Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Network Infrastructure and Directory Services

Provides valuable information and resources on building and network infrastructure, as well as implementing directory services for effective system management.

directory services

domain name system (dns)

dynamic host configuration protocol (dhcp)

transmission control protocol/internet protocol (tcp/ip)

virtual private network (vpn)

routing

switching

lan

wan

ethernet

ip address

dns server

active directory

ldap

lightweight directory access protocol

group policy objects (gpos)

network topology

Network Discovery Controls the ability to see other computers and devices

  • True
  • False

Intended as a designation for a network in which computers are connected to the corporate domain to which they are joined.

  • [No Answer]

Which on is the fourth step In windows server 2012 routing/nat configuration?

  • from Server Manager click Manage > Add Roles and Features
  • On the Before You Begin page, click Next.
  • On Server Selection select the server you want to install the feature on and click Next
  • __Select Role-based or feature-based installation and click Next

Intended as a designation for a guest network in a public place, such as a coffee shop or airport, rather than for an internal network.

  • public network

Token Requests/sec Monitors the number of incoming federation metadata requests sent to the federation server

  • True
  • False

This data integrity algorithm is stronger than MD5 but uses more resources.

  • Secure Hash Algorithm 1 (SHA-1)
  • Advanced Encryption Standard-Galois Message AuthenticationCode 128 bit (AES-GMAC 128)
  • SHA 256-bit (SHA-256)
  • AES-GMAC 192

Which on is the second step In windows server 2012 routing/nat configuration?

  • On the Before You Begin page, click Next.
  • On Server Selection select the server you want to install the feature on and click Next
  • _Select Role-based or feature-based installation and click Next
  • from Server Manager click Manage > Add Roles and Features

In which of the given steps is the second step in configuring a DNS forwarding?

  • In DNS manager, right-click and scroll down the menu. Click Properties
  • Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS .
  • Enter the IP address of your secondary DNS server you want to forward DNS queries. Click OK
  • Click Forwarders tab and then click Edit

In computer certificate, default signing algorithm for this authentication method is AES, but Elliptic Curve Digital Signature Algorithm (ECDSA)–P256 and ECDSA-P384 are also supported signing algorithms.

  • True
  • False

Use this option to configure the default IPsec settings that the local computer will use when attempting to establish secure connections with other IPsec-enabled computers

  • IPsec Defaults
  • IPsec Exemptions
  • IPsec Tunnel Authorization

Network-based firewall are network devices built into the IT infrastructure and they stand between public and internal networks. Anetwork-based firewall can be a hardware device or a virtual solution.

  • True
  • False

A proxy firewall is also referred to as a gateway firewall, or an application firewall. It stands between the internet and the devices in the private network

  • True
  • False

This algorithm is faster and stronger than DES. It is supported on Windows Vista and later.

  • Advanced Encryption Standard-Cipher Block Chaining 64-bit(AES-CBC 64)
  • Advanced Encryption Standard-Cipher Block Chaining 128-bit(AES-CBC 128)
  • Advanced Encryption Standard-Cipher Block Chaining 32-bit(AES-CBC 32)

Which one is the fourth step when creating Firewall Inbound Rules?

  • The following step will allow you to specify the protocol and port for the traffic that this firewall rule will filter. Click Next after you select a protocol type and configure the settings.
  • Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose the type of rule you want to create. You can choose one out of four types
  • On the home screen, select the Inbound Rules The console will show all inbound rules in the middle section and available actions in the right pane. You can filter the list by using the available choices.
  • Choose if the rule will apply to connections for All programs or a specific program on the local machine and click Next. You can click Customize… to select additional settings for the processes of the program you selected.

This edition of windows server 2012 is suited for small businesses, but with up to 25 users, it is also available on retail stores making it accessible to small businesses,

  • Windows Server 2012 Datacenter Edition
  • Windows Server 2012 Foundation Edition
  • Windows Server 2012 Standard Edition
  • Windows Server 2012 Essentials Edition

_________________ enable you to create customized views of events across any event log stored on a server, including events in the forwarded event log.

  • Event log views
  • System log views
  • Event views

The default signing algorithm for this authentication method is RSA, but Elliptic Curve Digital Signature Algorithm (ECDSA)–P256 and ECDSA-P384 are also supported signing algorithms.

  • Computer health certificate
  • Computer certificate
  • Pre-shared key
  • Computer (NTLMv2)

This type of firewall runs on individual systems, physical or virtual. It is a piece of software installed on an operating system which stands between the host and other network devices.

