70-642 Config IP Addressing And Services

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rmcka
R
Rmcka
Community Contributor
Quizzes Created: 1 | Total Attempts: 119
Questions: 35 | Attempts: 119

SettingsSettingsSettings
70-642 Config IP Addressing And Services - Quiz


When you have a dedicated IP address you get less down time, remote access to your PC no wonder where you are and get to have your own private SL certificate. How knowledgeable are you at configuring IP addresses and services? Take up the questions below and find out. Good luck!


Questions and Answers
  • 1. 

    Your organization consists of a single Windows Server 2008 Active Directory domain that is spread across two IP subnets. One DHCP server exists in the domain. You receive a complaint from a user that she is unable to access domain resources. You discover that her computer's IP address is 169.254.11.213. What action should you perform? A. Install a DHCP Relay Agent on the user's local subnet. B. Disable PXE on the user's computer. C. Enable traffic on TCP 1542 as a Windows Firewall exception on the user's computer. D. Install a WDS server on the user's local subnet.

    • A.

      A. Install a DHCP Relay Agent on the user's local subnet. ------ In Windows Server 2008, the DHCP Relay Agent service is installed as a service of the RRAS server role. The DHCP Relay Agent allows DHCP broadcast messages to cross router interfaces.

    • B.

      B. Disable PXE on the user's computer. ------ The Preboot Execution Environment (PXE) represents an alternate way for a device to obtain an IP address lease from DHCP. However, PXE does not factor into this scenario.

    • C.

      C. Enable traffic on TCP 1542 as a Windows Firewall exception on the user's computer. ------ DHCP Relay is defined in Request for Comments (RFC) 1542. Traditional DHCP traffic is not blocked by Windows Firewall due to its mission-critical nature.

    • D.

      D. Install a WDS server on the user's local subnet. ------ Windows Deployment Service (WDS) is an operating system deployment technology that relies upon DHCP. However, the WDS service itself will not allow DHCP Discover packets to cross router interfaces.

    Correct Answer
    A. A. Install a DHCP Relay Agent on the user's local subnet. ------ In Windows Server 2008, the DHCP Relay Agent service is installed as a service of the RRAS server role. The DHCP Relay Agent allows DHCP broadcast messages to cross router interfaces.
  • 2. 

    Your organization consists of an Active Directory domain in which all servers run Windows Server 2008 and all client computers are laptops that run Windows Vista with Service Pack 1. You need to configure TCP/IP on the laptops such that users are able to seamlessly connect to both the corporate network, which uses static IP addressing, and their own home networks, which use dynamic IP addressing. What action should you perform? A. Configure the users with IPv6 addresses. B. Configure the users' computers with APIPA IP addresses. C. Use the Alternate Configuration feature to configure the laptop computers with static primary IP addresses. D. Use the Alternate Configuration feature to configure the laptop computers with a static secondary address.

    • A.

      A. Configure the users with IPv6 addresses. ------ We must be careful never to make assumptions on IT certification exams. Because the scenario says nothing about an IPv6 deployment, we can safely determine that we are using the current industry standard, which is IPv4.

    • B.

      B. Configure the users' computers with APIPA IP addresses. ------ Automatic Private IP Addressing (APIPA) addresses, which exist in the range 169.254.X.Y, are invoked automatically whenever a DHCP client is unable to reach a DHCP server. APIPA addresses won't work for the users when they are at home.

    • C.

      C. Use the Alternate Configuration feature to configure the laptop computers with static primary IP addresses. ------ The primary connection method for LAN adapters must be set for DHCP to have the ability to use a static configuration as an alternate configuration.

    • D.

      D. Use the Alternate Configuration feature to configure the laptop computers with a static secondary address. ------ If the primary (DHCP) configuration fails, then the alternate configuration (either APIPA or static addressing) takes over.

    Correct Answer
    D. D. Use the Alternate Configuration feature to configure the laptop computers with a static secondary address. ------ If the primary (DHCP) configuration fails, then the alternate configuration (either APIPA or static addressing) takes over.
  • 3. 

    Your organization uses the IPv4 network address 172.16.30.0/22. All client computers in the domain run Windows Vista. HostA (IP address 172.16.8.111, subnet mask 255.255.252.0) is unable to connect to HostB (IP address 172.16.12.23, subnet mask 255.255.252.0) when using NetBIOS broadcasts. What is the most likely explanation of the problem? A. The network's DHCP server is offline. B. HostA and HostB are using an incorrect subnet mask. C. HostA and HostB reside on different IP subnets. D. HostA and HostB are using different default gateway addresses.

    • A.

      A. The network's DHCP server is offline. ------ The scenario does not state if these hosts are statically or dynamically assigned their IP addresses. However, if a DHCP server were unavailable then the default behavior would be for each machine to auto-generate APIPA addresses.

    • B.

      B. HostA and HostB are using an incorrect subnet mask. ------ The decimal subnet mask 255.255.252.0 (22 bits) is correct.

    • C.

      C. HostA and HostB reside on different IP subnets. ------ HostA belongs to subnet ID 172.16.8.0, and HostB belongs to subnet ID 172.16.12.0.

    • D.

      D. HostA and HostB are using different default gateway addresses. ------ These two hosts SHOULD be using different default gateway addresses, as their IP network addresses are different. Remember that routers typically discard NetBIOS broadcast traffic, which accounts for why the hosts are unable to communicate by using this method.

    Correct Answer
    C. C. HostA and HostB reside on different IP subnets. ------ HostA belongs to subnet ID 172.16.8.0, and HostB belongs to subnet ID 172.16.12.0.
    Explanation
    The most likely explanation for the problem is that HostA and HostB reside on different IP subnets. HostA belongs to subnet ID 172.16.8.0, while HostB belongs to subnet ID 172.16.12.0. Since they are on different subnets, they cannot directly communicate with each other using NetBIOS broadcasts. Routers typically discard NetBIOS broadcast traffic, which is why the hosts are unable to connect.

    Rate this question:

  • 4. 

    You have deployed a Group Policy Object (GPO) containing Connection Security Rules to your users. However, you discover that none of the domain workstations are communicating by using IPSec packet encryption when they are connected to the Active Directory domain. What action should you perform? A. Verify that the authentication method in use in the domain is Kerberos V5. B. Ensure that the Connection Security Rule is associated with the Domain Profile. C. Ensure that the Connection Policy contains the Isolation rule. D. Verify that the policy requirement is set to the Require authentication for inbound and outbound connections.

    • A.

      A. Verify that the authentication method in use in the domain is Kerberos V5. ------ With Connection Security Rules, you can mandate Kerberos, digital certificate, or default authentication options.

    • B.

      B. Ensure that the Connection Security Rule is associated with the Domain Profile. ------ Remember that Windows Firewall supports three profiles: Domain, Private, and Public. In domain networking we need to configure the Domain profile.

    • C.

      C. Ensure that the Connection Policy contains the Isolation rule. ------ You have much choice in the rules that govern whether an IPSec policy will proceed or not.

    • D.

      D. Verify that the policy requirement is set to the Require authentication for inbound and outbound connections. ------ While this is a good and effective policy requirement, it won't amount to a proverbial hill of beans unless the Connection Security Rule is attached to the proper Windows Firewall profile.

