You are on page 1of 101

Network Infrastructure and Directory

Services
PRELIM QUIZ 1
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
WINS
Answer  is a service that resolves computer names to IP addresses. Using this,
the computer name COMPUTER84, for example, can be resolved to an IP address that
enables computers on a Microsoft network to find one another and transfer information.
Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Intended as a designation for a guest network in a public place, such as a coffee shop or
airport, rather than for an internal network
Select one:

a.

Private Network
b.

Domain Network

c.

Public Network
Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides automated diagnostics to help diagnose and resolve networking problems
Select one:

a.

Network Discovery

b.

Network and Sharing Center

c.

Network Explorer

d.

Windows Network Diagnostics


Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00


Flag question

Question text
WINS works best in client/server environments in which WINS clients send single-label
(host) name queries to WINS servers for name resolution and WINS servers resolve the
query and respond.
Select one:

True 

False

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which one is not an official version of windows server 2012?
Select one:

a.

Windows Server 2012 Essentials Edition

b.

Windows Server 2012 Datacenter Edition

c.

Windows Server 2012 Standard Edition

d.

Windows Server 2012 Home Edition


Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides a central console for browsing computers and devices on the network
Select one:

a.

Network andSharing Center

b.

Windows Network Diagnostics

c.

Network Explorer

d.

Network Discovery
Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Reports changes in network connectivity and configuration
Select one:

a.

Network and Sharing Center

b.

Network Location Awareness

c.

Windows Network Diagnostics

d.

Network Discovery
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Intended as a designation for a network in which computers are connected to the corporate
domain to which they are joined
Select one:

a.

Domain Network

b.

Private Network
c.

Public Network
Feedback
Your answer is correct.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This edition of windows server 2012 is suited for small businesses, but with up to 25 users, it
is also available on retail stores making it accessible to small businesses,
Select one:

a.

Windows Server 2012 Datacenter Edition

b.

Windows Server 2012 Foundation Edition

c.

Windows Server 2012 Essentials Edition

d.

Windows Server 2012 Standard Edition


Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00


Flag question

Question text
member server
A Answer  is a computer in a domain which has Windows Server edition of
operating system deployed but it is not a Domain Controller. Normally in any organization
we don’t use DCs to deploy all the roles and services e.g. DHCP, application server, file and
print server, Citrix Application Virtualization, Citrix Desktop Virtualization, DNS, etc.
Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
it describes a collection of users, systems, applications, networks, database servers, and any
other resources that are administered with a common set of rules.
Select one:

a.

Domain Controller

b.

Member Servers

c.

Domain

d.

Domain Services
Feedback
Your answer is correct.
Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This edition of windows server 2012 supports up to 2 virtual machines, it also supports an
unlimited amount of users as long as the required user licenses have been purchased
Select one:

a.

Windows Server 2012 Essentials Edition

b.

Windows Server 2012 Standard Edition

c.

Windows Server 2012 Foundation Edition

d.

Windows Server 2012 Datacenter Edition


Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Intended as a designation for a network in which computers are configured as members of
a homegroup or workgroup and are not connected directly to the public Internet
Select one:

a.

Private Network

b.

Public Network

c.

Domain Network
Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This command–line tool for system management is implemented in a Visual Basic Scripting
Edition file (Winrm.vbs) written using the WinRM scripting API. This tool enables an
administrator to configure WinRM and to get data or manage resources. For more
information, see the online help provided by the command line Winrm /?.

Select one:

a.

Winrm.cmd

b.
Winrs.exe
Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Window s Pow ersh
Answer  is a more advanced version of standard windows command line
interface known as cmd or command prompt
Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides a central console for viewing and managing a computer’s networking and sharing
configuration
Select one:

a.

Network Discovery

b.

Windows Network Diagnostics

c.
Network Explorer

d.

Network andSharing Center


Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This Edition of windows server 2012 is suited for small businesses of up to 15 users where it
can implement features such as file sharing, printer sharing, security and remote access.

Select one:

a.

Windows Server 2012 Foundation Edition

b.

Windows Server 2012 Datacenter Edition

c.

Windows Server 2012 Standard Edition

d.

Windows Server 2012 Essentials Edition


Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00


Flag question

Question text
This scripting API enables you to obtain data from remote computers using scripts that
perform WS-Management protocol operations.
Select one:

a.

WinRM Scripting API

b.

WS-Management protocol

c.

Intelligent Platform Management Interface (IPMI) driver and WMI provider


Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This edition of windows server 2012 the flagship product under the brand name of windows
server 2012,
Select one:

a.

Windows Server 2012 Foundation Edition

b.
Windows Server 2012 Essentials Edition

c.

Windows Server 2012 Datacenter Edition


Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Controls the ability to see other computers and devices
Select one:

a.

Network andSharing Center

b.

Windows Network Diagnostics

c.

Network Discovery

d.

Network Explorer
Feedback
Your answer is correct.

PRELIM QUIZ 2
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Hardware management through the Intelligent Platform Management Interface (IPMI)
provider and driver enables you to control and diagnose remote server hardware through
BMCs when the operating system is not running or deployed.
Select one:

True 

False

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.
Select one:

a.

