70-642 Flashcards

(285 cards)

1
Q

Which command is used to assign different lease durations for desktop and portable computers

A

The IPconfig /setclassID command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when can Kerberos authentication be used between two computers

A

When members are from the same domain, or when members are from domains with trust relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the class A address information

A
0.0.0.0- 126.255.255.255
8 bit network number
24 bit host number
126 subnets
16,777,216 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which industry-standard protocol can be used to encrypt any type of traffic between two endpoints

A

Internet protocol security (IPSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the user class option in dynamic host configuration protocol (DHCP)

A

You can group computers with similar configuration needs within one scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the class C information?

A
192.0.0.0- 223.255.255.254
24 bit network number
8 bit host number
2,097,152 subnets
254 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of IPv6 address is 2001: DB8:2A5C:F482:2B0:D0AF:FBE9:4943

A

A global unicast IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the private IP addresses

A

Class A 10.0.0.0 - 10.255.255.254
Class B 172.6.0.1 - 172.31.255.254
Class C 192.168.0.1 - 192.168.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the certificate-based isolation policy design differ from domain isolation policy design and server isolation policy design

A

Certificate-based isolation policy design uses certificates and can authenticate computers that use another operating system or are not domain members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which implementation of Internet protocol security (IP sac) provides data source authentication data integrity and anti-replay protection for the entire packet

A

IP SEC authentication header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the unspecified address (0:0:0:0:0:0:0:0 or::) indicate

A

It indicates the absence of an address. It is the equivalent to the IPV for unspecified address 0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many IPv6 subnets can be created from the subnet address prefix of /55 using the global routing prefix

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the address prefix for all site-local IPv6 addresses

A

FEC0::/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the class B address information

A
128.0.0.0 - 191.0.0.0
16 bit network number
16 bit host number
65,534 subnets
254 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the automatic private IP address (APIPA) range

A

169.254.0.0 /24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Internet protocol security (IPsec) policy attempts to communicate with other computers without using (IPsec), but will use (IPsec) to communicate with those computers that request (IPsec)

A

The client (respond only) (IPsec) policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why should you create DHCP reservation on all DHCP servers

A

To ensure that the computer for which the addresse is reserved receives the appropriate IP address regardless of which DHCP computer DHCP client contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which Internet protocol security (IPsec) policy only requests encrypted communication, but will allow unencrypted communication. If the other computer cannot communicate using (IPsec)

A

The server (request security) (IPsec) policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which command would add a persistent route to the 10.51.0.0/16 network that connects through the router interface of 10.23.0.1

A

Route -p add 10.51.0.0 mask 255.255.0.0 10.23.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which utility is used to troubleshoot NetBIOS name resolution problems

A

The Nbtstat command-line utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What routing protocol should you install on a Windows server 2008 are two server that is configured as a router to support multicasting applications

A

The IGMP routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which type of IPv6 address is used when communicating with neighboring nodes on the same subnet

A

A link-local address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which implementation of Internet protocol security (IPsec) provides data confidentiality data source authentication data integrity and anti-relay protection from part of the packet

A

(IPsec) encapsulating (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the netsh interface IPv6 install command do