    Correct Answer
    B. B. Ensure that the Connection Security Rule is associated with the Domain Profile. ------ Remember that Windows Firewall supports three profiles: Domain, Private, and Public. In domain networking we need to configure the Domain profile.
  • 5. 

    Your organization's single Active Directory domain consists of a mixed IPv4/IPv6 environment. All servers run Windows Server 2008 and all client workstations run Windows Vista. You need to ping a file server named FS01.BIRCO.LAN that uses an IPv6 address. What actions should you perform? (Select two answers. Each correct answer represents an independent solution.) A. Ping the site-local address of the server. B. Issue the command ping -426 fs01.birdco.com from your administrative workstation. C. Ping the link-local address of the server. D. Issue the command ping -6 fs01.birdco.lan from your administrative workstation.

    • A.

      A. Ping the site-local address of the server. ------ You can ping the link-local address of the server, but not the site-local address.

    • B.

      B. Issue the command ping -426 fs01.birdco.com from your administrative workstation. ------ The -426 switch is invalid.

    • C.

      C. Ping the link-local address of the server. ------ You can ping IPv6 addresses by using the -6 flag or by specifying the link-local address of the target host.

    • D.

      D. Issue the command ping -6 fs01.birdco.lan from your administrative workstation. ------ The -6 flag of the ping.exe command enables you to lookup the AAAA record for the host in DNS and issue the ping.

    Correct Answer
    C. C. Ping the link-local address of the server. ------ You can ping IPv6 addresses by using the -6 flag or by specifying the link-local address of the target host.
  • 6. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008 and all client computers run Windows Vista. You need to ensure that IPv6 is disabled on six development workstations in the domain. Your solution must involve the least amount of administrative effort. What action should you perform? A. Disable IPv6 by adding the DisabledComponents DWORD value to the Registry of the development workstations. B. Uninstall Windows Meeting Space on the development workstations. C. Disable IPv6 by configuring the Local Area Connection properties of the six development workstations. D. Uninstall IPv6 from the Programs and Features Control Panel item on the development workstations.

    • A.

      A. Disable IPv6 by adding the DisabledComponents DWORD value to the Registry of the development workstations. ------ Although this option is technically correct, it is more cumbersome and prone to error than is modifying the LAN connection properties on the development workstations.

    • B.

      B. Uninstall Windows Meeting Space on the development workstations. ------ If you disable IPv6, then programs that use the Windows Peer-to-Peer networking protocols won't work anymore. However, simply uninstalling Meeting Space does not affect the running status of the IPv6 stack itself.

    • C.

      C. Disable IPv6 by configuring the Local Area Connection properties of the six development workstations. ------ The easiest way to disable IPv6 on a per-interface basis is to deselect the "Internet Protocol version 6" option in the appropriate computers' Local Area Connection properties.

    • D.

      D. Uninstall IPv6 from the Programs and Features Control Panel item on the development workstations. ------ You cannot uninstall IPv6 in Windows Vista and Windows Server 2008; you can only disable the protocol stack.

    Correct Answer
    C. C. Disable IPv6 by configuring the Local Area Connection properties of the six development workstations. ------ The easiest way to disable IPv6 on a per-interface basis is to deselect the "Internet Protocol version 6" option in the appropriate computers' Local Area Connection properties.
  • 7. 

    Your organization consists of a multi-domain Active Directory forest in which all servers run Windows Server 2008 and all client computers run Windows Vista. Hosts in all domains are configured to use both IPv4 and IPv6. You need to ensure that hosts in different domains in the forest can communicate through networks that are separated by NAT firewalls. Your solution must involve the least amount of administrative effort. What action should you perform? A. Enable the Peer Name Resolution Protocol (PNRP) on all organizational firewalls. B. Create at least one IPv6 scope on all DHCP servers. C. Create static NAT translation entries on all organizational firewalls. D. Enable Teredo on all organizational firewalls.

    • A.

      A. Enable the Peer Name Resolution Protocol (PNRP) on all organizational firewalls. ------ PNRP is an IPv6-based discover technology that underpins Microsoft applications such as Meeting Space. However, without Teredo enabled on all firewalls, the firewalls will not let IPv6 packets traverse NAT.

    • B.

      B. Create at least one IPv6 scope on all DHCP servers. ------ This answer choice represents a classic "red herring." That is, we don't need to worry about IP addressing. There is nothing in the scenario that would lead us to believe there is a problem with addressing.

    • C.

      C. Create static NAT translation entries on all organizational firewalls. ------ Although this would solve the problem, it is almost mind-numbingly complex compared to enabling Teredo on all firewalls.

    • D.

      D. Enable Teredo on all organizational firewalls. ------ Teredo technology allows IPv6 packets to traverse IPv4 Network Address Translation (NAT) firewalls. The Teredo client is enabled by default in Windows Server 2008 and Windows Vista.

    Correct Answer
    D. D. Enable Teredo on all organizational firewalls. ------ Teredo technology allows IPv6 packets to traverse IPv4 Network Address Translation (NAT) firewalls. The Teredo client is enabled by default in Windows Server 2008 and Windows Vista.
    Explanation
    Enabling Teredo on all organizational firewalls is the correct action to perform in this scenario. Teredo technology allows IPv6 packets to traverse IPv4 Network Address Translation (NAT) firewalls, which is necessary for hosts in different domains to communicate through networks that are separated by NAT firewalls. This solution involves the least amount of administrative effort compared to creating static NAT translation entries on all firewalls. Enabling the Peer Name Resolution Protocol (PNRP) on all organizational firewalls alone is not sufficient, as the firewalls will not let IPv6 packets traverse NAT without Teredo enabled. Creating IPv6 scopes on DHCP servers is not relevant to the issue at hand.

    Rate this question:

  • 8. 

    You have recently had to delete and recreate a scope on your organization's DHCP server. You need to ensure that no duplicate IP addresses are leased to network clients. What action should you perform? A. Reauthorize the DHCP server in Active Directory. B. Reboot the DHCP server. C. Enable conflict detection on the server. D. Enable audit logging on the DHCP server.

    • A.

      A. Reauthorize the DHCP server in Active Directory. ------ Deleting and recreating scopes is not an action that would unauthorize an already authorized DHCP server in Active Directory.

    • B.

      B. Reboot the DHCP server. ------ Simply rebooting the server won't ensure that IP address conflicts do not occur.

    • C.

      C. Enable conflict detection on the server. ------ Conflict detection involves the server sending out one or more ICMP ping messages to clients before leasing addresses to them. The purpose of this is to prevent IP address conflicts from occurring on the network.

    • D.

      D. Enable audit logging on the DHCP server. ------ While it is a terrific idea to audit DHCP for security and performance reasons, doing so in this case will not solve the stated problem.

    Correct Answer
    C. C. Enable conflict detection on the server. ------ Conflict detection involves the server sending out one or more ICMP ping messages to clients before leasing addresses to them. The purpose of this is to prevent IP address conflicts from occurring on the network.
    Explanation
    Enabling conflict detection on the server is the correct action to perform in order to ensure that no duplicate IP addresses are leased to network clients. Conflict detection involves the server sending out one or more ICMP ping messages to clients before leasing addresses to them. This helps prevent IP address conflicts from occurring on the network. Reauthorizing the DHCP server in Active Directory, rebooting the DHCP server, or enabling audit logging on the DHCP server will not solve the stated problem.