Link-Local Multicast Name Resolution (LLMNR)

b.

IPv6 over Point-to-PointProtocol (PPPv6)

c.

IP Security
d.

DHCPv6-Capable DHCP client


Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Determines when neighboring nodes and routers are no longer reachable and reports the
condition.
Select one:

a.

Neighbor Unreachability Detection for IPv4

b.

Spurious Retransmission Timeout Detection

c.

Routing Compartments

d.

SACK-Based Loss Recovery


Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.Prevents address scanning of IPv6
addresses based on the known company IDs of network-adapter manufacturers. By default,
Windows Vista and later generate random interface IDs for nontemporary autoconfigured
IPv6 addresses, including public and link-local addresses.
Select one:

a.

IPv6 over Point-to-PointProtocol (PPPv6)

b.

Link-Local Multicast Name Resolution (LLMNR)

c.

Random Interface IDs

d.

DHCPv6-Capable DHCP client


Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Neighbor Unreachability Detection for IPv4 Provides an extensible framework that helps
users recover from and troubleshoot problems with network connections.
Select one:

True

False 

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides faster throughput by altering the way that a sender can increase the sending rate if
multiple segments in a window of data are lost and the sender receives an acknowledgment
stating that only part of the data has been received
Select one:

a.

Neighbor Unreachability Detection for IPv4

b.

Network Diagnostics Framework

c.

Extended Selective Acknowledgments

d.

Modified Fast Recovery Algorithm


Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Random Interface IDs maps the internal (private) address and port number to different
external (public) addresses and ports, depending on the external destination address.
Select one:

True

False 

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Extended Selective Acknowledgments provides faster throughput by altering the way that a
sender can increase the sending rate if multiple segments in a window of data are lost and
the sender receives an acknowledgment stating that only part of the data has been
received.
Select one:

True

False 

Question 9
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Spurious Retransmission Timeout Detection Provides correction for sudden, temporary
increases in retransmission timeouts and prevents unnecessary retransmission of segments.
Select one:

True 

False

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Maps the internal (private) address and port number to different external (public) addresses
and ports, depending on the external destination address.
Select one:

a.

Link-Local Multicast Name Resolution (LLMNR)

b.

Random Interface IDs

c.

Multicast Listener Discovery version 2 (MLDv2)

d.

Symmetric Network Address Translators


Feedback
Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is not possible to install WINS using windows powershell
Select one:

True

False 

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Ensures that an unreachable gateway is checked periodically to determine whether it has
become available.
Select one:

a.

Compound TCP

b.

Automatic Black Hole Router Detection

c.
Extended Selective Acknowledgments

d.

Automatic Dead Gateway Retry


Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Prevents TCP connections from terminating due to intermediate routers silently discarding
large TCP segments, retransmissions,or error messages.
Select one:

a.

Extended Selective Acknowledgments

b.

Compound TCP

c.

Automatic Black Hole Router Detection

d.

Automatic Dead Gateway Retry


Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00


Flag question

Question text
A push partner is a WINS server from which changes are “pulled.”
Select one:

True

False 

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides application programming interfaces (APIs) for extending the TCP/IP filtering
architecture so that it can support additional features.
Select one:

a.

Spurious Retransmission Timeout Detection

b.

TCP Extended Statistics

c.

Windows Filtering Platform

d.

Routing Compartments
Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
If a WINS server in an environment is the sole WINS server for that network, no additional
configuration is required other than ensuring that clients will be pointing to the WINS server
in their IP configuration. However, if it has been decided that WINS is required, it is a best-
practice recommendation to deploy a secondary WINS server to provide redundancy.
Select one:

True 

False

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Routing Compartments Prevents unwanted forwarding of traffic between interfaces by
associating an interface or a set of interfaces with a login session that has its own routing
tables.
Select one:

True 

False
Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Helps determine whether a performance bottleneck for a connection is the sending
application, the receiving application, or the network.
Select one:

a.

TCP Extended Statistics

b.

SACK-Based Loss Recovery

c.

Windows Filtering Platform

d.

Spurious Retransmission Timeout Detection


Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question
Question text
A push partner for a particular WINS server is the server that pulls WINS database
information from a receiving or push partner.
Select one:

True

False 

Question 20
Incorrect

Mark 1.00 out of 1.00

Flag question

Question text
The WMI service continues to run side-by-side with WinRM and provides requested data or
control through the WMI plug-in. You can continue to obtain data from standard WMI
classes, such as Win32_Process, as well as IPMI-supplied data.

Select one:

True 

False

PRELIM EXAM
Question 1
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Prevents TCP connections from terminating due to intermediate routers silently discarding
large TCP segments, retransmissions,or error messages.
Select one:

a.

Extended Selective Acknowledgments

b.

Automatic Dead Gateway Retry

c.

Automatic Black Hole Router Detection

d.

Compound TCP
Feedback
Your answer is correct.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Intended as a designation for a guest network in a public place, such as a coffee shop or
airport, rather than for an internal network
Select one:

a.

