Dynamic Host Configuration Protocol DHCP Quiz Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jevavee
J
Jevavee
Community Contributor
Quizzes Created: 4 | Total Attempts: 5,371
Questions: 25 | Attempts: 1,332

SettingsSettingsSettings
DHCP Quizzes & Trivia

DHCP and DNS Servers


Questions and Answers
  • 1. 

    For DHCP to allocate address from a particular scope, the scope must be ____________________

    • A.

      Authenticated

    • B.

      Allocate

    • C.

      Authorized

    • D.

      Activated

    Correct Answer
    D. Activated
    Explanation
    In order for DHCP to allocate an address from a particular scope, the scope must be activated. This means that the scope is enabled and ready to assign IP addresses to devices on the network. Without activation, DHCP will not be able to assign addresses from that specific scope.

    Rate this question:

  • 2. 

    The Command Line Syntax to install DHCP on Windows Server 2008 Server Core is ___________________.

    • A.

      Start /w ocsetup DHCPServerCore

    • B.

      Ocsetup /start DHCPInstall/w

    • C.

      DHCPSetup/install ServerCore

    • D.

      DHCPServerCore start /w ocsetup

    Correct Answer
    A. Start /w ocsetup DHCPServerCore
    Explanation
    The correct command line syntax to install DHCP on Windows Server 2008 Server Core is "Start /w ocsetup DHCPServerCore".

    Rate this question:

  • 3. 

    The expected response from a DHCPDISCOVER message is:

    • A.

      DHCPACK

    • B.

      DHCPREQUEST

    • C.

      DHCPOFFER

    • D.

      DHCPRELEASE

    Correct Answer
    C. DHCPOFFER
    Explanation
    The correct answer is DHCPOFFER. When a DHCPDISCOVER message is sent by a client to request an IP address, the expected response from the DHCP server is a DHCPOFFER message. This message is sent by the server to offer an available IP address to the client. The client can then choose to accept the offered IP address by sending a DHCPREQUEST message to the server.

    Rate this question:

  • 4. 

    This service will allocate an IP address to a dynamically configured host in the event that DHCP fails to initialize the host.

    • A.

      ARP

    • B.

      RIP

    • C.

      OSPF

    • D.

      APIPA

    Correct Answer
    D. APIPA
    Explanation
    APIPA stands for Automatic Private IP Addressing. It is a feature in Windows operating systems that allows a computer to automatically assign itself an IP address when it cannot obtain one from a DHCP server. In the given scenario, if DHCP fails to initialize the host, the service will use APIPA to allocate an IP address to the dynamically configured host. This ensures that the host can still communicate on the network even without a DHCP server.

    Rate this question:

  • 5. 

    DHCP relies heavily on _________________protocol.

    • A.

      BOOTP

    • B.

      ARP

    • C.

      APIPA

    • D.

      OSPF

    Correct Answer
    A. BOOTP
    Explanation
    DHCP relies heavily on the BOOTP (Bootstrap Protocol) protocol. BOOTP was the predecessor of DHCP and was used to assign IP addresses to devices on a network. DHCP was developed to enhance BOOTP by adding more features and flexibility. DHCP uses BOOTP as its foundation and extends it to provide dynamic IP address allocation, automatic configuration of network parameters, and centralized management of IP addresses. Therefore, BOOTP is an essential protocol for DHCP to function effectively.

    Rate this question:

  • 6. 

    This is generated at logon and identifies a user and all group memberships associated with that user.

    • A.

      User Object

    • B.

      User Abstraction

    • C.

      Access Token

    • D.

      Initialization Vector

    Correct Answer
    C. Access Token
    Explanation
    An access token is generated at logon and it serves as an identification for a user and all the group memberships associated with that user. It is used to authenticate and authorize the user's access to various resources and services within a system.

    Rate this question:

  • 7. 

    This is the process of confirming a user's identity using a known value,such as a password or fingerprint.

    • A.

      Authorization

    • B.

      Authentication

    • C.

      Confirmation

    • D.