    Rate this question:

  • 9. 

    Your network consists of a single Active Directory domain in which all servers run Windows Server 2008. You are deploying four additional file servers, all of which are configured with static IPv4 addresses. You need to ensure that the IP addresses that are statically assigned to the servers are not distributed to other hosts in the domain. What action should you perform? A. Create a new exclusion range in DHCP. B. Configure the appropriate scope option in DHCP. C. Configure the appropriate server option in DHCP. D. Create reservations for the new servers in DHCP.

    • A.

      A. Create a new exclusion range in DHCP. ------ An exclusion range removes one or more IP addresses from a DHCP scope, ensuring that DHCP will never offer those addresses to DHCP clients.

    • B.

      B. Configure the appropriate scope option in DHCP. ------ Scope and/or server options will not help us solve the problem that is outlined in this scenario.

    • C.

      C. Configure the appropriate server option in DHCP. ------ There exists no scope or server option that would prevent duplicate addresses from being delivered. We need to use either exclusions or client reservations.

    • D.

      D. Create reservations for the new servers in DHCP. ------ Because the scenario states that the new servers are configured with static IP addresses, client reservations will not work in this situation.

    Correct Answer
    A. A. Create a new exclusion range in DHCP. ------ An exclusion range removes one or more IP addresses from a DHCP scope, ensuring that DHCP will never offer those addresses to DHCP clients.
    Explanation
    An exclusion range in DHCP is the correct action to perform in this scenario. This will remove the IP addresses that are statically assigned to the new servers from the DHCP scope, preventing them from being distributed to other hosts in the domain. Configuring scope or server options will not solve the problem, and client reservations are not applicable since the new servers already have static IP addresses.

    Rate this question:

  • 10. 

    Your organization consists of a routed internetwork in which internal routers are multihomed Windows Server 2008 member servers that are configured with the RRAS server role. One Windows Server 2008-based DHCP server exists in the organization. You need to support RFC 1542 on the network to ensure smooth DHCP operations throughout the enterprise. What action should you perform? A. Configure one RRAS server as a WINS Proxy Agent. B. Configure all RRAS servers as DHCP Relay Agents. C. Configure all RRAS servers as WINS Proxy Agents. D. Configure one RRAS server as a DHCP Relay Agent.

    • A.

      A. Configure one RRAS server as a WINS Proxy Agent. ------ WINS proxy is not the issue here because Request for Comments (RFC 1542) discusses how to route DHCP/BOOTP broadcast messages through router interfaces.

    • B.

      B. Configure all RRAS servers as DHCP Relay Agents. ------ This methodology ensures that BOOTP/DHCP broadcast traffic is routed to the network's single live DHCP server.

    • C.

      C. Configure all RRAS servers as WINS Proxy Agents. ------ We need DHCP Relay on this routed internetwork, not WINS Proxy.

    • D.

      D. Configure one RRAS server as a DHCP Relay Agent. ------ We need to ensure that DHCP messages can be captured and transmitted via IP unicast on all subnets. Therefore, we need DHCP relay on all subnets.

    Correct Answer
    B. B. Configure all RRAS servers as DHCP Relay Agents. ------ This methodology ensures that BOOTP/DHCP broadcast traffic is routed to the network's single live DHCP server.
    Explanation
    The correct answer is B. Configure all RRAS servers as DHCP Relay Agents. This is because RFC 1542 discusses how to route DHCP/BOOTP broadcast messages through router interfaces. By configuring all RRAS servers as DHCP Relay Agents, it ensures that BOOTP/DHCP broadcast traffic is routed to the network's single live DHCP server, which is necessary for smooth DHCP operations throughout the enterprise.

    Rate this question:

  • 11. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008 and all client computers run Windows Vista with Service Pack 1. You need to define a policy such that all LAN traffic between users and a high-security file server named FS01 is encrypted at the packet level. What action should you perform? A. Deploy a NAP policy. B. Define a Wired Network (IEEE 802.3) policy. C. Define a Network List Manager policy. D. Define an IPSec policy.

    • A.

      A. Deploy a NAP policy. ------ Network Access Protection (NAP) represents a method for ensuring system health in a network.

    • B.

      B. Define a Wired Network (IEEE 802.3) policy. ------ Wired Network policies enable IEEE 802.1X authentication to take place. These policies do not govern packet-level data encryption.

    • C.

      C. Define a Network List Manager policy. ------ These policies control which networks a domain member computer can associate with.

    • D.

      D. Define an IPSec policy. ------ IPSec policies are known as Connection Security Rules in Windows Server 2008 and Windows Vista.

    Correct Answer
    D. D. Define an IPSec policy. ------ IPSec policies are known as Connection Security Rules in Windows Server 2008 and Windows Vista.
  • 12. 

    Your organization has a Windows Server 2008-based DHCP server named IP01. You have recently installed a second network interface card and configured the server bindings such that the server listens for DHCP client requests on both network interfaces. However, you notice that one of the network interfaces is not being used to service DHCP client requests. Your solution must involve the least amount of disruption to network services and operations. What action should you perform? A. Restart the DHCP server. B. Authorize the new network interface in Active Directory. C. Install Windows Deployment Services (WDS) on the DHCP server. D. Restart the DHCP Server service.

    • A.

      A. Restart the DHCP server. ------ This option (a) would not solve the problem and (b) cause a disruption of service on the network.

    • B.

      B. Authorize the new network interface in Active Directory. ------ DHCP Server is authorized in Active Directory on a per-interface (IP address) basis.

    • C.

      C. Install Windows Deployment Services (WDS) on the DHCP server. ------ WDS interacts very closely with DHCP for obvious reasons; however, these are fundamentally two different technologies with two different purposes.

    • D.

      D. Restart the DHCP Server service. ------ The issue here is that the second NIC and its associated IP address are not authorized to perform DHCP Server services in Active Directory. Therefore, simply restarting the DHCP service will have no positive effect on this situation.

    Correct Answer
    B. B. Authorize the new network interface in Active Directory. ------ DHCP Server is authorized in Active Directory on a per-interface (IP address) basis.
  • 13. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008 and all client computers run Windows Vista. You are planning to migrate from IPv4 and IPv6 and need to educate yourself as to how IPv6 addressing works. Which of the following represents an invalid IPv6 transmission type? A. Anycast B. Multicast C. Unicast D. Digicast

    • A.

      A. Anycast ------ IPv6 supports anycast data transmission.

    • B.

      A. Anycast ------ IPv6 supports anycast data transmission.

    • C.

      C. Unicast ------ IPv6 supports point-to-point (unicast) data transmission.

    • D.

      C. Unicast ------ IPv6 supports point-to-point (unicast) data transmission.

    Correct Answer
    D. C. Unicast ------ IPv6 supports point-to-point (unicast) data transmission.
  • 14. 

