Você está na página 1de 6

1.

2.

Final Exam Study Guide


Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers? a. MBR, b. NTFS, c. FAT Selected, d. GPT Which of the following prohibits users from consuming any disk space beyond the allotted amount? a. b. c. d. allotments, allocations, soft quota Selected, hard quota

3.

4.

You can configure the DNS Server role by using which console? a. Remote Server, b. Terminal Services, c. Windows Manager Selected, d. Server Manager Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address and lease duration? a. DHCPDISCOVER, b. DHCPOFFER Selected, c. DHCPRELEASE, d. DHCPACK Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network? a. IP host configuration, b. dynamic host configuration, c. flexibility and scalability Selected, d. de-centralized administration Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide? a. DHCPACK, b. DHCPNACK, c. DHCPRELEASE, d. DHCPINFORM In a Windows Server 2008 network, the primary means of locating network devices and network services is through the use of __________. a. b. c. d. DHCP, DNS, TCP/IP, BOOTP

5.

6.

7.

8.

9.

A server that operates the NAP Enforcement Server components is referred to as a NAP __________. a. Agent, b. enforcement point, c. enforcement server, d. none of the above

10. Active Directoryintegrated zones follow what type of update model? a. multiple node, b. multimaster, c. replication, d. notification 11. An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items? a. conditions, b. constraints, c. settings, d. all of the above 12. For network users to be able to access a shared folder on an NTFS drive, you must grant them __________ permissions. a. share, b. NTFS, c. both A & B, d. registry 13. __________________________________________________________________ a. Setup node, b. Application node, c. Diagnostics node, d. Security node 14. Most personal computers use basic disks because they are the easiest to manage. A basic disk uses what type of partitions and drives? a. b. c. d. primary partitions, extended partitions, and logical disks, primary partitions, virtual partitions, and logical disks, primary partitions, extended partitions, and virtual disks, primary partitions, logical partitions, and virtual disks

15. Nslookup can be used for which of the following? a. resolving queries, b. specifying DNS server, c. resolving IP addresses to host names, d. all of the above 16. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option? a. b. c. d. Server Must Supply an IP Address, Client Must Supply an IP Address, Client May Request an IP Address, Server Settings Determine IP Address Assignment

17. Routers are considered components of which layer? a. layer 1, b. layer 2, c. layer 3, d. layer 4

18. What file system provides the most granular user access control and also provides other advanced storage features, including file encryption and compression? a. NTFS, b. FAT, c. LTP, d. SWAP 19. What is the default authentication protocol in an Active Directory network? a. b. c. d. Kerberos v5, LM Authentication, NTLM Authentication, NTLMv2 Authentication

20. What is the first step in designing a file-sharing strategy? a. deciding how many shares to create and where to create them, b. determining usernames and passwords, c. deciding security measures, d. projecting anticipated storage needs and procuring the correct server hardware and disk arrays to meet your needs 21. What type of zone might a DNS server host? a. primary, b. main, c. single label, d. forest 22. What volume type consists of space on three or more physical disks, all of which must be dynamic disks? a. b. c. d. simple, spanned, striped, RAID-5

23. What volume type is essentially a method for combining the space from multiple dynamic disks into a single large volume? a. simple, b. spanned, c. striped, d. RAID-5 24. Where is the checksum located? a. footer of each packet, b. header of each packet, c. payload of each packet, d. application data of each packet 25. Where are zone transfers initiated? a. primary server, b. secondary server, c. stub server, d. master server

26. Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment? a. Kerberos v5 protocol, b. PKI certificate from a Certification Authority (CA), c. preshared key, d. IPSec Authentication mode 27. Which entries refer to a separate multicast route? 28. Which of the following is the limited broadcast address that is general for all networks and routers? a. 0.0.0.0, b. 127.0.0.0, c. 224.0.0.0, d. 255.255.255.255 29. Which of the following is not a category for the Windows operating system updates? a. Group Policy updates, b. critical updates, c. recommended downloads, d. multilanguage features 30. _____________________________ a. primary, b. secondary, c. integrated, d. stub 31. Which of the following is a 32-bit integer representing the maximum time, in seconds, that a DNS server or client caches this resource record before it is discarded? a. Owner, b. Class, c. TTL, d. Resource Record Data 32. _________________________________________ a. remote access, b. network address translation, c. virtual private network, d. custom configuration 33. Which process is used to establish trust between communicating systems, after which only trusted systems can communicate with each other? a. shared cryptography, b. cryptographic checksum, c. mutual authentication, d. filtered methodology 34. Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone? a. b. c. d. standard primary zone, standard secondary zone, reverse lookup zone, stub zone

35. Which zone enables a host to determine another hosts name based on its IP address? 36. Which zone hosts a read/write copy of the DNS zone in which resource records are created and managed? a. standard primary zone, b. standard secondary zone, c. reverse lookup zone, d. stub zone 37. Windows Server 2008 has several sets of permissions that operate independently of each other. Which permissions control access to folders over a network? a. share permissions, b. NTFS permissions, c. registry permissions, d. Active Directory permissions 38. After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and __________ as the destination address. a. 265.265.265.265, b. 225.225.225.225, c. 255.255.255.255, d. 205.205.205.205 39. NTFS quotas are limited to controlling storage on entire volumes on what basis? a. per user, b. group, c. network, d. none of the above 40. IPv4 addresses are commonly represented by using what type of notation? a. subnetting, b. CIDR, c. classful addressing, d. dotted-decimal 41. A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class? a. Class A, b. Class B, c. Class C, d. Class D 42. ____________________________________________________________________ a. automatic private IP address, b. fixed IP address, c. static IP address, d. none of the above 43. The XML Paper Specification format is included with which of the following operating systems by default? 44. Network Access Protection was introduced with which operating system? a. Windows Vista, b. Windows NT, c. Windows Server 2003, d. Windows Server 2008

45. Of the several key components of subnetting that are listed below, which is the most accurate description? a. Systems within the same subnet can communicate indirectly with the external network, b. Systems within the same subnet will not share the same network address, c. Systems within a subnet need not be burdened with information about external network addressing, d. Systems within the same subnet that share the same network address do not require any information about external network addressing 46. Once a Server Core computer is installed, how can it be managed locally? a. Windows Console, b. Start menu, c. command-line utilities, d. Computer Management Console 47. What is made up of free space from multiple physical disks? 48. Which type of volume is made up of free space from multiple disks and uses RAID-0 striping to interleave data across the disks, thus improving the read performance of the volume? 49. Which type of volume consists of free space contained on a single physical disk? a. striped volume, b. simple volume, c. spanned volume, d. mirrored volume 50. Which of the following is not a benefit of DHCP? a. b. c. d. centralized administration of IP configuration, dynamic host configuration, seamless IP host configuration, portability of workstations

51. Which of the following strings does not represent the same IPv6 address? a. 2001:0000:0000:0000:0000:0000:0000:7334, b. 2001::7334, c. 192.168.1.101, d. 2001:0:0:0:0:0:0:7334

Você também pode gostar