A

It allows you to install IPv6 on computers running Windows XP SP1 or later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When using DHCP V6 how should you set the M and O flags to ensure that the clients receive IP addresses, but not configuration information
Set the M flag to 1 and the O to 0
26
Which scripting tool allows you to configure and monitor Windows server 2008 R2 networking components
The Netsh command-line scripting utility
27
How many subnets could be created from this network ID or network number and associated subnet mask 129.168.10.0/28
16
28
If the global address prefix assigned is 3FFF: 2FFA: 3B:A000/52 and you need eight subnets are the eight subnetted address prefixes that can be used
``` 3FFF:2FFA:3B:A000::/55 3FFF:2FFA:3B:A200::/55 3FFF:2FFA:3B:A400::/55 3FFF:2FFA:3B:A600::/55 3FFF:2FFA:3B:A800::/55 3FFF:2FFA:3B:AA00::/55 3FFF:2FFA:3B:AC00::/55 3FFF:2FFA:3B:AE00::/55 ```
29
What should you do to ensure that a DHCP server is automatically authorized when you add the server to the DHCP console for the first time
Install DHCP on a computer that is also running as a domain controller
30
Which command is used to remove a specific route or a number of routes
Route delete
31
Which, Netsh parameter is used to specify a context
The -c switch
32
What must you do to ensure that your's DHCP server is able to assign IP addresses to DHCP clients on the network
Authorize the DHCP server
33
In IPv6. What does the 0:0:0:0:0:0:0:1 or ::1 address indicate
A loopback interface transfer
34
What is the easiest way to configure dynamic host configuration protocol (DHCP) to assign different lease durations to computers in the same scope
Implement user classes in the zone for any computers that should receive a different lease duration configure the computers that need the new lease duration to be members of the new user class
35
Which command is used to make changes to an existing route
Route change
36
Which registry key can be edited to prevent users from making an IPv6 connection over nontitle (dial-up) connection
HKEY_LOCAL MACHINE/SYSTEM/currentcontrolset/services/TCPIP6/parameters/disabledcomponents
37
If (IPsec) is not an option for encrypting data as it crosses the network. What can be used to encrypt data retrieved from an IIS server
A secure sockets layer (SSL) connection
38
Why are all authentication methods considered safe (even clear tax). When you are using L2TP/IPsec as the remote access protocol
The authentication occurs AFTER the establishment of the secure tunnel so takes place within the tunnel
39
Which command is used to add a route
Route add
40
Which Netsh parameter is used to specify a remote computer to be monitored
The-r switch
41
If a DHCP server is connected to two subnets. What should you do to ensure that the DHCP server does NOT assign addresses on one of the subnets
Unbind DHCP from the network interface card (NIC) connected to the subnet to which you do not want to assign IP addresses
42
Which IPv6 subneted address prefix would yield 25 subnets
/53
43
Which console should you use to create a new Internet protocol security (IPsec) policy
The IP security policies console
44
Which tool should you use to remove a filter from an Internet protocol security (IPsec) policy
The IP security policies tool
45
Which remote access protocol can be used to provide data integrity and security user and/or computer authentication and can be used with either certificates or pre-shared keys
L2TP/IPSEC
46
What should you configure on DHCP server to prevent getting IP addresses conflicts. After you restore your DHCP server from backup
Set the conflict detection value between the value of 1 and 3
47
Which Netsh parameter is used to specify an alias file to be executed
The -a switch
48
What different operations are available for RADIUS accounting logging
You can configure SQL server logging text file logging or combinations of these 2 logging types
49
For IPv6 systems that cannot store any historical information for generating future interface identifier values. What is generated each time the IPv6 protocol is initialized
A new random interface identifier
50
What command will allow you to copy outbound and inbound firewall rules from a Windows server 2008 R2 server
Netsh advfirewall export and Netsh advfirewall import
51
What should you do to ensure that all group policy settings are reapplied to a computer
Reboot the computer (some group policy settings require reboot of the computer)
52
What is the address prefix of all unique local IPv6 addresses
FC00::/7
53
If you need to authenticate accounts that are not members of your domain or a trusted domain, which authentication method should you use when you need to ensure that all data, including the computer's identity is encrypted
Certification authentication
54
After installing the DHCP server in creating the scope and scope options what to additional configurations must be performed manually before the server can begin issuing addresses
Authorize the server and activate the scope
55
You have been issued in IPV for network address or network ID of 192.168.2.0 what subnet mask would allow for at least 60 hosts on each subnet
255.255.255.192
56
What is the address prefix for all link local IPv6 addresses
FE80::/64
57
When editing the HKEY_LOCAL_MACHINE\SYSTEM\currentcontrolset\TCPIP6\parameters\disabledcomponents registry key to prevent users from making an IPv6 connection over a non-tunnel (dial-up) connection which of the 5 bits used to set the disabledcomponents registry key is utilized
Bit 4
58
What does the -p parameter in the command route -p add 10.51.0.0 mask 255.255.0.0 space 10.23.0.1 accomplish
It causes the route to remain in the routing table, even when the computer is rebooted, also known as a persistent route
59
Which utility should you used to compact the dynamic host configuration protocol (DHCP) database
The jetpack utility
60
Which utility is used to display protocol statistics and current's TCP/IP connections
The NetStat command-line utility
61
Which subnet prefix could be placed on a server to allow it to communicate with all subnets in an IPv6 network where the subnet prefix on the subnet. It networks is/53
