Professional Documents
Culture Documents
Services
PRELIM QUIZ 1
Question 1
Correct
Flag question
Question text
WINS
Answer is a service that resolves computer names to IP addresses. Using this,
the computer name COMPUTER84, for example, can be resolved to an IP address that
enables computers on a Microsoft network to find one another and transfer information.
Question 2
Correct
Flag question
Question text
Intended as a designation for a guest network in a public place, such as a coffee shop or
airport, rather than for an internal network
Select one:
a.
Private Network
b.
Domain Network
c.
Public Network
Feedback
Your answer is correct.
Question 3
Correct
Flag question
Question text
Provides automated diagnostics to help diagnose and resolve networking problems
Select one:
a.
Network Discovery
b.
c.
Network Explorer
d.
Question 4
Correct
Question text
WINS works best in client/server environments in which WINS clients send single-label
(host) name queries to WINS servers for name resolution and WINS servers resolve the
query and respond.
Select one:
True
False
Question 5
Correct
Flag question
Question text
Which one is not an official version of windows server 2012?
Select one:
a.
b.
c.
d.
Question 6
Correct
Flag question
Question text
Provides a central console for browsing computers and devices on the network
Select one:
a.
b.
c.
Network Explorer
d.
Network Discovery
Feedback
Your answer is correct.
Question 7
Correct
Flag question
Question text
Reports changes in network connectivity and configuration
Select one:
a.
b.
c.
d.
Network Discovery
Feedback
Your answer is correct.
Question 8
Correct
Flag question
Question text
Intended as a designation for a network in which computers are connected to the corporate
domain to which they are joined
Select one:
a.
Domain Network
b.
Private Network
c.
Public Network
Feedback
Your answer is correct.
Question 9
Correct
Flag question
Question text
This edition of windows server 2012 is suited for small businesses, but with up to 25 users, it
is also available on retail stores making it accessible to small businesses,
Select one:
a.
b.
c.
d.
Question 10
Correct
Question text
member server
A Answer is a computer in a domain which has Windows Server edition of
operating system deployed but it is not a Domain Controller. Normally in any organization
we don’t use DCs to deploy all the roles and services e.g. DHCP, application server, file and
print server, Citrix Application Virtualization, Citrix Desktop Virtualization, DNS, etc.
Question 11
Correct
Flag question
Question text
it describes a collection of users, systems, applications, networks, database servers, and any
other resources that are administered with a common set of rules.
Select one:
a.
Domain Controller
b.
Member Servers
c.
Domain
d.
Domain Services
Feedback
Your answer is correct.
Question 12
Correct
Flag question
Question text
This edition of windows server 2012 supports up to 2 virtual machines, it also supports an
unlimited amount of users as long as the required user licenses have been purchased
Select one:
a.
b.
c.
d.
Question 13
Correct
Flag question
Question text
Intended as a designation for a network in which computers are configured as members of
a homegroup or workgroup and are not connected directly to the public Internet
Select one:
a.
Private Network
b.
Public Network
c.
Domain Network
Feedback
Your answer is correct.
Question 14
Correct
Flag question
Question text
This command–line tool for system management is implemented in a Visual Basic Scripting
Edition file (Winrm.vbs) written using the WinRM scripting API. This tool enables an
administrator to configure WinRM and to get data or manage resources. For more
information, see the online help provided by the command line Winrm /?.
Select one:
a.
Winrm.cmd
b.
Winrs.exe
Feedback
Your answer is correct.
Question 15
Correct
Flag question
Question text
Window s Pow ersh
Answer is a more advanced version of standard windows command line
interface known as cmd or command prompt
Question 16
Correct
Flag question
Question text
Provides a central console for viewing and managing a computer’s networking and sharing
configuration
Select one:
a.
Network Discovery
b.
c.
Network Explorer
d.
Question 17
Correct
Flag question
Question text
This Edition of windows server 2012 is suited for small businesses of up to 15 users where it
can implement features such as file sharing, printer sharing, security and remote access.
Select one:
a.
b.
c.
d.
Question 18
Correct
Question text
This scripting API enables you to obtain data from remote computers using scripts that
perform WS-Management protocol operations.
Select one:
a.
b.
WS-Management protocol
c.
Question 19
Correct
Flag question
Question text
This edition of windows server 2012 the flagship product under the brand name of windows
server 2012,
Select one:
a.
b.
Windows Server 2012 Essentials Edition
c.
Question 20
Correct
Flag question
Question text
Controls the ability to see other computers and devices
Select one:
a.
b.
c.
Network Discovery
d.
Network Explorer
Feedback
Your answer is correct.
PRELIM QUIZ 2
Question 1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Hardware management through the Intelligent Platform Management Interface (IPMI)
provider and driver enables you to control and diagnose remote server hardware through
BMCs when the operating system is not running or deployed.