  • Host-based firewall
  • Local-based firewall
  • Network-based firewall
  • Packet-based firewall

Packet Stack is the lowest layer in the network stack, and contains the network driver that communicates directly with the network adapter.

  • True
  • False

IPsec Encapsulation Model where the payload is encapsulated with an IPsec header

  • Tunnel mode
  • Transport mode
  • Key Mode
  • Handshake Mode

Provides a central console for browsing computers and devices on the network

  • Network Discovery
  • Windows Network Diagnostics
  • Network Explorer
  • Network andSharing Center

This data integrity algorithm is not recommended and is provided for backward compatibility only.

  • Secure Hash Algorithm 1 (SHA-1)
  • SHA 256-bit (SHA-256)
  • Message-Digest algorithm 5 (MD5)
  • SHA-384

If you want to use the command line to configure your DNS, use the __ command.

  • dnscmd

Federation Metadata Requests Monitors the number of incoming federation metadata requests sent to the federation server.

  • True
  • False

Windows Server 2012 provides task-oriented Windows PowerShell cmdlets for DHCP server management. The DHCP server configuration operations are implemented in Windows Server 2012 as Common Information Model (CIM) based cmdlets.

  • True
  • False

____________ is the successor to Network Monitor. You can use this to perform network traffic capture and analysis. Message Analyzer also functions as a replacement for LogParser

  • Message Analyzer
  • Network Analyzer
  • Resource Monitor
  • CPU Monitor

This view of resource monitor provides information on connections on the basis of local address, port, and remote address and port.

  • Network Activity
  • TCP Connections
  • Listening Ports
  • Processes With Network Activity

Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows stateful address autoconfiguration with a DHCPv6 server.

  • IPv6 over Point-to-PointProtocol (PPPv6)
  • DHCPv6-Capable DHCP client
  • Link-Local Multicast Name Resolution (LLMNR)
  • IP Security

This phase of IPsec negotiation is performed first and isused to generate a shared master key that the computers can use tosecurely exchange keying information.

  • main mode

Extends the Dynamic Host Configuration Protocol (DHCP) client to support IPv6 and allows stateful address autoconfiguration with a DHCPv6 server.Prevents address scanning of IPv6 addresses based on the known company IDs of network-adapter manufacturers. By default, Windows Vista and later generate random interface IDs for nontemporary autoconfigured IPv6 addresses, including public and link-local addresses.

  • Random Interface IDs
  • IPv6 over Point-to-PointProtocol (PPPv6)
  • DHCPv6-Capable DHCP client
  • Link-Local Multicast Name Resolution (LLMNR)

Intended as a designation for a network in which computers are configured as members of a homegroup or workgroup and are not connected directly to the public Internet.

  • [No Answer]

DHCP failover is a feature that provides the ability to have two DHCP servers serve IP addresses and option configuration to the same subnet or scope, providing for continuous availability of DHCP service to clients.

  • True
  • False

With DHCP failover, two DHCP servers share DHCP scope and lease information, enabling one server to provide DHCP leases to DHCP clients if the other server is unavailable.

  • True
  • False

_____________________________ typically contain applications that require very fast inter-process communication (IPC) and inter-computer communications, a high degree of predictability regarding latency and transaction response times, and the ability to handle very high message rates.

  • Low-latency workloads technologies
  • Network Load Balancing (NLB)
  • IP Address Management (IPAM)
  • Hyper-V virtual switch

Use IPsec Exemptions option to configure how IPsec handles Internet Control Message Protocol (ICMP) traffic. By default, ICMP traffic is not exempted from using IPsec, but you can change this by selecting Yes from the list control.

  • True
  • False

_________________ exposes interfaces for the driver below it and for the layers above it,such as the Protocol Stack.

  • Protocol Stack
  • Network interface
  • Network Driver Interface Specification (NDIS)
  • System Drivers

In __ dhcp failover, two servers operate in a failover relationship where an active server is responsible for leasing IP addresses and configuration information to all clients in a scope or

  • Hot standby mode
  • subnet.

Proxy firewalls perform deep packet inspection rather than merely packet header inspection. Here, the firewall creates a separate connection for every incoming and outgoing packet

  • True
  • False

_______________ Provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS).

  • IP Address Management (IPAM)
  • Network Load Balancing (NLB)
  • Hyper-V virtual switch
  • Low-latency workloads technologies

Encapsulating Security Protocol (ESP) mechanism provides data-origin authentication, data integrity, anti-replay protection, and the option of confidentiality for the IP payload only

  • True
  • False

This option places a DHCP server in a cluster with another DHCP server that assumes the load if the primary DHCP server fails.