/48
62
What authentication mode settings can be used in a connection security rule when (IPsec) tunneling is used
Require inbound and outbound or require inbound and clear outbound
63
Which Netsh parameter is used to specify a script file to be executed
The -f switch
64
Which type of IPv6 address is equivalent to the IPV for private address space
A unique-local address
65
What is the address prefix for currently assigned IPv6 global addresses
2000::/3
66
Which for command should you run to compact the dynamic host configuration protocol (DHCP) database
CD %SYSTEMROOT%\SYSTEM32\DHCP net stop dhcpserver jetpack DHCP.mbd tempdatabse_name.mdb net start dhcpserver
67
What UDP ports must you open a firewall if you have a Windows deployment service (WDS) server on one subnet and an DHCP server on another subnet
Port 67 port 69 and port 4011
68
When using DHCP to issue IPv6 addresses. What will be the result if the M flag is set to 0 and the capital O flag is set to 1
DHCP V6 will assign other configuration settings, but not addresses
69
Which command is used to install IPv6 on Windows XP computers with no service packs installed
The IPv6 install command (which is been replaced by the Netsh tool for the later versions of Windows)
70
Which Internet protocol security (IPsec) policy requires that (IPsec) be used to protect all communication except for initial connection request
The secure server (require security) IPSEC policy
71
Which command displays a list of interfaces and active routes included in the routing table
The route print command
72
Which commandline tool can be used to determine the server roles that are currently installed on Windows server 2008 R2 server core installation
Oclist.exe
73
Which parameter of the dmscmd zoneadd command is used to create a secondary zone
/Secondary master_IP_address
74
Which type of DNS zone can be used to reduce the load on network bandwidth DNS replication and domain controllers are deployed at each location
In active directory-integrated zone
75
With commandline tool used to install all on Windows server 2008 R2 server core installation
ocsetup.exe
76
In which two types of zones configure aging and scavenging of steel records
Primary zones or active directory integrated zones
77
What command is used to immediately reflect changes made to a zone
Run the dnscmd command with the /zonerefresh option
78
Where is the DNS log stored
In the %systemroot%\system32\DNS
79
What are two ways to increase the size of the soccer pool size in a DNS server in order to prevent cache poisoning attacks
Use the dnscmd command with the /config and /socketpoolsize parameters. You can also use regedit to increase the value of the socket poolside's registry key under HKEY_LOCAL_MACHINE\SYSTEM\currentcontrolset\services\DNS\parameters
80
Which feature of DNS provides a mechanism for performing cleanup, removal of still records can accumulate in zone data
Aging and scavenging
81
What is the purpose of the forwarders tab of the DNS servers properties dialog box
Allows an administrator to configure DNS servers to which requests for specific zone data should be forwarded
82
Which DNS zone type supports secure dynamic updates
Active directory integrated DNS zones
83
Which service dynamically maps NetBIOS names to IP addresses
Windows Internet name service (WINS)
84
Which DNS option uses DNS dynamic update to register the IP addresses and primary domain name of the computer in DNS
The register DNS connections addresses in DNS option
85
What feature of a Windows server 2008 are to DNS server forces the DNS server not to overwrite cached records for the duration of the time to live (TTL) value
Cache locking
86
Which IP config parameter clears the contents of the DNS cache
The /flushdns parameter
87
What is the purpose of enable automatic scavenging of the stale records check box on the advanced tab of the DNS server's property dialog box
To remove old records from the DNS zone
88
When more than one DNS server is configured on a DNS client how do you configure the client to contact the second DNS server listed first
Configure the IP address of the second DNS server as the first listed DNS server, and the IP address of the first DNS server is the second listed DNS server
89
Which option allows you to enable automatic scavenging of stale records on the DNS server
The enable automatic scavenging of stale records option in the advanced tab in the properties dialog box of the DNS server
90
Which command is used for manual dynamic registration of the DNS names and IP addresses that are configured at a computer
The IPconfig /register DNS command
91
Which type of DNS resource record specifies the DNS server that is the authoritative data source for a domain
The start of authority (SOA) resource record
92
Where does the HOSTS file need to reside on a Windows 2008 server R2 server
The \windows\system32\drivers\etc folder
93
Which protocol helps resolve the name of neighboring computers without using a DNS server
Link-local multicast name resolution (LLMNR)
94
Which type of DNS resource record configures a host to use an alias name
A canonical name (CNAME) record
95
What is the purpose of the root hints tab of the DNS servers property box
It allows DNS servers to discover authoritative servers that manage domains that are located at a higher level in the DNS domain namespace
96
What determines when the cached records expire
The time to live (TTL) specified on the DNS server
97
Which parameter of the dnscmd zoneadd command is used to create an active directory integrated zone
/dsprimary
98
Which DNS server roles feature provides single label name resolution for large enterprise networks that do not contain a WINS server
The globalnames zone
99
Which type of DNS resource record specifies mail exchanger servers for a domain
Mail exchange (MX) resource records
100
What should you do if the root hints file on the DNS server is presenting DNS requests from being forwarded to the correct DNS server
Delete the root hints file
101
Which type of WINS clients use a hybrid form of WINS resolution and attempt to use P-node resolution followed by b- node resolution