Select one:
True
False
Question 2
Correct
Flag question
Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.
Select one:
a.
b.
c.
IP Security
d.
Question 3
Correct
Flag question
Question text
Determines when neighboring nodes and routers are no longer reachable and reports the
condition.
Select one:
a.
b.
c.
Routing Compartments
d.
Question 4
Correct
Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.Prevents address scanning of IPv6
addresses based on the known company IDs of network-adapter manufacturers. By default,
Windows Vista and later generate random interface IDs for nontemporary autoconfigured
IPv6 addresses, including public and link-local addresses.
Select one:
a.
b.
c.
d.
Question 5
Correct
Flag question
Question text
Neighbor Unreachability Detection for IPv4 Provides an extensible framework that helps
users recover from and troubleshoot problems with network connections.
Select one:
True
False
Question 6
Correct
Flag question
Question text
Provides faster throughput by altering the way that a sender can increase the sending rate if
multiple segments in a window of data are lost and the sender receives an acknowledgment
stating that only part of the data has been received
Select one:
a.
b.
c.
d.
Question 7
Correct
Question text
Random Interface IDs maps the internal (private) address and port number to different
external (public) addresses and ports, depending on the external destination address.
Select one:
True
False
Question 8
Correct
Flag question
Question text
Extended Selective Acknowledgments provides faster throughput by altering the way that a
sender can increase the sending rate if multiple segments in a window of data are lost and
the sender receives an acknowledgment stating that only part of the data has been
received.
Select one:
True
False
Question 9
Correct
Question text
Spurious Retransmission Timeout Detection Provides correction for sudden, temporary
increases in retransmission timeouts and prevents unnecessary retransmission of segments.
Select one:
True
False
Question 10
Correct
Flag question
Question text
Maps the internal (private) address and port number to different external (public) addresses
and ports, depending on the external destination address.
Select one:
a.
b.
c.
d.
Question 11
Correct
Flag question
Question text
It is not possible to install WINS using windows powershell
Select one:
True
False
Question 12
Correct
Flag question
Question text
Ensures that an unreachable gateway is checked periodically to determine whether it has
become available.
Select one:
a.
Compound TCP
b.
c.
Extended Selective Acknowledgments
d.
Question 13
Correct
Flag question
Question text
Prevents TCP connections from terminating due to intermediate routers silently discarding
large TCP segments, retransmissions,or error messages.
Select one:
a.
b.
Compound TCP
c.
d.
Question 14
Correct
Question text
A push partner is a WINS server from which changes are “pulled.”
Select one:
True
False
Question 15
Correct
Flag question
Question text
Provides application programming interfaces (APIs) for extending the TCP/IP filtering
architecture so that it can support additional features.
Select one:
a.
b.
c.
d.
Routing Compartments
Feedback
Your answer is correct.
Question 16
Correct
Flag question
Question text
If a WINS server in an environment is the sole WINS server for that network, no additional
configuration is required other than ensuring that clients will be pointing to the WINS server
in their IP configuration. However, if it has been decided that WINS is required, it is a best-
practice recommendation to deploy a secondary WINS server to provide redundancy.
Select one:
True
False
Question 17
Correct
Flag question
Question text
Routing Compartments Prevents unwanted forwarding of traffic between interfaces by
associating an interface or a set of interfaces with a login session that has its own routing
tables.
Select one:
True
False
Question 18
Correct
Flag question
Question text
Helps determine whether a performance bottleneck for a connection is the sending
application, the receiving application, or the network.
Select one:
a.
b.
c.
d.
Question 19
Correct
Flag question
Question text
A push partner for a particular WINS server is the server that pulls WINS database
information from a receiving or push partner.
Select one:
True
False
Question 20
Incorrect
Flag question
Question text
The WMI service continues to run side-by-side with WinRM and provides requested data or
control through the WMI plug-in. You can continue to obtain data from standard WMI
classes, such as Win32_Process, as well as IPMI-supplied data.
Select one:
True
False
PRELIM EXAM
Question 1
Correct
Flag question
Question text
Prevents TCP connections from terminating due to intermediate routers silently discarding
large TCP segments, retransmissions,or error messages.
Select one:
a.
b.
c.
d.
Compound TCP
Feedback
Your answer is correct.
Question 2
Correct
Flag question
Question text
Intended as a designation for a guest network in a public place, such as a coffee shop or
airport, rather than for an internal network
Select one:
a.
Public Network
b.
Domain Network
c.
Private Network
Feedback
Your answer is correct.
Question 3
Correct
Flag question
Question text
Determines when neighboring nodes and routers are no longer reachable and reports the
condition.
Select one:
a.
b.
c.
d.
Routing Compartments
Feedback
Your answer is correct.