    Your organization includes a newly deployed Windows Server 2008 e-mail server that is configured with the following IP configuration information: IP Address: 172.16.16.3 Subnet mask: 255.255.224.0 You receive complaints from users who state that they are unable to connect to the email server. What action should you perform? A. Change the server's IP address to 172.16.0.3. B. Configure the server to use a /20 subnet mask. C. Change the server's IP address to 172.16.32.3. D. Configure the server to use the subnet mask 255.255.128.0.

    • A.

      A. Change the server's IP address to 172.16.0.3. ------ The problem here is that the given IP address and the subnet mask do not match.

    • B.

      B. Configure the server to use a /20 subnet mask. ------ The given IP address is invalid with a 19-bit subnet mask. Here we need to use a /20 (255.255.240.0 in decimal) subnet mask.

    • C.

      C. Change the server's IP address to 172.16.32.3. ------ The problem here is in the subnet mask.

    • D.

      D. Configure the server to use the subnet mask 255.255.128.0. ------ This subnet mask masks only 17 bits, which continues to render the server's IP address as invalid.

    Correct Answer
    B. B. Configure the server to use a /20 subnet mask. ------ The given IP address is invalid with a 19-bit subnet mask. Here we need to use a /20 (255.255.240.0 in decimal) subnet mask.
    Explanation
    The correct answer is B. Configure the server to use a /20 subnet mask. The given IP address is invalid with a 19-bit subnet mask. To resolve the issue, the server should be configured to use a /20 subnet mask (255.255.240.0 in decimal) which will allow for proper communication and connection to the email server.

    Rate this question:

  • 15. 

    Your organization contains a Windows Server 2008 member server that is configured with the RRAS server role. Its two network adapters are named LAN1 and LAN2. You need to configure the network adapters such that outbound network traffic is favored toward LAN2. What action should you perform? A. Set the interface metric of LAN1 to 2 and the interface metric of LAN2 to 1. B. Set the interface metric of LAN1 to 1 and the interface metric of LAN2 to 2. C. Install the Microsoft Loopback Adapter and set its interface metric to 2. D. Install the Microsoft Loopback Adapter and set its interface metric to 1.

    • A.

      A. Set the interface metric of LAN1 to 2 and the interface metric of LAN2 to 1. ------ Because, in this case, the LAN1 interface has a higher metric, the server will prefer the wrong interface.

    • B.

      B. Set the interface metric of LAN1 to 1 and the interface metric of LAN2 to 2. ------ Higher metric numbers denote higher-priority network adapters. Therefore, in this case, the server will favor the LAN2 interface to the LAN1 interface.

    • C.

      C. Install the Microsoft Loopback Adapter and set its interface metric to 2. ------ We can be very certain that we don't want to use the Loopback Adapter on a production server-ever.

    • D.

      D. Install the Microsoft Loopback Adapter and set its interface metric to 1. ------ We never want to use the Loopback Adapter on a production server.

    Correct Answer
    B. B. Set the interface metric of LAN1 to 1 and the interface metric of LAN2 to 2. ------ Higher metric numbers denote higher-priority network adapters. Therefore, in this case, the server will favor the LAN2 interface to the LAN1 interface.
    Explanation
    Setting the interface metric of LAN1 to 1 and the interface metric of LAN2 to 2 is the correct action to perform. Higher metric numbers denote higher-priority network adapters, so in this case, the server will favor the LAN2 interface over the LAN1 interface. This configuration ensures that outbound network traffic is favored toward LAN2.

    Rate this question:

  • 16. 

    Your organization consists of an IP internetwork that is routed by a multihomed Windows Server 2008 member server that is configured with the RRAS server role. You need to configure a persistent default route on the server from the command prompt that sends all default traffic out of the interface with IP address 192.168.1.1. What action should you perform? A. Issue the command route print 192.168.1.0 on the server. B. Issue the command route -p add 0.0.0.0 mask 0.0.0.0 192.168.1.1 on the server. C. Issue the command route -persistent 192.168.1.0 on the server. D. Issue the command route -p add 255.255.255.255 mask 255.255.255.255 192.168.1.1 on the server.

    • A.

      A. Issue the command route print 192.168.1.0 on the server. ------ The Route Print command simply displays all or part of the server's routing table.

    • B.

      B. Issue the command route -p add 0.0.0.0 mask 0.0.0.0 192.168.1.1 on the server. ------ The -p flag of the route command makes the static route persistent across server reboots.

    • C.

      C. Issue the command route -persistent 192.168.1.0 on the server. ------ The -p flag of the route command is used, not the word "persistent." Besides, the syntax of this statement is incorrect.

    • D.

      D. Issue the command route -p add 255.255.255.255 mask 255.255.255.255 192.168.1.1 on the server. ------ We need to use decimal 0, not decimal 255, in our route statement.

    Correct Answer
    B. B. Issue the command route -p add 0.0.0.0 mask 0.0.0.0 192.168.1.1 on the server. ------ The -p flag of the route command makes the static route persistent across server reboots.
    Explanation
    To configure a persistent default route on the server, the correct action is to issue the command "route -p add 0.0.0.0 mask 0.0.0.0 192.168.1.1" on the server. The -p flag makes the static route persistent, meaning it will remain even after server reboots. The command adds a default route (0.0.0.0) with a subnet mask of 0.0.0.0, directing all default traffic to the interface with the IP address 192.168.1.1.

    Rate this question:

  • 17. 

    Your organization consists of a single Active Directory domain in which all servers run either Windows Server 2003 or Windows Server 2008 and all client computers run Windows Vista. You are planning to migrate the IP infrastructure of your company to IPv6. In particular, you need to ensure that the Windows Server 2003 can support IPv6. What action should you perform? A. Upgrade the Windows Server 2003 servers to Windows Server 2008. B. Install IPv6 by downloading the component from the Microsoft Web site. C. Install IPv6 by using the Network Connections Control Panel item. D. Install IPv6 by using the Server Manager application.

    • A.

      A. Upgrade the Windows Server 2003 servers to Windows Server 2008. ------ Windows Server 2003 natively supports IPv6; however, you have to install the component from the Network Connections Control Panel item.

    • B.

      B. Install IPv6 by downloading the component from the Microsoft Web site. ------ You do not need to do this because Windows Server 2003 includes IPv6 as an optional, installable component.

    • C.

      C. Install IPv6 by using the Network Connections Control Panel item. ------ You can use this method to install IPv6 as an additional network component for the appropriate network adapter(s) on the Windows Server 2003 computer.

    • D.

      D. Install IPv6 by using the Server Manager application. ------ Remember that Windows Server 2003 does not include a Server Manager tool like Windows Server 2008 does.

    Correct Answer
    C. C. Install IPv6 by using the Network Connections Control Panel item. ------ You can use this method to install IPv6 as an additional network component for the appropriate network adapter(s) on the Windows Server 2003 computer.
  • 18. 

    You are configuring a multihomed Windows Server 2008 member server as a DHCP server. The server will serve DHCP client requests on two physical networks. What action should you perform? A. Enable UDP ports 67 and 68 in Windows Firewall for both network interfaces. B. Modify the server bindings in the DHCP console. C. Disable IPv6 on the server. D. Set the WINS/NBT Node Type as a Server Option in the DHCP console.

