You are on page 1of 12

Question 1

Your company has deployed Network Access Protection (NAP). You configure secure wireless
access to the network by using 802.1X authentication from any access point. You need to ensure
that all client computers that access the network are evaluated by NAP.

What should you do?
Select one:
a. Configure all access points as RADIUS clients to the Remediation Servers.
b. Configure all access points as RADIUS clients to the Network Policy Server (NPS).
c. Create a Network Policy that defines Remote Access Server as a network connection method.
d. Create a Network Policy that specifies EAP-TLS as the only available authentication method.
Question 2
You are a network administrator for your company. The network consists of a single Active
Directory domain. All servers run Windows Server 2008. Windows Server Update Services
(WSUS) is installed on two servers, SERVERA and SERVERB. SERVERA receives software
updates from Microsoft Windows Update servers. You manually synchronized SERVERB with
the Windows Update servers and now need to complete the WSUS configuration on SERVERB.
Which of the following is not a step you might take to complete the configuration of WSUS on
SERVERB?
Select one:
a. Approve the current updates.
b. Set SERVERB to receive updates from SERVERA and automatically synchronize with
approved updates on SERVERA.
c. Set SERVERB to automatically draw updates from whichever sources SERVERA is set to
draw from.
d. Set SERVERB to automatically receive daily updates at a given time.
Question 3
Question text
Which one of the following uses the UDP - the connectionless protocol?
Select one:
a. TCP
b. FTP
c. DNS
d. None of the above
Question 4
Question text
The OSI layer is responsible for using electric (or sometimes other types of) signaling to get bits
from one computer to another. This layers components dont care what the bits mean; their job is
to get the bits from point A to point B, using whatever kind of optical, electrical, or wire- less
connection that connects the points. What layer in the OSI model are we referring to?
Select one:
a. Application layer
b. Physical layer
c. Network layer
d. Data-Link layer
Question 5
Question text
To improve productivity for employees during meetings, your organization has decided to
provide authentication and encrypted wireless network access throughout your facilities. The
organization is not willing to sacrifice security, however, and requires the most secure
authentication mechanisms available. You have recently upgraded all client computers to either
Windows XP (with the latest service pack) or Windows Vista. Which wireless security standard
should you use?
Select one:
a. 128-bit WEP
b. WPA-PSK
c. 64-bit WEP
d. WPA-EAP

Question 6
Question text
A computer running Windows Server 2008 has been experiencing intermittent performance
problems. You think the problems might be caused by an application that was installed last week.
Which tool would you use to determine exactly when the application was installed?
Select one:
a. Performance Monitor
b. Reliability Monitor
c. Network Monitor
d. All of Above are Correct
Question 7
Question text
A user in your organization complains that she cannot connect to any network resources. You run
the Ipconfig command on her computer and find that the address assigned to the Local Area
Connection is 169.254.232.21. Which of the following commands should you type first?
Select one:
a. Ipconfig /renew
b. ping 169.254.232.21
c. tracert 169.254.232.21
d. Arp -a
Question 8
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is
configured as a DNS server.

You need to ensure that Server1 only resolves queries issued from client computers in the same
subnet as Server1.

The solution must ensure that Server1 can resolve Internet host names.

What should you do on Server1?
Select one:
a. Configure Windows Firewall.
b. Create a conditional forwarder.
c. Modify the routing table.
d. Create a trust anchor.
Question 9
You configure a computer running Windows Server 2008 with two network interfaces. Each of
the interfaces is connected to different subnets. One of those subnets has four other routers
connected to it, and each router provides access to different subnets. You would like the computer
running Windows Server 2008 to automatically identify the routers and determine which remote
subnets are available using each router. What should you do?
Select one:
a. Enable NAT on the interface.
b. Enable DHCP on the server
c. Enable a routing protocol on the interface.
d. Add a static route to the interface.
Question 10
Which routing protocols are not available in Windows Server 2008? (Choose all that apply.)
Select one:
a. RIPv1
b. RIPv2
c. OSPF & EIGRP
d. Both a & b
Question 11
You are the systems engineer responsible for XYZ Ltd.s new division. You need to deploy five
new Windows Server 2008 systems. What do you need to do in order to make sure you
understand the normal load put on the systems under normal operations?
Select one:
a. Set up Task Manager.
b. Establish a baseline of current performance
c. Deploy the alerts in the Performance Console
d. Use Network Monitor to see current and future load
Question 12
Which of the following are enhancements/changes to Internet Protocol in version 6?
Select one:
a. Larger IP address space of 128 bits
b. Expanded TCP and UDP port values 32 bits wide
c. Broadcast messages are enhanced to provide better ICMP
d. None of the above
Question 13
You are the administrator for a small company. You have noticed lately that users are accidentally
deleting files from shared folders. You want to implement a way to have your users recover the
deleted files. What can you implement?
Select one:
a. Backups
b. Shadow copies
c. Recovery console
d. File restoration utility