Question 4
Correct
Question text
Controls the ability to see other computers and devices
Select one:
a.
Network Explorer
b.
Network Discovery
c.
d.
Question 5
Correct
Flag question
Question text
Intended as a designation for a network in which computers are configured as members of
a homegroup or workgroup and are not connected directly to the public Internet
Select one:
a.
Public Network
b.
Domain Network
c.
Private Network
Feedback
Your answer is correct.
Question 6
Correct
Flag question
Question text
Which one is not an official version of windows server 2012?
Select one:
a.
b.
c.
d.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Network Location Awareness Reports changes in network connectivity and configuration
Select one:
True
False
Question 8
Correct
Flag question
Question text
Network and Sharing Center Provides a central console for browsing computers and devices
on the network
Select one:
True
False
Question 9
Correct
Flag question
Question text
Network and Sharing Center Provides automated diagnostics to help diagnose and resolve
networking problems
Select one:
True
False
Question 10
Correct
Flag question
Question text
Spurious Retransmission Timeout Detection Provides correction for sudden, temporary
increases in retransmission timeouts and prevents unnecessary retransmission of segments.
Select one:
True
False
Question 11
Correct
Flag question
Question text
The WMI service continues to run side-by-side with WinRM and provides requested data or
control through the WMI plug-in. You can continue to obtain data from standard WMI
classes, such as Win32_Process, as well as IPMI-supplied data.
Select one:
True
False
Question 12
Correct
Flag question
Question text
Provides application programming interfaces (APIs) for extending the TCP/IP filtering
architecture so that it can support additional features.
Select one:
a.
Routing Compartments
b.
c.
d.
Question 13
Correct
Question text
Network Explorer Provides a central console for browsing computers and devices on the
network
Select one:
True
False
Question 14
Correct
Flag question
Question text
member server
A Answer is a computer in a domain which has Windows Server edition of
operating system deployed but it is not a Domain Controller. Normally in any organization
we don’t use DCs to deploy all the roles and services e.g. DHCP, application server, file and
print server, Citrix Application Virtualization, Citrix Desktop Virtualization, DNS, etc.
Question 15
Correct
Flag question
Question text
This Edition of windows server 2012 is suited for small businesses of up to 15 users where it
can implement features such as file sharing, printer sharing, security and remote access.
Select one:
a.
b.
c.
d.
Question 16
Correct
Flag question
Question text
This edition of windows server 2012 the flagship product under the brand name of windows
server 2012,
Select one:
a.
b.
c.
Question 17
Correct
Flag question
Question text
Network Discovery Controls the ability to see other computers and devices
Select one:
True
False
Question 18
Correct
Flag question
Question text
Random Interface IDs maps the internal (private) address and port number to different
external (public) addresses and ports, depending on the external destination address.
Select one:
True
False
Question 19
Correct
Question text
Window s Pow ersh
Answer is a more advanced version of standard windows command line
interface known as cmd or command prompt
Question 20
Correct
Flag question
Question text
Ensures that an unreachable gateway is checked periodically to determine whether it has
become available.
Select one:
a.
b.
Compound TCP
c.
d.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Intended as a designation for a network in which computers are connected to the corporate
domain to which they are joined
Select one:
a.
Private Network
b.
Public Network
c.
Domain Network
Feedback
Your answer is correct.
Question 22
Correct
Flag question
Question text
it describes a collection of users, systems, applications, networks, database servers, and any
other resources that are administered with a common set of rules.
Select one:
a.
Domain Services
b.
Domain
c.
Member Servers
d.
Domain Controller
Feedback
Your answer is correct.
Question 23
Correct
Flag question
Question text
This edition of windows server 2012 is suited for small businesses, but with up to 25 users, it
is also available on retail stores making it accessible to small businesses,
Select one:
a.
b.
c.
d.
Question 24
Correct
Flag question
Question text
If a WINS server in an environment is the sole WINS server for that network, no additional
configuration is required other than ensuring that clients will be pointing to the WINS server
in their IP configuration. However, if it has been decided that WINS is required, it is a best-
practice recommendation to deploy a secondary WINS server to provide redundancy.
Select one:
True
False
Question 25
Correct
Flag question
Question text
WINS
Answer is a service that resolves computer names to IP addresses. Using this,
the computer name COMPUTER84, for example, can be resolved to an IP address that
enables computers on a Microsoft network to find one another and transfer information.
Question 26
Incorrect
Question text
Intended as a designation for a network in which computers are connected to the corporate
domain to which they are joined.
Domain Netw ork WRONG
Answer:
Question 27
Correct
Flag question
Question text
This scripting API enables you to obtain data from remote computers using scripts that
perform WS-Management protocol operations.
Select one:
a.
b.
WS-Management protocol
c.
Question 28
Correct
Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.
