Escolar Documentos
Profissional Documentos
Cultura Documentos
Question 1
5 out of 5 points
The most widely used IP addressing scheme is __ _____. Selected Answer: Correct Answer: IPv4 IPv4
Question 2 5 out of 5 points The most recent and largest address space IP addressing scheme is ______. Selected Answer: Correct Answer: IPv6 IPv6
Question 3 0 out of 5 points To distribute IP addresses automatically, a network administrator would configure the
______ service. Selected Answer: Correct Answer: DHCP Dynamic Host Configuration Protocol (DHCP)
Question 4 5 out of 5 points The first attempt at breaking up IP address space used _ _ to provide address ranges of
differing sizes. Selected Answer: Correct Answer: classful addressing classful addressing
Question 5 5 out of 5 points Prior to the introduction of the Domain Name System, computers used __ __ to map
human-readable named to IP addresses. Selected Answer: Correct Answer: HOSTS files HOSTS files
Question 6 5 out of 5 points A(n) ____ is used to separate the host address portion of an IP address from the network
address. 33. 34. 35. 36. 37. Question 7 0 out of 5 points Selected Answer: Correct Answer: Subnet Mask subnet mask
38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. ___. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73.
The subnet mask within the TCP/IP configuration is used to distinguish the ____ from the
Question 8 0 out of 5 points In dotted-decimal notation, each IPv4 address is broken up into four ____. Selected Answer: Correct Answer: bytes octets
Question 9 5 out of 5 points Server computers and other systems that need to be accessed reliably by network clients
should be configured with a(n) ____. Selected Answer: Correct Answer: static IP address static IP address
Question 10 0 out of 5 points The method of breaking up IP address space into address ranges of flexible size is called
Question 11 5 out of 5 points What must each host on a TCP/IP network be configured with in order to communicate
Question 12 5 out of 5 points What is the process of transmitting TCP/IP traffic from one IP subnet to another?
Routing Routing
74. notation? 75. 76. 77. 78. 79. 80. networks? 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99.
Question 14 5 out of 5 points What is the default network protocol of the Internet and most modern corporate
TCP/IP TCP/IP
Question 15 5 out of 5 points What was used by TCP/IP networks to perform name resolution prior to the introduction of
the Domain Name System (DNS)? Selected Answer: Correct Answer: HOSTS files HOSTS files
Question 16 5 out of 5 points What is the process of dividing a large TCP/IP address space into multiple smaller
Question 17 5 out of 5 points What technology is used by private network ranges that has extended the useful life of
IPv4 addressing and slowed the adoption rate of IPv6? 100. Selected Answer: 101. Correct Answer: 102. 103. 104. 105. 106. Selected Answer: 107. Correct Answer: 108. Default gateway Default gateway Question 18 5 out of 5 points Which TCP/IP configuration item allows client computers to communicate with other NAT NAT
Question 19 5 out of 5 points On a TCP/IP network that uses the Domain Name System (DNS) for name resolution, what
unique configuration item must each TCP/IP host possess? 112. Selected Answer: 113. Correct Answer: 114. 115. 116. 117. 118. Selected Answer: 119. Correct Answer: 120. 121. 122. 123. 124. Selected Answer: 125. Correct Answer: 126. 127. 128. 129. 130. Selected Answer: 131. Correct Answer: 132. 133. 134. 135. 136. Selected Answer: 137. Correct Answer: 138. 139. 140. 141. 142. Selected Answer: 143. Correct Answer: 144. spanned volume striped volume Question 4 0 out of 5 points A(n) ___ _____ offers the best performance of any multi-disk configuration option within initial configuration tasks Initial Configuration Tasks Question 3 5 out of 5 points The ____ ______ screen appears by default when the Windows Server 2008 operating server core server core Question 2 5 out of 5 points Installation of just the necessary components for a particular server role, without the GUI repair mode repair mode Question 1 5 out of 5 points The ability to use the installation process to fix problems with an existing Windows Server Dotted-decimal Dotted-decimal Question 20 5 out of 5 points In what format are IPv4 IP addresses most commonly written? Fully qualified domain name Fully qualified domain name
the Disk Management MMC, but does so at the expense of fault tolerance.