Public Network

b.

Domain Network
c.

Private Network
Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Determines when neighboring nodes and routers are no longer reachable and reports the
condition.
Select one:

a.

Neighbor Unreachability Detection for IPv4

b.

Spurious Retransmission Timeout Detection

c.

SACK-Based Loss Recovery

d.

Routing Compartments
Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Controls the ability to see other computers and devices
Select one:

a.

Network Explorer

b.

Network Discovery

c.

Windows Network Diagnostics

d.

Network andSharing Center


Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Intended as a designation for a network in which computers are configured as members of
a homegroup or workgroup and are not connected directly to the public Internet
Select one:

a.
Public Network

b.

Domain Network

c.

Private Network
Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which one is not an official version of windows server 2012?
Select one:

a.

Windows Server 2012 Home Edition

b.

Windows Server 2012 Essentials Edition

c.

Windows Server 2012 Standard Edition

d.

Windows Server 2012 Datacenter Edition


Feedback
Your answer is correct.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Network Location Awareness Reports changes in network connectivity and configuration

Select one:

True 

False

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Network and Sharing Center Provides a central console for browsing computers and devices
on the network

Select one:

True

False 

Question 9
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Network and Sharing Center Provides automated diagnostics to help diagnose and resolve
networking problems
Select one:

True

False 

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Spurious Retransmission Timeout Detection Provides correction for sudden, temporary
increases in retransmission timeouts and prevents unnecessary retransmission of segments.
Select one:

True 

False

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The WMI service continues to run side-by-side with WinRM and provides requested data or
control through the WMI plug-in. You can continue to obtain data from standard WMI
classes, such as Win32_Process, as well as IPMI-supplied data.

Select one:
True

False 

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides application programming interfaces (APIs) for extending the TCP/IP filtering
architecture so that it can support additional features.
Select one:

a.

Routing Compartments

b.

Spurious Retransmission Timeout Detection

c.

TCP Extended Statistics

d.

Windows Filtering Platform


Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Network Explorer Provides a central console for browsing computers and devices on the
network
Select one:

True 

False

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
member server
A Answer  is a computer in a domain which has Windows Server edition of
operating system deployed but it is not a Domain Controller. Normally in any organization
we don’t use DCs to deploy all the roles and services e.g. DHCP, application server, file and
print server, Citrix Application Virtualization, Citrix Desktop Virtualization, DNS, etc.
Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This Edition of windows server 2012 is suited for small businesses of up to 15 users where it
can implement features such as file sharing, printer sharing, security and remote access.
Select one:

a.

Windows Server 2012 Datacenter Edition

b.

Windows Server 2012 Foundation Edition

c.

Windows Server 2012 Essentials Edition

d.

Windows Server 2012 Standard Edition


Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This edition of windows server 2012 the flagship product under the brand name of windows
server 2012,
Select one:

a.

Windows Server 2012 Foundation Edition

b.

Windows Server 2012 Datacenter Edition

c.

Windows Server 2012 Essentials Edition


Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Network Discovery Controls the ability to see other computers and devices
Select one:

True 

False

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Random Interface IDs maps the internal (private) address and port number to different
external (public) addresses and ports, depending on the external destination address.
Select one:

True

False 

Question 19
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Window s Pow ersh
Answer  is a more advanced version of standard windows command line
interface known as cmd or command prompt
Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Ensures that an unreachable gateway is checked periodically to determine whether it has
become available.
Select one:

a.

Extended Selective Acknowledgments

b.

Compound TCP

c.

Automatic Black Hole Router Detection

d.

Automatic Dead Gateway Retry


Feedback
Your answer is correct.

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Intended as a designation for a network in which computers are connected to the corporate
domain to which they are joined
Select one:

a.

Private Network

b.

Public Network

c.

Domain Network
Feedback
Your answer is correct.

Question 22
Correct

Mark 1.00 out of 1.00

Flag question

Question text
it describes a collection of users, systems, applications, networks, database servers, and any
other resources that are administered with a common set of rules.
Select one:

a.

Domain Services
b.

Domain

c.

Member Servers

d.

Domain Controller
Feedback
Your answer is correct.

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This edition of windows server 2012 is suited for small businesses, but with up to 25 users, it
is also available on retail stores making it accessible to small businesses,
Select one:

a.

Windows Server 2012 Foundation Edition

b.

Windows Server 2012 Essentials Edition

c.

Windows Server 2012 Datacenter Edition

d.

Windows Server 2012 Standard Edition


Feedback
Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
If a WINS server in an environment is the sole WINS server for that network, no additional
configuration is required other than ensuring that clients will be pointing to the WINS server
in their IP configuration. However, if it has been decided that WINS is required, it is a best-
practice recommendation to deploy a secondary WINS server to provide redundancy.
Select one:

True 

False

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text
WINS
Answer  is a service that resolves computer names to IP addresses. Using this,
the computer name COMPUTER84, for example, can be resolved to an IP address that
enables computers on a Microsoft network to find one another and transfer information.
Question 26
Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
Intended as a designation for a network in which computers are connected to the corporate
domain to which they are joined.
Domain Netw ork WRONG
Answer: 

Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This scripting API enables you to obtain data from remote computers using scripts that
perform WS-Management protocol operations.
Select one:

a.