    • A.

      A. Enable UDP ports 67 and 68 in Windows Firewall for both network interfaces. ------ When you install the DHCP server role in Windows Server 2008, the operating system creates the appropriate Windows Firewall rules automatically. Incidentally, DHCP does use User Datagram Protocol (UDP) ports 67 and 68.

    • B.

      B. Modify the server bindings in the DHCP console. ------ In the DHCP Manager console, you can adjust the network interface card (NIC) bindings such that the server will service DHCP client requests on all, or only selected, network interfaces.

    • C.

      C. Disable IPv6 on the server. ------ Remember that Windows Server 2008 DHCP can seamlessly service IPv6 requests as easily as it can service IPv4 requests.

    • D.

      D. Set the WINS/NBT Node Type as a Server Option in the DHCP console. ------ DHCP server or scope options have absolutely nothing to do with this situation.

    Correct Answer
    B. B. Modify the server bindings in the DHCP console. ------ In the DHCP Manager console, you can adjust the network interface card (NIC) bindings such that the server will service DHCP client requests on all, or only selected, network interfaces.
  • 19. 

    Your organization consists of a single Active Directory forest in which servers run either Windows Server 2003 or Windows Server 2008 and all client computers run Windows Vista. Your network consists of two subnets and you plan to deploy a Windows Server 2008 DHCP server on each subnet. You need to ensure that neither server distributes a different IP address to the DHCP-enabled workgroup printers in the enterprise. What action should you perform? A. Create a domain DFS in the forest. B. Create a reservation for the workgroup printers on both DHCP servers. C. Create a reservation for the workgroup printers on one DHCP server. D. Create an exclusion for the workgroup printers on both DHCP servers.

    • A.

      A. Create a domain DFS in the forest. ------ Here, we are concerned with IP address configuration (DHCP), not making filesystem resources available in a redundant way (Distributed File System or DFS).

    • B.

      B. Create a reservation for the workgroup printers on both DHCP servers. ------ When you have multiple DHCP servers in an enterprise, you need to be careful to plan and create scopes, keeping in mind that the servers never synchronize their scope data. The configurations must be manually duplicated on all servers.

    • C.

      C. Create a reservation for the workgroup printers on one DHCP server. ------ If we perform this action, there exists the possibility that the workgroup printers, which are configured as DHCP clients, may pick up a different IP address from the other DHCP server.

    • D.

      D. Create an exclusion for the workgroup printers on both DHCP servers. ------ An exclusion removes one or more IP addresses from a DHCP scope. The scenario in this case states explicitly that the workgroup printers are DHCP clients.

    Correct Answer
    B. B. Create a reservation for the workgroup printers on both DHCP servers. ------ When you have multiple DHCP servers in an enterprise, you need to be careful to plan and create scopes, keeping in mind that the servers never synchronize their scope data. The configurations must be manually duplicated on all servers.
    Explanation
    When there are multiple DHCP servers in an enterprise, it is important to create reservations for specific devices to ensure that they always receive the same IP address. In this scenario, the workgroup printers are DHCP clients, so creating a reservation for them on both DHCP servers will guarantee that they are assigned the same IP address regardless of which server they connect to. This eliminates the possibility of the printers receiving different IP addresses and ensures consistent network connectivity for the printers.

    Rate this question:

  • 20. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008 and all client computers run Windows XP SP2. You need to deploy Connection Security Rules to protect network traffic to and from a series of secure files servers that reside in the domain. What action should you perform? A. Install Service Pack 3 on the client computers. B. Install the NAP client software on the client computers. C. Install the Network Policy Server role on all member servers. D. Upgrade all client computers to Windows Vista.

    • A.

      A. Install Service Pack 3 on the client computers. ------ Windows XP SP3 is required in order for Windows XP domain workstations to participate in NAP health policy screens. However, Windows XP computers are unable to participate in IPSec Connection Security Rules that are created in Windows Server 2008.

    • B.

      B. Install the NAP client software on the client computers. ------ The Network Access Protection (NAP) client is included in Windows XP Service Pack 3, not as a separate download. Besides, NAP client is not what is needed in this scenario.

    • C.

      C. Install the Network Policy Server role on all member servers. ------ This scenario can be accomplished by using simple Group Policy in Active Directory Domain Services (AD DS).

    • D.

      D. Upgrade all client computers to Windows Vista. ------ Only Windows Server 2008 and Windows Vista can participate in Connection Security Rules.

    Correct Answer
    D. D. Upgrade all client computers to Windows Vista. ------ Only Windows Server 2008 and Windows Vista can participate in Connection Security Rules.
  • 21. 

    You need to take your network's Windows Server 2008 DHCP server offline briefly for scheduled maintenance. Now that the server is online, you need to ensure that no duplicate IP addresses are assigned by the DHCP server. What action should you perform? A. Change the server connection bindings on the server. B. Create a superscope on the DHCP server. C. Restart the DHCP Server service on the server. D. Increase the conflict detection attempts in the DHCP server properties.

    • A.

      A. Change the server connection bindings on the server. ------ The server connection binding option enables you to scope the DHCP listener service to a particular network interface.

    • B.

      B. Create a superscope on the DHCP server. ------ A superscope involves IP addresses from more than one subnet being distributed over the same LAN segment. This has nothing to do with the issue under consideration.

    • C.

      C. Restart the DHCP Server service on the server. ------ Simply restarting the DHCP Server service on the computer is not enough. We need to use the Conflict Detection feature to ensure that ready-to-lease IP addresses are not already in use on the network.

    • D.

      D. Increase the conflict detection attempts in the DHCP server properties. ------ The conflict detection feature in Windows Server DHCP uses PING to ensure that an IP address is not in use on the network before the server offers a lease to a client.

    Correct Answer
    D. D. Increase the conflict detection attempts in the DHCP server properties. ------ The conflict detection feature in Windows Server DHCP uses PING to ensure that an IP address is not in use on the network before the server offers a lease to a client.
  • 22. 

    Your organization contains a Windows Server 2008 DHCP server named IP01. You need to ensure that incorrect or missing information for client IP addresses that are stored in the server's scopes are purged and/or corrected. What action should you perform? A. Unauthorized and reauthorize the DHCP server in Active Directory. B. Enable conflict detection on IP01. C. Reconcile the scopes on IP01. D. Restart the DHCP Server service on IP01.

    • A.

      A. Unauthorized and reauthorize the DHCP server in Active Directory. ------ There is utterly no need to perform this action to fix inconsistencies in a DHCP scope database.

    • B.

      B. Enable conflict detection on IP01. ------ Conflict detection uses ICMP ping messages to ensure that an IP address is not already in use on the network before a lease is granted to a requesting host.

    • C.

      C. Reconcile the scopes on IP01. ------ Reconciling scopes is an online action in which inconsistencies in scope data are fixed.

    • D.

      D. Restart the DHCP Server service on IP01. ------ Restarting the service, much less the DHCP server, will not automatically repair inconsistencies in the scope data.