Select one:
a.
b.
IP Security
c.
d.
Question 29
Correct
Flag question
Question text
WINS works best in client/server environments in which WINS clients send single-label
(host) name queries to WINS servers for name resolution and WINS servers resolve the
query and respond.
Select one:
True
False
Question 30
Correct
Flag question
Question text
This command–line tool for system management is implemented in a Visual Basic Scripting
Edition file (Winrm.vbs) written using the WinRM scripting API. This tool enables an
administrator to configure WinRM and to get data or manage resources. For more
information, see the online help provided by the command line Winrm /?.
Select one:
a.
Winrm.cmd
b.
Winrs.exe
Feedback
Your answer is correct.
Question 31
Incorrect
Question text
Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows
stateful address autoconfiguration with a DHCPv6 server.Prevents address scanning of IPv6
addresses based on the known company IDs of network-adapter manufacturers. By default,
Windows Vista and later generate random interface IDs for nontemporary autoconfigured
IPv6 addresses, including public and link-local addresses.
Select one:
a.
b.
c.
d.
Question 32
Correct
Flag question
Question text
Provides faster throughput by altering the way that a sender can increase the sending rate if
multiple segments in a window of data are lost and the sender receives an acknowledgment
stating that only part of the data has been received
Select one:
a.
b.
c.
d.
Question 33
Correct
Flag question
Question text
A push partner for a particular WINS server is the server that pulls WINS database
information from a receiving or push partner.
Select one:
True
False
Question 34
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Intended as a designation for a network in which computers are configured as members of
a homegroup or workgroup and are not connected directly to the public Internet.
Private Netw ork WRONG
Answer:
Question 35
Correct
Flag question
Question text
Intended as a designation for a guest network in a public place, such as a coffee shop or
airport, rather than for an internal network.
Public Netw ork
Answer:
Question 36
Correct
Flag question
Question text
A push partner is a WINS server from which changes are “pulled.”
Select one:
True
False
Question 37
Correct
Flag question
Question text
Hardware management through the Intelligent Platform Management Interface (IPMI)
provider and driver enables you to control and diagnose remote server hardware through
BMCs when the operating system is not running or deployed.
Select one:
True
False
Question 38
Correct
Flag question
Question text
Extended Selective Acknowledgments provides faster throughput by altering the way that a
sender can increase the sending rate if multiple segments in a window of data are lost and
the sender receives an acknowledgment stating that only part of the data has been
received.
Select one:
True
False
Question 39
Correct
Flag question
Question text
Neighbor Unreachability Detection for IPv4 Provides an extensible framework that helps
users recover from and troubleshoot problems with network connections.
Select one:
True
False
Question 40
Incorrect
Flag question
Question text
Maps the internal (private) address and port number to different external (public) addresses
and ports, depending on the external destination address.
Select one:
a.
b.
c.
Question 41
Correct
Flag question
Question text
Provides a central console for browsing computers and devices on the network
Select one:
a.
b.
c.
Network Explorer
d.
Network Discovery
Feedback
Your answer is correct.
Question 42
Correct
Question text
Provides automated diagnostics to help diagnose and resolve networking problems
Select one:
a.
b.
Network Discovery
c.
Network Explorer
d.
Question 43
Correct
Flag question
Question text
It is not possible to install WINS using windows powershell
Select one:
True
False
Question 44
Correct
Flag question
Question text
Helps determine whether a performance bottleneck for a connection is the sending
application, the receiving application, or the network.
Select one:
a.
b.
c.
d.
Question 45
Correct
Flag question
Question text
Provides a central console for viewing and managing a computer’s networking and sharing
configuration
Select one:
a.
Network Discovery
b.
Network Explorer
c.
d.
Question 46
Correct
Flag question
Question text
Routing Compartments Prevents unwanted forwarding of traffic between interfaces by
associating an interface or a set of interfaces with a login session that has its own routing
tables.
Select one:
True
False
Question 47
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Network and Sharing Center provides a central console for viewing and managing a
computer’s networking and sharing configuration
Select one:
True
False
Question 48
Correct
Flag question
Question text
Network Discovery Reports changes in network connectivity and configuration
Select one:
True
False
Question 49
Correct
Flag question
Question text
This edition of windows server 2012 supports up to 2 virtual machines, it also supports an
unlimited amount of users as long as the required user licenses have been purchased
Select one:
a.
b.
c.
d.
Question 50
Correct
Flag question
Question text
Reports changes in network connectivity and configuration
Select one:
a.
b.
d.
Network Discovery
Feedback
Your answer is correct.
MIDTERM QUIZ 1
Question 1
Correct
Flag question
Question text
policy-based assig
With Answer , the DHCP the server evaluates DHCP requests against policies
that you define.