WinRM Scripting API

b.

WS-Management protocol

c.

Intelligent Platform Management Interface (IPMI) driver and WMI provider


Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.
Select one:

a.

Link-Local Multicast Name Resolution (LLMNR)

b.

IP Security

c.

DHCPv6-Capable DHCP client

d.

IPv6 over Point-to-PointProtocol (PPPv6)


Feedback
Your answer is correct.

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text
WINS works best in client/server environments in which WINS clients send single-label
(host) name queries to WINS servers for name resolution and WINS servers resolve the
query and respond.
Select one:
True 

False

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This command–line tool for system management is implemented in a Visual Basic Scripting
Edition file (Winrm.vbs) written using the WinRM scripting API. This tool enables an
administrator to configure WinRM and to get data or manage resources. For more
information, see the online help provided by the command line Winrm /?.

Select one:

a.

Winrm.cmd

b.

Winrs.exe
Feedback
Your answer is correct.

Question 31
Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.Prevents address scanning of IPv6
addresses based on the known company IDs of network-adapter manufacturers. By default,
Windows Vista and later generate random interface IDs for nontemporary autoconfigured
IPv6 addresses, including public and link-local addresses.
Select one:

a.

Link-Local Multicast Name Resolution (LLMNR)

b.

IPv6 over Point-to-PointProtocol (PPPv6)

c.

DHCPv6-Capable DHCP client WRONG

d.

Random Interface IDs


Feedback
Your answer is incorrect.

Question 32
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Provides faster throughput by altering the way that a sender can increase the sending rate if
multiple segments in a window of data are lost and the sender receives an acknowledgment
stating that only part of the data has been received
Select one:

a.

Neighbor Unreachability Detection for IPv4

b.

Extended Selective Acknowledgments

c.

Network Diagnostics Framework

d.

Modified Fast Recovery Algorithm


Feedback
Your answer is correct.

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A push partner for a particular WINS server is the server that pulls WINS database
information from a receiving or push partner.
Select one:

True

False 

Question 34
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Intended as a designation for a network in which computers are configured as members of
a homegroup or workgroup and are not connected directly to the public Internet.
Private Netw ork WRONG
Answer: 

Question 35
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Intended as a designation for a guest network in a public place, such as a coffee shop or
airport, rather than for an internal network.
Public Netw ork
Answer: 

Question 36
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A push partner is a WINS server from which changes are “pulled.”
Select one:

True
False 

Question 37
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Hardware management through the Intelligent Platform Management Interface (IPMI)
provider and driver enables you to control and diagnose remote server hardware through
BMCs when the operating system is not running or deployed.
Select one:

True 

False

Question 38
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Extended Selective Acknowledgments provides faster throughput by altering the way that a
sender can increase the sending rate if multiple segments in a window of data are lost and
the sender receives an acknowledgment stating that only part of the data has been
received.
Select one:

True

False 
Question 39
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Neighbor Unreachability Detection for IPv4 Provides an extensible framework that helps
users recover from and troubleshoot problems with network connections.
Select one:

True

False 

Question 40
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Maps the internal (private) address and port number to different external (public) addresses
and ports, depending on the external destination address.
Select one:

a.

Link-Local Multicast Name Resolution (LLMNR)

b.

Random Interface IDs WRONG

c.

Multicast Listener Discovery version 2 (MLDv2)


d.

Symmetric Network Address Translators


Feedback
Your answer is incorrect.

Question 41
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides a central console for browsing computers and devices on the network
Select one:

a.

Network andSharing Center

b.

Windows Network Diagnostics

c.

Network Explorer

d.

Network Discovery
Feedback
Your answer is correct.

Question 42
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Provides automated diagnostics to help diagnose and resolve networking problems
Select one:

a.

Windows Network Diagnostics

b.

Network Discovery

c.

Network Explorer

d.

Network and Sharing Center


Feedback
Your answer is correct.

Question 43
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is not possible to install WINS using windows powershell
Select one:

True

False 
Question 44
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Helps determine whether a performance bottleneck for a connection is the sending
application, the receiving application, or the network.
Select one:

a.

SACK-Based Loss Recovery

b.

TCP Extended Statistics

c.

Windows Filtering Platform

d.

Spurious Retransmission Timeout Detection


Feedback
Your answer is correct.

Question 45
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Provides a central console for viewing and managing a computer’s networking and sharing
configuration
Select one:

a.

Network Discovery

b.

Network Explorer

c.

Network andSharing Center

d.

Windows Network Diagnostics


Feedback
Your answer is correct.

