Import Settings




Download 46,5 Kb.
bet1/2
Sana21.03.2017
Hajmi46,5 Kb.
#962
  1   2

Lesson 6: Working with Networking Services
Multiple Choice
1. What protocol automatically configures IP configuration for a client?

a) DNS


b) DHCP

c) WINS


d) FTP
Answer: b

Difficulty: Easy

Section Reference: Working with DHCP

Explanation: The Dynamic Host Configuration Protocol (DHCP) sends IP information to clients automatically, making configuration of IP addresses on the network easier.


2. Which of these ports does DHCP use?

a) 80


b) 67

c) 23


d) 500
Answer: b

Difficulty: Hard

Section Reference: Working with DHCP

Explanation: DCHP uses ports 67 and 68.


3. After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?

a) Register the scope

b) Register the server

c) Authorize the server

d) Register the clients
Answer: c

Difficulty: Easy

Section Reference: Working with DHCP

Explanation: Installing a DHCP server consists of the following steps:



  1. Installing the DHCP service

  2. Configuring an IP scope

  3. Activating the scope

  4. Authorizing the server

4. You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem?

a) It cannot communicate with a DHCP server.

b) The DNS servers specified are incorrect or are down.

c) NetBIOS over TCP/IP has not been enabled.

d) The network card is not connected properly to the network.


Answer: a

Difficulty: Medium

Section Reference: Working with DHCP

Explanation: Sometimes, APIPA can get in the way of a client obtaining an IP address properly (for example, when a client attempts to obtain an IP address from a DHCP server, but the DHCP server is too busy). At that point, APIPA would self-assign an IP address to the client computer, and the computer would be stuck with that address until you run ipconfig /release and ipconfig /renew from the command line.


5. What name does Windows Server 2008 R2 use for Terminal Services?

a) MS Telnet Server

b) MS Primary Services

c) MS Thin Server

d) Remote Desktop Services
Answer: d

Difficulty: Medium

Section Reference: Working with Terminal Services

Explanation: Terminal Services, also known as Remote Desktop Services, is a type of thin-client terminal server computing. It allows client computers to access and use applications loaded on the server, as well as to connect to and take control of a server.


6. What port does Remote Desktop Services use?

a) 443


b) 501

c) 389


d) 3389
Answer: d

Difficulty: Hard

Section Reference: Working with Terminal Services

Explanation: Thin-client computers and PCs can connect to servers running Terminal Services. The service uses port 3389 and is also known as Microsoft Windows-Based Terminal (WBT) Server.


7. What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2?

a) Microsoft RAS

b) Microsoft RRAS

c) Microsoft RDC

d) Microsoft VPN Server
Answer: b

Difficulty: Medium

Section Reference: Defining More Networking Services

Explanation: Originally used with dial-up services, Microsoft RAS has morphed into RRAS, or Routing and Remote Access Service. This powerful service allows clients to connect remotely to a central network using dial-up and high-speed Internet connections. It also allows connectivity through VPNs.


8. What protocol is used with L2TP to encrypt data?

a) IPSec


b) MS-CHAP

c) MS-CHAPv2

d) MPPE
Answer: a

Difficulty: Easy

Section Reference: Defining IPsec

Explanation: Internet Protocol Security (IPsec) is a protocol within the TCP/IP suite that encrypts and authenticates IP packets. It is designed to secure any application traffic because it resides on the Network layer (or Internet layer, as TCP/IP programmers refer to it). This protocol is used with VPNs and is an integral part of IPv6.


9. Which component of IPSec is generates the encryption and authentication keys?

a) SA


b) AH

c) ESP


d) MPPE
Answer: a

Difficulty: Medium

Section Reference: Defining IPsec

Explanation: Security association (SA) generates the encryption and authentication keys that are used by IPsec.


10. Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality?

a) SA


b) AH

c) ESP


d) MPPE
Answer: b

Difficulty: Medium

Section Reference: Defining IPsec

Explanation: Authentication header (AH) provides connectionless integrity and data authentication. It also provides protection against replay attacks. Different form ESP, AH does not provide confidentiality.


11. Which IPsec component includes the most security, including confidentiality?

a) SA


b) AH

c) ESP


d) MPPE
Answer: c

Difficulty: Medium

Section Reference: Defining IPsec

Explanation: Encapsulating security payload (ESP) provides the same services as AH but also provides confidentiality when sending data.


12. What port does DNS use?

a) 443


b) 389

c) 51


d) 53
Answer: d

Difficulty: Medium

Section Reference: Defining DNS

Explanation: DNS servers use inbound port 53 to accept name-resolution requests.


13. What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?

a) DNS


b) WINS

c) DHCP


d) LDAP
Answer: b

Difficulty: Easy

Section Reference: Defining WINS

Explanation: Windows Internet Name Service (WINS) resolves NetBIOS names to IP addresses. It is Microsoft’s version of the NetBIOS Name Service (NBNS) combined with a name server. A Windows computer name (for example, Computer1), can be considered a host name and interact with DNS, and/or a NetBIOS name by working either alone or in concert with a WINS server.


14. What feature within Windows allows the server to act as a router?

a) IPsec


b) DHCP

c) IP forwarding

d) RDC
Answer: c

Difficulty: Medium

Section Reference: Defining RRAS

Explanation: When RRAS is configured, it can be modified further depending on what network adapters and IP addresses the server has. Enabling LAN routing turns on the concept known as IP forwarding, but only if the server has two or more network adapters.



Download 46,5 Kb.
  1   2




Download 46,5 Kb.