    Correct Answer
    C. C. Reconcile the scopes on IP01. ------ Reconciling scopes is an online action in which inconsistencies in scope data are fixed.
    Explanation
    Reconciling the scopes on IP01 is the correct action to perform in order to ensure that incorrect or missing information for client IP addresses stored in the server's scopes are purged and/or corrected. Reconciling scopes is an online action that fixes inconsistencies in scope data. Restarting the DHCP Server service or enabling conflict detection will not automatically repair the inconsistencies in the scope data, and unauthorized and reauthorizing the DHCP server in Active Directory is unnecessary for fixing scope database inconsistencies.

    Rate this question:

  • 23. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008 and all client computers run Windows Vista. You are planning to migrate from IPv4 to IPv6 and need to educate yourself as to how IPv6 addressing works. Which of the following represents an invalid IPv6 address? A. 2001:cgba::3257:9654 B. 2001:cdba::3257:9651 C. 2001:cdba:0000:0000:0000:0000:3257:9656 D. 2001:cdba:0:0:0:0:3257:9655

    • A.

      A. 2001:cgba::3257:9654 ------ This IPv6 address is invalid because g is an illegal character in hexadecimal notation.

    • B.

      B. 2001:cdba::3257:9651 ------ This is a valid IPv6 address.

    • C.

      C. 2001:cdba:0000:0000:0000:0000:3257:9656 ------ This is a valid IPv6 address.

    • D.

      D. 2001:cdba:0:0:0:0:3257:9655 ------ This is a valid IPv6 address.

    Correct Answer
    A. A. 2001:cgba::3257:9654 ------ This IPv6 address is invalid because g is an illegal character in hexadecimal notation.
  • 24. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008 and all client computers run Windows Vista. Your company is migrating to IPv6. In particular, you need to configure DHCP to support client autoconfiguration. What action should you perform? A. Configure the DHCP server to use DHCPv6 Stateful mode. B. Configure all client computers to support PNRP. C. Configure the DHCP server to use DHCPv6 Stateless mode. D. Configure all client computers to use DHCPv6 Client mode.

    • A.

      A. Configure the DHCP server to use DHCPv6 Stateful mode. ------ In DHCPv6 Stateful mode, clients receive both an IPv6 address as well as all other addresses/parameters from the DHCPv6 server.

    • B.

      B. Configure all client computers to support PNRP. ------ Windows Vista supports the Peer Name Resolution Protocol (PNRP) by default. Besides, that protocol is only tangentially related to the subject that is under consideration in this item.

    • C.

      C. Configure the DHCP server to use DHCPv6 Stateless mode. ------ In DHCPv6 Stateless mode, clients auto-assign their IP addresses and receive additional parameters (default gateway address, DNS server address, etc.) from the DHCPv6 server.

    • D.

      D. Configure all client computers to use DHCPv6 Client mode. ------ In DHCPv6 Client mode, no IPv6 information is given to the client; this simply determines the relationship between the client devices and routers that may lie between the client and the DHCPv6 server.

    Correct Answer
    C. C. Configure the DHCP server to use DHCPv6 Stateless mode. ------ In DHCPv6 Stateless mode, clients auto-assign their IP addresses and receive additional parameters (default gateway address, DNS server address, etc.) from the DHCPv6 server.
  • 25. 

    Your organization currently uses the IPv4 network address 192.168.16.0/24. You need to expand the network into 7 segments of at least 28 hosts each. What action should you perform? A. Deploy the subnet mask 255.255.255.224 in the network. B. Deploy the subnet mask 255.255.255.240 in the network. C. Deploy the subnet mask 255.255.255.128 in the network. D. Deploy the subnet mask 255.255.255.248 in the network.

    • A.

      A. Deploy the subnet mask 255.255.255.224 in the network. ------ A 27-bit mask will yield 8 subnets with 30 hosts per subnet.

    • B.

      B. Deploy the subnet mask 255.255.255.240 in the network. ------ A 28-bit mask will yield 16 subnets, but with only 14 host IDs per subnet.

    • C.

      C. Deploy the subnet mask 255.255.255.128 in the network. ------ A 25-bit mask will yield only two subnets with 126 host ID available on each subnet.

    • D.

      D. Deploy the subnet mask 255.255.255.248 in the network. ------ A 29-bit mask yields 32 subnets with only 6 hosts per subnet.

    Correct Answer
    A. A. Deploy the subnet mask 255.255.255.224 in the network. ------ A 27-bit mask will yield 8 subnets with 30 hosts per subnet.
  • 26. 

    You manage a Windows Server 2008 file server named FS01. For ease of management you want to rely upon DHCP for IP configuration on this server. However, you need to ensure that users are able to connect to FS01 reliably. What action should you perform? A. Create a DHCP exclusion for FS01. B. Configure FS01 with a static IPv4 address. C. Create a Connection Security Rule in a Group Policy Object (GPO). Scope the GPO to apply to FS01. D. Create a DHCP reservation for FS01.

    • A.

      A. Create a DHCP exclusion for FS01. ------ If we created an IP address exclusion in DHCP, then again we would have to configure FS01 with a static IP address. This is not what the scenario asks us to do.

    • B.

      B. Configure FS01 with a static IPv4 address. ------ Although this option would allow reliable connections from users, the scenario states that we want to make FS01 a DHCP client.

    • C.

      C. Create a Connection Security Rule in a Group Policy Object (GPO). Scope the GPO to apply to FS01. ------ Connection Security Rules used to be called IPSec policies in Windows Server 2003. We are not concerned with providing packet-level security in this item.

    • D.

      D. Create a DHCP reservation for FS01. ------ We can reserve an IP configuration for FS01 based upon the Media Access Control (MAC) address of the network interface card (NIC) in FS01.

    Correct Answer
    D. D. Create a DHCP reservation for FS01. ------ We can reserve an IP configuration for FS01 based upon the Media Access Control (MAC) address of the network interface card (NIC) in FS01.
  • 27. 

    Your organization is planning to migrate from an IPv4 infrastructure to an IPv6 infrastructure. Your manager is concerned about how IPv6 packets can be routed over the public Internet, especially to destinations that still use IPv4. What actions should you perform? (Select two choices. Each correct answer represents an independent solution.) A. Deploy 6to4 technology in your network. B. Deploy NPS in your network. C. Deploy the Teredo transition technology in your network. D. Deploy NAT in your network.

    • A.

      A. Deploy 6to4 technology in your network. ------ The 6to4 technology was developed to facilitate communications between IPv6 hosts and IPv4 hosts.

    • B.

      B. Deploy NPS in your network. ------ The Windows Server 2008 Network Policy Server(NPS) technology is not relevant in this scenario.

    • C.

      C. Deploy the Teredo transition technology in your network. ------ Teredo is a vendor-neutral technology that was developed to allow IPv6 and IPv4 to interoperate.

    • D.

      C. Deploy the Teredo transition technology in your network. ------ Teredo is a vendor-neutral technology that was developed to allow IPv6 and IPv4 to interoperate.

    Correct Answer(s)
    A. A. Deploy 6to4 technology in your network. ------ The 6to4 technology was developed to facilitate communications between IPv6 hosts and IPv4 hosts.
    C. C. Deploy the Teredo transition technology in your network. ------ Teredo is a vendor-neutral technology that was developed to allow IPv6 and IPv4 to interoperate.
    Explanation
    The correct answer is A and C.