Question 46
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Routing Compartments Prevents unwanted forwarding of traffic between interfaces by
associating an interface or a set of interfaces with a login session that has its own routing
tables.
Select one:

True 

False

Question 47
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Network and Sharing Center provides a central console for viewing and managing a
computer’s networking and sharing configuration
Select one:

True 

False

Question 48
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Network Discovery Reports changes in network connectivity and configuration

Select one:

True

False 

Question 49
Correct

Mark 1.00 out of 1.00

Flag question
Question text
This edition of windows server 2012 supports up to 2 virtual machines, it also supports an
unlimited amount of users as long as the required user licenses have been purchased
Select one:

a.

Windows Server 2012 Foundation Edition

b.

Windows Server 2012 Standard Edition

c.

Windows Server 2012 Datacenter Edition

d.

Windows Server 2012 Essentials Edition


Feedback
Your answer is correct.

Question 50
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Reports changes in network connectivity and configuration
Select one:

a.

Network Location Awareness

b.

Windows Network Diagnostics


c.

Network and Sharing Center

d.

Network Discovery
Feedback
Your answer is correct.

MIDTERM QUIZ 1
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
policy-based assig
With Answer , the DHCP the server evaluates DHCP requests against policies
that you define.
Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Split scope DHCP
Answer  uses two independent DHCP servers that share responsibility for
a scope. Typically, 70% of the addresses in the scope are assigned to the primary server and
the remaining 30% are assigned to a backup server. If clients cannot reach the primary
server then they can acquire an IP address lease from the secondary server.
Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Root hints only
Answer  Will have the IP addresses of DNS servers where records can be
acquired.
Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
With policy based assignment, the DHCP the server evaluates DHCP requests against
policies that you define. Policies are applicable for a specific scope with a defined
processing order.
Select one:

True 

False

Question 5
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Load balance mode
Answer  is the default mode of deployment. In this mode, two DHCP
servers simultaneously serve IP addresses and options to clients on a given subnet.
Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
With DHCP failover, two DHCP servers share DHCP scope and lease information, enabling
one server to provide DHCP leases to DHCP clients if the other server is unavailable.
Select one:

True 

False

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which of the given steps is the third step in configuring a DNS forwarding?
Select one:
a.

Enter the IP address of your secondary DNS server you want to forward DNS queries. Click
OK

b.

Click Forwarders tab and then click Edit

c.

In DNS manager, right-click and scroll down the menu. Click Properties

d.

Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS
.
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This option places a DHCP server in a cluster with another DHCP server that assumes the
load if the primary DHCP server fails.
DHCP in a Window s failover cluster
Answer: 

Question 9
Correct

Mark 1.00 out of 1.00

Flag question
Question text
hot standby
In Answer  dhcp failover, two servers operate in a failover relationship where an
active server is responsible for leasing IP addresses and configuration information to all
clients in a scope or subnet.
Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
DHCP failover
Answer  provides redundancy and load balancing for DHCP services, enabling
administrators to deploy a highly resilient DHCP service.
Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Load balance
In Answer  dhcp failover is the default mode of deployment. In this mode, two
DHCP servers simultaneously serve IP addresses and options to clients on a given subnet.
Question 12
Correct

Mark 1.00 out of 1.00

Flag question
Question text
forw ard lookup zon
A Answer  is a DNS function that takes a domain name and resolves it to an
IP address.
Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The following command installs dhcp server role Add-WindowsFeature -ManagementTools
dhcp
Select one:

True

False 

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Windows Server 2012 provides task-oriented Windows PowerShell cmdlets for DHCP server
management. The DHCP server configuration operations are implemented in Windows
Server 2012 as Common Information Model (CIM) based cmdlets.
Select one:

True 

False
Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which of the given steps is the second step in configuring a DNS forwarding?
Select one:

a.

Enter the IP address of your secondary DNS server you want to forward DNS queries. Click
OK

b.

Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS
.

c.

Click Forwarders tab and then click Edit

d.

In DNS manager, right-click and scroll down the menu. Click Properties
Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question
Question text
reverse lookup zo
A Answer  is a DNS function that takes an IP address andresolves it to a
domain name.
Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
DHCP failover is a feature that provides the ability to have two DHCP servers serve IP
addresses and option configuration to the same subnet or scope, providing for continuous
availability of DHCP service to clients.
Select one:

True 

False

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Split scope DHC
Answer  uses two independent DHCP servers that share responsibility for a
scope. Typically, 70% of the addresses in the scope are assigned to the primary server and
the remaining 30% are assigned to a backup server.
Question 19
Correct

Mark 1.00 out of 1.00


Flag question

Question text
In which of the given steps is the first step in configuring a DNS forwarding?
Select one:

a.

Click Forwarders tab and then click Edit

b.

In DNS manager, right-click and scroll down the menu. Click Properties

c.

Enter the IP address of your secondary DNS server you want to forward DNS queries. Click
OK

d.

Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS
.
Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
hot standby mode
In Answer  failover mode, two servers operate in a failover relationship
where an active server is responsible for leasing IP addresses and configuration information
to all clients in a scope or subnet.
MIDTERM QUIZ 2
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which on is the second step In windows server 2012 routing/nat configuration?
Select one:

a.

Select Role-based or feature-based installation and click Next

b.