  • DHCP in a Windows failover cluster

__ provides redundancy and load balancing for DHCP services, enabling administrators to deploy a highly resilient DHCP service.

  • dhcp failover

In transport mode, The payload is encapsulated with an IPsec header

  • True
  • False

These are network devices built into the IT infrastructure and they stand between public and internal networks.

  • Local-based firewall
  • Host-based firewall
  • Network-based firewall
  • Packet-based firewall

Set-NetAdapterRss command sets the RSS properties onthe network adapter that you specify.

  • True
  • False

Which one is the third step when creating Firewall Inbound Rules?

  • Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose the type of rule you want to create. You can choose one out of four types.
  • The following step will allow you to specify the protocol and port for the traffic that this firewall rule will filter. Click Next after you select a protocol type and configure the settings.
  • On the home screen, select the Inbound Rules The console will show all inbound rules in the middle section and available actions in the right pane. You can filter the list by using the available choices.
  • Choose if the rule will apply to connections for All programs or a specific program on the local machine and click Next. You can click Customize… to select additional settings for the processes of the program you selected.

Provides faster throughput by altering the way that a sender can increase the sending rate if multiple segments in a window of data are lost and the sender receives an acknowledgment stating that only part of the data has been received

  • Neighbor Unreachability Detection for IPv4
  • Modified Fast Recovery Algorithm
  • Network Diagnostics Framework
  • Extended Selective Acknowledgments

AES-GCM 191 This algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to AESGMAC 128 for integrity.

  • True
  • False

A __ is a DNS function that takes an IP address andresolves it to a domain name.

  • reverse lookup zone

Network Discovery Reports changes in network connectivity and configuration

  • True
  • False

This policy determines the maximum event forwarding rate in events per second. If this policy is not configured, events will be transmitted as soon as they are recorded.

  • Configure Target Server Manager
  • Configure Target Subscription Manager
  • Configure Forwarder Resource Usage
  • Configure Target Network Manager

Advanced Encryption Standard-Cipher Block Chaining 128-bit(AES-CBC 128) algorithm is faster and stronger than DES. It is supported on Windows Vista and later.

  • True
  • False

Enable-NetworkAdapterRss command enables RSS on the network adapter that you specify.

  • True
  • False

AES-GCM 256 algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to AES-GMAC 256 for integrity.

  • True
  • False

Pre-shared key authentication method is not recommended except for test environments.

  • [No Answer]

AES-GMAC 128 algorithm can be used for quick mode only andis supported on Windows Vista SP1 and later. It is equivalent to AES-GCM 256 for integrity.

  • True
  • False

Computer (NTLMv2) authentication method can be used on networks that include systems running an earlier version of the Windows operating system and on standalone systems.

  • True
  • False

Random Interface IDs maps the internal (private) address and port number to different external (public) addresses and ports, depending on the external destination address.

  • True
  • False

This view of resource monitor lists the ports and addresses that services and applications are listening on. Also provides information about the firewall status for these roles and services.

  • TCP Connections
  • Network Activity
  • Listening Ports
  • Processes With Network Activity

Elliptic Curve Diffie-Hellman P-500 algorithm has the strongest security but also the highest resource usage. It iscompatible only with Windows Vista and later.

  • True
  • False

This edition of windows server 2012 the flagship product under the brand name of windows server 2012,

  • Windows Server 2012 Foundation Edition
  • Windows Server 2012 Essentials Edition
  • Windows Server 2012 Datacenter Edition

This command disables RSS on thenetwork adapter that you specify.

  • Disable-NetworkAdapterRss
  • Disable-NICAdapterRss
  • Disable-NetAdapterRss

______________ is used in TCP/IP networks for naming computers and network services

  • BranchCache
  • Data Center Bridging (DCB)
  • Hyper-V network virtualization
  • Dynamic Host Configuration Protocol (DHCP)
  • ______________ Provides policy-based, software-controlled network virtualization that reduces the management overhead that is faced by enterprises when they expandde dicated IaaS clouds

Which one is the first step when creating Firewall Inbound Rules?

  • Choose if the rule will apply to connections for All programs or a specific program on the local machine and click Next. You can click Customize… to select additional settings for the processes of the program you selected
  • The following step will allow you to specify the protocol and port for the traffic that this firewall rule will filter. Click Next after you select a protocol type and configure the settings.
  • On the home screen, select the Inbound Rules The console will show all inbound rules in the middle section and available actions in the right pane. You can filter the list by using the available choices.
  • Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose the type of rule you want to create. You can choose one out of four types.

