Final Question
Final Question
1. In which of the following ways does a DHCP client communicate which offered IP address it will
accept from which DHCP server?
➢ The clients sends a DHCPREQUEST message to all servers with the IP address of the
chosen DHCP server.
3. You are the system administrator of your network and have hundreds of host workstations to
manage and maintain. You need to enable the hosts on your network to find the IP addresses of
named machines. Which of the following would you use?
➢ DNS server.
6. In class, what did we configure to allow our machines to connect to the NLB cluster using
www.a2107.local?
➢ A DNS ’A’ record.
8. When using WDS with Active Directory integration, what other roles are required for the service
to run?
➢ DNS.
➢ DHCP.
10. When adding install images to a WDS server, you must first create an image group.
➢ True.
11. Policies can be put in place for DHCP servers to provide different addresses to devices on the
same network. For example, Nortel phones can receive a different subnet than HP PCs.
➢ True.
14. A failover cluster can protect against problems with lack of disk space, network resources,
memory, and/or a lack of computing resources.
➢ False.
16. Print and Document Services connects users to print devices through group policy.
➢ TRUE.
17. A single server is highly resilient piece of hardware and will never fail.
➢ False.
18. Network Policy Server is installed by default when you add the Remote Access Role.
➢ False.
19. For users to be able to access a load balanced, or failover cluster what additional server role
needs to be configured?
➢ DNS.
22. In which of the following situations would it be desirable to use a split tunnel for uses?
➢ If the users have laptop computers and work from home or office.
25. In which of the following situations is it appropriate to use windows Server 2016 as a router
between two networks?
➢ For light traffic on small networks.
26. When an access client contacts a VPN server or wireless point, a connection request is sent to
which system?
➢ The NPS server.
27. Which of the following DNS components automatically creates and deletes host records when
an IP address lease is created/released?
➢ Dynamic DNS.
30. which of the following terms is defined as private data placed in a packet with a header
containing routing information that allows the data to traverse a transit network, such as the
Internet?
➢ Encapsulation.
31. Which windows tool is used to provide RIP and BPG routing?
➢ Routing and Remote Access.
32. By using the active directory-integrated zone, DNS follows which kind of model?
➢ Multimaster
33. Which of the following is one of the primary advantages of using active directory to store DNS
information?
➢ Security and replication
34. By default, zone transfers are disabled. Three zone transfer methods are available to choose
from. Which of the following describes the to any server method?
➢ Allows a data transfer to any server that asks for a zone transfer.
35. By default, zone transfers are disabled. Three zone transfer methods are available to choose
from. Which of the following describes the Only to the following server’s method?
➢ Restricts zone transfers to those servers specified in the accompanied list.
36. Before creating PTR records, which DNS objects must be created?
➢ Reverse lookup zones.
37. Which command line utility is used to add product keys and manage activation for a computer.
➢ Slmgr.vbs
38. Which type of DNS zone transfer host names to IP addresses?
➢ Forward lookup zone
39. Before a DHCP server can hand out addresses, which of the following steps must be completed
first?
➢ The DHCP server must be created and authorised.
42. On which port does DHCP failover listen for failover traffic?
➢ TCP port 647.
43. By default, how often does a backup of the DHCP database occur?
➢ Every 60 minutes.
44. What type of network traffic is generated when a client computer requests a DHCP lease?
➢ Broadcast.
45. Which of the following steps must be completed in order to ensure a network printer is assigned
the same address through the DHCP server?
➢ Create a reservation in the DHCP scope.
46. In server 2016 is it possible for an internal Hyper-V network adapter to provide internet access
to your VM’s?
➢ Yes, with the help of a NAT router on the host server.
47. Which of the following is 1/2 the default lease period for DHCP dynamic address allocation?
➢ 4 days
48. Time to Live (TTL) means which of the following in DNS parlance?
➢ The length of time a record remains in a DNS cache.
49. What would you configure on a DNS server to have it send all queries it cannot answer to
another server for further processing?
➢ Forwarders/ forwarding/ forwarder/ server forwarder.
50. Which of the following roles must be installed in order to deploy a DHCP Relay Agent on
Windows Server 2012, and later?
➢ Remote access.
51. RRAS has multiple options available to select one or more services to provide users which of
the following is the correct description for the Network Address Translation (NAT) option?
➢ Sets up the server to provide NAT services to clients on a private network that need to
access the internet.
52.
53. How does DHCP scope creation differ in windows server 2012 and windows server 2016?
➢ In windows server 2012 and windows server 2016 creating the server scope is done
separately after adding the DHCP server role.
54. You are creating a NLB cluster to provide high availability for a static website. You have 3
Servers: Web1, Web2, Web3, which are configured as follows:
• Each server has two network cards installed
• Each server has its own disk storage
• Each server has the same data/configuration
• Each server receives a DHCP address from the server
• Each server has the IIS role installed
• Each server has the NLB feature installed
Are you ready to configure your NLB cluster?
➢ No. Each server should be assigned a static IP.
55. You are a server admin for your corporate domain. You have an application server named SRV12
that runs a website using IIS. Because of recent growth, this server is becoming unable to
process all incoming requests in a timely manner. You would like to add a second server to run
the website.
• Your solution should meet the following requirements:
• Client requests should be divided evenly between the two servers.
• If one server goes down, all requests should go to the other server.
What solution do you implement?
➢ Configure both servers in a NLB cluster.
56. After installing the Failover Cluster feature, what is the order you need to complete these
configuration steps:
➢ Validate the cluster hosts.
➢ Create the Cluster.