    The 6to4 technology allows for communication between IPv6 hosts and IPv4 hosts. This technology encapsulates IPv6 packets within IPv4 packets, allowing them to be routed over the public Internet.

    The Teredo transition technology is a vendor-neutral solution that enables IPv6 and IPv4 to interoperate. It encapsulates IPv6 packets within IPv4 UDP packets, allowing them to be routed over the public Internet.

    Deploying both 6to4 and Teredo technologies in the network will ensure that IPv6 packets can be routed to destinations that still use IPv4.

    Rate this question:

  • 28. 

    You are responsible for creating a new Active Directory domain for a client in which all servers will run Windows Server 2008. Your DHCP strategy involves deploying two DHCP servers with redundant scopes for fault-tolerance purposes. You need to reduce the attack surface of these two DHCP servers as much as possible. What action should you perform? A. Ensure that both DHCP servers are configured with the Active Directory Domain Services role as well. B. Disable IPv6 on both DHCP servers. C. Install the Network Policy Server (NPS) role on both DHCP servers. D. Install Windows Server 2008 in the Server Core configuration on both servers.

    • A.

      A. Ensure that both DHCP servers are configured with the Active Directory Domain Services role as well. ------ Again, this is a preposterous action. In a best case scenario, we want two Server Core machines that are largely dedicated to their DHCP server duties.

    • B.

      B. Disable IPv6 on both DHCP servers. ------ Quite the contrary! IPv6 is considered to be a far more secure protocol than its predecessor, IPv4.

    • C.

      C. Install the Network Policy Server (NPS) role on both DHCP servers. ------ The scenario states no requirement for NAP and/or remote access services. Hardening a server means that we DO NOT install any unnecessary services and applications.

    • D.

      D. Install Windows Server 2008 in the Server Core configuration on both servers. ------ The Server Core installation type supports the DHCP Server server role. The Server Core installation reduces the attack surface by eliminating the explorer.exe shell and most unnecessary services, drivers, and applications.

    Correct Answer
    D. D. Install Windows Server 2008 in the Server Core configuration on both servers. ------ The Server Core installation type supports the DHCP Server server role. The Server Core installation reduces the attack surface by eliminating the explorer.exe shell and most unnecessary services, drivers, and applications.
    Explanation
    Installing Windows Server 2008 in the Server Core configuration on both servers is the correct action to reduce the attack surface of the DHCP servers. The Server Core installation type eliminates the explorer.exe shell and most unnecessary services, drivers, and applications, reducing the potential vulnerabilities and attack vectors. This configuration is recommended for dedicated DHCP server duties and helps to enhance the security and fault-tolerance of the DHCP infrastructure.

    Rate this question:

  • 29. 

    Your organization has recently upgraded all domain servers from Windows Server 2003 to Windows Server 2008. You need to configure IPSec policy in a Group Policy Object. However, you are unsure where the IPSec policy settings are stored in Windows Server 2008. What action should you perform? A. Configure inbound and outbound rules in the Windows Firewall with Advanced Security node in Group Policy. B. Configure the IPSec Enforcement Client in the Nework Access Protection (NAP) node in Group Policy. C. Specify a cryptographic service provider in the Health Registration Settings node in Group Policy. D. Configure Connection Security Rules in the Windows Firewall with Advanced Security node in Group Policy.

    • A.

      A. Configure inbound and outbound rules in the Windows Firewall with Advanced Security node in Group Policy. ------ While these nodes do exist, IPSec policies are now categorized as Connection Security Rules in Windows Server 2008 and Windows Vista.

    • B.

      B. Configure the IPSec Enforcement Client in the Nework Access Protection (NAP) node in Group Policy. ------ IPSec security policies and NAP are related, however, we need to configure the IPSec rules themselves in the Windows Firewall with Advanced Security node in Group Policy.

    • C.

      C. Specify a cryptographic service provider in the Health Registration Settings node in Group Policy. ------ This item is concerned with protecting network traffic with Internet Protocol Security (IPSec), not NAP-based computer health policies.

    • D.

      D. Configure Connection Security Rules in the Windows Firewall with Advanced Security node in Group Policy. ------ IPSec policies are now configured as Connection Security Rules in the Windows Firewall with Advanced Security utility.

    Correct Answer
    D. D. Configure Connection Security Rules in the Windows Firewall with Advanced Security node in Group Policy. ------ IPSec policies are now configured as Connection Security Rules in the Windows Firewall with Advanced Security utility.
  • 30. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008. Due to budgetary constraints, you need to configure a member server as an IPv4 router rather than purchase dedicated hardware. What action should you perform first? A. Install the Routing and Remote Access Service server role. B. Install Active Directory Domain Services on the member server. C. Create the appropriate exceptions in Windows Firewall. D. Configure the member server as a multihomed host.

    • A.

      A. Install the Routing and Remote Access Service server role. ------ You need to provide the physical capability of routing packets to different IP subnetworks on the server before you configure the server role.

    • B.

      B. Install Active Directory Domain Services on the member server. ------ It is not a recommended best practice to install the RRAS server role on a domain controller. This step is certainly not necessary to the process.

    • C.

      C. Create the appropriate exceptions in Windows Firewall. ------ Whenever you install a server role in Windows Server 2008, the operating system automatically creates the appropriate traffic access rules in Windows Firewall.

    • D.

      D. Configure the member server as a multihomed host. ------ In order for a Windows Server computer to serve as an IP router and/or remote access server, the server must have more than one network interface card (NIC) installed. This configuration is referred to as multihomed.

    Correct Answer
    D. D. Configure the member server as a multihomed host. ------ In order for a Windows Server computer to serve as an IP router and/or remote access server, the server must have more than one network interface card (NIC) installed. This configuration is referred to as multihomed.
  • 31. 

    Your organization consists of a single Active Directory domain in which all servers run either Windows Server 2003 or Windows Server 2008 and client computers run either Windows 2000 Professional or Windows XP SP2. You are planning to migrate the network's IP addressing infrastructure to IPv6. What actions should you perform? (Select two choices. Each correct answer represents a part of a single solution.) A. Ensure that all DHCP servers are multihomed. B. Upgrade the Windows 2000 Professional computers to Windows XP SP2. C. Upgrade the Windows Server 2003 computers to Windows Server 2008. D. Ensure that all DHCP servers run Windows Server 2008.

    • A.

      A. Ensure that all DHCP servers are multihomed. ------ There is no requirement for this in order for a Windows Server 2008 DHCP server to support a dual IPv4/IPv6 infrastructure.

    • B.

      B. Upgrade the Windows 2000 Professional computers to Windows XP SP2. ------ IPv6 is not available in Windows 2000 or Windows 9x.

    • C.

      C. Upgrade the Windows Server 2003 computers to Windows Server 2008. ------ Windows Server 2003 includes native support for IPv6.

    • D.

      D. Ensure that all DHCP servers run Windows Server 2008. ------ Although Windows Server 2003 R2 can use IPv6 as a client, only Windows Server 2008 DHCP includes support for IPv6 scopes.