H-node clients
102
Which two features must your domain controller support for DNS name resolution
SRV records and dynamic updates
103
Which type of WINS clients use broadcasts for WINS resolution
B-node clients
104
Which type of DNS records allow a DNS server to track network servers that offer special functionality such as domain controllers
SRV records
105
What is the function of the DNS forwarder
The DNS forwarder allows the DNS server to delegate queries that it cannot answer based on its local zone information to another server on the network
106
Which type of DNS resource record is the IPv6 equivalent to an IPV four host (A) address
A quad-A (AAAA) record
107
Which servers can process requests from DNS clients to update the zone when using active directory integrated zones
Any of the primary servers for the active directory integrated zone
108
Which three types of DNS records are required to support DNS security (DNSsec) extensions
``` a public key (KEY) resource record. a signature (SIG) resource record. a next (NXT) resource record ```
109
Which type of WINS clients use point-to-point connections to connect directly to an WINS server
P-node clients
110
Which type of DNS server does not perform zone transfers
The caching only DNS server
111
Which dnscmd command parameter deletes a root zone from the DNS server
These /zonedelete parameter
112
What records are contained in a stub zone
Host (A) records for the DNS servers that are authoritative for the zone and (NS) records for the name servers
113
Which DNS zone contains only the resource records necessary to identify the authoritative DNS servers for the actual zone replicates only the necessary records of a master zone, such as the secondary zone
A stub zone
114
Which dnscmd command parameter deletes the root zone from active directory
The /dsdel parameter
115
Which files stored on a local computer can be populated with a list of host names and IP addresses as an alternative to DNS
The hosts file
116
What is the term for setting both the M and O flags to 1
DHCPV6 stateful
117
How do you restrict zone transfers to only certain DNS servers
Configure the allow zone transfers only to servers listed on the names servers option on a zone
118
Which type of DNS resource record contains the service type protocol priority and weight
A service (SRV) record
119
What should you do to ensure that the DNS servers will query the WINS servers in the DNS server is unable to resolve a hosting
Enter the IP address of the WINS servers in the WINS tab of the DNS zones properties dialog box
120
Which parameter of the dnscmd command is used to change the DNS zone type
Zoneresettype
121
What should you do to prevent DNS zone information from being replicated to an anonymous computer
Specify the DNS servers were zone information will be replicated on the zone transfers tab
122
Which two methods would allow the service (SRV) records for a domain controller to be re-created
Restart the domain controller or restart the netlogon service on the domain controller
123
What should you do to ensure that both IP addresses and other configuration settings are automatically allocated to DHCP clients
Set both the M and O flags, 1 in the router advertisements
124
Which DNS radio button option would cause any suffixes listed in the box below the radio button to be appended to DNS queries
The append these DNS suffixes radio button
125
If multiple entries for a server type exist which DNS entry is contacted first by the DNS server
The entry with the lowest priority value
126
Which replication method is faster and more efficient: directory replication or standard DNS replication
Directory replication
127
Which DNS zone when configured on a DNS server that hosts a parent zone can updated list of authoritative DNS servers for a child zone
A stub zone
128
What determines how long a DNS server caches a query result for a specified amount of time
The time to live (TTL) value
129
What feature of a Windows server 2008 R2 DNS server ensures data integrity provides origin authority and authenticates denial of existence
DNSSEC
130
How should you configure the priority for mail exchanger (MX) resource records while configuring load-balancing for edge transport servers installed running exchange 2010 in Windows server 2008 R2
You should configure each MX resource record with the same priority
131
Which DNS option will allow you to add a DNS suffix automatically to any DNS query you execute
The append primary and connection specific DNS suffixes option
132
Which option causes the resolver to perform name devolution on the primary DNS suffix
The appended parent suffixes of the primary DNS suffix checkbox
133
What should you do if you want to allow a user to manage an active directory integrated zone
Give the user the appropriate permissions to the zone
134
What do men can reset the contents of the DNS resolver cache
Run the IPconfig /flushDNS command
135
One of the four new features provided by the DNS server role in Windows server 2008 R2
Background zone loading IPv6 support, support for read-only domain controllers (RODC) and the globalname zone
136
Which type of WINS replication, since any changes to the database to the replication partners
WINS push replication
137
Which DHCP option code should you use to specify that the DHCP server should all obtain a computers fully qualified domain name (FQDN) so that the DHCP server can dynamically update DNS
DHCP option code 81
138
What is the purpose of the interfaces tab of the DNS servers property dialog box
Allows an administrator to configure more than one IP address in which the DNS server will listen for DNS requests
139
Which type of WINS replication request the changes to the database from the replication partner
WINS pull replication
140
What is the purpose of the zone transfers tab of the DNS zone's properties dialog box
To configure the servers that receive zone transfers
141
Which parameter of the dnscmd zoneadd command is used to create a primary zone
/Primary /file file_name
142
Which type of DNS server does not host any zones