On Server Selection select the server you want to install the feature on and click Next

c.

from Server Manager click Manage > Add Roles and Features

d.

On the Before You Begin page, click Next.


Feedback
Your answer is correct.

Question 2
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Use IPsec Defaults option to configure the default IPsec settings that the local computer will
use when attempting to establish secure connections with other IPsec-enabled computers.
To configure these settings, click the Customize button to open the Custo
Select one:

True 

False

Question 3
Incorrect

Mark 1.00 out of 1.00

Flag question

Question text
his algorithm is not recommended and is provided for backward compatibility only.
Select one:

a.

Diffie-Hellman Group 24 (DH Group 24)

b.

Diffie-Hellman Group 2 (DH Group 2)

c.

Diffie-Hellman Group 1 (DH Group 1)

d.

Diffie-Hellman Group 14 (DH Group 14)


Feedback
Your answer is correct.

Question 4
Incorrect

Mark 1.00 out of 1.00

Flag question

Question text
IPsec encapsulation mode where the payload is encapsulated with an additional IP header
Select one:

a.

Transport mode

b.

Main Mode

c.

Tunnel mode

d.

Quick Mode
Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question
Question text
This data integrity algorithm is not recommended and is provided for backward
compatibility only.

Select one:

a.

Message-Digest  algorithm  5  (MD5)

b.

SHA-384

c.

SHA 256-bit (SHA-256)

d.

Secure Hash Algorithm 1 (SHA-1)


Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This authentication method can be used on networks that include systems running an
earlier version of the Windows operating system and on standalone systems.
Select one:

a.

Computer certificate

b.

Computer (Kerberos V5)


c.

Computer (NTLMv2)

d.

Pre-shared key
Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which on is the third step In windows server 2012 routing/nat configuration?
Select one:

a.

To start, from Server Manager click Manage > Add Roles and Features

b.

On the Before You Begin page, click Next

c.

Select Role-based or feature-based installation and click Next

d.

On Server Selection select the server you want to install the feature on and click Next.
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00


Flag question

Question text
The Server-to-Server type of connection security rule can be used to protect
communications between two computers, two groups of computers, two subnets, or some
combination of these, such as between a computer and a subnet. For example, you can use
serverto-server rules to protect communications between a database server and a front-end
web server
Select one:

True 

False

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Use IPsec Exemptions option to configure how IPsec handles Internet Control Message
Protocol (ICMP) traffic. By default, ICMP traffic is not exempted from using IPsec, but you
can change this by selecting Yes from the list control.
Select one:

True 

False

Question 10
Correct

Mark 1.00 out of 1.00


Flag question

Question text
his algorithm has the strongest security but also the highest resource usage. It is compatible
only with Windows Vista and later.
Select one:

a.

Elliptic Curve Diffie-Hellman P-384

b.

DH Group 24

c.

Elliptic Curve Diffie-Hellman P-256

d.

Diffie-Hellman Group 1 (DH Group 1)


Feedback
Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which on is the first step In windows server 2012 routing/nat configuration?
Select one:

a.
On the Before You Begin page, click Next.

b.

Select Role-based or feature-based installation and click Next.

c.

On Server Selection select the server you want to install the feature on and click Next.

d.

From Server Manager click Manage > Add Roles and Features.
Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
AES-GCM 192 algorithm can be used for quick mode only and is supported on Windows
Vista SP1 and later. It is equivalent to AESGMAC 192 for integrity
Select one:

True 

False

Question 13
Correct

Mark 1.00 out of 1.00

Flag question
Question text
The default signing algorithm for this authentication method is RSA, but Elliptic Curve
Digital Signature Algorithm (ECDSA)–P256 and ECDSA-P384 are also supported signing
algorithms.
Select one:

a.

Computer (NTLMv2)

b.

Pre-shared key

c.

Computer certificate

d.

Computer health certificate


Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which on is the fourth step In windows server 2012 routing/nat configuration?
Select one:

a.

from Server Manager click Manage > Add Roles and Features

b.

On the Before You Begin page, click Next.


c.

Select Role-based or feature-based installation and click Next

d.

On Server Selection select the server you want to install the feature on and click Next
Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This algorithm is stronger than DH Group 2. It has medium resource usage and is
compatible only with Windows Vista and later.
Select one:

a.

Elliptic Curve Diffie-Hellman P-256

b.

Elliptic Curve Diffie-Hellman P-384

c.

DH Group 24

d.

Diffie-Hellman Group 1 (DH Group 1)


Feedback
Your answer is correct.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
AES-GCM 256 algorithm can be used for quick mode only and is supported on Windows
Vista SP1 and later. It is equivalent to AESGMAC 256 for integrity.
Select one:

True 

False

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
IPsec Encapsulation Model where the payload is encapsulated with an IPsec header
Select one:

a.

Transport mode

b.

Handshake Mode

c.

Tunnel mode

d.

Key Mode
Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This data integrity algorithm is stronger than MD5 but uses more resources.

Select one:

a.

Advanced Encryption Standard-Galois Message AuthenticationCode 128 bit (AES-GMAC


128)

b.