Question 14
You ask one of your technicians to get the IPv6 address of new Windows Server 2008 machine,
and she hands you a note with FE80::0203:FFFF:FE11:2CD on it. What can you tell from this
address?
Select one:
a. This is a globally unique IPv6 address.
b. This is a link-local IPv6address.
c. This is a multicast IPv6address.
d. None of the above
Question 15
Given the IPv6 address 2001:0DB8:0000:0000:0000:BEE0:0000:1234, what would be the
appropriate condensed IPv6 address displayed if entered as an interface address on Windows
Server 2008?
Select one:
a. 2001:DB8::BEE0:0:1234
b. 2001:0DB8::BEE:0:1234
c. 2001:DB8::BEE:0:1234
d. 2001:DB8::BEE0::1234

Question 16
A systems administrator suspects that a domain controller is not operating properly. Another
systems administrator has been monitoring the performance of the server and has found that this
is not a likely cause of the problems. Where can the first systems administrator look for more
information regarding details about any specific problems or errors that may be occurring?
Select one:
a. Task Manager
b. Network Monitor
c. Performance Monitor
d. Event Viewer
Question 17
You have a server that runs Windows Server 2008. You need to configure the server as a VPN
server. What should you installed on the server?
Select one:
a. Windows Deployment Serivces role and Deployment Server role service
b. Windows Deployment Services role and Deployment Transport Role Service
c. Network Policy and Access Services role and Routing and Remote Access Services role
service.
d. Network Policy and Access Services role and Routing and Host Credential Authorization
Protocol role service.
Question 18
You are building an ISP around the technology available with Windows Server 2008. You are
marketing personalized services that will ultimately allow you to provide voice, data, and video
services to your customers by integrating Active Directory with the infrastructure of the network.
For example, you plan to sell bandwidth on demand based on the customers account in Active
Directory. Your long-range plans notwithstanding, you start providing basic services to your
customers by offering both dynamic and static IP addressing. Some ISPs offer static IP addresses
based on a particular machine, but you want to provide a particular address based on the
individual user. How can you provide this level of service for the users?
Select one:
a. Create an IP address reservation for the users in the Windows Server 2008 DHCP server.
b. Assign a unique IP address to the users accounts in Active Directory.
c. Create a network access policy that provides an assigned static IP address to the appropriate
users.
d. You cant provide a static IP address per user using Windows Server 2008 services.
Question 19
Your network contains an Active Directory domain. The domain contains several VPN servers
that run Windows Server 2008 R2.

You need to log the time and the date users establish VPN connections to the network. The log
must be stored in a central location.

What should you configure on the VPN servers?
Select one:
a. The Windows Accounting accounting provider
b. Connection request policies
c. health policies
d. The RADIUS Accounting accounting provider
Question 20
You administer a network consisting of 100 client computers and 2 Windows Server 2008
computers. You must configure a VPN solution for your company using L2TP/IPSec. Unfor-
tunately, you dont have a certificate server in-house, and the management would prefer to not
pay for a third-party service. What should you do to ensure that VPN communication is secure?
Choose the best answers.
Select one:
a. Implement a solution with preshared keys.
b. Use CHAP.
c. Use PPTP.
d. All of the above

Question 21
Your network contains a server named Server1 that runs Windows Server 2008 R2 Service Pack
1 (SP1). Server1 has a static IP address.

You need to configure Server1 to receive an IP address from a DHCP server.