Caching-only DNS server
143
When a root zone exists on the DNS server. What must be done when you want to configure DNS forwarding
Delete the root zone
144
What should you enable in the default domain controllers policy to audit and active directory integrated zone
Enable audit directory service access and enable auditing on the active directory integrated zone
145
With DNSSEC what element performs the validation of the signature when a digital signature is sent in response to a query
The trust anchor
146
What is the purpose of the name servers tab of the DNS zones properties dialog box
It configures other DNS servers that are authoritative for the zone
147
Which type of WINS client choose a hybrid form of WINS resolution and attempt B-node resolution followed by P-node resolution
M-node clients
148
Which dnscmd command parameter should you use to delete a zone
/Zonedelete
149
In order to provide enhanced security against cache poisoning attacks, what percentage of the DNS cache is locked
100%
150
What is the purpose of the do not use recursion for this domain checkbox on the forwarders tab of the DNS servers property dialog box
It configures the DNS server to only use forwarders and do not attempt any further recursion. If the forwarders fail
151
Which parameter of the dnscmd command is used to reload the zone
/Zonereload
152
Which parameter of the dnscmd command is used to create a new zone
/Zoneadd
153
When should you use a caching only DNS server
When you want the server to only store resource records information from other DNS servers caching only servers are not authoritative for any DNS zone
154
Which command should you use to install the DNS server role on a Windows server 2008 server R2 core computer
Start /w ocsetup DNS-server-core-role
155
Which parameter of the dnscmd command is used to empty the contents of the DNS resolver cache on a DNS server
Clearcache
156
What is the purpose of the WINS tab of the DNS zones properties dialog box
It configures WINS lookup when a DNS server cannot resolve the name
157
Which type of DNS resource record maps. An IP address to a hostname
A pointer (PTR) record
158
Which feature of a Windows server 2008 R2 DNS server randomly picks a source port from a pool of available sockets that it opens when the DNS service starts in order to prevent cache poisoning attacks
Socket pooling
159
Which technology allows you to create policies that define the required software and configuration of a computer that connects to the network
Network access protection (NAP)
160
Which operating system supports network access protection (NAP) at the NAP client
Windows Vista, Windows 7, Windows server 2008 Windows 2008 R2 or Windows XP with service pack 3
161
What should you do to disable IPv6 on all the local area network (LAN) interfaces, connections and tunnel interfaces of a Windows server 2008 R2 computer
Access the following registry node: HKEY_LOCAL_MACHINE\SYSTEM\currentcontrol set\services\TCPIPv6\parameters\disabledcomponents. At a registry value of 0XFF with a DWORD registry type
162
Which new virtual private network (VPN) tunnel protocol is included in Windows server 2008, to prevent VPN connectivity issues
Secure socket tunneling protocol (SSTP)
163
What happens if you create an outbound rule for TCP/IP port 25, Windows firewall with advanced security on a Windows server 2008 R2 computer
The Windows server 2008 R2 computer will be unable to establish connections to the other computers across TCP port 25
164
Which routing and remote access service (RRAS) feature should you configure on a Windows server 2008 R2 computer that is set up as an answering router in order to specify a time to allow the calling router access to the answering router
Dial-in hours
165
Which of syndication method is used by the Remote Desktop connection to enhance security by reducing the risk of denial of service (DoS) attacks
Network level authentication (NLA)
166
Which authentication protocol is supported by point-to-point protocol (PPP)-based connections in Windows server 2008 R2
Protected extensible authentication protocol-Microsoft challenge. Handshake authentication protocol version 2 (PEAP-MS-CHAPv2) and P EAP-transport layer security (PEAP-TLS)
167
Which temporary wireless profile can be used by Windows server 2008 R 2 wireless computer to connect to a secure wireless network and joined to an active directory domain automatically
Bootstrap wireless profile
168
Which virtual private network (VPN) tunneling protocol should you use in a Windows server 2008R2 network to ensure a successful connection for capital VPN clients and servers behind NAT routers, firewalls, or web proxies
Secure socket tunneling protocol (SSTP)
169
Which 2 types of mappings are stored in a NAT translation table
Dynamic mappings and static mappings
170
Which of the decay protocol should you use to implement a smart card infrastructure for virtual private network (VPN) remote access
Extensible authentication protocol-transport level security (EAP-TLS)
171
Which wizard should you use to configure extensible authentication protocol-transport level security (EAP-TLS) to implement a smart card infrastructure for virtual private network (VPN) remote access
New remote access policy wizard
172
What should you do to disable IPv6 on your local area network (LA and) interfaces and connections except on tunnel interfaces of the Windows server 2008 R2 computer
Open the local area connection properties and clear the Internet protocol version 6 (TCP/IPV6) checkbox in the list under the disconnection uses the following items section
173
Which profile type is applied when a computer is connected to a private network, but not a domain environment
A private profile
174
Which server role or roles should you install on a Windows server 2008 R2 computer to configure it as a dial-up and virtual private network (VPN) site to site demanded dial router
The network policy and access services role along with the routing and remote access service (RRAS)
175
Which 3 authentication protocols are not supported by the point-to-point protocol (PPP)-based connections in Windows server 2008 R2