Question 5 5 out of 5 points The feature that allows users on different computers to access the Internet through a
single connection is called___ _______. 148. Selected Answer: 149. Correct Answer: 150. 151. 152. 153. 154. Selected Answer: 155. Correct Answer: 156. 157. 158. 159. 160. Selected Answer: 161. Correct Answer: 162. 163. 164. 165. 166. Selected Answer: 167. Correct Answer: 168. 169. 170. 171. 172. Selected Answer: 173. Correct Answer: 174. 175. 176. Question 10 5 out of 5 points Once a disk is converted from a basic disk to a(n) __ _____, it can only be accessed only by network discovery network discovery Question 9 5 out of 5 points The network location setting controls the behavior of ___ _______. firewall Windows firewall Question 8 5 out of 5 points Unsolicited inbound traffic can be blocked through the use of the ____ ___. Network location network location Question 7 5 out of 5 points The setting describing the network environment, such as home or public network, is Network and Sharing Center Network and Sharing Center Question 6 5 out of 5 points The ___ _______ provides a single point of administration to configure networking and internet connection sharing (ICS) Internet Connection Sharing
operating systems that support dynamic disks: Windows 2000 Professional, Windows XP Professional, Windows Vista Business, Enterprise or Ultimate, Windows 2000 Server, Windows Server 2003, and Windows Server 2008. 177. 178. Selected Answer: 179. Correct Answer: dynamic disk dynamic disk
180. 181. 182. network? 183. 184. Selected Answer: 185. Correct Answer: 186. 187. 188. volume? 189. 190. Selected Answer: 191. Correct Answer: 192. 193. 194. volume? 195. 196. Selected Answer: 197. Correct Answer: 198. 199. 200. 201. 202. Selected Answer: 203. Correct Answer: 204. 205. 206. 207. 208. Selected Answer: 209. Correct Answer: 210. 211. 212. 213. 214. Selected Answer: Windows Server Backup Question 16 5 out of 5 points Which feature is used to perform backups and restores of Windows volumes? HOSTS files NetBIOS Question 15 0 out of 5 points What was the primary means of name resolution on Windows networks prior to the Wireless Networking Wireless Networking Question 14 5 out of 5 points Which Windows Server 2008 feature installs and configured wireless connections and Mount point Mount point Question 13 5 out of 5 points Which disk formatting option will cause a disk to appear as a folder within an existing RAID-5 RAID-1 Question 12 0 out of 5 points What type of volume uses 50% of available drive space to provide fault tolerance for the Key Management System (KMS) Key Management System (KMS) Question 11 5 out of 5 points What type of license key allows you to host an activation service locally within your own
215. Correct Answer: 216. 217. 218. 219. 220. Selected Answer: 221. Correct Answer: 222. 223. 224. 225. 226. Selected Answer: 227. Correct Answer: 228. 229. 230. 231. 232. Selected Answer: 233. Correct Answer: 234. 235. 236. 237. 238. Selected Answer: 239. Correct Answer: 240. 241. 242. Question 1 243. 244. 245. Question
Question 17 5 out of 5 points Which networking service is used to automatically associate NetBIOS names with IP
Question 18 5 out of 5 points Which disk partition style is recommended for disks larger than 2TB or disks that are used
in Itanium computers? GUID Partition Table (GPT) GUID Partition Table (GPT)
Question 19 5 out of 5 points What is used to manage the licensing process for volume licenses of Windows Vista and
Question 20 5 out of 5 points Which volume contains the operating system files on a Windows computer?
50 out of 50 points
Match the term in Column 1 to its description in Column 2. Correct Match Selected Match E. DHCPRELEASE E. DHCPRELEASE
246. This DHCP message type is sent by a DHCP client when it no longer requires the use of an IP address that it has leased from a DHCP server. address from a particular DHCP server. assigned to DHCP clients by a DHCP server. 247. You can configure one of these to ensure that a DHCP client always receives the same IP H. reservation H. reservation F. exclusion range 248. This is used to ensure that a particular address or block of addresses within a scope is not F. exclusion range
249. You must do this to any DHCP server that needs to function within an Active Directory domain. A. authorize A. authorize D. DHCPDECLINE B. automatic restore D. DHCPDECLINE 250. A DHCP client will send this message type if it determines that an IP address offered by a DHCP server is already in use. B. automatic restore 251. This is performed by a DHCP server when corruption is detected within the DHCP database. 252. The DHCP database is based on this database technology G. Joint Engine Technology (JET) G. Joint Engine Technology (JET) 253. Authorizing DHCP servers in Active Directory is designed to prevent against these. DHCP server 254. 255. 256. These provide DHCP parameters to DHCP clients based on vendor or user type. options 258. 259. 260. 261. 262. 263. Selected Answer: 264. Correct Answer: 265. 266. 267. 268. 269. Selected Answer: 270. Correct Answer: 271. 272. 273. 274. 275. Selected Answer: 276. Correct Answer: 277. 278. 279. as: 280. 281. Selected Answer: T1 Question 5 5 out of 5 points A DHCP client first attempts to reacquire its lease at half the lease time, which is known User Datagram Protocol (UDP) User Datagram Protocol (UDP) Question 4 5 out of 5 points What protocol is used by the Trivial File Transfer Protocol (TFTP)? Application layer Application layer Question 3 5 out of 5 points At which layer of the OSI model does DHCP operate? DHCPDISCOVER DHCPDISCOVER Question 2 5 out of 5 points Which of the following DHCP message types is sent first in the process of obtaining an C. class options J. T2 J. T2 257. This defaults to 87.5% of the total DHCP lease. C. class I. rogue DHCP server I. rogue
address lease?
282. Correct Answer: 283. 284. 285. 286. 287. Selected Answer: 288. Correct Answer: 289. 290. 291. 292. 293. Selected Answer: 294. Correct Answer: 295. 296. 297. 298. 299. Selected Answer: 300. Correct Answer: 301. 302. 303. 304. 305. Selected Answer: 306. Correct Answer: 307. 308. 309. 310. 311. Selected Answer: 312. Correct Answer: 313. 314. 315. 316.