SHA 256-bit (SHA-256)

c.

AES-GMAC 192

d.

Secure Hash Algorithm 1 (SHA-1)


Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question
Question text
This mechanism is defined in RFC2409   and   combines   the   Internet   Security  
Association   and   Key Management Protocol (ISAKMP) of RFC 2408 with the Oakley Key
Determination Protocol (Oakley) of RFC 2412
Select one:

a.

Diffie-Hellman Group 1

b.

IP Tunneling

c.

Authenticated IP (AuthIP)

d.

Internet Key Exchange (IKE)


Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
AES-GCM 191 This algorithm can be used for quick mode only and is supported on
Windows Vista SP1 and later. It is equivalent to AESGMAC 128 for integrity.
Select one:

True

False 
FINAL QUIZ 1
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
______________ is used in TCP/IP networks for naming computers and network services

Select one:

a.

Data Center Bridging (DCB)

b.

Hyper-V network virtualization

c.

BranchCache

d.

Dynamic Host Configuration Protocol (DHCP)


Feedback
Your answer is correct.

______________ Provides policy-based, software-controlled network virtualization that reduces


the management overhead that is faced by enterprises when they expandde dicated IaaS
clouds
Question 2
Correct

Mark 1.00 out of 1.00


Flag question

Question text
When it comes to deploying updates, SCCM is the best tool to do it. You must understand
that deploying updates is a complex task. SCCM make it easy not only to deploy updates
but to gather the depoyment reports as well.
Select one:

True 

False

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
These are network devices built into the IT infrastructure and they stand between public and
internal networks.
Select one:

a.

Host-based firewall

b.

Local-based firewall

c.

Packet-based firewall

d.
Network-based firewall
Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
_________________ Is an Internet Engineering Task Force (IETF) standarddesigned to reduce the
administration burden and complexity ofconfiguring hosts on a TCP/IP-based network, such
as a privateintranet
Select one:

a.

BranchCache

b.

Data Center Bridging (DCB)

c.

Domain Name System (DNS)

d.

Dynamic Host Configuration Protocol (DHCP)


Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00


Flag question

Question text
_______________ Provides for administration and monitoring of servers running Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS).
Select one:

a.

Low-latency workloads technologies

b.

IP Address Management (IPAM)

c.

Network Load Balancing (NLB)

d.

Hyper-V virtual switch


Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Proxy firewalls perform deep packet inspection rather than merely packet header inspection.
Here, the firewall creates a separate connection for every incoming and outgoing packet
Select one:

True 
False

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which one is the second step when creating Firewall Inbound Rules?
Select one:

a.

Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types.

b.

Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected.

c.

The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.

d.

On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00


Flag question

Question text
In Manual software updates deployment, a set of software updates is selected the SCCM
console and these updates are deployed to the target collection.
Select one:

True 

False

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which one is a benefit of using windows firewall?
Select one:

a.

Its not highly flexible. It does not offer many advanced functionalities and different levels of
controls for the firewall services.

b.

It needs a special license or additional hardware. Once you obtain your copy of a Windows
operating system, there are no additional costs.

c.

It is ready out-of-the-box. It comes preinstalled with personal Microsoft Windows operating


systems as well as Server editions. It is also active by default, protecting your operating
system from the very first startup
Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A proxy firewall is also referred to as a gateway firewall, or an application firewall. It stands
between the internet and the devices in the private network
Select one:

True 

False

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which one is the fourth step when creating Firewall Inbound Rules?
Select one:

a.

The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.

b.
Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types

c.

On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.

d.

Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected.
Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
____________ is a virtual layer-2 network switch that provides programmatically managed and
extensible capabilities to connect virtual machines to the physical network
Select one:

a.

Hyper-V virtual switch

b.

Hyper-V network virtualization

c.

Domain Name System (DNS)

d.
Dynamic Host Configuration Protocol (DHCP)
Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This method of firewall filtering analyzes the header of every packet and checks if it matches
the configured rules.
Select one:

a.

Stateful Inspection

b.

Proxy Server

c.

IP Filtering

d.

Packet Filtering
Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which one is the first step when creating Firewall Inbound Rules?

Select one:

a.

On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.

b.

The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.

c.

Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected

d.

Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types.
Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Automatic software updates deployment is configured by using automatic deployment
rules. This method is used for deploying monthly software updates and for managing
definition updates.
Select one:

True 

False

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
_____________ is a wide area network (WAN) bandwidth optimization technology that is
included in some editions of the Windows Server2012 and Windows 8 operating systems.
To optimize WAN bandwidth when users access content on remote servers
Select one:

a.

BranchCache

b.

Dynamic Host Configuration Protocol (DHCP)

c.

Domain Name System (DNS)

d.

Data Center Bridging (DCB)


Feedback
Your answer is correct.
Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This method of firewall filtering inspects every packet and keeps the information for the
current connection. This includes TCP protocol information, source and destination IP
addresses, and port numbers.
Select one:

a.

Proxy Server

b.

Packet Filtering

c.

Stateful Inspection

d.