This edition of windows server 2012 supports up to 2 virtual machines, it also supports an unlimited amount of users as long as the required user licenses have been purchased

  • Windows Server 2012 Foundation Edition
  • Windows Server 2012 Standard Edition
  • Windows Server 2012 Datacenter Edition
  • Windows Server 2012 Essentials Edition

distributes incoming network I/O packets among logical processors so that packets which belong to the same TCP connection are processed on the same logical processor, which preserves ordering

  • Receive Side Scaling (RSS)

Which on is the first step In windows server 2012 routing/nat configuration?

  • On Server Selection select the server you want to install the feature on and click Next.
  • From Server Manager click Manage > Add Roles and Features.
  • On the Before You Begin page, click Next.
  • _Select Role-based or feature-based installation and click Next.

In which of the given steps is the first step in configuring a DNS forwarding?

  • In DNS manager, right-click and scroll down the menu. Click Properties
  • Click Forwarders tab and then click Edit
  • Enter the IP address of your secondary DNS server you want to forward DNS queries. Click OK
  • Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS .

Provides a central console for viewing and managing a computer’s networking and sharing configuration

  • Network andSharing Center
  • Network Explorer
  • Windows Network Diagnostics
  • Network Discovery

Automatic software updates deployment is configured by using automatic deployment rules. This method is used for deploying monthly software updates and for managing definition updates.

  • True
  • False

Use this option to configure how IPsec handles Internet Control Message Protocol (ICMP) traffic. By default, ICMPtraffic is not exempted from using IPsec, but you can change this by selecting Yes from the list control.

  • IPsec Tunnel Authorization
  • IPsec Exemptions
  • IPsec Defaults

System Drivers are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK) interface to expose interfaces to user-mode applications. The WSK interface was introduced in Windows Server® 2008 and Windows Vista, and it is exposed by AFD.sys. The interface improves performance by eliminating the switching between user mode and kernel mode

  • True
  • False

A push partner is a WINS server from which changes are “pulled.”

  • True
  • False

These are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK) interface to expose interfaces to user-mode applications.

  • System drivers

Network and Sharing Center provides a central console for viewing and managing a computer’s networking and sharing configuration

  • True
  • False

_____________ is a wide area network (WAN) bandwidth optimization technology that is included in some editions of the Windows Server2012 and Windows 8 operating systems. To optimize WAN bandwidth when users access content on remote servers

  • Data Center Bridging (DCB)
  • Domain Name System (DNS)
  • BranchCache
  • Dynamic Host Configuration Protocol (DHCP)

This method of firewall filtering inspects every packet and keeps the information for the current connection. This includes TCP protocol information, source and destination IP addresses, and port numbers.

  • Packet Filtering
  • Proxy Server
  • IP Filtering
  • Stateful Inspection

With __, the DHCP the server evaluates DHCP requests against policies that you define.

  • Policy-based assignment

Which one is the second step when creating Firewall Inbound Rules?

  • Click on New Rule… to start the New Inbound Rule Wizard.The wizard will let you choose the type of rule you want to create. You can choose one out of four types.
  • On the home screen, select the Inbound Rules The console will show all inbound rules in the middle section and available actions in the right pane. You can filter the list by using the available choices.
  • Choose if the rule will apply to connections for All programs or a specific program on the local machine and click Next. You can click Customize… to select additional settings for the processes of the program you selected.
  • The following step will allow you to specify the protocol and port for the traffic that this firewall rule will filter. Click Next after you select a protocol type and configure the settings.

This scripting API enables you to obtain data from remote computers using scripts that perform WS-Management protocol operations.

  • WS-Management protocol
  • Intelligent Platform Management Interface (IPMI) driver and WMI provider
  • WinRM Scripting API

________ is a suite of Institute of Electrical and Electronics Engineers (IEEE)standards that enable Converged Fabrics in the data center, where storage, data networking, cluster IPC and management traffic all share the same Ethernet network infrastructure.

  • Data Center Bridging (DCB)
  • BranchCache
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Name System (DNS)

Network Explorer Provides a central console for browsing computers and devices on the network

  • True
  • False

____________ enables you to access recorded event information.

  • Event Viewer
  • Network Logger
  • System Logger
  • Resource Monitor

AES-GCM 256 algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to AESGMAC 256 for integrity.

  • True
  • False

System Drivers is the lowest layer in the networkstack, and contains the network driver that communicates directlywith the network adapter.

