1.
For DHCP to allocate address from a particular scope, the scope must be ____________________
Correct Answer
D. Activated
Explanation
In order for DHCP to allocate an address from a particular scope, the scope must be activated. This means that the scope is enabled and ready to assign IP addresses to devices on the network. Without activation, DHCP will not be able to assign addresses from that specific scope.
2.
The Command Line Syntax to install DHCP on Windows Server 2008 Server Core is ___________________.
Correct Answer
A. Start /w ocsetup DHCPServerCore
Explanation
The correct command line syntax to install DHCP on Windows Server 2008 Server Core is "Start /w ocsetup DHCPServerCore".
3.
The expected response from a DHCPDISCOVER message is:
Correct Answer
C. DHCPOFFER
Explanation
The correct answer is DHCPOFFER. When a DHCPDISCOVER message is sent by a client to request an IP address, the expected response from the DHCP server is a DHCPOFFER message. This message is sent by the server to offer an available IP address to the client. The client can then choose to accept the offered IP address by sending a DHCPREQUEST message to the server.
4.
This service will allocate an IP address to a dynamically configured host in the event that DHCP fails to initialize the host.
Correct Answer
D. APIPA
Explanation
APIPA stands for Automatic Private IP Addressing. It is a feature in Windows operating systems that allows a computer to automatically assign itself an IP address when it cannot obtain one from a DHCP server. In the given scenario, if DHCP fails to initialize the host, the service will use APIPA to allocate an IP address to the dynamically configured host. This ensures that the host can still communicate on the network even without a DHCP server.
5.
DHCP relies heavily on _________________protocol.
Correct Answer
A. BOOTP
Explanation
DHCP relies heavily on the BOOTP (Bootstrap Protocol) protocol. BOOTP was the predecessor of DHCP and was used to assign IP addresses to devices on a network. DHCP was developed to enhance BOOTP by adding more features and flexibility. DHCP uses BOOTP as its foundation and extends it to provide dynamic IP address allocation, automatic configuration of network parameters, and centralized management of IP addresses. Therefore, BOOTP is an essential protocol for DHCP to function effectively.
6.
This is generated at logon and identifies a user and all group memberships associated with that user.
Correct Answer
C. Access Token
Explanation
An access token is generated at logon and it serves as an identification for a user and all the group memberships associated with that user. It is used to authenticate and authorize the user's access to various resources and services within a system.
7.
This is the process of confirming a user's identity using a known value,such as a password or fingerprint.
Correct Answer
B. Authentication
Explanation
Authentication is the process of confirming a user's identity using a known value, such as a password or fingerprint. It ensures that the user is who they claim to be before granting them access to a system or resource. This verification step helps to enhance security and prevent unauthorized access.
8.
This special identity group controls anonymous access to objects in a Windoes Server 2008 domain.
Correct Answer
D. Anonymous Logon
Explanation
The correct answer is "Anonymous Logon." This special identity group controls anonymous access to objects in a Windows Server 2008 domain. This means that users who are not authenticated or do not have a user account can still access certain objects or resources in the domain anonymously. The Anonymous Logon group allows for limited access without requiring users to provide credentials or login information.
9.
This type of group can be used to grant permissions to objects located in any domain in a forest.
Correct Answer
A. Group Scope
Explanation
Group Scope refers to the extent to which a group's permissions can be granted. In this case, the given answer suggests that a group with a wide scope can be used to grant permissions to objects located in any domain within a forest. This means that the group's permissions are not limited to a specific domain and can be applied across multiple domains within the same forest.
10.
DHCP utulizes this to reserve IP addresses for a certain host:
Correct Answer
D. Media Access Control (MAC) Address
Explanation
DHCP (Dynamic Host Configuration Protocol) is a network protocol that assigns IP addresses to devices on a network. It uses the Media Access Control (MAC) address to reserve and assign a specific IP address to a certain host. The MAC address is a unique identifier assigned to each network interface card (NIC) of a device. By using the MAC address, DHCP ensures that the same IP address is consistently assigned to the same device, allowing for efficient network management and communication.
11.
This rule is used to split DHCP scopes to allow fault tolerance.
Correct Answer
A. 80/20 Rule
Explanation
The 80/20 rule is used to split DHCP scopes to allow fault tolerance. This rule states that 80% of the available IP addresses are allocated to the primary DHCP server, while the remaining 20% are allocated to the secondary DHCP server. This ensures that even if one server fails, the other server can still provide IP addresses to clients. By splitting the scopes in this way, the network can maintain high availability and ensure uninterrupted connectivity for devices.
12.
Before a fully configured DHCP server can begin operation it must be________________________.
Correct Answer
B. Authorized
Explanation
Before a fully configured DHCP server can begin operation, it must be authorized. This means that the server needs to be granted permission by a higher authority, such as a domain controller, to provide IP addresses and other network configuration information to clients. This authorization process ensures that only trusted DHCP servers are allowed to operate on the network, preventing unauthorized servers from causing conflicts or security risks.
13.
This feature allows a host to be configured through DHCP while still retaining the same IP address:
Correct Answer
C. DHCPReservation
Explanation
DHCP Reservation is the correct answer because it allows a host to be configured through DHCP while still retaining the same IP address. With DHCP Reservation, the DHCP server assigns a specific IP address to a particular host based on its MAC address. This ensures that the host always receives the same IP address whenever it requests an address from the DHCP server, even if the DHCP lease expires or the host restarts.
14.
This service alloes DHCP communications to cross network boundaries.