IP Filtering
Feedback
Your answer is correct.

Question 18
Incorrect

Mark 1.00 out of 1.00

Flag question
Question text
This type of firewall runs on individual systems, physical or virtual. It is a piece of software
installed on an operating system which stands between the host and other network devices.
Select one:

a.

Local-based firewall

b.

Host-based firewall

c.

Network-based firewall

d.

Packet-based firewall
Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
________ is a suite of Institute of Electrical and Electronics Engineers (IEEE)standards that
enable Converged Fabrics in the data center, where storage, data networking, cluster IPC
and management traffic all share the same Ethernet network infrastructure.
Select one:

a.

Domain Name System (DNS)

b.
BranchCache

c.

Data Center Bridging (DCB)

d.

Dynamic Host Configuration Protocol (DHCP)


Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which one is the third step when creating Firewall Inbound Rules?
Select one:

a.

Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected.

b.

On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.

c.

The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.

d.
Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types.
Feedback
Your answer is correct.

FINAL QUIZ 2
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This policy enables you to set the location of the collector computer.

Select one:

a.

Configure Target Subscription Manager

b.

Configure Forwarder Resource Usage

c.

Configure Target Network Manager

d.

Configure Target Server Manager


Feedback
Your answer is correct.

Question 2
Incorrect

Mark 1.00 out of 1.00


Flag question

Question text
Artifact Resolution Requests Monitors the number of requests to the artifact resolution
endpoint per second that are sent to the federation server.
Select one:

True 

False

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Proxy MEX Requests Monitors the number of incoming WS-Metadata Exchange (MEX)
requests that are sent to the federation server proxy.
Select one:

True 

False

Question 4
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Federation Metadata Requests Monitors the number of incoming federation metadata
requests sent to the federation server.
Select one:

True 

False

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Federation Metadata Requests Monitors the number of token requests sent to the
federation server including SSOAuth token requests per second.
Select one:

True

False 

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
_________ enables you to monitor how a computer running the Windows Server 2012 and
Windows Server 2012 R2 operating system uses CPU, memory, disk, and network resources.
Select one:
a.

Computer Monitor

b.

Resource Monitor

c.

Networking Monitor

d.

Message Analyzer
Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
____________ is the successor to Network Monitor. You can use this to perform network traffic
capture and analysis. Message Analyzer also functions as a replacement for LogParser
Select one:

a.

CPU Monitor

b.

Network Analyzer

c.

Resource Monitor

d.
Message Analyzer
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
_________________ enable you to create customized views of events across any event log
stored on a server, including events in the forwarded event log.

Select one:

a.

Event views

b.

System log views

c.

Event log views


Feedback
Your answer is correct.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Artifact Resolution Requests/sec Monitors the number of requests to the artifact resolution
endpoint per second that are sent to the federation server
Select one:

True 

False

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This view of resource monitor lists the ports and addresses that services and applications are
listening on. Also provides information about the firewall status for these roles and services.
Select one:

a.

Processes With Network Activity

b.

TCP Connections

c.

Network Activity

d.

Listening Ports
Feedback
Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Proxy MEX Requests/sec Monitors the number of incoming MEX requests per second that
are sent to the federation server proxy.
Select one:

True 

False

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This view of resource monitor provides information on connections on the basis of local
address, port, and remote address and port.
Select one:

a.

Listening Ports

b.

TCP Connections

c.

Network Activity

d.
Processes With Network Activity
Feedback
Your answer is correct.

Question 13
Incorrect

Mark 1.00 out of 1.00

Flag question

Question text
Proxy MEX Requests/sec Monitors the number of incoming WS-Metadata Exchange (MEX)
requests that are sent to the federation server proxy.
Select one:

True 

False

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This view of resource monitor Lists network activity on a per-process basis,but also lists the
destination address, sent bits per second,received bits per second, and total bits per second.
Select one:

a.

Listening Ports

b.
TCP Connections

c.

Processes With Network Activity

d.

Network Activity
Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This policy determines the maximum event forwarding rate in events per second. If this
policy is not configured, events will be transmitted as soon as they are recorded.
Select one:

a.

Configure Target Subscription Manager

b.

Configure Target Server Manager

c.

Configure Target Network Manager

d.

Configure Forwarder Resource Usage


Feedback
Your answer is correct.
Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This view of resource monitor lists processes by name and ID; and provides information on
bits sent per second,bits received per second, and total bits per second.
Select one:

a.

TCP Connections

b.

Processes With Network Activity

c.

Network Activity

d.

Listening Ports
Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Token Requests Monitors the number of token requests sent to the federation server
including SSOAuth token requests.
Select one:

True 

False

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Proxy Requests Monitors the number of incoming requests sent to the federation server
proxy.
Select one:

True 

False

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Token Requests/sec Monitors the number of incoming federation metadata requests sent to
the federation server
Select one:
True

False 

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
____________ enables you to access recorded event information.
Select one:

a.

Event Viewer

b.

Network Logger

c.

Resource Monitor

d.

System Logger
Feedback
Your answer is correct.

You might also like