Which Netsh context should you use?
Select one:
a. dhcpclient
b. Ian
c. interface
d. ip
Question 22
You are currently evaluating which of the computers in your environment will be able to
download updates from WSUS. Which of the following operating systems can act as WSUS
clients (even if they require a service pack)?
Select one:
a. Windows 95
b. Windows 98
c. Windows XP Professional
d. RedHat Linux
Question 23
This OSI layer translates data between the formats the network requires and the formats the com-
puter expects. This OSI layer also performs protocol conversion; data translation, compression,
and encryption; character set conversion; and the interpretation of graphics commands. What OSI
layer are we referring to?
Select one:
a. Application layer
b. Data-Link layer
c. Network layer
d. Presentation layer
Question 24
The TCP/IP model (sometimes called the IP model or the DoD model) is truly what the Internet
was built upon. The TCP/IP model has four layers. What are the four layers, in order from top to
bottom?
Select one:
a. Internet, Application, Transport, and Link
b. Transport, Internet, Link, and Application
c. Application, Transport, Internet, and Link
d. Application, Link, Internet, and Transport
Question 25
Your company has a main office and a branch office.

The network contains two DNS servers named DNS1 and DNS2.

DNS1 is located in the main office. DNS1 hosts a primary standard zone named contoso.com.
The contoso.com zone is configured to use DNSSEC.

DNS2 is located in the branch office. DNS2 is a caching-only DNS server.

You need to ensure that client computers in the branch office can receive authoritative responses
to queries for contoso.com if a WAN link fails. DNSSEC security must be maintained.

What should you configure on DNS2 for contoso.com?
Select one:
a. a conditional forwarder
b. a secondary zone
c. a zone delegation
d. an Active Directory-integrated stub zone

Question 26
Which of the following subnet masks are represented with the CIDR of /27?
Select one:
a. 255.255.255.254
b. 255.255.255.248
c. 255.255.255.224
d. 255.255.255.240
Question 27
A packet is sent from one computer to another across a network. Various protocols move the
packet down the OSI stack from the sending computer and up the OSI stack to the receiving
computer. How do the protocols know where to send the packet?
Select one:
a. Each packet has a trailer that contains source and destination addresses.
b. Each packet has a header that contains an alert signal and source and destination addresses.
c. The data portion of every packet stores all the source and destination information.
d. Special packets, called header packets.
Question 28
When troubleshooting a DHCP problem, you notice an event ID in the 50s within the DHCP log.
What does an event ID greater than 50 indicate?
Select one:
a. A problem related to leases, such as the 051 Lease option
b. An issue with a client not receiving an address in time
c. A problem with the client being unable to renew its address
d. A problem with a rogue server
Question 29
You are the network administrator for a Windows Server 2008 network. You have multiple
remote locations connected to your main office by slow satellite links. You want to install DNS
onto these offices so that clients can locate authoritative DNS servers in the main location. What
type of DNS servers should be installed in the remote locations?
Select one:
a. Primary DNS zones
b. Secondary DNS zones
c. Active Directoryintegrated zones
d. Stub zones
Question 30
This type of DNS query results in the server returning its best answer from the cache or local
data.
Select one:
a. Recursive
b. Iterative
c. Forward
d. NS

Question 31
You are the network administrator for a midsize distributor. Your companys net- work has four
Windows 2008 servers, and all clients are running either XP or Vista. Most of your end users use
laptops to do their work, and many of them work away from the office. What should you
configure to help them work on documents when away from the office?
Select one:
a. Online file access
b. Offline file access
c. Share permissions
d. NTFS permissions
Question 32
What will be the subnet mask for the subnet /28?
Select one:
a. 255.255.255.248
b. 255.255.240.0
c. 255.240.0.0
d. 255.255.255.240
Question 33
When creating a new scope, what is the default lease time for that scope, and approximately how
long would it be until a client begins attempting to renew the address?
Select one:
a. Three days is the lease time, and the client will attempt to renew at the end of the three days.
b. Three days is the lease time, and the client will attempt to renew after approximately one and a
half days.
c. Five days is the lease time and, the client will attempt to renew after approximately three days.
d. Eight days is the lease time, and the client will attempt to renew after approximately four days.
Question 34
You are a systems administrator configuring an update infrastructure for your organization. You
need to use Group Policy settings to configure client computers to download updates and install
them automatically without prompting the user. Which Group Policy setting should you enable
and configure?
Select one:
a. Allow Automatic Updates Immediate Installation
b. Configure Automatic Updates
c. No Auto-Restart For Scheduled Automatic Updates
d. Enable Client-Side Targeting
Question 35
You assign two DNS server addresses as part of the options for a scope. Later you find a client
workstation that isnt using those addresses. Whats the most likely cause?
Select one:
a. The client didnt get the option information as part of its lease.
b. The client has been manually configured with a different set of DNS servers.
c. The client has a reserved IP address in the address pool.
d. Theres a bug in the DHCP server service.

You might also like