      Admission

    Correct Answer
    B. Authentication
    Explanation
    Authentication is the process of confirming a user's identity using a known value, such as a password or fingerprint. It ensures that the user is who they claim to be before granting them access to a system or resource. This verification step helps to enhance security and prevent unauthorized access.

    Rate this question:

  • 8. 

    This special identity group controls anonymous access to objects in a Windoes Server 2008 domain.

    • A.

      Everyone

    • B.

      Interactive

    • C.

      Network

    • D.

      Anonymous Logon

    Correct Answer
    D. Anonymous Logon
    Explanation
    The correct answer is "Anonymous Logon." This special identity group controls anonymous access to objects in a Windows Server 2008 domain. This means that users who are not authenticated or do not have a user account can still access certain objects or resources in the domain anonymously. The Anonymous Logon group allows for limited access without requiring users to provide credentials or login information.

    Rate this question:

  • 9. 

    This type of group can be used to grant permissions to objects located in any domain in a forest.

    • A.

      Group Scope

    • B.

      Group Domain

    • C.

      Group Policy

    • D.

      Group Reach

    Correct Answer
    A. Group Scope
    Explanation
    Group Scope refers to the extent to which a group's permissions can be granted. In this case, the given answer suggests that a group with a wide scope can be used to grant permissions to objects located in any domain within a forest. This means that the group's permissions are not limited to a specific domain and can be applied across multiple domains within the same forest.

    Rate this question:

  • 10. 

    DHCP utulizes this to reserve IP addresses for a certain host:

    • A.

      Broadcast Address

    • B.

      Unicast Address

    • C.

      Multicast Address

    • D.

      Media Access Control (MAC) Address

    Correct Answer
    D. Media Access Control (MAC) Address
    Explanation
    DHCP (Dynamic Host Configuration Protocol) is a network protocol that assigns IP addresses to devices on a network. It uses the Media Access Control (MAC) address to reserve and assign a specific IP address to a certain host. The MAC address is a unique identifier assigned to each network interface card (NIC) of a device. By using the MAC address, DHCP ensures that the same IP address is consistently assigned to the same device, allowing for efficient network management and communication.

    Rate this question:

  • 11. 

    This rule is used to split DHCP scopes to allow fault tolerance.

    • A.

      80/20 Rule

    • B.

      Cooperative Rule

    • C.

      Shared Space Rule

    • D.

      Address Allocation Rule

    Correct Answer
    A. 80/20 Rule
    Explanation
    The 80/20 rule is used to split DHCP scopes to allow fault tolerance. This rule states that 80% of the available IP addresses are allocated to the primary DHCP server, while the remaining 20% are allocated to the secondary DHCP server. This ensures that even if one server fails, the other server can still provide IP addresses to clients. By splitting the scopes in this way, the network can maintain high availability and ensure uninterrupted connectivity for devices.

    Rate this question:

  • 12. 

    Before a fully configured DHCP server can begin operation it must be________________________.

    • A.

      Authenticated

    • B.

      Authorized

    • C.

      Recognized

    • D.

      Initiated

    Correct Answer
    B. Authorized
    Explanation
    Before a fully configured DHCP server can begin operation, it must be authorized. This means that the server needs to be granted permission by a higher authority, such as a domain controller, to provide IP addresses and other network configuration information to clients. This authorization process ensures that only trusted DHCP servers are allowed to operate on the network, preventing unauthorized servers from causing conflicts or security risks.

    Rate this question:

  • 13. 

    This feature allows a host to be configured through DHCP while still retaining the same IP address:

    • A.

      DHCP Override

    • B.

      DHCP Bypass

    • C.

      DHCPReservation

    • D.

      DHCP Exemption

    Correct Answer
    C. DHCPReservation
    Explanation
    DHCP Reservation is the correct answer because it allows a host to be configured through DHCP while still retaining the same IP address. With DHCP Reservation, the DHCP server assigns a specific IP address to a particular host based on its MAC address. This ensures that the host always receives the same IP address whenever it requests an address from the DHCP server, even if the DHCP lease expires or the host restarts.