  • True
  • False

A push partner for a particular WINS server is the server that pulls WINS database information from a receiving or push partner.

  • True
  • False

Token Requests Monitors the number of token requests sent to the federation server including SSOAuth token requests.

  • True
  • False

Network-based firewall runs on individual systems, physical or virtual. It is a piece of software installed on an operating system which stands between the host and other network devices.

  • True
  • False

Artifact Resolution Requests/sec Monitors the number of requests to the artifact resolution endpoint per second that are sent to the federation server

  • True
  • False

This command enables RSS on the network adapter that you specify.

  • Enable-NetAdapterRss
  • Enable-NICAdapterRss
  • Enable-NetworkAdapterRss

Authenticated IP (AuthIP) mechanism is defined in RFC2409 and combines the Internet Security Association and KeyManagement Protocol (ISAKMP) of RFC 2408 with the Oakley KeyDetermination Protocol (Oakley) of RFC 2412.IKE is supported oncomputers that are running Windows 2000 or later.

  • True
  • False

The network stack implements protocols such as TCP/IP and UDP/IP. These layers expose the transport layerinterface for layers above them.

  • True
  • False

This view of resource monitor lists processes by name and ID; and provides information on bits sent per second,bits received per second, and total bits per second.

  • Processes With Network Activity
  • Network Activity
  • TCP Connections
  • Listening Ports

Proxy MEX Requests/sec Monitors the number of incoming WS-Metadata Exchange (MEX) requests that are sent to the federation server proxy.

  • True
  • False

__ is the default mode of deployment. In this mode, two DHCP servers simultaneously serve IP addresses and options to clients on a given subnet.

  • Load balance mode

This algorithm can be used for quick mode only and is faster and stronger than DES. It is supported on Windows Vista and later.

  • AES-GCM 256
  • AES-GCM 128
  • AES-GCM 192

This command sets the RSS properties onthe network adapter that you specify.

  • Set-NetAdapterRss

Use IPsec Defaults option to configure the default IPsec settings that the local computer will use when attempting to establish secure connections with other IPsec-enabled computers. To configure these settings, click the Customize button to open the Custo

  • True
  • False

In __ failover mode, two servers operate in a failover relationship where an active server is responsible for leasing IP addresses and configuration information to all clients in a scope or

  • Hot standby mode
  • subnet.

Extended Selective Acknowledgments provides faster throughput by altering the way that a sender can increase the sending rate if multiple segments in a window of data are lost and the sender receives an acknowledgment stating that only part of the data has been received.

  • True
  • False

The following command installs dhcp server role Add-WindowsFeature -ManagementTools dhcp

  • True
  • False

This phase of IPsec negotiation uses the master key from main mode to generate one or more session keys that can be used to ensure data integrity and encryption.

  • quick mode

This algorithm is notrecommended and is provided for backward compatibility only.

  • Data Encryption Standard (DES)
  • Triple-DES (3DES)

Determines when neighboring nodes and routers are no longer reachable and reports the condition.

  • Spurious Retransmission Timeout Detection
  • SACK-Based Loss Recovery
  • Neighbor Unreachability Detection for IPv4
  • Routing Compartments

his algorithm has the strongest security but also the highest resource usage. It is compatible only with Windows Vista and later.

  • Elliptic Curve Diffie-Hellman P-256
  • DH Group 24
  • Diffie-Hellman Group 1 (DH Group 1)
  • Elliptic Curve Diffie-Hellman P-384

RSS is a network driver technology that enables the efficient distribution of network receive processing across multiple CPUs in multiprocessor systems.

  • True
  • False

Network and Sharing Center Provides automated diagnostics to help diagnose and resolve networking problems

  • True
  • False

Intended as a designation for a network in which computers are connected to the corporate domain to which they are joined

  • Public Network
  • Private Network
  • Domain Network

A __ is a computer in a domain which has Windows Server edition of operating system deployed but it is not a Domain Controller. Normally in any organization we don’t use DCs to deploy all the

  • member server
  • roles and services e.g. DHCP, application server, file and print server, Citrix Application Virtualization, Citrix Desktop Virtualization, DNS, etc.

It is not possible to install WINS using windows powershell

  • True
  • False

Provides automated diagnostics to help diagnose and resolve networking problems

  • Network Discovery
  • Windows Network Diagnostics
  • Network Explorer
  • Network and Sharing Center

__ Will have the IP addresses of DNS servers where records can be acquired.

  • Root hints only

The Server-to-Server type of connection security rule can be used to protect communications between two computers, two groups of computers, two subnets, or some combination of these, such as between a computer and a subnet. For example, you can use serverto-server rules to protect communications between a database server and a front-end web server

  • True
  • False

If a WINS server in an environment is the sole WINS server for that network, no additional configuration is required other than ensuring that clients will be pointing to the WINS server in their IP configuration. However, if it has been decided that WINS is required, it is a best-practice recommendation to deploy a secondary WINS server to provide redundancy.

  • True
  • False

Proxy MEX Requests Monitors the number of incoming WS-Metadata Exchange (MEX) requests that are sent to the federation server proxy.

  • True
  • False

Controls the ability to see other computers and devices

  • Network andSharing Center
  • Network Explorer
  • Windows Network Diagnostics
  • Network Discovery

This algorithm is stronger than DH Group 2. It has medium resource usage and is compatible only with Windows Vista and later.

  • Diffie-Hellman Group 1 (DH Group 1)
  • Elliptic Curve Diffie-Hellman P-384
  • DH Group 24
  • Elliptic Curve Diffie-Hellman P-256

The __ implements protocols suchas TCP/IP and UDP/IP. These layers expose the transport layerinterface for layers above them.

  • protocol stack

Intended as a designation for a network in which computers are configured as members of a homegroup or workgroup and are not connected directly to the public Internet

  • Private Network
  • Public Network
  • Domain Network

In __ dhcp failover is the default mode of deployment. In this mode, two DHCP servers simultaneously serve IP addresses and options to clients on a given subnet.

  • Load balance mode

Routing Compartments Prevents unwanted forwarding of traffic between interfaces by associating an interface or a set of interfaces with a login session that has its own routing tables.

  • True
  • False

This Edition of windows server 2012 is suited for small businesses of up to 15 users where it can implement features such as file sharing, printer sharing, security and remote access.

  • Windows Server 2012 Essentials Edition
  • Windows Server 2012 Standard Edition
  • Windows Server 2012 Datacenter Edition
  • Windows Server 2012 Foundation Edition

__________________ distributes incoming network I/O packets among logical processors so that packets which belong to the same TCP connection are processed on the same logical processor, which preserves ordering

  • NIC Teaming
  • Receive Side Scaling (RSS)
  • Message-Signaled Interrupt

This policy enables you to set the location of the collector computer.

  • Configure Target Subscription Manager
  • Configure Forwarder Resource Usage
  • Configure Target Server Manager
  • Configure Target Network Manager

The WMI service continues to run side-by-side with WinRM and provides requested data or control through the WMI plug-in. You can continue to obtain data from standard WMI classes, such as Win32_Process, as well as IPMI-supplied data.

  • True
  • False

AES-GCM 192 algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to AESGMAC 192 for integrity

  • True
  • False

Which one is a benefit of using windows firewall?

  • It needs a special license or additional hardware. Once you obtain your copy of a Windows operating system, there are no additional costs.
  • Its not highly flexible. It does not offer many advanced functionalities and different levels of controls for the firewall services.
  • It is ready out-of-the-box. It comes preinstalled with personal Microsoft Windows operating systems as well as Server editions. It is also active by default, protecting your operating system from the very first startup

it describes a collection of users, systems, applications, networks, database servers, and any other resources that are administered with a common set of rules.

  • Domain
  • Member Servers
  • Domain Services
  • Domain Controller

Which one is not an official version of windows server 2012?

  • Windows Server 2012 Home Edition
  • Windows Server 2012 Datacenter Edition
  • Windows Server 2012 Essentials Edition
  • Windows Server 2012 Standard Edition

Internet Key Exchange (IKE) mechanism is defined in RFC2409 and combines the Internet Security Association and KeyManagement Protocol (ISAKMP) of RFC 2408 with the Oakley KeyDetermination Protocol (Oakley) of RFC 2412.IKE is supported oncomputers that are running Windows 2000 or later.

  • True
  • False

_________________ Is an Internet Engineering Task Force (IETF) standarddesigned to reduce the administration burden and complexity ofconfiguring hosts on a TCP/IP-based network, such as a privateintranet

  • BranchCache
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Name System (DNS)
  • Data Center Bridging (DCB)

IPsec encapsulation mode where the payload is encapsulated with an additional IP header

  • Quick Mode
  • Tunnel mode
  • Main Mode
  • Transport mode

Reports changes in network connectivity and configuration

  • Windows Network Diagnostics
  • Network and Sharing Center
  • Network Location Awareness
  • Network Discovery

WINS works best in client/server environments in which WINS clients send single-label (host) name queries to WINS servers for name resolution and WINS servers resolve the query and respond.

  • True
  • False

This view of resource monitor Lists network activity on a per-process basis,but also lists the destination address, sent bits per second,received bits per second, and total bits per second.

  • Processes With Network Activity
  • Listening Ports
  • TCP Connections
  • Network Activity

In which of the given steps is the third step in configuring a DNS forwarding?

  • Click Forwarders tab and then click Edit
  • Open server manager dashboard and click on Tools. Scroll down the menu and click on DNS .
  • In DNS manager, right-click and scroll down the menu. Click Properties
  • Enter the IP address of your secondary DNS server you want to forward DNS queries. Click OK

Neighbor Unreachability Detection for IPv4 Provides an extensible framework that helps users recover from and troubleshoot problems with network connections.

  • True
  • False

RSS is the ability to group packets together to minimize the header processing that is necessary for the host to perform. A maximum of 64 KB of received payload can be coalesced into a single larger packet for processing.

  • True
  • False

Get-NetAdapterRss command retrieves RSS properties of the network adapter that you specify.

  • True
  • False

Ensures that an unreachable gateway is checked periodically to determine whether it has become available.

  • Automatic Dead Gateway Retry
  • Automatic Black Hole Router Detection
  • Compound TCP
  • Extended Selective Acknowledgments

This command–line tool for system management is implemented in a Visual Basic Scripting Edition file (Winrm.vbs) written using the WinRM scripting API. This tool enables an administrator to configure WinRM and to get data or manage resources. For more information, see the online help provided by the command line Winrm /?.

  • Winrs.exe
  • Winrm.cmd

Authenticated IP (AuthIP) mechanism is a Microsoftproprietary extension of IKE that provides improved negotiation ofauthentication methods and supports additional authenticationmethods not included in IKE. AuthIP is supported on computersrunning Windows Vista, Windows Server 2008, or later.

  • True
  • False

Proxy MEX Requests/sec Monitors the number of incoming MEX requests per second that are sent to the federation server proxy.

  • True
  • False

his algorithm is not recommended and is provided for backward compatibility only.

  • Diffie-Hellman Group 14 (DH Group 14)
  • Diffie-Hellman Group 1 (DH Group 1)
  • Diffie-Hellman Group 24 (DH Group 24)
  • Diffie-Hellman Group 2 (DH Group 2)

Helps determine whether a performance bottleneck for a connection is the sending application, the receiving application, or the network.

  • Windows Filtering Platform
  • TCP Extended Statistics
  • SACK-Based Loss Recovery
  • Spurious Retransmission Timeout Detection

This is the lowest layer in the networkstack, and contains the network driver that communicates directlywith the network adapter.

  • System Drivers
  • Network Driver Interface Specification (NDIS)
  • User-Mode Applications
  • Network interface
  • Protocol Stack

This algorithm is not recommended and is provided for backward compatibility only.

  • Diffie-Hellman Group 1 (DH Group 1)

This method of firewall filtering analyzes the header of every packet and checks if it matches the configured rules.

  • Stateful Inspection
  • Proxy Server
  • IP Filtering
  • Packet Filtering

Disable-NetworkAdapterRss command disables RSS on the network adapter that you specify.

  • True
  • False

Encapsulating Security Protocol (ESP) mechanism provides data-origin authentication, data integrity, and anti-replay protection for the entire packet (both the IP header and the data payload carried in the packet), except for the fields in the IP header that are allowed to change in transit.

  • True
  • False

This mechanism is defined in RFC2409 and combines the Internet Security Association and Key Management Protocol (ISAKMP) of RFC 2408 with the Oakley Key Determination Protocol (Oakley) of RFC 2412

  • Diffie-Hellman Group 1
  • Internet Key Exchange (IKE)
  • Authenticated IP (AuthIP)
  • IP Tunneling

Network and Sharing Center Provides a central console for browsing computers and devices on the network

  • True
  • False

Provides application programming interfaces (APIs) for extending the TCP/IP filtering architecture so that it can support additional features.

  • Windows Filtering Platform
  • Spurious Retransmission Timeout Detection
  • TCP Extended Statistics
  • Routing Compartments

Prevents TCP connections from terminating due to intermediate routers silently discarding large TCP segments, retransmissions,or error messages.

  • Automatic Black Hole Router Detection
  • Compound TCP
  • Extended Selective Acknowledgments
  • Automatic Dead Gateway Retry

AES-GMAC 192 algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to AES-GCM 192 for integrity.

