out of 1 points
For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?Answer
Selected Answer:10
Correct Answer:10
Question 8
0 out of 1 points
Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.Answer
Selected Answer:DHCP Relay Agent
Correct Answer:OSPF
Question 9
1 out of 1 points
How can you view the IP routing table?Answer
Selected Answer:
both A & B
Correct Answer:both A & B
Question 10
1 out of 1 points
Which entries refer to a separate multicast route?Answer
Selected Answer:224.0.0.0
Correct Answer:224.0.0.0
Question 11
0 out of 1 points
Which of the following is the limited broadcast address that is general for all networks and routers?Answer
Selected Answer: [None Given]
Correct Answer:255.255.255.255
Question 12
1 out of 1 points
Which column of the IP Routing Table indicates the gateway value for each routing table entry?Answer
Selected Answer:third
Correct Answer:third
Question 13
0 out of 1 points
Of the four types of routes that can be found in a routing table, which of the following cannot be found?Answer
Selected Answer:directly attached network routes
Correct Answer:client routes
Question 14
1 out of 1 points
Which option enables internal clients to connect to the Internet using a single, external IP address?Answer
Selected Answer:network address translation
Correct Answer:network address translation
Question 15
1 out of 1 points
What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet?Answer
Selected Answer:virtual private network
Correct Answer:virtual private network
Question 16
1 out of 1 points
An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items?Answer
Selected Answer:all of the above
Correct Answer:all of the above
Question 17
1 out of 1 points
What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?Answer
Selected Answer:basic encryption
Correct Answer:basic encryption
Question 18
1 out of 1 points
Which mutual authentication method offers encryption of both authentication data and connection data?Answer
Selected Answer:MS-CHAPv2
Correct Answer:MS-CHAPv2
Question 19
0 out of 1 points
Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?Answer
802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.Answer
Selected Answer:verifier
Correct Answer:verifier
Question 22
1 out of 1 points
What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point?Answer
Selected Answer:supplicant
Correct Answer:supplicant
Question 23
1 out of 1 points
Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)?Answer
Selected Answer:MS-CHAPv1
Correct Answer:MS-CHAPv1
Question 24
1 out of 1 points
One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option?Answer
Selected Answer:Client Must Supply an IP Address
Correct Answer:Client Must Supply an IP Address
Question 25
1 out of 1 points
By default, the Callback Options setting is configured as __________.Answer
Selected Answer:No Callback
Correct Answer:No Callback
Question 26
10 out of 10 points
Match the description with terminology.
Answer
Question Correct Selected
Match Match
Open __________ Path First was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks.
H.Shortest
H.Shortest
The first column in the routing table indicates the network __________.
A.destination
A.destination
The final column in the routing table corresponds to the routing table entry’s __________.
J.metric
J.metric
For remote network routes, the __________-Hop field is a local router’s IP address.
B.Next
B.Next
The __________ protocol translates internal, private IP addresses to external, public IP addresses and vice versa.
E.NAT
E.NAT
After a user submits credentials to create a remote access connection, the remote access connection must be authorized by a Windows Server 2008 server running the Network __________ Server RRAS role service.
D.Policy
D.Policy
__________ is the process of verifying that an entity or object is who or what it claims to be.
F.Authentication
F.Authentication
As a final step in configuring the Network Policy Server to provide authentication, authorization, and accounting for your remote access clients, you will also need to configure
__________.
I.accounting
I.accounting
__________ addresses include specific subnet broadcast addresses, such as 192.168.0.255.
G.Broadcast
G.Broadcast
You can view the IP routing table by using the Routing and Remote Access console or the __________ prompt.
C.command
C.command
Question 27
8 out of 8 points
Match the descripton to terminology.Answer
Question Correct Selected
Match Match
802.1X provides port-based security through the use of an Authentication Server and what in another other components?
E.supplicant
E.supplicant
What is one encryption options available in the Encryption tab?
H.None
H.None
802.1X can allow or deny access on the basis of a physical port (such as someone plugging into a single wall jack using an Ethernet cable) or a logical port (such as one or more people connecting to a wireless access point using the WiFi cards in one or more laptops or handheld devices). This occurs because 802.1x is based on what?
G.port based
G.port based
What is a rule for evaluating remote connections? B.
NPS Network Policy
B.
NPS Network Policy
What type of server can be used to centralize remote access authentication, authorization, and logging?
F.RADIUS
F.RADIUS
What protocol enables private networks to connect to the Internet?
C.NAT
C.NAT
What was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks?