Sie sind auf Seite 1von 35

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24.

25. 26. 27. 28. 29. 30. 31. 32.

Question 1

5 out of 5 points

The most widely used IP addressing scheme is __ _____. Selected Answer: Correct Answer: IPv4 IPv4

Question 2 5 out of 5 points The most recent and largest address space IP addressing scheme is ______. Selected Answer: Correct Answer: IPv6 IPv6

Question 3 0 out of 5 points To distribute IP addresses automatically, a network administrator would configure the

______ service. Selected Answer: Correct Answer: DHCP Dynamic Host Configuration Protocol (DHCP)

Question 4 5 out of 5 points The first attempt at breaking up IP address space used _ _ to provide address ranges of

differing sizes. Selected Answer: Correct Answer: classful addressing classful addressing

Question 5 5 out of 5 points Prior to the introduction of the Domain Name System, computers used __ __ to map

human-readable named to IP addresses. Selected Answer: Correct Answer: HOSTS files HOSTS files

Question 6 5 out of 5 points A(n) ____ is used to separate the host address portion of an IP address from the network

address. 33. 34. 35. 36. 37. Question 7 0 out of 5 points Selected Answer: Correct Answer: Subnet Mask subnet mask

38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. ___. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73.

The subnet mask within the TCP/IP configuration is used to distinguish the ____ from the

host address. Selected Answer: Correct Answer: network network address

Question 8 0 out of 5 points In dotted-decimal notation, each IPv4 address is broken up into four ____. Selected Answer: Correct Answer: bytes octets

Question 9 5 out of 5 points Server computers and other systems that need to be accessed reliably by network clients

should be configured with a(n) ____. Selected Answer: Correct Answer: static IP address static IP address

Question 10 0 out of 5 points The method of breaking up IP address space into address ranges of flexible size is called

Selected Answer: Correct Answer:

subnetting Classless Inter-Domain Routing (CIDR)

Question 11 5 out of 5 points What must each host on a TCP/IP network be configured with in order to communicate

with other hosts? Selected Answer: Correct Answer: IP address IP address

Question 12 5 out of 5 points What is the process of transmitting TCP/IP traffic from one IP subnet to another?

Selected Answer: Correct Answer:

Routing Routing

Question 13 5 out of 5 points

74. notation? 75. 76. 77. 78. 79. 80. networks? 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99.

An IP network that is formatted such as 192.168.1.0/24 is referred to as what type of

Selected Answer: Correct Answer:

CIDR notation CIDR notation

Question 14 5 out of 5 points What is the default network protocol of the Internet and most modern corporate

Selected Answer: Correct Answer:

TCP/IP TCP/IP

Question 15 5 out of 5 points What was used by TCP/IP networks to perform name resolution prior to the introduction of

the Domain Name System (DNS)? Selected Answer: Correct Answer: HOSTS files HOSTS files

Question 16 5 out of 5 points What is the process of dividing a large TCP/IP address space into multiple smaller

networks called? Selected Answer: Correct Answer: Subnetting Subnetting

Question 17 5 out of 5 points What technology is used by private network ranges that has extended the useful life of

IPv4 addressing and slowed the adoption rate of IPv6? 100. Selected Answer: 101. Correct Answer: 102. 103. 104. 105. 106. Selected Answer: 107. Correct Answer: 108. Default gateway Default gateway Question 18 5 out of 5 points Which TCP/IP configuration item allows client computers to communicate with other NAT NAT

computers that are located on remote networks?

109. 110. 111.

Question 19 5 out of 5 points On a TCP/IP network that uses the Domain Name System (DNS) for name resolution, what

unique configuration item must each TCP/IP host possess? 112. Selected Answer: 113. Correct Answer: 114. 115. 116. 117. 118. Selected Answer: 119. Correct Answer: 120. 121. 122. 123. 124. Selected Answer: 125. Correct Answer: 126. 127. 128. 129. 130. Selected Answer: 131. Correct Answer: 132. 133. 134. 135. 136. Selected Answer: 137. Correct Answer: 138. 139. 140. 141. 142. Selected Answer: 143. Correct Answer: 144. spanned volume striped volume Question 4 0 out of 5 points A(n) ___ _____ offers the best performance of any multi-disk configuration option within initial configuration tasks Initial Configuration Tasks Question 3 5 out of 5 points The ____ ______ screen appears by default when the Windows Server 2008 operating server core server core Question 2 5 out of 5 points Installation of just the necessary components for a particular server role, without the GUI repair mode repair mode Question 1 5 out of 5 points The ability to use the installation process to fix problems with an existing Windows Server Dotted-decimal Dotted-decimal Question 20 5 out of 5 points In what format are IPv4 IP addresses most commonly written? Fully qualified domain name Fully qualified domain name

system is called ___ _______.

and other software features, is called ____ ______.

system is first installed.

the Disk Management MMC, but does so at the expense of fault tolerance.

145. 146. 147.

Question 5 5 out of 5 points The feature that allows users on different computers to access the Internet through a

single connection is called___ _______. 148. Selected Answer: 149. Correct Answer: 150. 151. 152. 153. 154. Selected Answer: 155. Correct Answer: 156. 157. 158. 159. 160. Selected Answer: 161. Correct Answer: 162. 163. 164. 165. 166. Selected Answer: 167. Correct Answer: 168. 169. 170. 171. 172. Selected Answer: 173. Correct Answer: 174. 175. 176. Question 10 5 out of 5 points Once a disk is converted from a basic disk to a(n) __ _____, it can only be accessed only by network discovery network discovery Question 9 5 out of 5 points The network location setting controls the behavior of ___ _______. firewall Windows firewall Question 8 5 out of 5 points Unsolicited inbound traffic can be blocked through the use of the ____ ___. Network location network location Question 7 5 out of 5 points The setting describing the network environment, such as home or public network, is Network and Sharing Center Network and Sharing Center Question 6 5 out of 5 points The ___ _______ provides a single point of administration to configure networking and internet connection sharing (ICS) Internet Connection Sharing

firewall configuration tasks on a Windows Server 2008 computer.

called the ____ ______.

operating systems that support dynamic disks: Windows 2000 Professional, Windows XP Professional, Windows Vista Business, Enterprise or Ultimate, Windows 2000 Server, Windows Server 2003, and Windows Server 2008. 177. 178. Selected Answer: 179. Correct Answer: dynamic disk dynamic disk

180. 181. 182. network? 183. 184. Selected Answer: 185. Correct Answer: 186. 187. 188. volume? 189. 190. Selected Answer: 191. Correct Answer: 192. 193. 194. volume? 195. 196. Selected Answer: 197. Correct Answer: 198. 199. 200. 201. 202. Selected Answer: 203. Correct Answer: 204. 205. 206. 207. 208. Selected Answer: 209. Correct Answer: 210. 211. 212. 213. 214. Selected Answer: Windows Server Backup Question 16 5 out of 5 points Which feature is used to perform backups and restores of Windows volumes? HOSTS files NetBIOS Question 15 0 out of 5 points What was the primary means of name resolution on Windows networks prior to the Wireless Networking Wireless Networking Question 14 5 out of 5 points Which Windows Server 2008 feature installs and configured wireless connections and Mount point Mount point Question 13 5 out of 5 points Which disk formatting option will cause a disk to appear as a folder within an existing RAID-5 RAID-1 Question 12 0 out of 5 points What type of volume uses 50% of available drive space to provide fault tolerance for the Key Management System (KMS) Key Management System (KMS) Question 11 5 out of 5 points What type of license key allows you to host an activation service locally within your own

wireless LAN profiles?

introduction of Windows 2000 and Active Directory?

215. Correct Answer: 216. 217. 218. 219. 220. Selected Answer: 221. Correct Answer: 222. 223. 224. 225. 226. Selected Answer: 227. Correct Answer: 228. 229. 230. 231. 232. Selected Answer: 233. Correct Answer: 234. 235. 236. 237. 238. Selected Answer: 239. Correct Answer: 240. 241. 242. Question 1 243. 244. 245. Question

Windows Server Backup

Question 17 5 out of 5 points Which networking service is used to automatically associate NetBIOS names with IP

addresses? WINS WINS

Question 18 5 out of 5 points Which disk partition style is recommended for disks larger than 2TB or disks that are used

in Itanium computers? GUID Partition Table (GPT) GUID Partition Table (GPT)

Question 19 5 out of 5 points What is used to manage the licensing process for volume licenses of Windows Vista and

Windows Server 2008? Volume Activation Volume Activation

Question 20 5 out of 5 points Which volume contains the operating system files on a Windows computer?

Boot volume Boot volume

50 out of 50 points

Match the term in Column 1 to its description in Column 2. Correct Match Selected Match E. DHCPRELEASE E. DHCPRELEASE

246. This DHCP message type is sent by a DHCP client when it no longer requires the use of an IP address that it has leased from a DHCP server. address from a particular DHCP server. assigned to DHCP clients by a DHCP server. 247. You can configure one of these to ensure that a DHCP client always receives the same IP H. reservation H. reservation F. exclusion range 248. This is used to ensure that a particular address or block of addresses within a scope is not F. exclusion range

249. You must do this to any DHCP server that needs to function within an Active Directory domain. A. authorize A. authorize D. DHCPDECLINE B. automatic restore D. DHCPDECLINE 250. A DHCP client will send this message type if it determines that an IP address offered by a DHCP server is already in use. B. automatic restore 251. This is performed by a DHCP server when corruption is detected within the DHCP database. 252. The DHCP database is based on this database technology G. Joint Engine Technology (JET) G. Joint Engine Technology (JET) 253. Authorizing DHCP servers in Active Directory is designed to prevent against these. DHCP server 254. 255. 256. These provide DHCP parameters to DHCP clients based on vendor or user type. options 258. 259. 260. 261. 262. 263. Selected Answer: 264. Correct Answer: 265. 266. 267. 268. 269. Selected Answer: 270. Correct Answer: 271. 272. 273. 274. 275. Selected Answer: 276. Correct Answer: 277. 278. 279. as: 280. 281. Selected Answer: T1 Question 5 5 out of 5 points A DHCP client first attempts to reacquire its lease at half the lease time, which is known User Datagram Protocol (UDP) User Datagram Protocol (UDP) Question 4 5 out of 5 points What protocol is used by the Trivial File Transfer Protocol (TFTP)? Application layer Application layer Question 3 5 out of 5 points At which layer of the OSI model does DHCP operate? DHCPDISCOVER DHCPDISCOVER Question 2 5 out of 5 points Which of the following DHCP message types is sent first in the process of obtaining an C. class options J. T2 J. T2 257. This defaults to 87.5% of the total DHCP lease. C. class I. rogue DHCP server I. rogue

address lease?

282. Correct Answer: 283. 284. 285. 286. 287. Selected Answer: 288. Correct Answer: 289. 290. 291. 292. 293. Selected Answer: 294. Correct Answer: 295. 296. 297. 298. 299. Selected Answer: 300. Correct Answer: 301. 302. 303. 304. 305. Selected Answer: 306. Correct Answer: 307. 308. 309. 310. 311. Selected Answer: 312. Correct Answer: 313. 314. 315. 316.

T1

Question 6 5 out of 5 points The _______ is composed of the remaining addresses within a DHCP scope once all

exclusion ranges have been applied. available address pool available address pool

Question 7 5 out of 5 points The following is a lightweight version of FTP that uses the UDP protocol, which is used by

the BOOTP protocol to transmit network configuration information TFTP TFTP

Question 8 5 out of 5 points The following process will populate DHCP client lease information from the registry to the

DHCP database: Reconciliation Reconciliation

Question 9 5 out of 5 points The following is an administrative grouping of scopes that is used to support multiple

logical subnets on a single network segment: superscope superscope

Question 10 5 out of 5 points This indicates the location of the last information that was successfully written from

transaction logs to a database file, such as a DHCP database. Checkpoint file Checkpoint file

Question 11 5 out of 5 points The following is a hexadecimal address that is uniquely associated with a specific Network

Interface Card (NIC):

317. Selected Answer: 318. Correct Answer: 319. 320. 321. 322. 323. Selected Answer: 324. Correct Answer: 325. 326. 327. 328. 329. Selected Answer: 330. Correct Answer: 331. 332. 333. 334. 335. Selected Answer: 336. Correct Answer: 337. 338. 339. 340. 341. Selected Answer: 342. Correct Answer: 343. 344. 345. 346. 347. Selected Answer: 348. Correct Answer: 349. 350. 351. 352. 353. Selected Answer: 354. Correct Answer: Question 1 MAC

MAC

5 out of 5 points

A(n) _ _ will transfer all records within a zone from a primary server to a secondary server.

full zon transfer (AXFR) full zone transfer (AXFR)

Question 2 5 out of 5 points A(n) _ _ creates an alias for an existing A record. CNAME record CNAME Record

Question 3 5 out of 5 points A(n) _ _ is used by e-mail systems such as Microsoft Exchange to locate mail servers in

different networks. Mail Exchanger (MX) record Mail Exchanger (MX) record

Question 4 5 out of 5 points The _ _ allows IPv6 hosts to map host names to IP addresses. ip6.arpa domain ip6.arpa domain

Question 5 5 out of 5 points contoso.com is an example of a(n) _ _ within the .com top-level domain. second-level domain second-level domain

Question 6 5 out of 5 points The _ _ application scope will replicate DNS data to all DNS servers within a domain.

DomainDNSZones DomainDNSZones

355. 356. 357. 358. 359. Selected Answer: 360. Correct Answer: 361. 362. 363. 364. 365. Selected Answer: 366. Correct Answer: 367. 368. 369. 370. 371. Selected Answer: 372. Correct Answer: 373. 374. 375. 376. 377. Selected Answer: 378. Correct Answer: 379. 380. 381. 382. 383. Selected Answer: 384. Correct Answer: 385. 386. 387. 388. 389. Selected Answer: 390. Correct Answer: 391. Forward lookup zone Forward lookup zone Question 12 5 out of 5 points This type of zone takes human-readable FQDNs and translates them into IP addresses. Conditional forwarder Conditional forwarder Question 11 5 out of 5 points This DNS configuration item will forward DNS queries to different servers based on the country code country code Question 10 5 out of 5 points A DNS domain name like .uk or .it is an example of a(n) _ _ domain. authoritative authoritative Question 9 5 out of 5 points A DNS server is considered _ _ for each zone that it hosts. (TTL) Time To Live Time to Live (TTL) Question 8 5 out of 5 points Each DNS record has a(n) _ _ that indicates the maximum time that a record will be file-backed zone file-backed zone Question 7 5 out of 5 points A(n) _ _ stores DNS data in a text file on the server hard drive, rather than as part of

Active Directory.

cached by a DNS server before it is discarded.

domain name of the query.

392. 393.

Question 13 5 out of 5 points This zone is used in combination with IP addresses to resolve queries for IPv4 IP

addresses: 394. 395. Selected Answer: 396. Correct Answer: 397. 398. 399. 400. 401. Selected Answer: 402. Correct Answer: 403. 404. 405. 406. 407. Selected Answer: 408. Correct Answer: 409. 410. 411. 412. 413. Selected Answer: 414. Correct Answer: 415. 416. 417. 418. 419. Selected Answer: 420. Correct Answer: 421. 422. 423. 424. 425. Selected Answer: 426. Correct Answer: 427. Zone transfer Zone transfer Question 18 5 out of 5 points Data from a primary zone is transmitted to secondary zones using the following: Stub zone Stub zone Question 17 5 out of 5 points This zone type contains only SOA, name server, and glue records for the relevant zone. Discretionary Access Control List Discretionary Access Control List Question 16 5 out of 5 points You can secure an Active Directory-integrated DNS server, zone, or record by applying Authoritative answer Authoritative answer Question 15 5 out of 5 points A DNS server that hosts a primary or secondary zone containing a particular record can AAAA record AAAA record Question 14 5 out of 5 points The IPv6 DNS host record is referred to as a(n): in.addr-arpa in.addr-arpa

issue the following response to a query for that record:

the following to it:

428. 429. zone. 430.

Question 19 5 out of 5 points These contain the names and IP addresses of the DNS servers authoritative for the root

431. Selected Answer: 432. Correct Answer: 433. 434. 435. 436. 437. Selected Answer: 438. Correct Answer: 439. 440. 441. 442. 443. Question 2 444. 445. 446. Selected Answer: 447. Correct Answer: 448. 449. 450. 451. 452. Selected Answer: 453. Correct Answer: 454. 455. 456. 457. 458. Selected Answer: 459. Correct Answer: 460. 461. 462. 463. 464. Selected Answer:

Root Hints Root Hints

Question 20 5 out of 5 points The following feature is available only on Active Directory-integrated DNS zones:

Secure dynamic updates Secure dynamic updates

5 out of 5 points

The IP address 255.255.255.255 represents ___________ in the IP Routing table. Limited broadcast address Limited broadcast address

Question 3 5 out of 5 points To allow users to specify a call-back number when they connect to a remote access

server via modem, you will enable the following setting: Set by Caller Set by Caller

Question 4 5 out of 5 points Routing Information Protocol v2 (RIPv2) is an example of a: Routing protocol Routing protocol

Question 5 5 out of 5 points Windows Server 2008 can provide remote access services through a Virtual Private

Network (VPN) or through: Dial-Up Networking (DUN)

465. Correct Answer: 466. 467. 468.

Dial-Up Networking (DUN)

Question 6 5 out of 5 points When a workstation ends a session with an 802.1X-secured network port, it sends the

following to inform the network access server to set the port back to an Unauthorized status: 469. 470. Selected Answer: 471. Correct Answer: 472. 473. 474. 475. 476. Selected Answer: 477. Correct Answer: 478. 479. 480. 481. 482. Selected Answer: 483. Correct Answer: 484. 485. 486. 487. 488. Selected Answer: 489. Correct Answer: 490. 491. 492. 493. 494. Selected Answer: 495. Correct Answer: 496. 497. 498. networks: 499. 500. Selected Answer: Default route Question 11 5 out of 5 points The following route is used by a computer s default gateway to send traffic to remote Network Address Translation (NAT) Network Address Translation (NAT) Question 10 5 out of 5 points The following RRAS service allows multiple computers on an internal network to share a Authenticator Authorization Server (AS) Question 9 0 out of 5 points In an 802.1X infrastructure, an NPS or RADIUS server performs the role of the: Packets Packets Question 8 5 out of 5 points Network information at the Network Layer of the OSI model is organized into: Metric Metric Question 7 5 out of 5 points If an IP Routing Table contains two routes to the same destination network, the route with EAP-Logoff EAP-Logoff

the lowest __________ will be selected first.

single public IP address to access the Internet:

501. Correct Answer: 502. 503. 504. 505. Question utilization. 507. 508.

Default route Match the following definitions with the appropriate term.

Question 1 40 out of 50 points

Correct Match Selected Match

506. This type of router is well-suited for a small organization with low levels of network traffic I. software-based router I. software-based router

509. Network data at the Data Link Layer is organized into these. 510. 511. 512. 513. This is used as the Windows Server 2008 implementation of a RADIUS server. 514. 515. 516. 517. This routing protocol was supported in Windows Server 2003 but is no longer available with the Routing and Remote Access server role in Windows Server 2008. 518. 519. 520. 521. 522. This address corresponds to the 127.0.0.1 address used for TCP/IP diagnostics and troubleshooting. 523. 524. 525. 526. 527. 528. Question 1 529. 530. 531. Selected Answer: 532. Correct Answer: 533. 534. 535. 536. 537. Selected Answer: targets Question 2 5 out of 5 points In the Distributed File System, the actual shared folders referred to by the virtual folders multiple master replication multiple master replication 5 out of 5 points The DFS Replication engine uses a form of replication called _ _. D. loopback address D. loopback address G. Open Shortest Path First (OSPF) G. Open Shortest Path First (OSPF) F. Network Policy Server (NPS) F. Network Policy Server (NPS) B. frames B. frames

in the namespace are known as _ _.

538. Correct Answer: 539. 540. 541. 542. 543. Selected Answer: 544. Correct Answer: 545. 546. 547. 548. 549. Selected Answer: 550. Correct Answer: 551. 552. 553. 554. 555. Selected Answer: 556. Correct Answer: 557. 558. 559. 560. 561. Selected Answer: 562. Correct Answer: 563. 564. 565. 566. 567. Selected Answer: 568. Correct Answer: 569. 570. 571. 572. 573. Selected Answer:

targets

Question 3 5 out of 5 points DFS Replication relies on a protocol called _ _ for file replication. remote differential compression (RDC) Remote Differential Compression (RDC)

Question 4 5 out of 5 points A DFS replication topology in which every server replicates with every other server is

called a(n) _ Topology. full mesh full mesh

Question 5 5 out of 5 points The basic file-sharing capabilities of a Windows server are provided by the _ _ service.

server Server

Question 6 5 out of 5 points To keep a DFS folder s multiple targets synchronized, you must create a(n) _ _.

replication group replication group

Question 7 5 out of 5 points The __ __ allows you to simplify the view of file shares located across multiple servers as

they appear to your user base. distributed file service (DFS) Distributed File Service (DFS)

Question 8 5 out of 5 points A(n) __ __ appears to the operating system as though it is a physically separate disk and

can host an operating system primary partition

574. Correct Answer: 575. 576. 577. 578. 579. Selected Answer: 580. Correct Answer: 581. 582. 583. 584. 585. Selected Answer: 586. Correct Answer: 587. 588. 589. 590. 591. Selected Answer: 592. Correct Answer: 593. 594. 595. 596. 597. Selected Answer: 598. Correct Answer: 599. 600. 601. 602. 603. Selected Answer: 604. Correct Answer: 605. 606. 607. 608. 609. Selected Answer: 610. Correct Answer:

primary partition

Question 9 5 out of 5 points A(n) __ __ enables you to limit DFS replication traffic to specific pairs of members.

hub/spoke topology hub/spoke topology

Question 10 5 out of 5 points A DFS __ __ enables you to create a single directory tree that contains references to

shared folders located on multiple separate file servers. namespace namespace

Question 11 5 out of 5 points An alternative to the multimaster replication model used in DFS is: Single master replication Single master replication

Question 12 5 out of 5 points A server in a replication group is referred to as a: Member Member

Question 13 5 out of 5 points This refers to the ability of DFS clients to revert back to folder targets that have been

unavailable due to server or network outages. Client failback Client failback

Question 14 5 out of 5 points A disk partition that can hold data but not an operating system is called a(n):

Extended partition Extended partition

611. 612. 613. 614. 615. Selected Answer: 616. Correct Answer: 617. 618. 619. servers. 620. 621. Selected Answer: 622. Correct Answer: 623. 624. 625. 626. 627. Selected Answer: 628. Correct Answer: 629. 630. 631. 632. 633. Selected Answer: 634. Correct Answer: 635. 636. 637. sharing: 638. 639. Selected Answer: 640. Correct Answer: 641. 642. 643. following: 644. 645. Selected Answer: Replication group Question 20 5 out of 5 points To enable replication for a DFS folder with multiple folder targets, you must create the Server Service Server Service Question 19 5 out of 5 points The following service is required on a Windows Server 2008 server in order to enable file Full mesh replication Full mesh replication Question 18 5 out of 5 points In this topology, every member of a DFS replication group replicates with every other Multiple Master Replication Multiple Master Replication Question 17 5 out of 5 points The Distributed File System uses the following replication model to keep servers in a Namespace Namespace Question 16 5 out of 5 points A DFS __________ contains a virtual representation of the shared folders on all DFS target Namespace server Namespace server Question 15 5 out of 5 points This DFS component is responsible for maintaining a list of DFS shared folders and

responding to user requests for those folders.

replication group up to date:

member, for full replication connectivity.

646. Correct Answer: 647. 648. Question 1 649. device. 650. 651. Selected Answer: 652. Correct Answer: 653. 654. 655. a(n) __. 656. 657. Selected Answer: 658. Correct Answer: 659. 660. 661. 662. 663. Selected Answer: 664. Correct Answer: 665. 666. 667. 668. 669. Selected Answer: 670. Correct Answer: 671. 672. 673. 674. 675. Selected Answer: 676. Correct Answer: 677. 678. 679. 680.

Replication group

5 out of 5 points

A(n) __ is the software interface through which a computer communicates with a print

printer printer

Question 2 5 out of 5 points When you connect a single print server to multiple print devices, you create what is called

printer pool printer pool

Question 3 5 out of 5 points By default, all printers assign the Allow Print permission to the __ special identity, which

enables all users to access the printer and manage their own documents. everyone Everyone

Question 4 5 out of 5 points Users with the __ permission can go beyond just manipulating queued documents; they

can reconfigure the printer itself. manage Manage Printers

Question 5 5 out of 5 points The ____ is the default print format used by the Windows 2000, Windows XP, and Windows

Server 2003 operating systems. EMF interim Enhanced Metafile Format (EMF)

Question 6 5 out of 5 points A(n) ____ is a device driver that converts the print jobs generated by applications into an

appropriate string of commands for a specific print device.

681. Selected Answer: 682. Correct Answer: 683. 684. 685. Wide Web. 686. 687. Selected Answer: 688. Correct Answer: 689. 690. 691. 692. 693. Selected Answer: 694. Correct Answer: 695. 696. 697. 698. 699. Selected Answer: 700. Correct Answer: 701. 702. 703. 704. 705. Selected Answer: 706. Correct Answer: 707. 708. 709. 710. 711. Selected Answer: 712. Correct Answer: 713. 714. 715.

printer driver printer driver

Question 7 5 out of 5 points The ____ allows clients to print documents using HTTP traffic over an intranet or the World

Internet Printing Protocol (IPP) Internet Printing Protocol (IPP)

Question 8 5 out of 5 points Users with the ____ permission to a printer have the ability to pause, resume, restart, and

cancel their own documents, but not documents created by any other user. print Print

Question 9 5 out of 5 points A(n) ____ print architecture consists of one print device connected to one computer.

locally-attached print device locally attached print device

Question 10 0 out of 5 points ____ such as Printer Not Ready are a useful way for administrators to determine what

printers need attention throughout a Windows Server 2008 network. Default Filters Custom filters

Question 11 5 out of 5 points Which printer permission allows users to pause, resume, restart and cancel all users'

documents, and to control job settings for all documents? Manage Documents Manage Documents

Question 12 5 out of 5 points What document format is a new, platform-independent format included with Windows

Vista and Windows Server 2008?

716. 717. Selected Answer: 718. Correct Answer: 719. 720. 721. 722. 723. Selected Answer: 724. Correct Answer: 725. 726. 727. 728. 729. Selected Answer: 730. Correct Answer: 731. 732. 733. 734. 735. Selected Answer: 736. Correct Answer: 737. 738. 739. 740. 741. Selected Answer: 742. Correct Answer: 743. 744. 745. 746. 747. Selected Answer: 748. Correct Answer: 749. 750. 751. Question 18 5 out of 5 points What protocol allows users to print documents through an IIS server? Network-attached printer Local printer Question 17 0 out of 5 points What kind of printer is directly attached to a single computer, regardless of the interface Manage Printers Manage Printers Question 16 5 out of 5 points What permission allows a user to share a printer, delete a printer, and change a printer's Printer pool Printer pool Question 15 5 out of 5 points What can you create to connect a single print server to multiple print devices? Network-attached print device Print server Question 14 3 out of 5 points What kind of print device is connected to a TCP/IP network, either directly or through Print server Print server Question 13 5 out of 5 points What kind of device receives print jobs from clients and sends them to either locallyXML Paper Specification (XPS) XML Paper Specification (XPS)

attached or network-attached printer devices?

another computer?

properties?

it uses to connect?

752. 753. Selected Answer: 754. Correct Answer: 755. 756. 757. 758. 759. Selected Answer: 760. Correct Answer: 761. 762. 763. 764. 765. Selected Answer: 766. Correct Answer: 767. 768. 769. 770. server. 771. 772. Selected Answer: 773. Correct Answer: 774. 775. 776. Question 3 5 out of 5 points This view of the Windows Event Viewer allows you to configure a Windows Server 2008 Automatic Updates Automatic Updates Question 2 5 out of 5 points This feature will automatically check for software updates that are published on a WSUS Print Print Question 20 5 out of 5 points What permission allows users to pause, manage and cancel only those printer documents Print device Print device Question 19 5 out of 5 points What describes the actual hardware that produces hard copy documents on paper or IPP IPP

other print media?

that they have created?

computer to act as a repository for Event Viewer entries from one or more remote computers. 777. 778. Selected Answer: 779. Correct Answer: 780. 781. 782. 783. 784. Selected Answer: 785. Correct Answer: 786. Performance Monitor Users Performance Monitor Users Question 4 5 out of 5 points The following user group can view both real-time and historical data within the Forwarded Events Forwarded Events

Performance Monitor console, but cannot create or modify Data Collector Sets:

787. 788. 789.

Question 5 5 out of 5 points In order to collect events from remote computers that match the criteria of one or more

event filters that you define, you will create one or more of the following: 790. Selected Answer: 791. Correct Answer: 792. 793. 794. 795. 796. Selected Answer: 797. Correct Answer: 798. 799. 800. 801. 802. Selected Answer: 803. Correct Answer: 804. 805. 806. 807. 808. Selected Answer: 809. Correct Answer: 810. 811. 812. 813. 814. Selected Answer: 815. Correct Answer: 816. 817. 818. 819. 820. Selected Answer: 821. Correct Answer: Performance Log Users Performance Log Users Question 10 5 out of 5 points The following user group can view both real-time and historical data within the Display Filter Display Filter Question 9 5 out of 5 points The following allows you to display only those packets matching a particular set of Windows Event Collector Service Windows Event Collector Service Question 8 5 out of 5 points The following service allows you to configure a single server as a repository of Event Setup Log Setup Log Question 7 5 out of 5 points This is a new Event Log in Windows Server 2008, used to capture information regarding WS-Management WS-Management Question 6 5 out of 5 points What protocol does the Windows Event Viewer use to configure event forwarding? Subscription Subscription

operating system and application installations and un-installations.

Viewer information for multiple computers:

criterion among a larger set of packets that have been captured by Network Monitor:

Performance Monitor console, and can also create and modify Data Collector Sets:

822. 823. 824. 825. 826. Selected Answer: 827. Correct Answer: 828. 829. Question 1 830. 831. 832. Selected Answer: 833. Correct Answer: 834. 835. 836. 837. 838. Selected Answer: 839. Correct Answer: 840. 841. 842. 843. 844. Selected Answer: 845. Correct Answer: 846. 847. 848. 849. 850. Selected Answer: 851. Correct Answer: 852. 853. 854. domain. 855. 856. Selected Answer: Isolation Question 5 5 out of 5 points A(n) __ __ connection security rule allows you to restrict inbound and outbound policy transport mode Question 4 0 out of 5 points IPSec __ __ is used to provide end-to-end security, in which both hosts support IPSec using NTVMv2 NTLMv2 authentication Question 3 5 out of 5 points The strongest form of NT LAN Manager authentication is __ __. identity spoofing identity spoofing Question 2 5 out of 5 points A(n) __ __ attack is one in which a malicious user masquerades as the legitimate sender or default response rule default response rule 5 out of 5 points The __ __ was configured in Windows 2000, Windows Server 2003, and Windows XP IPSec Content Synchronization Service Content Synchronization Service Question 11 5 out of 5 points The following is a server-side component within WSUS that retrieves the latest critical

updates from the Windows Update Web site:

policies to ensure that the computer responds to requests for secure communication.

recipient of network traffic.

the same authentication protocols.

connections based on certain sets of criteria, such as membership in a particular Active Directory

857. Correct Answer: 858. 859. 860. 861. 862. Selected Answer: 863. Correct Answer: 864. 865. 866. 867. 868. Selected Answer: 869. Correct Answer: 870. 871. 872. 873. 874. Selected Answer: 875. Correct Answer: 876. 877. 878. 879. 880. Selected Answer: 881. Correct Answer: 882. 883. 884. 885. 886. Selected Answer: 887. Correct Answer: 888. 889. 890. 891. 892. Selected Answer:

Isolation

Question 6 5 out of 5 points Microsoft Network Monitor is an example of a real-world __ __. packet sniffing packet sniffer

Question 7 0 out of 5 points The Windows Firewall with Advanced Security MMC snap-in allows you to integrate IPSec

into the Windows Firewall by configuring one or more __ __. features Connection Security Rules

Question 8 5 out of 5 points The default __ __ for IPSec connections in an Active Directory environment is the Kerberos

v5 protocol. authentication method authentication method

Question 9 5 out of 5 points Each Windows Firewall exception can be configured with a specific __ __ to control which

computers the local computer will accept connections from. range of IP addresses scope

Question 10 5 out of 5 points A(n) __ __ must occur before secure traffic can be sent, in order to determine the type of

traffic to be secured and how it will be secured negotiation quick mode negotiation

Question 11 5 out of 5 points This is used to provide gateway-to-gateway protection for site-to-site communications

that cross the Internet (or other public networks). Tunnel mode

893. Correct Answer: 894. 895. 896. 897. 898. Selected Answer: 899. Correct Answer: 900. 901. 902. 903. 904. Selected Answer: 905. Correct Answer: 906. 907. 908.

Tunnel mode

Question 12 5 out of 5 points Windows Server 2003 supports the following feature, which is used to determine new

keying material through a new Diffie-Hellman exchange on a regular basis: Dynamic rekeying Dynamic rekeying

Question 13 5 out of 5 points The following protocol provides confidentiality (in addition to authentication, integrity,

and anti-replay) for the IP payload: Encapsulating Security Payload (ESP) Encapsulating Security Payload (ESP)

Question 14 5 out of 5 points This suite of protocols was introduced to provide a series of cryptographic algorithms that

can be used to provide security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is sending or receiving data. 909. 910. Selected Answer: 911. Correct Answer: 912. 913. 914. 915. 916. Selected Answer: 917. Correct Answer: 918. 919. 920. 921. 922. Selected Answer: 923. Correct Answer: 924. 925. 926. Question 17 5 out of 5 points You can configure the Windows Firewall to allow one or more inbound connections based Authentication exemption Authentication exemption Question 16 5 out of 5 points This Connection Security Rule allows you to specify one or more computers that do not Cookie Cookie Question 15 5 out of 5 points The following is a value contained in a received IKE message that is used to help identify IPSec IPSec

the corresponding main mode SA:

need to be authenticated in order to pass traffic.

on any of the following that you configure:

927. 928. Selected Answer: 929. Correct Answer: 930. 931. 932. 933. 934. Selected Answer: 935. Correct Answer: 936. 937. 938. Question 19 5 out of 5 points The following NTLM Authentication type is disabled by default in Windows Server 2003 Mirrored Mirrored Question 18 5 out of 5 points An IP Filter in which traffic that is defined in one direction will also be defined in the Exception Exception

opposite direction is said to be:

and Windows Server 2008 servers; it should not be used in a production environment as it is weak and can be easily hacked by malicious users: 939. 940. Selected Answer: 941. Correct Answer: 942. 943. 944. packet. 945. 946. Selected Answer: 947. Correct Answer: 948. 949. 950. Question 1 951. 5 out of 5 points A(n) _ _ is a CA that integrates with Active Directory and allows for auto-enrollment of Checksum Checksum Question 20 5 out of 5 points This is a mathematical value that is used to provide an integrity check for a TCP or UDP LM authentication LM authentication

user and computer certificates through the use of Group Policy and certificate templates. 952. 953. Selected Answer: 954. Correct Answer: 955. 956. 957. 958. 959. Selected Answer: 960. Correct Answer: 961. root CA root CA Question 2 5 out of 5 points The top-level CA in any PKI hierarchy is the _ _. enterprise CA enterprise CA

962. 963. 964.

Question 3 0 out of 5 points One alternative to using public key cryptography is by using a(n) _ _. certificate authority shared secret key

965. Selected Answer: 966. Correct Answer: 967. 968. 969. 970. 971. Selected Answer: 972. Correct Answer: 973. 974. 975. 976. 977. Selected Answer: 978. Correct Answer: 979. 980. 981. 982. 983. Selected Answer: 984. Correct Answer: 985. 986. 987. 988. 989. Selected Answer: 990. Correct Answer: 991. 992. 993. 994. 995. Selected Answer: 996. Correct Answer: 997. 998.

Question 4 5 out of 5 points Each PKI certificate consists of a public key that is widely known, and a(n) _ _ that is

known only to the user or computer who holds the certificate. private key private key

Question 5 0 out of 5 points Users can request certificates via the web using the _ _ service. online responder Certification Authority Web Enrollment

Question 6 0 out of 5 points A __ __ obtains PKI health certificates from client computers when the IPSec NAP

enforcement method is used. internet protocol security (IPSe) enforcement Health Registration Authority (HRA)

Question 7 0 out of 5 points The __ __ method is the only NAP enforcement agent that can be deployed in the absence

of an Active Directory domain. DHCP DHCP enforcement

Question 8 5 out of 5 points __ __ provide continuous monitoring of system compliance on all NAP clients. System Health Agents (SHAs) System Health Agents (SHAs)

Question 9 0 out of 5 points

999. Validators. 1000.

The __ __ distributes Statement of Health information to the appropriate System Health

1001.Selected Answer: 1002.Correct Answer: 1003. 1004. 1005. 1006. 1007.Selected Answer: 1008.Correct Answer: 1009. 1010. 1011. 1012. 1013.Selected Answer: 1014.Correct Answer: 1015. 1016. 1017. 1018. 1019.Selected Answer: 1020.Correct Answer: 1021. 1022. 1023. 1024. 1025.Selected Answer: 1026.Correct Answer: 1027. 1028. 1029. 1030. 1031.Selected Answer: 1032.Correct Answer: 1033. 1034.

NAP agent NAP administration server

Question 10 0 out of 5 points Each System Health Agent provides a __ __ regarding its health status. System Statement of Health (SSCH) Statement of Health (SOH)

Question 11 5 out of 5 points Each server that functions as a CA must be configured with a(n): Revocation configuration Revocation configuration

Question 12 5 out of 5 points An organization can have one or more of these to distribute the load of issuing certificates

in a geographically dispersed organization: Intermediate CA Intermediate CA

Question 13 5 out of 5 points In order to authenticate using a smart card that has been configured for their use, a user

must have the following installed at their workstation: smart card reader smart card reader

Question 14 5 out of 5 points Which component of Active Directory Certificate Services uses the Online Certificate

Status Protocol to respond to client requests? Online Responder Online Responder

Question 15 5 out of 5 points

1035. 1036.

The IPSec NAP Enforcement method relies on this type of PKI certificate to perform its

enforcements: 1037.Selected Answer: 1038.Correct Answer: 1039. 1040. 1041. 1042. 1043.Selected Answer: 1044.Correct Answer: 1045. 1046. 1047. 1048. 1049.Selected Answer: 1050.Correct Answer: 1051. 1052. 1053. 1054. 1055.Selected Answer: 1056.Correct Answer: 1057. 1058. 1059. 1060. 1061.Selected Answer: 1062.Correct Answer: 1063. 1064. 1065. 1066. 1067.Selected Answer: 1068.Correct Answer: 1069. 1070.Question 2 5 out of 5 points Certificate Practice Statement Certificate Practice Statement Question 20 5 out of 5 points This provides a detailed explanation of how a particular Certification Authority manages NAP Agent NAP Agent Question 19 5 out of 5 points The following NAP component transmits information between the NAP Enforcement System Statement of Health Response System Statement of Health Question 18 0 out of 5 points Statements of Health from each SHA are combined to create a: Simple Certificate Enrollment Protocol Simple Certificate Enrollment Protocol Question 17 5 out of 5 points The Network Device Enrollment Service (NDES) uses the following protocol to enroll enforcement point enforcement point Question 16 5 out of 5 points A server that operates the NAP Enforcement Server components is referred to as a(n): health certificate health certificate

network devices for PKI certificates:

Clients and the System Health Agents:

certificates and keys

1071. 1072.

This type of backup will completely reformat the target drive that hosts the backup files.

1073.Selected Answer: 1074.Correct Answer: 1075. 1076. 1077. 1078. 1079.Selected Answer: 1080.Correct Answer: 1081. 1082. 1083. 1084. 1085.Selected Answer: 1086.Correct Answer: 1087. 1088. 1089. 1090. 1091.Selected Answer: 1092.Correct Answer: 1093. 1094. 1095. 1096. 1097.Selected Answer: 1098.Correct Answer: 1099. 1100. 1101. 1102. 1103.Selected Answer: 1104.Correct Answer: 1105.

Scheduled backup Scheduled backup

Question 3 5 out of 5 points This type of disk quota allows the user to access storage space beyond the allotted

amount and simply sends an email notification when the quota has been exceeded. soft quota soft quota

Question 4 5 out of 5 points This type of restore can be used to recover an entire server after it has experienced a

hardware failure or other disaster recovery scenario. bare-metal restore bare-metal restore

Question 5 5 out of 5 points This backup type will retain the Application log files on the local server after the backup is

completed. Copy backup Copy backup

Question 6 5 out of 5 points This quota type prohibits users from consuming any disk space beyond what has been

defined within the quota. hard quota hard quota

Question 7 5 out of 5 points This is the only type of quota available on servers that do not have the File Server

Resource Manager role service installed. NTFS quota NTFS quota

1106. 1107. 1108.

Question 8 5 out of 5 points All Windows disk quotas are based on the following to determine the amount of space

being used by a particular user. 1109.Selected Answer: 1110.Correct Answer: 1111. 1112. 1113. 1114. 1115.Selected Answer: 1116.Correct Answer: 1117. 1118. 1119. 1120. 1121.Selected Answer: 1122.Correct Answer: 1123. 1124. 1125. 1126. 1127.Selected Answer: 1128.Correct Answer: 1129. 1130. 1131.Administrators can specify these to dictate the percentage of available disk space at which actions associated with disk quotas will take effect. 1132. 1133. F. threshold 1134. 1135. F. threshold 1136. 1137.This is a new command-line and task-based scripting technology that is included with Windows Server 2008. 1138. 1139. I. Windows Powershell 1140. Windows Server Backup Windows Server Backup Question 11 5 out of 5 points This backup technology was introduced by Windows Server 2008 and relies on the quota template quota template Question 10 5 out of 5 points This collection of disk quota settings can be used to create numerous quota assignments VSS full backup VSS full backup Question 9 5 out of 5 points This backup type will update the server s backup history and will clear the Application Log file ownership file ownership

files on the server.

all containing consistent configuration settings.

Volume Shadow Copy Service (VSS).

1141. I. Windows Powershell 1142. 1143.This is a limit that is placed on the disk space a user is permitted to consume in a particular volume or folder. 1144. 1145. A. disk quota 1146.disk quota 1147.This controls what types of traffic will be recorded by Network Monitor when you press F10. 1148. D. 1149. Capture Filter 1150. 1151. D. 1152. Capture Filter 1153. 1154. 1155.This right must be granted to Performance Log Users to allow them to create and manage Data Collector Sets. 1156. 1157. H. 1158. Log on as a batch user 1159. 1160. H. 1161. Log on as a batch user 1162. 1163. 1164.This custom view in the Event Viewer collects Critical, Error, and Warning events from all logs on a particular server. 1165. 1166. A. Administrative Events 1167. 1168. A. Administrative Events 1169. 1170.This capture mode enables Network Monitor to listen to all traffic that is being passed on a particular network segment. 1171. 1172. J. promiscuous mode J. promiscuous mode 1173.This service is used by WSUS to optimize network traffic while downloading updates. 1174. 1175. C. 1176. Background Intelligent Transfer Service (BITS) 1177.

1178. C. 1179. Background Intelligent Transfer Service (BITS) 1180. 1181. 1182.This type of forwarded event is initiated by the server acting as the event repository. 1183. 1184. E. 1185. collector initiated 1186. 1187. E. 1188. collector initiated 1189. 1190. 1191.This is the command-line method of launching the Performance Monitor MMC snap-in. 1192. 1193. I. 1194. perfmon 1195. I. 1196. perfmon 1197.This log provides a view of events related to software that has been installed on a Windows server computer. 1198. 1199. B. 1200. Application Log 1201. 1202. B. 1203. Application Log 1204. 1205. 1206.This is collected to provide a real-time view into the behavior and performance of a server and its applications. 1207. 1208. G. 1209. event trace data 1210. 1211. G. 1212. event trace data 1213. 1214.This allows you to organize a set of performance counters, event traces, and system configuration data into a single reusable configuration item. F. 1215. Data Collector Set

1216. 1217. F. 1218. Data Collector Set