• Fill in the Blank
  • Short Answer
  • Discovery
  • Lesson 6: Working with Networking Services Multiple Choice




    Download 20.13 Kb.
    Sana21.03.2017
    Hajmi20.13 Kb.

    Lesson 6: Working with Networking Services
    Multiple Choice
    1. What protocol automatically configures IP configuration for a client?

    a) DNS


    b) DHCP

    c) WINS


    d) FTP
    Answer: b

    Difficulty: Easy

    Section Reference: Working with DHCP

    Explanation: The Dynamic Host Configuration Protocol (DHCP) sends IP information to clients automatically, making configuration of IP addresses on the network easier.


    2. Which of these ports does DHCP use?

    a) 80


    b) 67

    c) 23


    d) 500
    Answer: b

    Difficulty: Hard

    Section Reference: Working with DHCP

    Explanation: DCHP uses ports 67 and 68.


    3. After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?

    a) Register the scope

    b) Register the server

    c) Authorize the server

    d) Register the clients
    Answer: c

    Difficulty: Easy

    Section Reference: Working with DHCP

    Explanation: Installing a DHCP server consists of the following steps:



    1. Installing the DHCP service

    2. Configuring an IP scope

    3. Activating the scope

    4. Authorizing the server

    4. You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem?

    a) It cannot communicate with a DHCP server.

    b) The DNS servers specified are incorrect or are down.

    c) NetBIOS over TCP/IP has not been enabled.

    d) The network card is not connected properly to the network.


    Answer: a

    Difficulty: Medium

    Section Reference: Working with DHCP

    Explanation: Sometimes, APIPA can get in the way of a client obtaining an IP address properly (for example, when a client attempts to obtain an IP address from a DHCP server, but the DHCP server is too busy). At that point, APIPA would self-assign an IP address to the client computer, and the computer would be stuck with that address until you run ipconfig /release and ipconfig /renew from the command line.


    5. What name does Windows Server 2008 R2 use for Terminal Services?

    a) MS Telnet Server

    b) MS Primary Services

    c) MS Thin Server

    d) Remote Desktop Services
    Answer: d

    Difficulty: Medium

    Section Reference: Working with Terminal Services

    Explanation: Terminal Services, also known as Remote Desktop Services, is a type of thin-client terminal server computing. It allows client computers to access and use applications loaded on the server, as well as to connect to and take control of a server.


    6. What port does Remote Desktop Services use?

    a) 443


    b) 501

    c) 389


    d) 3389
    Answer: d

    Difficulty: Hard

    Section Reference: Working with Terminal Services

    Explanation: Thin-client computers and PCs can connect to servers running Terminal Services. The service uses port 3389 and is also known as Microsoft Windows-Based Terminal (WBT) Server.


    7. What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2?

    a) Microsoft RAS

    b) Microsoft RRAS

    c) Microsoft RDC

    d) Microsoft VPN Server
    Answer: b

    Difficulty: Medium

    Section Reference: Defining More Networking Services

    Explanation: Originally used with dial-up services, Microsoft RAS has morphed into RRAS, or Routing and Remote Access Service. This powerful service allows clients to connect remotely to a central network using dial-up and high-speed Internet connections. It also allows connectivity through VPNs.


    8. What protocol is used with L2TP to encrypt data?

    a) IPSec


    b) MS-CHAP

    c) MS-CHAPv2

    d) MPPE
    Answer: a

    Difficulty: Easy

    Section Reference: Defining IPsec

    Explanation: Internet Protocol Security (IPsec) is a protocol within the TCP/IP suite that encrypts and authenticates IP packets. It is designed to secure any application traffic because it resides on the Network layer (or Internet layer, as TCP/IP programmers refer to it). This protocol is used with VPNs and is an integral part of IPv6.


    9. Which component of IPSec is generates the encryption and authentication keys?

    a) SA


    b) AH

    c) ESP


    d) MPPE
    Answer: a

    Difficulty: Medium

    Section Reference: Defining IPsec

    Explanation: Security association (SA) generates the encryption and authentication keys that are used by IPsec.


