You are on page 1of 4

MCTS Guide to Configuring Microsoft

Windows Server 2008 Active Directory


1st Edition Tomsho Solutions Manual
Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/mcts-guide-to-configuring-microsoft-windows-server-2008-active-directory-1st-e
dition-tomsho-solutions-manual/
MCTS Guide to Microsoft Windows Server 2008 Active Directory Configuration, 1423902351
Ch. 8 Solutions-1

Chapter 8 Solutions
Review Questions
1. Which of the following is needed if a computer with IP address 172.31.210.10/24 wants to
communicate with a computer with IP address 172.31.209.122/24?
b. Router
2. A computer that wants to share a network resource should have which of the following
installed?
a. Service
3. The LLTD protocol must be installed and enabled for a computer to be discovered and listed
in a network browse list. True or False?
False (LLTD is necessary only for a device to be placed in the network map.)
4. You’re setting up a new network connection and select Work as the location of the network to
which you’re connecting. Windows detects Windows Server 2008 running Active Directory
on the network. Which type of network will be shown in the network map?
c. Domain
5. Which of the following is a reason that a computer might not appear in a network map?
(Choose all that apply.)
b. The computer is running Windows Server 2003.
c. LLTD Responder is disabled.
6. If you turn on printer sharing in the Network and Sharing Center, all printers on the computer
are shared. True or False?
True
7. You have just typed the commands ipconfig /flushdns and ping server1. Which of the
following protocols is used first as a result of these commands?
b. DNS
8. You have just completed a default installation of Windows Server 2008. You know that the
TCP/IP protocol is installed. How does the server get assigned an IP address?
d. DHCP
9. You have just typed the commands arp -d, ipconfig /flushdns, and nslookup server1, and your
DNS server is on the same network as the computer from which you enter the commands.
Which of the following protocols is used first as a result of these commands?
c. ARP (ARP is used to retrieve the MAC address of the DNS server.)
10. The IP address 10.240.0.0/8 is invalid. True or False?
False
11. Which of the following is a good reason to subnet an IPv4 network? (Choose all that apply.)
b. Decrease the size of the broadcast domain.
d. Conserve IP addresses.
12. Which of the following IP addresses has 12 bits in the host ID?
MCTS Guide to Microsoft Windows Server 2008 Active Directory Configuration, 1423902351
Ch. 8 Solutions-2

d. 12.156.109.252/20
13. You have set up an e-mail server that needs to respond to e-mail requests using
mail.coolgadgets.com and mail.niftytools.com in the request URL. How can you do this?
b. Configure two IP addresses on one NIC. Configure DNS to map one IP address to
mail.coolgadgets.com and the other IP address to mail.niftytools.com.
14. You have a server with two NICs, each attached to a different IP network. You’re having
problems communicating with devices on remote networks that send packets to one of the
interfaces. The server receives the packets fine, but the server’s replies never reach the
intended destination network. Replies to packets that come in through the other interface seem
to reach their destination without any problems. What can you do that will most likely solve
the problem?
c. Use the Route command to add routes to the networks that aren’t receiving replies.
15. You have just changed the IP address on a computer named Computer5 in your domain from
172.31.1.10/24 to 172.31.1.110/24. You were communicating with this computer from your
workstation fine right before you changed the address. Now when you try the command “ping
computer5” from your workstation, you don’t get a successful reply. Other computers on the
network aren’t having a problem communicating with the computer. Which command might
help solve the problem?
b. ipconfig /flushdns
16. A user complains that opening NFS shares on his recently installed Linux computer from his
Windows computer is taking an inordinately long time. Opening shares on Windows servers
doesn’t seem to take as long. He’ll be using his Linux computer to store and back up files
more often than he’ll be accessing shares on Windows computers. What is a good course of
action to improve the speed of opening Linux shares?
Change the network provider order so that Network File System (NFS) is listed first.
17. You’re running the network map feature on your Windows Server 2008 machine. An older
computer used by a colleague doesn’t appear on the map, however. What could be the
problem?
c. Your colleague’s computer is running Windows XP.
18. Which of the following is a benefit of using IPv6 rather than IPv4? (Choose all that apply.)
b. Subnetting to conserve IP addresses is less of a concern.
c. Features to improve communication security and quality are built into IPv6.
19. Which of the following is a valid IPv6 address? (Choose all that apply.)
a. fe80:0:0:FEED::1
d. 2001:DB8:BAD: F00D:0020:3344:0:e4
20. You want all 100 computers in your domain to have network discovery enabled. What’s the
best way to do this?
c. Write a script containing the command to enable network discovery and distribute it as a startup
script by using a group policy.

Case Projects

Case Project 8-1: Creating a List of MAC addresses


MCTS Guide to Microsoft Windows Server 2008 Active Directory Configuration, 1423902351
Ch. 8 Solutions-3

There are a few possibilities. The brute-force method is going to each computer, using ipconfig /all to
display the necessary information, and writing it down. A more automated method is having each
computer run a startup script containing ipconfig /all > \\serverXX\Share\%computername%.txt, which
creates a text file with the required information in a share on the server. The information then has to be
extracted from each file. (The script could also use the command ipconfig /all
>>\\serverXX\Share\IPconfigs.txt, which has the advantage of sending output to a single file because
>> appends output to a file.)
Another possibility is pinging all the IP addresses in the range of IP addresses you’re using. By using
the -a option, you can get the computer name, and then use ARP to display the MAC address.
However, this method has the drawback of being labor intensive, and computers would have to be on
at the time you pinged them.
Case Project 8-2: Creating a GPO to Configure Network Settings

To meet the first two requirements of this project, students should create a script with the following
commands that runs by using a group policy startup script:
• Enable network discovery:
netsh advfirewall firewall set rule group="network discovery" new
enable=yes
• Set IPv6 address to use EUI-64:
netsh interface ipv6 set global randomizeidentifiers=disabled
The next two are group policies:
• Enable the LLTD Responder protocol for domain computers.
• Configure the Limit reservable bandwidth policy in the QoS Packet Scheduler node.
Case Project 8-3: IP Addressing Practice

Answers to problems can be found at www.learntosubnet.com/IPAddressing_Answers.htm.


Case Project 8-4: Using Additional Networking Tools

Answers will vary. Network Monitor can capture packets and display protocol information, which is an
excellent tool for learning and troubleshooting network protocols.
Netinfo 6.5 can display information about computers on a network to find vulnerabilities. The Ping
scanner tool could also be used in Case Project 8-1.

You might also like