➢ Configure quorum settings and witness disk.
➢ Add shared storage.
58. Pu the following items in order for how a PC using SLAAC assigns itself an IPv6 address.
➢ A Router Solicitation (RS) message is broadcast over the network.
➢ The Router replies with a Router Advertisement (RA) message to the requesting PC.
➢ The PC uses its the prefix from the RS message, and its MAC address to generate a unique
Global Unicast Address.
➢ Duplicate Address Detection is ran to check that the new address is unique.
59. Put the following steps in the correct order to create an IPv4 DHCP scope.
➢ Open the DHCP console.
➢ Right-click on IPv4 and select New Scope
➢ Enter the scope name and description.
➢ Enter the scope IP address range and subnet mask.
➢ Configure exclusions, delays, and lease duration.
➢ Configurations for the DHCP scope (Like the gateway, DNS, and WINS servers)
➢ Select to activate scope and then click finish.
61. You have installed a DHCP server on your network and need to allocate addresses for the
scopes. It has been decided that we will divide the 140.10.0.0 network for our purposes. You
need to divide this into 100 networks and put the 3rd network address then the subnet mask in
the first 2 blanks .140.10.4.0, 255.255.254.0. It has also been decided that we will break down
the 6th range for the link addresses needed for connection devices on our network. In the next
three blanks put the network address for the last 3 of these new networks beginning with the
last network then the 2nd last network and finally the third last network. 140.10.11.252,
140.10.11.248, 140.10.11.244.
62. Given the IP of 13.0.0.0. the new subnet mask to give 750 Nets would be 255.255.192.0. The
Network number of the 5th range would be 13.1.0.0. And the Broadcast number would be
13.1.63.255.
63. You have installed a DHCP server on your network and need to allocate address, for the scopes.
It has been decided that we will divide the 10.0.0.0 network for our purposes. You need to divide
this into 16 networks and put the 2nd network address then the subnet mask in the first 2
blanks. It has also been decided that we will break down the fourth range for the link addresses
needed for connection devices on our network. In the next three blanks put the network
address for the first 3 of these new networks.
➢ 10.16.0.0
➢ 255.240.0.0
➢ 10.48.0.0
➢ 10.48.0.4
➢ 10.48.0.8
64. In what order does your domain forward DNS requests to the internet for resolution?
➢ My DNS server forwarder to the class DNS
➢ Class DNS forwarders to the CIS. Local DNS
➢ The CIS. Local DNS forwarders to the college DNS
➢ The college DNS forwarders to the internet (ISP).
66. IN your network you have two File Servers named File1 and File2. File1 contains a shared folder
for the accounting department. All members of accounting have the Modify NTFS permission.
Members of the IT group have FC NTFS on all shares. A member of accounting named Bill who is
also a member of Executives who have Modify NTFS permission. The Share ACL reads as
follows: Administrator’s Full control. Everyone Full Control Accounting Read, IT Full Control,
Executives Full Control. Bill logs on to File1 and accesses the folder. What is his permission?
➢ Modify.
67. IN your network you have two File Servers named File1 and File2. File1 contains the ACC shared
folder for the accounting department. All members of accounting have the Modify NTFS
permission. Members of the IT group have FC NTFS on all shares. Bill who is a member of
Executives who have Change NTFS permission. The Share ACL reads as follows: Administrator’s
Full control, Everyone Full Control Accounting Read, IT Full Control. Bill logs on to File1 Server
and accesses the folder. What is his permission?
➢ Change.
68. IN your network you have two File Servers named Flle1 and File2. File1 contains a shared folder
(ACCshare) for the accounting department. All members of accounting have the Modify NTFS
permission ACCshare. Members of the IT group have FC NTFS on all shares. Bill who is a
member of accounting needs to add a file in the ACCshare folder and delete some of the
subtree. All accounting members should have this ability. The Share ACL reads as follows:
Administrator’s Full control, Accounting Read, IT Full Control. What is the recommended way
to give Bill the proper access right?
➢ Change the share permission for the Accounting group to change.
69. IN your network you have two File Servers named Flle1 and File2. File1 contains a shared folder
for the accounting department called ACCshare. All members of accounting have the Modify
NTFS permission on ACCshare. Members of the IT group have FC NTFS on all shares. Bill who is
a member of Executives needs to add a file in the ACCshare folder and delete some of the
subtree. The Share ACL reads as follows Administrator's Full control, Accounting Read, IT Full
Control. What is the recommended way to give Bill the proper access right over the network?
Select the Best answer.
➢ Create a group called Temp, assigns Temp the proper permissions, add bill to the Temp
group.
70. IN your network you have two File servers named File 1 and File2. Filel contains a Shared folder
for the Accounting department. An members of Accounting have the Modify NTFS permission
File1. Members of the IT group have FC NTFS on all shares. Bill who is a member of IT needs to
add a file in the File1 folder and delete some of the subtree. The Share ACL reads as follows:
Administrator's Full control, Accounting Read, IT Full Control. What is the recommended way to
give Bill the proper access right?
➢ Do nothing.
71. You are the administrator of what will become a large Windows Server network using the TCP/IP
protocol. Currently, the network consists of 3 Windows servers and 50 workstations all on the
same subnet. During the last meeting you had with your manager, it was determined that the
expected company growth would mean adding workstations and printers to the existing
network for a total of 235 devices. The existing hardware will he used on the network as the new
devices are added. How should you assign IP addresses to the workstations on the network to
minimize your administrative, effort?
➢ Configure each workstation to use DHCP. Install a DHCP server and configure a single
scope.