    Rate this question:

  • 14. 

    This service alloes DHCP communications to cross network boundaries.

    • A.

      DHCP Initiator

    • B.

      DHCP Relay Agent

    • C.

      DHCP Router

    • D.

      DHCP Forwarder

    Correct Answer
    B. DHCP Relay Agent
    Explanation
    A DHCP Relay Agent allows DHCP communications to cross network boundaries. It acts as an intermediary between DHCP clients and DHCP servers, forwarding DHCP messages between them. This is useful in scenarios where DHCP clients and servers are located on different networks, allowing clients to obtain IP addresses and other configuration information from DHCP servers that are not directly reachable.

    Rate this question:

  • 15. 

    This is a collection of accounts to simplify administration of network permissions.

    • A.

      Organizatonal Units

    • B.

      Containers

    • C.

      Targets

    • D.

      Groups

    Correct Answer
    D. Groups
    Explanation
    Groups are a collection of accounts that simplify the administration of network permissions. By organizing users into groups, network administrators can assign permissions and access rights to multiple users at once, rather than individually managing each user account. This not only streamlines the administration process but also enhances security by ensuring consistent permissions across multiple accounts. Therefore, groups are an essential component in simplifying the management of network permissions.

    Rate this question:

  • 16. 

    Using this tool you can deploy hundreds of configuration settings to large collection of users at once.

    • A.

      Windows Metadata Pushing

    • B.

      Group Policy Objects

    • C.

      Domain Federation Services

    • D.

      Implicit Replication Service

    Correct Answer
    B. Group Policy Objects
    Explanation
    Group Policy Objects (GPOs) allow administrators to manage and control the configuration settings of multiple users and computers in a Windows domain. By applying GPOs, administrators can deploy and enforce various settings such as security policies, software installations, and network configurations to a large collection of users simultaneously. GPOs provide a centralized and efficient way to manage and maintain consistent settings across an organization's network. Therefore, the given correct answer is Group Policy Objects.

    Rate this question:

  • 17. 

    A site topology consists of these three Active Directory objects:

    • A.

      Container,Leaf,Root

    • B.

      Organization Unit,Domain,Forest

    • C.

      Site, Subnet, Site link

    • D.

      Users, Computers, Domain Controllers

    Correct Answer
    C. Site, Subnet, Site link
    Explanation
    A site topology in Active Directory consists of three objects: Site, Subnet, and Site link.
    - A site represents a physical location, such as an office or a branch, where network resources are located.
    - A subnet is a logical division of an IP network, which helps in organizing and managing network traffic.
    - A site link is a connection between two or more sites, which defines the path for replication traffic between them.
    These objects help in organizing and managing the Active Directory infrastructure, ensuring efficient communication and replication between different sites and subnets.

    Rate this question:

  • 18. 

    This consists of one or more domain tress which have the same two-way trust relationship as two domains in the same tree:

    • A.

      Root

    • B.

      Cluster

    • C.

      Namespace

    • D.

      Forest

    Correct Answer
    D. Forest
    Explanation
    A forest in Active Directory is a collection of one or more domain trees that share a common schema, global catalog, and trust relationship. Each domain tree within a forest represents a separate namespace, and all domains within the forest are connected by two-way transitive trusts. This allows users and resources to be easily accessed and shared across multiple domains within the forest. Therefore, the correct answer is "Forest".

    Rate this question:

  • 19. 

    This is a Windows Server 2008 domain controller that supports only incoming replication, and is not capable of processing creating, modifying, or deleting Active Directory objects.

    • A.

      Backup Domain Controller

    • B.

      Read-only Domain Controller

    • C.

      Remote Access Domain Controller

    • D.

      Lightweight Directory Domain Controller

    Correct Answer
    B. Read-only Domain Controller
    Explanation
    A read-only domain controller (RODC) is a type of domain controller in Windows Server 2008 that supports only incoming replication. It is designed for use in remote or branch office locations where physical security cannot be guaranteed. An RODC does not allow creating, modifying, or deleting Active Directory objects, making it a suitable choice for environments where there is a need for read-only access to Active Directory but limited administrative control.