Question 2
Correct
Flag question
Question text
Split scope DHCP
Answer uses two independent DHCP servers that share responsibility for
a scope. Typically, 70% of the addresses in the scope are assigned to the primary server and
the remaining 30% are assigned to a backup server. If clients cannot reach the primary
server then they can acquire an IP address lease from the secondary server.
Question 3
Correct
Flag question
Question text
Root hints only
Answer Will have the IP addresses of DNS servers where records can be
acquired.
Question 4
Correct
Flag question
Question text
With policy based assignment, the DHCP the server evaluates DHCP requests against
policies that you define. Policies are applicable for a specific scope with a defined
processing order.
Select one:
True
False
Question 5
Correct
Question text
Load balance mode
Answer is the default mode of deployment. In this mode, two DHCP
servers simultaneously serve IP addresses and options to clients on a given subnet.
Question 6
Correct
Flag question
Question text
With DHCP failover, two DHCP servers share DHCP scope and lease information, enabling
one server to provide DHCP leases to DHCP clients if the other server is unavailable.
Select one:
True
False
Question 7
Correct
Flag question
Question text
In which of the given steps is the third step in configuring a DNS forwarding?
Select one:
a.
Enter the IP address of your secondary DNS server you want to forward DNS queries. Click
OK
b.
c.
In DNS manager, right-click and scroll down the menu. Click Properties
d.
Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS
.
Feedback
Your answer is correct.
Question 8
Correct
Flag question
Question text
This option places a DHCP server in a cluster with another DHCP server that assumes the
load if the primary DHCP server fails.
DHCP in a Window s failover cluster
Answer:
Question 9
Correct
Flag question
Question text
hot standby
In Answer dhcp failover, two servers operate in a failover relationship where an
active server is responsible for leasing IP addresses and configuration information to all
clients in a scope or subnet.
Question 10
Correct
Flag question
Question text
DHCP failover
Answer provides redundancy and load balancing for DHCP services, enabling
administrators to deploy a highly resilient DHCP service.
Question 11
Correct
Flag question
Question text
Load balance
In Answer dhcp failover is the default mode of deployment. In this mode, two
DHCP servers simultaneously serve IP addresses and options to clients on a given subnet.
Question 12
Correct
Flag question
Question text
forw ard lookup zon
A Answer is a DNS function that takes a domain name and resolves it to an
IP address.
Question 13
Correct
Flag question
Question text
The following command installs dhcp server role Add-WindowsFeature -ManagementTools
dhcp
Select one:
True
False
Question 14
Correct
Flag question
Question text
Windows Server 2012 provides task-oriented Windows PowerShell cmdlets for DHCP server
management. The DHCP server configuration operations are implemented in Windows
Server 2012 as Common Information Model (CIM) based cmdlets.
Select one:
True
False
Question 15
Correct
Flag question
Question text
In which of the given steps is the second step in configuring a DNS forwarding?
Select one:
a.
Enter the IP address of your secondary DNS server you want to forward DNS queries. Click
OK
b.
Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS
.
c.
d.
In DNS manager, right-click and scroll down the menu. Click Properties
Feedback
Your answer is correct.
Question 16
Correct
Flag question
Question text
reverse lookup zo
A Answer is a DNS function that takes an IP address andresolves it to a
domain name.
Question 17
Correct
Flag question
Question text
DHCP failover is a feature that provides the ability to have two DHCP servers serve IP
addresses and option configuration to the same subnet or scope, providing for continuous
availability of DHCP service to clients.
Select one:
True
False
Question 18
Correct
Flag question
Question text
Split scope DHC
Answer uses two independent DHCP servers that share responsibility for a
scope. Typically, 70% of the addresses in the scope are assigned to the primary server and
the remaining 30% are assigned to a backup server.
Question 19
Correct
Question text
In which of the given steps is the first step in configuring a DNS forwarding?
Select one:
a.
b.
In DNS manager, right-click and scroll down the menu. Click Properties
c.
Enter the IP address of your secondary DNS server you want to forward DNS queries. Click
OK
d.
Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS
.
Feedback
Your answer is correct.
Question 20
Correct
Flag question
Question text
hot standby mode
In Answer failover mode, two servers operate in a failover relationship
where an active server is responsible for leasing IP addresses and configuration information
to all clients in a scope or subnet.
MIDTERM QUIZ 2
Question 1
Correct
Flag question
Question text
Which on is the second step In windows server 2012 routing/nat configuration?
Select one:
a.
b.
On Server Selection select the server you want to install the feature on and click Next
c.
from Server Manager click Manage > Add Roles and Features
d.
Question 2
Correct
Question text
Use IPsec Defaults option to configure the default IPsec settings that the local computer will
use when attempting to establish secure connections with other IPsec-enabled computers.