Shiva's password authentication protocol (SPAP), extensible authentication protocol message digest algorithm 5-challenge handshake authentication protocol (EAP-MD5-CHAP), and MS CHAP version 1
176
Which server role in Windows server 2008 and Windows server 2008 R2 allows you to install routing and remote access service (RRAS)
Network policy and access services
177
Which checkbox in the connection tab for the default properties of a wireless network allows a Windows server 2008 R2 computer to send a probe request to discover if the nonbroadcast network is in range
The connect even if the network is not broadcasting checkbox
178
Which Windows server 2008 feature can be configured to require that antivirus software is installed and up-to-date
A network health policy configured on a network policy server (NPS)
179
Which checkbox in the connection tab for the default properties of a wireless network allows a Windows server 2008 are 2 computer to send a probe request to wireless networks that are configured to not broadcast theSSID provided that the computer is configured for automatic connection
The connect automatically when this wireless network is in range check box
180
Which port numbers should be enabled on the firewall. If you want to establish VPN communications to Windows server 2008 R2 computer using IP security (IPSEC) authentication header (AH) and encapsulating security payload (ESP)
Ports 50 and 51
181
Which port numbers should be enabled on the firewall to ensure that's PPTP connections can be made over a VPN connection
Ports 47 and 1723
182
Which Windows firewall option ensures that remote computers cannot connect to a computer on which the option is enabled
The block all incoming connection option
183
Which network service. Should you install on a Windows server 2008 R2 computer to configure it as an IPV 4 router for connecting subnets of a private network
The routing and remote access service of the network policy and access services role
184
Which authentication method does the Remote Desktop connection provide to complete the user authentication process before a full Remote Desktop connection is established
Network level authentication (NLA)
185
Which type of network address translation (NAT) mapping ensures that the NAT table entry is deleted after a certain amount of time
Dynamic mappings
186
Which profile type supplied when a computer is directly connected to the Internet
A public profile
187
Which technology in Windows server 2008 and Windows server 2008 R2 can be deployed as a network access protection (NAP) health policy server
Network policy server (NPS)
188
Which 3 components or roles must be installed for Windows server 2008 R2 to function as a network access protection (NAP) server using VPN enforcement
Network policy server (NPS) routing and remote access service (RRAS) dynamic host configuration protocol (DHCP) server
189
Which network service in Windows server provides dial-up and virtual private network (VPN) services
Routing and remote access service (RRAS)
190
Which 3 settings are required to support a bootstrap wireless profile for a wireless Windows server 2008 R2 computer
Protected extensible authentication protocol-Microsoft challenge handshake authentication protocol version 2 (PEAP-MS-CHAPv2) authentication. Single sign-on enabled. Validate RADIUS server certificate disabled
191
Which routing and remote access service (RRAS) feature should you can figure on a Windows server 2008 R2 computer that is configured at a calling router in order to prevent connections at unwanted times
Dial-out hours
192
To recover a full server that have one disk and one volume, should the new hard disk be as big as the old disk or as big as the old volume
As big as the old disk
193
Which VSadmin.exe tool parameter is used to restore volume using a shadow copy
The revert shadow parameter
194
Which command line utility is used to create and manage quotas. Auto apply quotas and quota templates
dirquota.exe
195
What must you do to open an encrypted file that was transferred from another computer to a Windows server 2008 R2 file server
Export the EFS to think it from the source computer and import the EFS computer to the Windows server 2008 R2 file server
196
Which type of filter is used to monitor the print server and its status
A printer filter
197
Which console includes a version of the print management console that can only be used to manage the local computer
The server manager console
198
Which utilities can you use to migrate print queues printer settings printer ports and language monitors from Windows server 2003 servers to Windows server 2008 R2 servers
The printer migration wizard and the printbrm.exe command-line tool
199
Which command line utility is used to create and manage file screens file screen exceptions file screen templates and file groups
filescrn.exe
200
Which scripts should be used when you want to deploy scripts based on user accounts
Logon scripts
201
When creating a RAID 1 or RAID 5 set on a Windows server 2008 R2 computer which type of disc is required: basic or dynamic
The disc type must be a dynamic disk. If the disk is basic, it must be converted to dynamic
202
Which service is used to protect information through persistent usage policies
Active directory rights management services (RMS)
203
Which command-line utility is used to create and manage quotas and quota templates
The dirquota.exe command-line utility
204
What type of file management task in file server resource manager will automatically move all files that match specific criteria to a user-defined expiration directory
File expiration task
205
Command-line utility allows you to write a script. That backs up the SharePoint portal server databases on a schedule
The spsbackup.exe utility
206
Which Roth is used by distributed file system (DFS) to locate the root target link target or a client
DFS site discovery
207
Which command should be used on Windows server 2008 R2 computer to create a daily backup schedule and modify an existing backup schedule
The wbaadmin enabled backup command
208