    Rate this question:

  • 20. 

    This type of group can be used to grant permissions to objects located in any domain in a forest.

    • A.

      Forest Groups

    • B.

      Power Groups

    • C.

      Global Groups

    • D.

      Administrative Groups

    Correct Answer
    C. Global Groups
    Explanation
    Global Groups can be used to grant permissions to objects located in any domain in a forest. Unlike Domain Local Groups, which can only grant permissions within a specific domain, Global Groups have a scope that extends across the entire forest. This means that they can be used to manage access to resources in multiple domains, making them a useful tool for granting permissions in complex, multi-domain environments.

    Rate this question:

  • 21. 

    This feature contains a list of all objects in a forest along with a subset of each object's attributes.

    • A.

      Global Catalog

    • B.

      Composite Catalog

    • C.

      Global Directory

    • D.

      Composite Directory

    Correct Answer
    A. Global Catalog
    Explanation
    The Global Catalog is a feature that contains a list of all objects in a forest along with a subset of each object's attributes. It serves as a distributed data repository in Active Directory, allowing users to search for objects and their attributes across multiple domains. The Global Catalog helps improve the efficiency of searches by providing a partial view of object attributes, reducing the need for referrals to different domains.

    Rate this question:

  • 22. 

    A Class A Address has __________________________

    • A.

      16,772,214

    • B.

      65,543

    • C.

      254

    • D.

      126

    Correct Answer
    A. 16,772,214
    Explanation
    A Class A Address has a range of 16,772,214 possible unique IP addresses. Class A addresses are identified by having the first octet (the first 8 bits) reserved for network identification, while the remaining 24 bits are used for host identification. This allows for a large number of unique addresses, making Class A addresses suitable for large networks with a large number of hosts.

    Rate this question:

  • 23. 

    This type of hard disk allows you access the advanced disk configuration features.

    • A.

      Basic Disk

    • B.

      Advanced Disk

    • C.

      Enhanced Disk

    • D.

      Dynamic Disk

    Correct Answer
    D. Dynamic Disk
    Explanation
    A dynamic disk allows you to access advanced disk configuration features that are not available with basic disks. These advanced features include creating and managing multiple volumes, such as spanned volumes that combine free space from multiple disks, striped volumes that provide increased performance by spreading data across multiple disks, and mirrored volumes that provide data redundancy by creating an identical copy of data on another disk. Dynamic disks also support fault tolerance options, such as RAID, which can help protect your data in case of disk failure.

    Rate this question:

  • 24. 

    ________________________addressing feature provide IP address without accessing a server or having a manual configuration.

    • A.

      DHCP

    • B.

      ARP

    • C.

      APIPA

    • D.

      DNS

    Correct Answer
    C. APIPA
    Explanation
    APIPA stands for Automatic Private IP Addressing. It is a feature that allows a device to automatically assign itself an IP address without accessing a server or requiring manual configuration. This feature is useful when a device is unable to obtain an IP address from a DHCP server. With APIPA, the device can assign itself a unique IP address within a specific range, enabling it to communicate on the local network. This eliminates the need for manual configuration and ensures that devices can still connect to the network even without a DHCP server.

    Rate this question:

  • 25. 

    Active Directory uses which type of replication to update domain controllers?

    • A.

      Block Chained Feedback Replication

    • B.

      Multiple-Master Replication

    • C.

      Single-Master Replication

    • D.

      Dual Port Multi-initiated Replication

    Correct Answer
    B. Multiple-Master Replication
    Explanation
    Active Directory uses Multiple-Master Replication to update domain controllers. This type of replication allows multiple domain controllers to make changes to the directory database simultaneously. Each domain controller can act as both a publisher and a subscriber, meaning it can both send and receive updates. This ensures that changes made on one domain controller are replicated to all other domain controllers in the network, maintaining consistency and ensuring that all domain controllers have the most up-to-date information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 24, 2012
    Quiz Created by
    Jevavee
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.