T1
Question 6 5 out of 5 points The _______ is composed of the remaining addresses within a DHCP scope once all
exclusion ranges have been applied. available address pool available address pool
Question 7 5 out of 5 points The following is a lightweight version of FTP that uses the UDP protocol, which is used by
Question 8 5 out of 5 points The following process will populate DHCP client lease information from the registry to the
Question 9 5 out of 5 points The following is an administrative grouping of scopes that is used to support multiple
Question 10 5 out of 5 points This indicates the location of the last information that was successfully written from
transaction logs to a database file, such as a DHCP database. Checkpoint file Checkpoint file
Question 11 5 out of 5 points The following is a hexadecimal address that is uniquely associated with a specific Network
317. Selected Answer: 318. Correct Answer: 319. 320. 321. 322. 323. Selected Answer: 324. Correct Answer: 325. 326. 327. 328. 329. Selected Answer: 330. Correct Answer: 331. 332. 333. 334. 335. Selected Answer: 336. Correct Answer: 337. 338. 339. 340. 341. Selected Answer: 342. Correct Answer: 343. 344. 345. 346. 347. Selected Answer: 348. Correct Answer: 349. 350. 351. 352. 353. Selected Answer: 354. Correct Answer: Question 1 MAC
MAC
5 out of 5 points
A(n) _ _ will transfer all records within a zone from a primary server to a secondary server.
Question 2 5 out of 5 points A(n) _ _ creates an alias for an existing A record. CNAME record CNAME Record
Question 3 5 out of 5 points A(n) _ _ is used by e-mail systems such as Microsoft Exchange to locate mail servers in
different networks. Mail Exchanger (MX) record Mail Exchanger (MX) record
Question 4 5 out of 5 points The _ _ allows IPv6 hosts to map host names to IP addresses. ip6.arpa domain ip6.arpa domain
Question 5 5 out of 5 points contoso.com is an example of a(n) _ _ within the .com top-level domain. second-level domain second-level domain
Question 6 5 out of 5 points The _ _ application scope will replicate DNS data to all DNS servers within a domain.
DomainDNSZones DomainDNSZones
355. 356. 357. 358. 359. Selected Answer: 360. Correct Answer: 361. 362. 363. 364. 365. Selected Answer: 366. Correct Answer: 367. 368. 369. 370. 371. Selected Answer: 372. Correct Answer: 373. 374. 375. 376. 377. Selected Answer: 378. Correct Answer: 379. 380. 381. 382. 383. Selected Answer: 384. Correct Answer: 385. 386. 387. 388. 389. Selected Answer: 390. Correct Answer: 391. Forward lookup zone Forward lookup zone Question 12 5 out of 5 points This type of zone takes human-readable FQDNs and translates them into IP addresses. Conditional forwarder Conditional forwarder Question 11 5 out of 5 points This DNS configuration item will forward DNS queries to different servers based on the country code country code Question 10 5 out of 5 points A DNS domain name like .uk or .it is an example of a(n) _ _ domain. authoritative authoritative Question 9 5 out of 5 points A DNS server is considered _ _ for each zone that it hosts. (TTL) Time To Live Time to Live (TTL) Question 8 5 out of 5 points Each DNS record has a(n) _ _ that indicates the maximum time that a record will be file-backed zone file-backed zone Question 7 5 out of 5 points A(n) _ _ stores DNS data in a text file on the server hard drive, rather than as part of
Active Directory.
392. 393.
Question 13 5 out of 5 points This zone is used in combination with IP addresses to resolve queries for IPv4 IP
addresses: 394. 395. Selected Answer: 396. Correct Answer: 397. 398. 399. 400. 401. Selected Answer: 402. Correct Answer: 403. 404. 405. 406. 407. Selected Answer: 408. Correct Answer: 409. 410. 411. 412. 413. Selected Answer: 414. Correct Answer: 415. 416. 417. 418. 419. Selected Answer: 420. Correct Answer: 421. 422. 423. 424. 425. Selected Answer: 426. Correct Answer: 427. Zone transfer Zone transfer Question 18 5 out of 5 points Data from a primary zone is transmitted to secondary zones using the following: Stub zone Stub zone Question 17 5 out of 5 points This zone type contains only SOA, name server, and glue records for the relevant zone. Discretionary Access Control List Discretionary Access Control List Question 16 5 out of 5 points You can secure an Active Directory-integrated DNS server, zone, or record by applying Authoritative answer Authoritative answer Question 15 5 out of 5 points A DNS server that hosts a primary or secondary zone containing a particular record can AAAA record AAAA record Question 14 5 out of 5 points The IPv6 DNS host record is referred to as a(n): in.addr-arpa in.addr-arpa
Question 19 5 out of 5 points These contain the names and IP addresses of the DNS servers authoritative for the root
431. Selected Answer: 432. Correct Answer: 433. 434. 435. 436. 437. Selected Answer: 438. Correct Answer: 439. 440. 441. 442. 443. Question 2 444. 445. 446. Selected Answer: 447. Correct Answer: 448. 449. 450. 451. 452. Selected Answer: 453. Correct Answer: 454. 455. 456. 457. 458. Selected Answer: 459. Correct Answer: 460. 461. 462. 463. 464. Selected Answer:
Question 20 5 out of 5 points The following feature is available only on Active Directory-integrated DNS zones:
5 out of 5 points
The IP address 255.255.255.255 represents ___________ in the IP Routing table. Limited broadcast address Limited broadcast address
Question 3 5 out of 5 points To allow users to specify a call-back number when they connect to a remote access
server via modem, you will enable the following setting: Set by Caller Set by Caller
Question 4 5 out of 5 points Routing Information Protocol v2 (RIPv2) is an example of a: Routing protocol Routing protocol
Question 5 5 out of 5 points Windows Server 2008 can provide remote access services through a Virtual Private
Question 6 5 out of 5 points When a workstation ends a session with an 802.1X-secured network port, it sends the
following to inform the network access server to set the port back to an Unauthorized status: 469. 470. Selected Answer: 471. Correct Answer: 472. 473. 474. 475. 476. Selected Answer: 477. Correct Answer: 478. 479. 480. 481. 482. Selected Answer: 483. Correct Answer: 484. 485. 486. 487. 488. Selected Answer: 489. Correct Answer: 490. 491. 492. 493. 494. Selected Answer: 495. Correct Answer: 496. 497. 498. networks: 499. 500. Selected Answer: Default route Question 11 5 out of 5 points The following route is used by a computer s default gateway to send traffic to remote Network Address Translation (NAT) Network Address Translation (NAT) Question 10 5 out of 5 points The following RRAS service allows multiple computers on an internal network to share a Authenticator Authorization Server (AS) Question 9 0 out of 5 points In an 802.1X infrastructure, an NPS or RADIUS server performs the role of the: Packets Packets Question 8 5 out of 5 points Network information at the Network Layer of the OSI model is organized into: Metric Metric Question 7 5 out of 5 points If an IP Routing Table contains two routes to the same destination network, the route with EAP-Logoff EAP-Logoff
501. Correct Answer: 502. 503. 504. 505. Question utilization. 507. 508.
Default route Match the following definitions with the appropriate term.
506. This type of router is well-suited for a small organization with low levels of network traffic I. software-based router I. software-based router
509. Network data at the Data Link Layer is organized into these. 510. 511. 512. 513. This is used as the Windows Server 2008 implementation of a RADIUS server. 514. 515. 516. 517. This routing protocol was supported in Windows Server 2003 but is no longer available with the Routing and Remote Access server role in Windows Server 2008. 518. 519. 520. 521. 522. This address corresponds to the 127.0.0.1 address used for TCP/IP diagnostics and troubleshooting. 523. 524. 525. 526. 527. 528. Question 1 529. 530. 531. Selected Answer: 532. Correct Answer: 533. 534. 535. 536. 537. Selected Answer: targets Question 2 5 out of 5 points In the Distributed File System, the actual shared folders referred to by the virtual folders multiple master replication multiple master replication 5 out of 5 points The DFS Replication engine uses a form of replication called _ _. D. loopback address D. loopback address G. Open Shortest Path First (OSPF) G. Open Shortest Path First (OSPF) F. Network Policy Server (NPS) F. Network Policy Server (NPS) B. frames B. frames
538. Correct Answer: 539. 540. 541. 542. 543. Selected Answer: 544. Correct Answer: 545. 546. 547. 548. 549. Selected Answer: 550. Correct Answer: 551. 552. 553. 554. 555. Selected Answer: 556. Correct Answer: 557. 558. 559. 560. 561. Selected Answer: 562. Correct Answer: 563. 564. 565. 566. 567. Selected Answer: 568. Correct Answer: 569. 570. 571. 572. 573. Selected Answer:
targets
Question 3 5 out of 5 points DFS Replication relies on a protocol called _ _ for file replication. remote differential compression (RDC) Remote Differential Compression (RDC)
Question 4 5 out of 5 points A DFS replication topology in which every server replicates with every other server is
Question 5 5 out of 5 points The basic file-sharing capabilities of a Windows server are provided by the _ _ service.
server Server
Question 6 5 out of 5 points To keep a DFS folder s multiple targets synchronized, you must create a(n) _ _.
Question 7 5 out of 5 points The __ __ allows you to simplify the view of file shares located across multiple servers as
they appear to your user base. distributed file service (DFS) Distributed File Service (DFS)
Question 8 5 out of 5 points A(n) __ __ appears to the operating system as though it is a physically separate disk and
574. Correct Answer: 575. 576. 577. 578. 579. Selected Answer: 580. Correct Answer: 581. 582. 583. 584. 585. Selected Answer: 586. Correct Answer: 587. 588. 589. 590. 591. Selected Answer: 592. Correct Answer: 593. 594. 595. 596. 597. Selected Answer: 598. Correct Answer: 599. 600. 601. 602. 603. Selected Answer: 604. Correct Answer: 605. 606. 607. 608. 609. Selected Answer: 610. Correct Answer:
primary partition
Question 9 5 out of 5 points A(n) __ __ enables you to limit DFS replication traffic to specific pairs of members.
Question 10 5 out of 5 points A DFS __ __ enables you to create a single directory tree that contains references to
Question 11 5 out of 5 points An alternative to the multimaster replication model used in DFS is: Single master replication Single master replication
Question 13 5 out of 5 points This refers to the ability of DFS clients to revert back to folder targets that have been
Question 14 5 out of 5 points A disk partition that can hold data but not an operating system is called a(n):
611. 612. 613. 614. 615. Selected Answer: 616. Correct Answer: 617. 618. 619. servers. 620. 621. Selected Answer: 622. Correct Answer: 623. 624. 625. 626. 627. Selected Answer: 628. Correct Answer: 629. 630. 631. 632. 633. Selected Answer: 634. Correct Answer: 635. 636. 637. sharing: 638. 639. Selected Answer: 640. Correct Answer: 641. 642. 643. following: 644. 645. Selected Answer: Replication group Question 20 5 out of 5 points To enable replication for a DFS folder with multiple folder targets, you must create the Server Service Server Service Question 19 5 out of 5 points The following service is required on a Windows Server 2008 server in order to enable file Full mesh replication Full mesh replication Question 18 5 out of 5 points In this topology, every member of a DFS replication group replicates with every other Multiple Master Replication Multiple Master Replication Question 17 5 out of 5 points The Distributed File System uses the following replication model to keep servers in a Namespace Namespace Question 16 5 out of 5 points A DFS __________ contains a virtual representation of the shared folders on all DFS target Namespace server Namespace server Question 15 5 out of 5 points This DFS component is responsible for maintaining a list of DFS shared folders and
646. Correct Answer: 647. 648. Question 1 649. device. 650. 651. Selected Answer: 652. Correct Answer: 653. 654. 655. a(n) __. 656. 657. Selected Answer: 658. Correct Answer: 659. 660. 661. 662. 663. Selected Answer: 664. Correct Answer: 665. 666. 667. 668. 669. Selected Answer: 670. Correct Answer: 671. 672. 673. 674. 675. Selected Answer: 676. Correct Answer: 677. 678. 679. 680.
Replication group
5 out of 5 points
A(n) __ is the software interface through which a computer communicates with a print
printer printer
Question 2 5 out of 5 points When you connect a single print server to multiple print devices, you create what is called
Question 3 5 out of 5 points By default, all printers assign the Allow Print permission to the __ special identity, which
enables all users to access the printer and manage their own documents. everyone Everyone
Question 4 5 out of 5 points Users with the __ permission can go beyond just manipulating queued documents; they
Question 5 5 out of 5 points The ____ is the default print format used by the Windows 2000, Windows XP, and Windows
Server 2003 operating systems. EMF interim Enhanced Metafile Format (EMF)
Question 6 5 out of 5 points A(n) ____ is a device driver that converts the print jobs generated by applications into an
681. Selected Answer: 682. Correct Answer: 683. 684. 685. Wide Web. 686. 687. Selected Answer: 688. Correct Answer: 689. 690. 691. 692. 693. Selected Answer: 694. Correct Answer: 695. 696. 697. 698. 699. Selected Answer: 700. Correct Answer: 701. 702. 703. 704. 705. Selected Answer: 706. Correct Answer: 707. 708. 709. 710. 711. Selected Answer: 712. Correct Answer: 713. 714. 715.
Question 7 5 out of 5 points The ____ allows clients to print documents using HTTP traffic over an intranet or the World
Question 8 5 out of 5 points Users with the ____ permission to a printer have the ability to pause, resume, restart, and
cancel their own documents, but not documents created by any other user. print Print
Question 9 5 out of 5 points A(n) ____ print architecture consists of one print device connected to one computer.
Question 10 0 out of 5 points ____ such as Printer Not Ready are a useful way for administrators to determine what
printers need attention throughout a Windows Server 2008 network. Default Filters Custom filters
Question 11 5 out of 5 points Which printer permission allows users to pause, resume, restart and cancel all users'
documents, and to control job settings for all documents? Manage Documents Manage Documents
Question 12 5 out of 5 points What document format is a new, platform-independent format included with Windows
716. 717. Selected Answer: 718. Correct Answer: 719. 720. 721. 722. 723. Selected Answer: 724. Correct Answer: 725. 726. 727. 728. 729. Selected Answer: 730. Correct Answer: 731. 732. 733. 734. 735. Selected Answer: 736. Correct Answer: 737. 738. 739. 740. 741. Selected Answer: 742. Correct Answer: 743. 744. 745. 746. 747. Selected Answer: 748. Correct Answer: 749. 750. 751. Question 18 5 out of 5 points What protocol allows users to print documents through an IIS server? Network-attached printer Local printer Question 17 0 out of 5 points What kind of printer is directly attached to a single computer, regardless of the interface Manage Printers Manage Printers Question 16 5 out of 5 points What permission allows a user to share a printer, delete a printer, and change a printer's Printer pool Printer pool Question 15 5 out of 5 points What can you create to connect a single print server to multiple print devices? Network-attached print device Print server Question 14 3 out of 5 points What kind of print device is connected to a TCP/IP network, either directly or through Print server Print server Question 13 5 out of 5 points What kind of device receives print jobs from clients and sends them to either locallyXML Paper Specification (XPS) XML Paper Specification (XPS)
another computer?
properties?
it uses to connect?
752. 753. Selected Answer: 754. Correct Answer: 755. 756. 757. 758. 759. Selected Answer: 760. Correct Answer: 761. 762. 763. 764. 765. Selected Answer: 766. Correct Answer: 767. 768. 769. 770. server. 771. 772. Selected Answer: 773. Correct Answer: 774. 775. 776. Question 3 5 out of 5 points This view of the Windows Event Viewer allows you to configure a Windows Server 2008 Automatic Updates Automatic Updates Question 2 5 out of 5 points This feature will automatically check for software updates that are published on a WSUS Print Print Question 20 5 out of 5 points What permission allows users to pause, manage and cancel only those printer documents Print device Print device Question 19 5 out of 5 points What describes the actual hardware that produces hard copy documents on paper or IPP IPP
computer to act as a repository for Event Viewer entries from one or more remote computers. 777. 778. Selected Answer: 779. Correct Answer: 780. 781. 782. 783. 784. Selected Answer: 785. Correct Answer: 786. Performance Monitor Users Performance Monitor Users Question 4 5 out of 5 points The following user group can view both real-time and historical data within the Forwarded Events Forwarded Events
Performance Monitor console, but cannot create or modify Data Collector Sets:
Question 5 5 out of 5 points In order to collect events from remote computers that match the criteria of one or more
event filters that you define, you will create one or more of the following: 790. Selected Answer: 791. Correct Answer: 792. 793. 794. 795. 796. Selected Answer: 797. Correct Answer: 798. 799. 800. 801. 802. Selected Answer: 803. Correct Answer: 804. 805. 806. 807. 808. Selected Answer: 809. Correct Answer: 810. 811. 812. 813. 814. Selected Answer: 815. Correct Answer: 816. 817. 818. 819. 820. Selected Answer: 821. Correct Answer: Performance Log Users Performance Log Users Question 10 5 out of 5 points The following user group can view both real-time and historical data within the Display Filter Display Filter Question 9 5 out of 5 points The following allows you to display only those packets matching a particular set of Windows Event Collector Service Windows Event Collector Service Question 8 5 out of 5 points The following service allows you to configure a single server as a repository of Event Setup Log Setup Log Question 7 5 out of 5 points This is a new Event Log in Windows Server 2008, used to capture information regarding WS-Management WS-Management Question 6 5 out of 5 points What protocol does the Windows Event Viewer use to configure event forwarding? Subscription Subscription
criterion among a larger set of packets that have been captured by Network Monitor:
Performance Monitor console, and can also create and modify Data Collector Sets:
822. 823. 824. 825. 826. Selected Answer: 827. Correct Answer: 828. 829. Question 1 830. 831. 832. Selected Answer: 833. Correct Answer: 834. 835. 836. 837. 838. Selected Answer: 839. Correct Answer: 840. 841. 842. 843. 844. Selected Answer: 845. Correct Answer: 846. 847. 848. 849. 850. Selected Answer: 851. Correct Answer: 852. 853. 854. domain. 855. 856. Selected Answer: Isolation Question 5 5 out of 5 points A(n) __ __ connection security rule allows you to restrict inbound and outbound policy transport mode Question 4 0 out of 5 points IPSec __ __ is used to provide end-to-end security, in which both hosts support IPSec using NTVMv2 NTLMv2 authentication Question 3 5 out of 5 points The strongest form of NT LAN Manager authentication is __ __. identity spoofing identity spoofing Question 2 5 out of 5 points A(n) __ __ attack is one in which a malicious user masquerades as the legitimate sender or default response rule default response rule 5 out of 5 points The __ __ was configured in Windows 2000, Windows Server 2003, and Windows XP IPSec Content Synchronization Service Content Synchronization Service Question 11 5 out of 5 points The following is a server-side component within WSUS that retrieves the latest critical
policies to ensure that the computer responds to requests for secure communication.
connections based on certain sets of criteria, such as membership in a particular Active Directory
857. Correct Answer: 858. 859. 860. 861. 862. Selected Answer: 863. Correct Answer: 864. 865. 866. 867. 868. Selected Answer: 869. Correct Answer: 870. 871. 872. 873. 874. Selected Answer: 875. Correct Answer: 876. 877. 878. 879. 880. Selected Answer: 881. Correct Answer: 882. 883. 884. 885. 886. Selected Answer: 887. Correct Answer: 888. 889. 890. 891. 892. Selected Answer:
Isolation
Question 6 5 out of 5 points Microsoft Network Monitor is an example of a real-world __ __. packet sniffing packet sniffer
Question 7 0 out of 5 points The Windows Firewall with Advanced Security MMC snap-in allows you to integrate IPSec
into the Windows Firewall by configuring one or more __ __. features Connection Security Rules
Question 8 5 out of 5 points The default __ __ for IPSec connections in an Active Directory environment is the Kerberos
Question 9 5 out of 5 points Each Windows Firewall exception can be configured with a specific __ __ to control which
computers the local computer will accept connections from. range of IP addresses scope
Question 10 5 out of 5 points A(n) __ __ must occur before secure traffic can be sent, in order to determine the type of
traffic to be secured and how it will be secured negotiation quick mode negotiation
Question 11 5 out of 5 points This is used to provide gateway-to-gateway protection for site-to-site communications
that cross the Internet (or other public networks). Tunnel mode
893. Correct Answer: 894. 895. 896. 897. 898. Selected Answer: 899. Correct Answer: 900. 901. 902. 903. 904. Selected Answer: 905. Correct Answer: 906. 907. 908.
Tunnel mode
Question 12 5 out of 5 points Windows Server 2003 supports the following feature, which is used to determine new
keying material through a new Diffie-Hellman exchange on a regular basis: Dynamic rekeying Dynamic rekeying
Question 13 5 out of 5 points The following protocol provides confidentiality (in addition to authentication, integrity,
and anti-replay) for the IP payload: Encapsulating Security Payload (ESP) Encapsulating Security Payload (ESP)
Question 14 5 out of 5 points This suite of protocols was introduced to provide a series of cryptographic algorithms that
can be used to provide security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is sending or receiving data. 909. 910. Selected Answer: 911. Correct Answer: 912. 913. 914. 915. 916. Selected Answer: 917. Correct Answer: 918. 919. 920. 921. 922. Selected Answer: 923. Correct Answer: 924. 925. 926. Question 17 5 out of 5 points You can configure the Windows Firewall to allow one or more inbound connections based Authentication exemption Authentication exemption Question 16 5 out of 5 points This Connection Security Rule allows you to specify one or more computers that do not Cookie Cookie Question 15 5 out of 5 points The following is a value contained in a received IKE message that is used to help identify IPSec IPSec
927. 928. Selected Answer: 929. Correct Answer: 930. 931. 932. 933. 934. Selected Answer: 935. Correct Answer: 936. 937. 938. Question 19 5 out of 5 points The following NTLM Authentication type is disabled by default in Windows Server 2003 Mirrored Mirrored Question 18 5 out of 5 points An IP Filter in which traffic that is defined in one direction will also be defined in the Exception Exception
and Windows Server 2008 servers; it should not be used in a production environment as it is weak and can be easily hacked by malicious users: 939. 940. Selected Answer: 941. Correct Answer: 942. 943. 944. packet. 945. 946. Selected Answer: 947. Correct Answer: 948. 949. 950. Question 1 951. 5 out of 5 points A(n) _ _ is a CA that integrates with Active Directory and allows for auto-enrollment of Checksum Checksum Question 20 5 out of 5 points This is a mathematical value that is used to provide an integrity check for a TCP or UDP LM authentication LM authentication
user and computer certificates through the use of Group Policy and certificate templates. 952. 953. Selected Answer: 954. Correct Answer: 955. 956. 957. 958. 959. Selected Answer: 960. Correct Answer: 961. root CA root CA Question 2 5 out of 5 points The top-level CA in any PKI hierarchy is the _ _. enterprise CA enterprise CA
Question 3 0 out of 5 points One alternative to using public key cryptography is by using a(n) _ _. certificate authority shared secret key
965. Selected Answer: 966. Correct Answer: 967. 968. 969. 970. 971. Selected Answer: 972. Correct Answer: 973. 974. 975. 976. 977. Selected Answer: 978. Correct Answer: 979. 980. 981. 982. 983. Selected Answer: 984. Correct Answer: 985. 986. 987. 988. 989. Selected Answer: 990. Correct Answer: 991. 992. 993. 994. 995. Selected Answer: 996. Correct Answer: 997. 998.
Question 4 5 out of 5 points Each PKI certificate consists of a public key that is widely known, and a(n) _ _ that is
known only to the user or computer who holds the certificate. private key private key
Question 5 0 out of 5 points Users can request certificates via the web using the _ _ service. online responder Certification Authority Web Enrollment
Question 6 0 out of 5 points A __ __ obtains PKI health certificates from client computers when the IPSec NAP
enforcement method is used. internet protocol security (IPSe) enforcement Health Registration Authority (HRA)
Question 7 0 out of 5 points The __ __ method is the only NAP enforcement agent that can be deployed in the absence
Question 8 5 out of 5 points __ __ provide continuous monitoring of system compliance on all NAP clients. System Health Agents (SHAs) System Health Agents (SHAs)
1001.Selected Answer: 1002.Correct Answer: 1003. 1004. 1005. 1006. 1007.Selected Answer: 1008.Correct Answer: 1009. 1010. 1011. 1012. 1013.Selected Answer: 1014.Correct Answer: 1015. 1016. 1017. 1018. 1019.Selected Answer: 1020.Correct Answer: 1021. 1022. 1023. 1024. 1025.Selected Answer: 1026.Correct Answer: 1027. 1028. 1029. 1030. 1031.Selected Answer: 1032.Correct Answer: 1033. 1034.
Question 10 0 out of 5 points Each System Health Agent provides a __ __ regarding its health status. System Statement of Health (SSCH) Statement of Health (SOH)
Question 11 5 out of 5 points Each server that functions as a CA must be configured with a(n): Revocation configuration Revocation configuration
Question 12 5 out of 5 points An organization can have one or more of these to distribute the load of issuing certificates
Question 13 5 out of 5 points In order to authenticate using a smart card that has been configured for their use, a user
must have the following installed at their workstation: smart card reader smart card reader
Question 14 5 out of 5 points Which component of Active Directory Certificate Services uses the Online Certificate
1035. 1036.
The IPSec NAP Enforcement method relies on this type of PKI certificate to perform its
enforcements: 1037.Selected Answer: 1038.Correct Answer: 1039. 1040. 1041. 1042. 1043.Selected Answer: 1044.Correct Answer: 1045. 1046. 1047. 1048. 1049.Selected Answer: 1050.Correct Answer: 1051. 1052. 1053. 1054. 1055.Selected Answer: 1056.Correct Answer: 1057. 1058. 1059. 1060. 1061.Selected Answer: 1062.Correct Answer: 1063. 1064. 1065. 1066. 1067.Selected Answer: 1068.Correct Answer: 1069. 1070.Question 2 5 out of 5 points Certificate Practice Statement Certificate Practice Statement Question 20 5 out of 5 points This provides a detailed explanation of how a particular Certification Authority manages NAP Agent NAP Agent Question 19 5 out of 5 points The following NAP component transmits information between the NAP Enforcement System Statement of Health Response System Statement of Health Question 18 0 out of 5 points Statements of Health from each SHA are combined to create a: Simple Certificate Enrollment Protocol Simple Certificate Enrollment Protocol Question 17 5 out of 5 points The Network Device Enrollment Service (NDES) uses the following protocol to enroll enforcement point enforcement point Question 16 5 out of 5 points A server that operates the NAP Enforcement Server components is referred to as a(n): health certificate health certificate
1071. 1072.
This type of backup will completely reformat the target drive that hosts the backup files.
1073.Selected Answer: 1074.Correct Answer: 1075. 1076. 1077. 1078. 1079.Selected Answer: 1080.Correct Answer: 1081. 1082. 1083. 1084. 1085.Selected Answer: 1086.Correct Answer: 1087. 1088. 1089. 1090. 1091.Selected Answer: 1092.Correct Answer: 1093. 1094. 1095. 1096. 1097.Selected Answer: 1098.Correct Answer: 1099. 1100. 1101. 1102. 1103.Selected Answer: 1104.Correct Answer: 1105.
Question 3 5 out of 5 points This type of disk quota allows the user to access storage space beyond the allotted
amount and simply sends an email notification when the quota has been exceeded. soft quota soft quota
Question 4 5 out of 5 points This type of restore can be used to recover an entire server after it has experienced a
hardware failure or other disaster recovery scenario. bare-metal restore bare-metal restore
Question 5 5 out of 5 points This backup type will retain the Application log files on the local server after the backup is
Question 6 5 out of 5 points This quota type prohibits users from consuming any disk space beyond what has been
Question 7 5 out of 5 points This is the only type of quota available on servers that do not have the File Server
Question 8 5 out of 5 points All Windows disk quotas are based on the following to determine the amount of space
being used by a particular user. 1109.Selected Answer: 1110.Correct Answer: 1111. 1112. 1113. 1114. 1115.Selected Answer: 1116.Correct Answer: 1117. 1118. 1119. 1120. 1121.Selected Answer: 1122.Correct Answer: 1123. 1124. 1125. 1126. 1127.Selected Answer: 1128.Correct Answer: 1129. 1130. 1131.Administrators can specify these to dictate the percentage of available disk space at which actions associated with disk quotas will take effect. 1132. 1133. F. threshold 1134. 1135. F. threshold 1136. 1137.This is a new command-line and task-based scripting technology that is included with Windows Server 2008. 1138. 1139. I. Windows Powershell 1140. Windows Server Backup Windows Server Backup Question 11 5 out of 5 points This backup technology was introduced by Windows Server 2008 and relies on the quota template quota template Question 10 5 out of 5 points This collection of disk quota settings can be used to create numerous quota assignments VSS full backup VSS full backup Question 9 5 out of 5 points This backup type will update the server s backup history and will clear the Application Log file ownership file ownership
1141. I. Windows Powershell 1142. 1143.This is a limit that is placed on the disk space a user is permitted to consume in a particular volume or folder. 1144. 1145. A. disk quota 1146.disk quota 1147.This controls what types of traffic will be recorded by Network Monitor when you press F10. 1148. D. 1149. Capture Filter 1150. 1151. D. 1152. Capture Filter 1153. 1154. 1155.This right must be granted to Performance Log Users to allow them to create and manage Data Collector Sets. 1156. 1157. H. 1158. Log on as a batch user 1159. 1160. H. 1161. Log on as a batch user 1162. 1163. 1164.This custom view in the Event Viewer collects Critical, Error, and Warning events from all logs on a particular server. 1165. 1166. A. Administrative Events 1167. 1168. A. Administrative Events 1169. 1170.This capture mode enables Network Monitor to listen to all traffic that is being passed on a particular network segment. 1171. 1172. J. promiscuous mode J. promiscuous mode 1173.This service is used by WSUS to optimize network traffic while downloading updates. 1174. 1175. C. 1176. Background Intelligent Transfer Service (BITS) 1177.
1178. C. 1179. Background Intelligent Transfer Service (BITS) 1180. 1181. 1182.This type of forwarded event is initiated by the server acting as the event repository. 1183. 1184. E. 1185. collector initiated 1186. 1187. E. 1188. collector initiated 1189. 1190. 1191.This is the command-line method of launching the Performance Monitor MMC snap-in. 1192. 1193. I. 1194. perfmon 1195. I. 1196. perfmon 1197.This log provides a view of events related to software that has been installed on a Windows server computer. 1198. 1199. B. 1200. Application Log 1201. 1202. B. 1203. Application Log 1204. 1205. 1206.This is collected to provide a real-time view into the behavior and performance of a server and its applications. 1207. 1208. G. 1209. event trace data 1210. 1211. G. 1212. event trace data 1213. 1214.This allows you to organize a set of performance counters, event traces, and system configuration data into a single reusable configuration item. F. 1215. Data Collector Set