Correct Answer
B. DHCP Relay Agent
Explanation
A DHCP Relay Agent allows DHCP communications to cross network boundaries. It acts as an intermediary between DHCP clients and DHCP servers, forwarding DHCP messages between them. This is useful in scenarios where DHCP clients and servers are located on different networks, allowing clients to obtain IP addresses and other configuration information from DHCP servers that are not directly reachable.
15.
This is a collection of accounts to simplify administration of network permissions.
Correct Answer
D. Groups
Explanation
Groups are a collection of accounts that simplify the administration of network permissions. By organizing users into groups, network administrators can assign permissions and access rights to multiple users at once, rather than individually managing each user account. This not only streamlines the administration process but also enhances security by ensuring consistent permissions across multiple accounts. Therefore, groups are an essential component in simplifying the management of network permissions.
16.
Using this tool you can deploy hundreds of configuration settings to large collection of users at once.
Correct Answer
B. Group Policy Objects
Explanation
Group Policy Objects (GPOs) allow administrators to manage and control the configuration settings of multiple users and computers in a Windows domain. By applying GPOs, administrators can deploy and enforce various settings such as security policies, software installations, and network configurations to a large collection of users simultaneously. GPOs provide a centralized and efficient way to manage and maintain consistent settings across an organization's network. Therefore, the given correct answer is Group Policy Objects.
17.
A site topology consists of these three Active Directory objects:
Correct Answer
C. Site, Subnet, Site link
Explanation
A site topology in Active Directory consists of three objects: Site, Subnet, and Site link.
- A site represents a physical location, such as an office or a branch, where network resources are located.
- A subnet is a logical division of an IP network, which helps in organizing and managing network traffic.
- A site link is a connection between two or more sites, which defines the path for replication traffic between them.
These objects help in organizing and managing the Active Directory infrastructure, ensuring efficient communication and replication between different sites and subnets.
18.
This consists of one or more domain tress which have the same two-way trust relationship as two domains in the same tree:
Correct Answer
D. Forest
Explanation
A forest in Active Directory is a collection of one or more domain trees that share a common schema, global catalog, and trust relationship. Each domain tree within a forest represents a separate namespace, and all domains within the forest are connected by two-way transitive trusts. This allows users and resources to be easily accessed and shared across multiple domains within the forest. Therefore, the correct answer is "Forest".
19.
This is a Windows Server 2008 domain controller that supports only incoming replication, and is not capable of processing creating, modifying, or deleting Active Directory objects.
Correct Answer
B. Read-only Domain Controller
Explanation
A read-only domain controller (RODC) is a type of domain controller in Windows Server 2008 that supports only incoming replication. It is designed for use in remote or branch office locations where physical security cannot be guaranteed. An RODC does not allow creating, modifying, or deleting Active Directory objects, making it a suitable choice for environments where there is a need for read-only access to Active Directory but limited administrative control.
20.
This type of group can be used to grant permissions to objects located in any domain in a forest.
Correct Answer
C. Global Groups
Explanation
Global Groups can be used to grant permissions to objects located in any domain in a forest. Unlike Domain Local Groups, which can only grant permissions within a specific domain, Global Groups have a scope that extends across the entire forest. This means that they can be used to manage access to resources in multiple domains, making them a useful tool for granting permissions in complex, multi-domain environments.
21.
This feature contains a list of all objects in a forest along with a subset of each object's attributes.
Correct Answer
A. Global Catalog
Explanation
The Global Catalog is a feature that contains a list of all objects in a forest along with a subset of each object's attributes. It serves as a distributed data repository in Active Directory, allowing users to search for objects and their attributes across multiple domains. The Global Catalog helps improve the efficiency of searches by providing a partial view of object attributes, reducing the need for referrals to different domains.
22.
A Class A Address has __________________________
Correct Answer
A. 16,772,214
Explanation
A Class A Address has a range of 16,772,214 possible unique IP addresses. Class A addresses are identified by having the first octet (the first 8 bits) reserved for network identification, while the remaining 24 bits are used for host identification. This allows for a large number of unique addresses, making Class A addresses suitable for large networks with a large number of hosts.
23.
This type of hard disk allows you access the advanced disk configuration features.
Correct Answer
D. Dynamic Disk
Explanation
A dynamic disk allows you to access advanced disk configuration features that are not available with basic disks. These advanced features include creating and managing multiple volumes, such as spanned volumes that combine free space from multiple disks, striped volumes that provide increased performance by spreading data across multiple disks, and mirrored volumes that provide data redundancy by creating an identical copy of data on another disk. Dynamic disks also support fault tolerance options, such as RAID, which can help protect your data in case of disk failure.
24.
________________________addressing feature provide IP address without accessing a server or having a manual configuration.
Correct Answer
C. APIPA
Explanation
APIPA stands for Automatic Private IP Addressing. It is a feature that allows a device to automatically assign itself an IP address without accessing a server or requiring manual configuration. This feature is useful when a device is unable to obtain an IP address from a DHCP server. With APIPA, the device can assign itself a unique IP address within a specific range, enabling it to communicate on the local network. This eliminates the need for manual configuration and ensures that devices can still connect to the network even without a DHCP server.
25.
Active Directory uses which type of replication to update domain controllers?
Correct Answer
B. Multiple-Master Replication
Explanation
Active Directory uses Multiple-Master Replication to update domain controllers. This type of replication allows multiple domain controllers to make changes to the directory database simultaneously. Each domain controller can act as both a publisher and a subscriber, meaning it can both send and receive updates. This ensures that changes made on one domain controller are replicated to all other domain controllers in the network, maintaining consistency and ensuring that all domain controllers have the most up-to-date information.