What ports have to open on a branch cash clients firewall. If it is configured in hosted cache mode
TCP port 80
209
When you use a remote shared folder at the storage destination for schedule backups. What happens to the previous backup
It is erased by the current backup
210
How do you make a standard user "delegated print administrator"
Assign the user the allow-manage server permission on the print server
211
What feature and the DFS in Windows server 2008 R2 enables administrators to configure DFS services to be highly available
Windows failover clusters
212
What can you use to generate a storage report on a Windows server 2008 R2 file server to identify duplicate files and dormant files
File server resource manager
213
Which quota type will notify you, once the threshold limit is reached that will allow users to store data on the shared folder as long as the shared folder is not full
Soft quota
214
What ports have to open on a branch cash client firewall. If it is configured in distributed cache mode
TCP port 80 and UDP port 3072
215
Which command should be used to enable access-based enumeration in a namespace
The dfsutil property abde enable \\ command
216
Which quoted type should be used to ensure that users are not able to store more data threshold limit
Hard quota
217
Which command is used to create a hard link for a folder in Windows server 2008 R2
The mklink /H C:\FLDR1 D:\FLDR1 command
218
Which mode is used to ensure that the distributed file system (DFS) root servers poll their closest domain controller every hour to discover updates to the namespace
Scalability mode
219
Which command-line tool can be used to administer the volume shadow copy service (VSS) on a Windows server 2008 R2 computer
The vssadmin.exe tool
220
Which operating system support print driver isolation
Windows 7 and Windows server 2008 R2
221
In which folder is the print management console available on computers running Windows Vista, Windows 7, Windows 2008, or Windows server 2008 R2
The administrative tools folder
222
Which print driver isolation mode allows each print driver loaded into its own process space
Isolated
223
What kind of files cannot be classified with file server resource manager (FSRM) file classification
Encrypted files
224
Which tool should be used in Windows server 2008 are two to configure a printer filter to run a script that restarts the principal or service
The print management tool
225
Which command is used to create a directory symbolic link for a folder in Windows server 2008 R2
The mklink /D C:\FLDR1 D:\FLDR1 command
226
Which command is used in Windows server 2008 R2 to configure volume shadow copy service (VSS)
The diskshadow command
227
Which switch of the dfsrdiag.exe command computes and displays the hash value that is generated by the DFS replication service for a particular file
dfsrdiag.exe filehash
228
What switch of the dfsrdiag.exe command provides a summary of the replication status across all connections on the specified replication group member
dfsrdiag.exe replstate
229
Which command is used in Windows server 2008 R2 configure the context options mode and metadata file. When using volume shadow copy service (VSS)
The diskshadow set command
230
Went to diagnostic reports can you create for DFS replication
Propagation report and health report
231
When bitlocker is used with data drives which file systems can the drive formatted with
exFAT, FAT16, FAT32 or NTFS file systems
232
Which utility can be used to read the printer connection settings from group policy and assign the appropriate connection to the computer
The pushprinterconnections.exe utility
233
Which command-line utility can perform disk-related tasks that are normally performed in disk management
Diskpart.exe
234
What feature in Windows server 2008 and Windows server 2008 R2 automatically changes your default printer. When you change networks
Location-aware printing
235
Which tool can be used on a Windows server 2008 R2 computer to manage the printers on the network
The print management tool
236
Which print driver isolation mode allows all print drivers to be loaded into a single shared process space that is separate from the spooler process
Shared
237
Which file screening method can ensure that the user is not able to store a particular file that has been classified as a member of the blocked group
Active screening
238
Which distributed file system (DFS) functionality enables users to see only files and folders in the DFS namespace which they have permission to access
Access-based enumeration
239
How can you allow DFS clients read-only access to DFS shares without changing permissions or setting complicated ACLs
Use read-only replicated folders
240
What is the purpose of disk quotas
To manage the amount of hard drive space that an individual can use
241
When bitlocker is used with operating system drives which file systems can the drive be formatted with
The NTFS file system only
242
Which command-line utility is used to configure report parameters and generate storage reports on demand
storrept.exe
243
Which command line tool is used to backup and restore Windows SharePoint services, websites and my site personal sites
Thestsadm.exe command-line tool
244
Which command is used to create a directory junction for a folder in Windows server 2008 R2
The mklink /J C:FLDR1 D:\FLDR1 command
245
What settings and shared folders prevents the display of folders or other shared resources that the user does not have rights to access
Access-based enumeration (ABE)
246
What service ensures that any NTFS permission changes you make on one member of the replicas that are automatically replicated to the other members
File replication service (FRS)
247
What She statement should you use with the nmcap.exe command to capture only packets that are used with the Remote Desktop services to file named test.cap
nmcap /network * /capture quote (TCP.port = = 3389)" /file test.cap
248
Which option in Windows server 2008 R2 be used to ensure that events are delivered to the collector computer as soon as possible
The minimize latencyevent delivery optimization option
249