To configure these settings, click the Customize button to open the Custo
Select one:
True
False
Question 3
Incorrect
Flag question
Question text
his algorithm is not recommended and is provided for backward compatibility only.
Select one:
a.
b.
c.
d.
Question 4
Incorrect
Flag question
Question text
IPsec encapsulation mode where the payload is encapsulated with an additional IP header
Select one:
a.
Transport mode
b.
Main Mode
c.
Tunnel mode
d.
Quick Mode
Feedback
Your answer is correct.
Question 5
Correct
Flag question
Question text
This data integrity algorithm is not recommended and is provided for backward
compatibility only.
Select one:
a.
b.
SHA-384
c.
d.
Question 6
Correct
Flag question
Question text
This authentication method can be used on networks that include systems running an
earlier version of the Windows operating system and on standalone systems.
Select one:
a.
Computer certificate
b.
Computer (NTLMv2)
d.
Pre-shared key
Feedback
Your answer is correct.
Question 7
Correct
Flag question
Question text
Which on is the third step In windows server 2012 routing/nat configuration?
Select one:
a.
To start, from Server Manager click Manage > Add Roles and Features
b.
c.
d.
On Server Selection select the server you want to install the feature on and click Next.
Feedback
Your answer is correct.
Question 8
Correct
Question text
The Server-to-Server type of connection security rule can be used to protect
communications between two computers, two groups of computers, two subnets, or some
combination of these, such as between a computer and a subnet. For example, you can use
serverto-server rules to protect communications between a database server and a front-end
web server
Select one:
True
False
Question 9
Correct
Flag question
Question text
Use IPsec Exemptions option to configure how IPsec handles Internet Control Message
Protocol (ICMP) traffic. By default, ICMP traffic is not exempted from using IPsec, but you
can change this by selecting Yes from the list control.
Select one:
True
False
Question 10
Correct
Question text
his algorithm has the strongest security but also the highest resource usage. It is compatible
only with Windows Vista and later.
Select one:
a.
b.
DH Group 24
c.
d.
Question 11
Correct
Flag question
Question text
Which on is the first step In windows server 2012 routing/nat configuration?
Select one:
a.
On the Before You Begin page, click Next.
b.
c.
On Server Selection select the server you want to install the feature on and click Next.
d.
From Server Manager click Manage > Add Roles and Features.
Feedback
Your answer is correct.
Question 12
Correct
Flag question
Question text
AES-GCM 192 algorithm can be used for quick mode only and is supported on Windows
Vista SP1 and later. It is equivalent to AESGMAC 192 for integrity
Select one:
True
False
Question 13
Correct
Flag question
Question text
The default signing algorithm for this authentication method is RSA, but Elliptic Curve
Digital Signature Algorithm (ECDSA)–P256 and ECDSA-P384 are also supported signing
algorithms.
Select one:
a.
Computer (NTLMv2)
b.
Pre-shared key
c.
Computer certificate
d.
Question 14
Correct
Flag question
Question text
Which on is the fourth step In windows server 2012 routing/nat configuration?
Select one:
a.
from Server Manager click Manage > Add Roles and Features
b.
d.
On Server Selection select the server you want to install the feature on and click Next
Feedback
Your answer is correct.
Question 15
Correct
Flag question
Question text
This algorithm is stronger than DH Group 2. It has medium resource usage and is
compatible only with Windows Vista and later.
Select one:
a.
b.
c.
DH Group 24
d.
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
AES-GCM 256 algorithm can be used for quick mode only and is supported on Windows
Vista SP1 and later. It is equivalent to AESGMAC 256 for integrity.
Select one:
True
False
Question 17
Correct
Flag question
Question text
IPsec Encapsulation Model where the payload is encapsulated with an IPsec header
Select one:
a.
Transport mode
b.
Handshake Mode
c.
Tunnel mode
d.
Key Mode
Feedback
Your answer is correct.
Question 18
Correct
Flag question
Question text
This data integrity algorithm is stronger than MD5 but uses more resources.
Select one:
a.
b.
c.
AES-GMAC 192
d.
Question 19
Correct
Flag question
Question text
This mechanism is defined in RFC2409 and combines the Internet Security
Association and Key Management Protocol (ISAKMP) of RFC 2408 with the Oakley Key
Determination Protocol (Oakley) of RFC 2412
Select one:
a.
Diffie-Hellman Group 1
b.
IP Tunneling
c.
Authenticated IP (AuthIP)
d.
Question 20
Correct
Flag question
Question text
AES-GCM 191 This algorithm can be used for quick mode only and is supported on
Windows Vista SP1 and later. It is equivalent to AESGMAC 128 for integrity.
Select one:
True
False
FINAL QUIZ 1
Question 1
Correct
Flag question
Question text
______________ is used in TCP/IP networks for naming computers and network services
Select one:
a.
b.
c.
BranchCache
d.
Question text
When it comes to deploying updates, SCCM is the best tool to do it. You must understand
that deploying updates is a complex task. SCCM make it easy not only to deploy updates
but to gather the depoyment reports as well.
Select one:
True
False
Question 3
Correct
Flag question
Question text
These are network devices built into the IT infrastructure and they stand between public and
internal networks.
Select one:
a.
Host-based firewall
b.
Local-based firewall
c.
Packet-based firewall
d.
Network-based firewall
Feedback
Your answer is correct.
Question 4
Correct
Flag question
Question text
_________________ Is an Internet Engineering Task Force (IETF) standarddesigned to reduce the
administration burden and complexity ofconfiguring hosts on a TCP/IP-based network, such
as a privateintranet
Select one:
a.
BranchCache
b.
c.
d.
Question 5
Correct
Question text
_______________ Provides for administration and monitoring of servers running Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS).
Select one:
a.
b.
c.
d.
Question 6
Correct
Flag question
Question text
Proxy firewalls perform deep packet inspection rather than merely packet header inspection.
Here, the firewall creates a separate connection for every incoming and outgoing packet
Select one:
True
False
Question 7
Correct
Flag question
Question text
Which one is the second step when creating Firewall Inbound Rules?
Select one:
a.
Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types.
b.
Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected.
c.
The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.
d.
On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.
Feedback
Your answer is correct.
Question 8
Correct
Question text
In Manual software updates deployment, a set of software updates is selected the SCCM
console and these updates are deployed to the target collection.
Select one:
True
False
Question 9
Correct
Flag question
Question text
Which one is a benefit of using windows firewall?
Select one:
a.
Its not highly flexible. It does not offer many advanced functionalities and different levels of
controls for the firewall services.
b.
It needs a special license or additional hardware. Once you obtain your copy of a Windows
operating system, there are no additional costs.
c.
Question 10
Correct
Flag question
Question text
A proxy firewall is also referred to as a gateway firewall, or an application firewall. It stands
between the internet and the devices in the private network
Select one:
True
False
Question 11
Correct
Flag question
Question text
Which one is the fourth step when creating Firewall Inbound Rules?
Select one:
a.
The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.
b.
Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types
c.
On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.
d.
Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected.
Feedback
Your answer is correct.
Question 12
Correct
Flag question
Question text
____________ is a virtual layer-2 network switch that provides programmatically managed and
extensible capabilities to connect virtual machines to the physical network
Select one:
a.
b.
c.
d.
Dynamic Host Configuration Protocol (DHCP)
Feedback
Your answer is correct.
Question 13
Correct
Flag question
Question text
This method of firewall filtering analyzes the header of every packet and checks if it matches
the configured rules.
Select one:
a.
Stateful Inspection
b.
Proxy Server
c.
IP Filtering
d.
Packet Filtering
Feedback
Your answer is correct.
Question 14
Correct
Question text
Which one is the first step when creating Firewall Inbound Rules?
Select one:
a.
On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.
b.
The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.
c.
Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected
d.
Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types.
Feedback
Your answer is correct.
Question 15
Correct
Flag question
Question text
Automatic software updates deployment is configured by using automatic deployment
rules. This method is used for deploying monthly software updates and for managing
definition updates.
Select one:
True
False
Question 16
Correct
Flag question
Question text
_____________ is a wide area network (WAN) bandwidth optimization technology that is
included in some editions of the Windows Server2012 and Windows 8 operating systems.
To optimize WAN bandwidth when users access content on remote servers
Select one:
a.
BranchCache
b.
c.
d.
Flag question
Question text
This method of firewall filtering inspects every packet and keeps the information for the
current connection. This includes TCP protocol information, source and destination IP
addresses, and port numbers.
Select one:
a.
Proxy Server
b.
Packet Filtering
c.
Stateful Inspection
d.
IP Filtering
Feedback
Your answer is correct.
Question 18
Incorrect
Flag question
Question text
This type of firewall runs on individual systems, physical or virtual. It is a piece of software
installed on an operating system which stands between the host and other network devices.
Select one:
a.
Local-based firewall
b.
Host-based firewall
c.
Network-based firewall
d.
Packet-based firewall
Feedback
Your answer is correct.
Question 19
Correct
Flag question
Question text
________ is a suite of Institute of Electrical and Electronics Engineers (IEEE)standards that
enable Converged Fabrics in the data center, where storage, data networking, cluster IPC
and management traffic all share the same Ethernet network infrastructure.
Select one:
a.
b.
BranchCache
c.
d.
Question 20
Correct
Flag question
Question text
Which one is the third step when creating Firewall Inbound Rules?
Select one:
a.
Choose if the rule will apply to connections for All programs or a specific program on the
local machine and click Next. You can click Customize… to select additional settings for the
processes of the program you selected.
b.
On the home screen, select the Inbound Rules The console will show all inbound rules in the
middle section and available actions in the right pane. You can filter the list by using the
available choices.
c.
The following step will allow you to specify the protocol and port for the traffic that this
firewall rule will filter. Click Next after you select a protocol type and configure the settings.
d.
Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose
the type of rule you want to create. You can choose one out of four types.
Feedback
Your answer is correct.
FINAL QUIZ 2
Question 1
Correct
Flag question
Question text
This policy enables you to set the location of the collector computer.
Select one:
a.
b.
c.
d.
Question 2
Incorrect
Question text
Artifact Resolution Requests Monitors the number of requests to the artifact resolution
endpoint per second that are sent to the federation server.
Select one:
True
False
Question 3
Correct
Flag question
Question text
Proxy MEX Requests Monitors the number of incoming WS-Metadata Exchange (MEX)
requests that are sent to the federation server proxy.
Select one:
True
False
Question 4
Correct
Flag question
Question text
Federation Metadata Requests Monitors the number of incoming federation metadata
requests sent to the federation server.
Select one:
True
False
Question 5
Correct
Flag question
Question text
Federation Metadata Requests Monitors the number of token requests sent to the
federation server including SSOAuth token requests per second.
Select one:
True
False
Question 6
Correct
Flag question
Question text
_________ enables you to monitor how a computer running the Windows Server 2012 and
Windows Server 2012 R2 operating system uses CPU, memory, disk, and network resources.
Select one:
a.
Computer Monitor
b.
Resource Monitor
c.
Networking Monitor
d.
Message Analyzer
Feedback
Your answer is correct.
Question 7
Correct
Flag question
Question text
____________ is the successor to Network Monitor. You can use this to perform network traffic
capture and analysis. Message Analyzer also functions as a replacement for LogParser
Select one:
a.
CPU Monitor
b.
Network Analyzer
c.
Resource Monitor
d.
Message Analyzer
Feedback
Your answer is correct.
Question 8
Correct
Flag question
Question text
_________________ enable you to create customized views of events across any event log
stored on a server, including events in the forwarded event log.
Select one:
a.
Event views
b.
c.
Question 9
Correct
Flag question
Question text
Artifact Resolution Requests/sec Monitors the number of requests to the artifact resolution
endpoint per second that are sent to the federation server
Select one:
True
False
Question 10
Correct
Flag question
Question text
This view of resource monitor lists the ports and addresses that services and applications are
listening on. Also provides information about the firewall status for these roles and services.
Select one:
a.
b.
TCP Connections
c.
Network Activity
d.
Listening Ports
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Proxy MEX Requests/sec Monitors the number of incoming MEX requests per second that
are sent to the federation server proxy.
Select one:
True
False
Question 12
Correct
Flag question
Question text
This view of resource monitor provides information on connections on the basis of local
address, port, and remote address and port.
Select one:
a.
Listening Ports
b.
TCP Connections
c.
Network Activity
d.
Processes With Network Activity
Feedback
Your answer is correct.
Question 13
Incorrect
Flag question
Question text
Proxy MEX Requests/sec Monitors the number of incoming WS-Metadata Exchange (MEX)
requests that are sent to the federation server proxy.
Select one:
True
False
Question 14
Correct
Flag question
Question text
This view of resource monitor Lists network activity on a per-process basis,but also lists the
destination address, sent bits per second,received bits per second, and total bits per second.
Select one:
a.
Listening Ports
b.
TCP Connections
c.
d.
Network Activity
Feedback
Your answer is correct.
Question 15
Correct
Flag question
Question text
This policy determines the maximum event forwarding rate in events per second. If this
policy is not configured, events will be transmitted as soon as they are recorded.
Select one:
a.
b.
c.
d.
Flag question
Question text
This view of resource monitor lists processes by name and ID; and provides information on
bits sent per second,bits received per second, and total bits per second.
Select one:
a.
TCP Connections
b.
c.
Network Activity
d.
Listening Ports
Feedback
Your answer is correct.
Question 17
Correct
Flag question
Question text
Token Requests Monitors the number of token requests sent to the federation server
including SSOAuth token requests.
Select one:
True
False
Question 18
Correct
Flag question
Question text
Proxy Requests Monitors the number of incoming requests sent to the federation server
proxy.
Select one:
True
False
Question 19
Correct
Flag question
Question text
Token Requests/sec Monitors the number of incoming federation metadata requests sent to
the federation server
Select one:
True
False
Question 20
Correct
Flag question
Question text
____________ enables you to access recorded event information.
Select one:
a.
Event Viewer
b.
Network Logger
c.
Resource Monitor
d.
System Logger
Feedback
Your answer is correct.