  • True
  • False

In Automatic software updates deployment, a set of software updates is selected the SCCM console and these updates are deployed to the target collection.

  • True
  • False

Hardware management through the Intelligent Platform Management Interface (IPMI) provider and driver enables you to control and diagnose remote server hardware through BMCs when the operating system is not running or deployed.

  • True
  • False

With policy based assignment, the DHCP the server evaluates DHCP requests against policies that you define. Policies are applicable for a specific scope with a defined processing order.

  • True
  • False

Federation Metadata Requests Monitors the number of token requests sent to the federation server including SSOAuth token requests per second.

  • True
  • False

A __ is a DNS function that takes a domain name and resolves it to an IP address.

  • forward lookup zone

A network firewall is also referred to as a gateway firewall, or an application firewall. It stands between the internet and the devices in the private network.

  • True
  • False

The _________________________ feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or more computers that are running applications in Windows Server 2012 into a single virtual cluster

  • Low-latency workloads technologies
  • IP Address Management (IPAM)
  • Network Load Balancing (NLB)
  • Hyper-V virtual switch

Spurious Retransmission Timeout Detection Provides correction for sudden, temporary increases in retransmission timeouts and prevents unnecessary retransmission of segments.

  • True
  • False

__ is a more advanced version of standard windows command line interface known as cmd or command prompt

  • windows powershell

In Manual software updates deployment, a set of software updates is selected the SCCM console and these updates are deployed to the target collection.

  • True
  • False

Network adapters that support this can target their interrupts to specific logical processors.

  • Moment-Signaled Interrupts (MSI/MSI-X)
  • Message-Signaled Interrupts (MSI/MSI-X)
  • Memo-Signaled Interrupts (MSI/MSI-X)

Artifact Resolution Requests Monitors the number of requests to the artifact resolution endpoint per second that are sent to the federation server.

  • True
  • False

_________ enables you to monitor how a computer running the Windows Server 2012 and Windows Server 2012 R2 operating system uses CPU, memory, disk, and network resources.

  • Networking Monitor
  • Computer Monitor
  • Message Analyzer
  • Resource Monitor

Use this option to configure the users and computers that you want to be authorized to establish IPsec communications with the local computer.

  • IPsec Tunnel Authorization
  • IPsec Exemptions

__ is a service that resolves computer names to IP addresses. Using this, the computer name COMPUTER84, for example, can be resolved to an IP address that enables computers on a Microsoft

  • Windows Internet Name Service
  • network to find one another and transfer information.

Network Location Awareness Reports changes in network connectivity and configuration

  • True
  • False

Proxy Requests Monitors the number of incoming requests sent to the federation server proxy.

  • True
  • False

Maps the internal (private) address and port number to different external (public) addresses and ports, depending on the external destination address.

  • Random Interface IDs
  • Multicast Listener Discovery version 2 (MLDv2)
  • Link-Local Multicast Name Resolution (LLMNR)
  • Symmetric Network Address Translators

__ uses two independent DHCP servers that share responsibility for a scope. Typically, 70% of the addresses in the scope are assigned to the primary server and the remaining 30% are assigned

  • Split scope DHCP
  • to a backup server.

When it comes to deploying updates, SCCM is the best tool to do it. You must understand that deploying updates is a complex task. SCCM make it easy not only to deploy updates but to gather the depoyment reports as well.

  • True
  • False

Intended as a designation for a guest network in a public place, such as a coffee shop or airport, rather than for an internal network

  • Public Network
  • Domain Network
  • Private Network

This authentication method can be used on networks that include systems running an earlier version of the Windows operating system and on standalone systems.

  • Pre-shared key
  • Computer (Kerberos V5)
  • Computer (NTLMv2)
  • Computer certificate

____________ is a virtual layer-2 network switch that provides programmatically managed and extensible capabilities to connect virtual machines to the physical network

  • Hyper-V virtual switch
  • Hyper-V network virtualization
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Name System (DNS)

Which on is the third step In windows server 2012 routing/nat configuration?

  • To start, from Server Manager click Manage > Add Roles and Features
  • On the Before You Begin page, click Next
  • On Server Selection select the server you want to install the feature on and click Next.
  • _Select Role-based or feature-based installation and click Next

Elliptic Curve Diffie-Hellman P-256 algorithm is stronger than DH Group 2. It has medium resource usage and is compatible only with Windows Vista and later.

  • True
  • False
Comments
Paypal Donation

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Network Security

Network Administration

Logistics


Show All Subject
Affiliate Links

Shopee Helmet

Shopee 3D Floor

Lazada Smart TV Box