    Correct Answer(s)
    B. B. Upgrade the Windows 2000 Professional computers to Windows XP SP2. ------ IPv6 is not available in Windows 2000 or Windows 9x.
    D. D. Ensure that all DHCP servers run Windows Server 2008. ------ Although Windows Server 2003 R2 can use IPv6 as a client, only Windows Server 2008 DHCP includes support for IPv6 scopes.
  • 32. 

    Your organization consists of a single Active Directory domain in which all servers run Windows Server 2008 and all clients run Windows Vista. You need to configure your client computers' TCP/IP settings to provide IPv6 support in networks within your organization that support only IPv4 and NAT. What action should you perform? A. Ensure that the IPv6 protocol is enabled in the network card properties of all client workstations. B. Run the command netsh interface ipv6 set teredo on all client workstations. C. Ensure that at least one IPv6 scope is created on the network's DHCP server. D. Run the command netsh interface ipv6 set state on all client workstations.

    • A.

      A. Ensure that the IPv6 protocol is enabled in the network card properties of all client workstations. ------ This should be an obvious first step. If we disable IPv6 in the network card properties, then the IPv6 protocol is completely unusable.

    • B.

      B. Run the command netsh interface ipv6 set teredo on all client workstations. ------ The Teredo protocol is what allows Windows Vista and Windows Server 2008 computers to use IPv6 in environments that consist of Network Address Translation (NAT)-enabled firewalls and routers and an IPv4 addressing infrastructure.

    • C.

      C. Ensure that at least one IPv6 scope is created on the network's DHCP server. ------ The scenario does not state whether DHCP or static addressing is being used on the network.

    • D.

      D. Run the command netsh interface ipv6 set state on all client workstations. ------ The set state context of the netsh int command is used to enable or disable IPv4 compatibility. In this case, since NAT is involved as well, we need to be concerned, at least principally, with Teredo settings.

    Correct Answer
    B. B. Run the command netsh interface ipv6 set teredo on all client workstations. ------ The Teredo protocol is what allows Windows Vista and Windows Server 2008 computers to use IPv6 in environments that consist of Network Address Translation (NAT)-enabled firewalls and routers and an IPv4 addressing infrastructure.
    Explanation
    The correct answer is B. Running the command netsh interface ipv6 set teredo on all client workstations is the appropriate action to provide IPv6 support in networks within the organization that only support IPv4 and NAT. The Teredo protocol allows Windows Vista and Windows Server 2008 computers to use IPv6 in environments that consist of NAT-enabled firewalls and routers and an IPv4 addressing infrastructure. This command enables the Teredo protocol, which is necessary for IPv6 support in this specific network configuration.

    Rate this question:

  • 33. 

    Your organization consists of a single Active Directory domain. You undertake performance analysis of a Windows Server 2008 DHCP server named IP01 and determine that the DHCP database needs to be compacted. What action should you perform? A. Use the NTDSUTIL utility. B. Use the WDSUTIL utility. C. Use the jetpack.exe utility. D. Use the NETSH utility.

    • A.

      A. Use the NTDSUTIL utility. ------ We use this utility to perform operations on the Active Directory Domain Services database.

    • B.

      B. Use the WDSUTIL utility. The WDSUTIL command-line tool is used to manage Windows Deployment Services (WDS) from a command-prompt environment.

    • C.

      C. Use the jetpack.exe utility. ------ The jetpack.exe command-line tool can be used to compress and optimize WINS and DHCP databases, both of which use the Microsoft Access-based JET database engine.

    • D.

      D. Use the NETSH utility. ------ While the NETSH utility contains many operations that are useful for DHCP administration, we cannot compact the DHCP database by using this command.

    Correct Answer
    C. C. Use the jetpack.exe utility. ------ The jetpack.exe command-line tool can be used to compress and optimize WINS and DHCP databases, both of which use the Microsoft Access-based JET database engine.
    Explanation
    The correct answer is C. Use the jetpack.exe utility. The jetpack.exe command-line tool can be used to compress and optimize WINS and DHCP databases, both of which use the Microsoft Access-based JET database engine. This utility is specifically designed for compacting and optimizing databases, making it the appropriate choice for compacting the DHCP database in this scenario. The other options, NTDSUTIL, WDSUTIL, and NETSH, are not designed for compacting DHCP databases and would not be the correct choice in this situation.

    Rate this question:

  • 34. 

    Your organization includes a Windows Server 2008 member server named RA01 that is configured with the RRAS server role. You need to configure RA01 to allow or block certain IP traffic for entire subnets to which the RRAS server is connected. What action should you perform? A. Configure IPSec policy in Windows Firewall. B. Configure packet filtering in Windows Firewall. C. Install a RADIUS server on the network. D. Deploy RRAS packet filters.

    • A.

      A. Configure IPSec policy in Windows Firewall. ------ This policy affects only the local server. We need to deploy RRAS packet filters to affect traffic that is not directly associated with the RRAS server.

    • B.

      B. Configure packet filtering in Windows Firewall. ------ Windows Firewall will only screen packets that are directly addressed to the local server. We need to use RRAS packet filters to filter traffic that is destined for remote networks.

    • C.

      C. Install a RADIUS server on the network. ------ RADIUS is not relevant in this scenario.

    • D.

      D. Deploy RRAS packet filters. ------ The filtering that Windows Firewall provides governs only traffic that originates from or is directly addresses to the RRAS server itself. We need to use RRAS packet filters in this case.

    Correct Answer
    D. D. Deploy RRAS packet filters. ------ The filtering that Windows Firewall provides governs only traffic that originates from or is directly addresses to the RRAS server itself. We need to use RRAS packet filters in this case.
  • 35. 

    You need to create a new scope on your organization's Windows Server 2008 DHCP server that employs Class D IP addresses to support a new videoconferencing initiative which your company is spearheading. What action should you perform? A. Create a multicast scope on the DHCP server. B. Install the MADCAP protocol on the DHCP server. C. Create a DHCP vendor class on the server. D. Create a superscope on the DHCP server.

    • A.

      A. Create a multicast scope on the DHCP server. ------ In contrast to unicast IP, which is a one-to-one proposition, multicast scopes, which use Class D IPv4 addresses, enable multiple target hosts to "share" a single virtual IP address to save on network bandwidth.

    • B.

      B. Install the MADCAP protocol on the DHCP server. ------ Multicast DHCP does indeed use the MADCAP protocol; however, there is nothing to configure concerning the protocol in particular. We simply need to define a multicast scope by using the DHCP MMC console.

    • C.

      C. Create a DHCP vendor class on the server. ------ DHCP vendor classes and user classes are cool ways to target specific IP configurations to computers that match a particular vendor requirement, or users who meet class membership or location criteria.

    • D.

      D. Create a superscope on the DHCP server. ------ A superscope is a single scope that contains IP addresses from more than one subnet.

    Correct Answer
    A. A. Create a multicast scope on the DHCP server. ------ In contrast to unicast IP, which is a one-to-one proposition, multicast scopes, which use Class D IPv4 addresses, enable multiple target hosts to "share" a single virtual IP address to save on network bandwidth.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 27, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 10, 2009
    Quiz Created by
    Rmcka
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.