If you configure port 8524 as the custom port for HTTPS on a Windows server update services (WSUS) server which port will it automatically use for HTTP
8523
250
Into which mode does network monitor placed the network adapter of the computer to capture network frames
Promiscuous mode
251
Which option in Windows reliability and performance monitor should be selected to start reliability monitor
Monitoring tools reliability monitor
252
What three things must you do to ensure that certain computers receive updates from a WSUS server via client-side targeting
1. specify how you are going to assign computers to the computer groups. 2. create the computer group in WSUS 3. move the computers into groups
253
Which feature in Windows server is a reserved area in memory for holding incoming data
A capture buffer
254
Which relationship should be used when you have two windows software update service (WSUS) servers and you want one WSUS sever to receive updates from another WSUS server
And upstream/downstream WSUS relationship
255
Which service in Windows server 2008 and Windows server 2008 are to provide access to WMI data and enables the bank collection and subscription to events
Windows remote management (WinRM) service
256
Which service in Windows server 2008 are two supports logging events querying events, describing to events, archiving event logs and managing event metadata
Windows event log service
257
What command translate Windows events into SNMP traps
The evntcmd command
258
Which feature in Windows server 2008 are two allows roaming Windows software update service (WSUS) clients can be directed to the closest WSUS server based on IP subnets
Netmask ordering
259
Which file contains the source computers from which the events should be collected
The subscription file
260
Which tool is used in Windows server 2008 R2 to retrieve information about event logs and publishers
The wevtutil tool
261
Which option in Windows server compares the network traffic with a defined set of criteria and copies frames that meet the criteria to the temporary capture file
The capture filter
262
In which mode does the network adapter card copy all frames the Passover the network to a local buffer, regardless of the destination address
Promiscuous mode
263
What number value in the system stability index is the most stable weighted measurement
10 is the most stable
264
Which Windows update classification downloads only the updates related to non-security bugs
Critical updates
265
Which feature in Windows 7 and Windows server 2008 R2 enables you to collect copies of events from multiple remote computers and store them locally
Event viewer subscriptions
266
Which view is simply a filtered view of all event viewer data for a particular log
A custom view
267
Which service in Windows server 2008 R2 allows processes to start under alternate credentials
The secondary logon service
268
Which option in network monitor can be used to specify the types of display data such as protocols and computer addresses that you want to save to a file
Display filters
269
Which setting in a group policy object should you configure to ensure that Windows 7, or Windows 2008 R2 computer receives updates from a WSUS server named server01.nutex.com
The specify intranet Microsoft update service location policy-setting under the computer configuration\policies\administrative templates\Windows components\Windows update node
270
Which driver should be installed on the computers. If you want to manage the network traffic remotely
Network of monitor driver
271
What capture statement should you use with theNMCap.exe command to capture every packet except those used with Remote Desktop services to a file named test.
nmcap /network * /capture "!(TCP.port = = 3389)" /file test.cap
272
When using client-side targeting for Windows updates audio ensure that the client is assigned to the target group
Assign the computers to the target group by using either group policy or registry keys
273
Which feature in network monitor in Windows servers 2008 and Windows server 2008 R2 should be used to monitor network traffic data. When a program or batch file is running
A capture trigger
274
Which file is used to install network monitor
netmonsetup.exe
275
Which command is used to start Windows reliability and performance monitor in the resource view page
The perfmon.exe command
276
Which command should be run at an elevated command prompt to ensure that the computer is configured as the collector computer for event viewer subscriptions
The wecutil qc command
277
Why should you NOT initially set a connection security rule to require authentication for inbound and outbound connections in a GPO
You want to ensure that all computers can communicate with IPsec with the request authentication for inbound and outbound connections setting before using require mode
278
Which service in Windows server 2008 R2 allows a remote user to access the registry
The remote registry service
279
Which option should be selected from performance monitor to view the properties of a data collector set
The open properties for this data collector set option
280
Which checkbox should be selected in Windows reliability and performance monitor to allow all the data collectors to finish recording the latest values before the data collector set is stopped
The stop when all data collectors have finished checkbox
281
Which URL could you configure in the domain policy to set clients to establish an SSL connection to a Windows server update service (WSUS) server named VerigonWSUS if the service resides in the default website
https://VerigonWSUS
282
Which tool is used in Windows server 2008 R2 to manage event subscriptions
The wecsvc tool
283
What Windows update classification downloads updates to virus or other definition files
Definition updates
284
Which command should be run at an elevated command prompt to ensure that the computers are configured as source computers for event viewer subscriptions
The winrm quickconfig command
285
Which tool in Windows server can be used to monitor your entire network and check the traffic being transmitted between the computers in the network
Network monitor