    10. Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality?

    a) SA


    b) AH

    c) ESP


    d) MPPE
    Answer: b

    Difficulty: Medium

    Section Reference: Defining IPsec

    Explanation: Authentication header (AH) provides connectionless integrity and data authentication. It also provides protection against replay attacks. Different form ESP, AH does not provide confidentiality.


    11. Which IPsec component includes the most security, including confidentiality?

    a) SA


    b) AH

    c) ESP


    d) MPPE
    Answer: c

    Difficulty: Medium

    Section Reference: Defining IPsec

    Explanation: Encapsulating security payload (ESP) provides the same services as AH but also provides confidentiality when sending data.


    12. What port does DNS use?

    a) 443


    b) 389

    c) 51


    d) 53
    Answer: d

    Difficulty: Medium

    Section Reference: Defining DNS

    Explanation: DNS servers use inbound port 53 to accept name-resolution requests.


    13. What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?

    a) DNS


    b) WINS

    c) DHCP


    d) LDAP
    Answer: b

    Difficulty: Easy

    Section Reference: Defining WINS

    Explanation: Windows Internet Name Service (WINS) resolves NetBIOS names to IP addresses. It is Microsoft’s version of the NetBIOS Name Service (NBNS) combined with a name server. A Windows computer name (for example, Computer1), can be considered a host name and interact with DNS, and/or a NetBIOS name by working either alone or in concert with a WINS server.


    14. What feature within Windows allows the server to act as a router?

    a) IPsec


    b) DHCP

    c) IP forwarding

    d) RDC
    Answer: c

    Difficulty: Medium

    Section Reference: Defining RRAS

    Explanation: When RRAS is configured, it can be modified further depending on what network adapters and IP addresses the server has. Enabling LAN routing turns on the concept known as IP forwarding, but only if the server has two or more network adapters.


    Fill in the Blank
    15. You use the ________ to connect to a terminal server.
    Answer: Remote Desktop Connection (RDC)

    Difficulty: Medium

    Section Reference: Working with Terminal Services

    Explanation: When clients connect, they do so with the Remote Desktop Connection (RDC) program, which is based on the Remote Desktop Protocol (RDP).


    16. _________ provides name resolution between domain names and IP addresses.
    Answer: DNS

    Difficulty: Medium

    Section Reference: Defining DNS

    Explanation: The Domain Name System (DNS) is a worldwide service that resolves hostnames to IP addresses. This facilitates proper communication between computers. DNS servers communicate with each other in a hierarchy in an effort to teach each other their name resolutions.


    17. ________ allows a user to connect to a corporate network using the Internet.
    Answer: VPN

    Difficulty: Medium

    Section Reference: Defining RRAS

    Explanation: With VPNs, the inherent power of the Internet is exploited, and direct IP connections are made from clients to a VPN server or router.


    Short Answer
    18. What command do you use to release the IP configuration handed out by a DHCP server?
    Answer: ipconfig /release

    Difficulty: Medium

    Section Reference: Working with DHCP

    Explanation: To release an IP configuration that has been assigned by a DHCP server, you use the /renew option. This will not change any static information.


    19. What command do you use to reacquire IP configuration from a DHCP server?
    Answer: ipconfig /renew

    Difficulty: Medium

    Section Reference: Working with DHCP

    Explanation: To renew a IP configuration information that has been handed out by a DHCP server, you use the ipconfig /renew command.


    20. List the four steps for a client to get an IP address from a DHCP server.
    Answer: Discover, Offering, Request, and Acknowledge

    Difficulty: Easy

    Section Reference: Working with DHCP

    Explanation: DHCP sessions use a four-step process known as DORA. The four steps are as follows:



    1. Discovery: The client computer broadcasts out to the network in order to find a DHCP server.

    2. Offering: The DHCP server sends out a unicast “offering” of an IP address to the client computer.

    3. Request: The client broadcasts to all servers that it has accepted the offer.

    4. Acknowledge: The DHCP server sends a final unicast to the client that includes the IP information the client will use.


    Download 20.13 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa


    Lesson 6: Working with Networking Services Multiple Choice

    Download 20.13 Kb.