Lesson 6: Working With Networking Services

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lauraborkent
L
Lauraborkent
Community Contributor
Quizzes Created: 9 | Total Attempts: 3,353
Questions: 17 | Attempts: 281

SettingsSettingsSettings
Networking Quizzes & Trivia

Questions and Answers
  • 1. 

    What protocol automatically configures IP configuration for a client?

    • A.

      DNS

    • B.

      DHCP

    • C.

      WINS

    • D.

      FTP

    Correct Answer
    A. DNS
    Explanation
    The correct answer is DHCP. DHCP stands for Dynamic Host Configuration Protocol. It is responsible for automatically assigning IP addresses to clients on a network. DNS, on the other hand, stands for Domain Name System and is used to translate domain names into IP addresses. WINS is an outdated protocol used for name resolution in Windows networks. FTP is a protocol used for file transfer.

    Rate this question:

  • 2. 

    Which of these ports does DHCP use?

    • A.

      80

    • B.

      67

    • C.

      23

    • D.

      500

    Correct Answer
    B. 67
    Explanation
    DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign IP addresses and other network configuration settings to devices on a network. It operates at the application layer of the TCP/IP model. DHCP uses port number 67 for its server side, also known as the DHCP server, to listen for and receive DHCP requests from client devices. Therefore, the correct answer is 67.

    Rate this question:

  • 3. 

    After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?

    • A.

      Register the scope

    • B.

      Register the server

    • C.

      Authorize the server

    • D.

      Register the clients

    Correct Answer
    C. Authorize the server
    Explanation
    After installing DHCP servers and configuring and activating a scope, the last step is to authorize the server. This is necessary to ensure that the DHCP server is allowed to provide IP addresses to clients on the network. By authorizing the server, it becomes a trusted entity within the network infrastructure, allowing it to lease IP addresses and provide network configuration information to clients.

    Rate this question:

  • 4. 

    You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem?

    • A.

      It cannot communicate with a DHCP server.

    • B.

      The DNS servers specified are incorrect or are down.

    • C.

      NetBIOS over TCP/IP has not been enabled.

    • D.

      The network card is not connected properly to the network.

    Correct Answer
    A. It cannot communicate with a DHCP server.
    Explanation
    The most likely problem is that the computer cannot communicate with a DHCP server. The given IP address (169.254.32.23) falls within the range of Automatic Private IP Addressing (APIPA), which is used when a DHCP server is not available. This suggests that the computer is unable to obtain an IP address from a DHCP server, which would prevent it from connecting to the local file servers.

    Rate this question:

  • 5. 

    What name does Windows Server 2008 R2 use for Terminal Services?

    • A.

      MS Telnet Server

    • B.

      MS Primary Services

    • C.

      MS Thin Server

    • D.

      Remote Desktop Services

    Correct Answer
    D. Remote Desktop Services
    Explanation
    Windows Server 2008 R2 uses the name "Remote Desktop Services" for Terminal Services. This feature allows users to access and use applications, data, and desktops remotely over a network. It provides a secure and efficient way to connect to a server and access resources from anywhere, using devices such as computers, tablets, or smartphones. Remote Desktop Services enables organizations to centralize and manage their applications and data, providing flexibility and ease of access for users.

    Rate this question:

  • 6. 

    What port does Remote Desktop Services use?

    • A.

      443

    • B.

      501

    • C.

      389

    • D.

      3389

    Correct Answer
    D. 3389
    Explanation
    Remote Desktop Services use port 3389. This port is the default port for the Remote Desktop Protocol (RDP), which allows users to connect to and control a remote computer over a network connection. By using port 3389, Remote Desktop Services establish a secure and encrypted connection between the client and the server, allowing users to access and use the remote computer as if they were physically present at that location.

    Rate this question:

  • 7. 

    What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2?

    • A.

      Microsoft RAS

    • B.

      Microsoft RRAS

    • C.

      Microsoft RDC

    • D.

      Microsoft VPN Server

    Correct Answer
    B. Microsoft RRAS
    Explanation
    Microsoft RRAS (Routing and Remote Access Service) is the correct answer because it is a feature in Windows Server 2008 R2 that enables the creation of VPN tunnels. RRAS allows users to connect to the internal network securely from their homes, providing remote access to resources and services. It acts as a VPN server, allowing users to establish a secure connection over the public internet.

    Rate this question:

  • 8. 

    What protocol is used with L2TP to encrypt data?

    • A.

      IPSec

    • B.

      MS-CHAP

    • C.

      MS-CHAPv2

    • D.

      MPPE

    Correct Answer
    A. IPSec
    Explanation
    IPSec is used with L2TP (Layer 2 Tunneling Protocol) to encrypt data. L2TP provides the tunneling mechanism for establishing virtual private networks (VPNs) and IPSec is the protocol that adds security to the VPN by encrypting the data that is being transmitted. IPSec ensures the confidentiality, integrity, and authenticity of the data by encrypting it and providing secure communication over the internet.

    Rate this question:

  • 9. 

    Which component of IPSec is generates the encryption and authentication keys?

    • A.

      SA

    • B.

      AH

    • C.

      ESP

    • D.

      MPPE

    Correct Answer
    A. SA
    Explanation
    SA stands for Security Association, which is responsible for generating the encryption and authentication keys in IPSec. The SA defines the security parameters and the algorithms to be used for securing the communication between two entities. It establishes a secure channel between the sender and receiver, ensuring confidentiality, integrity, and authentication of the data. The SA generates the necessary keys that are used for encryption and authentication of the IP packets.

    Rate this question:

  • 10. 

    Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality?

    • A.

      SA

    • B.

      AH

    • C.

      ESP

    • D.

      MPPE

    Correct Answer
    B. AH
    Explanation
    AH (Authentication Header) provides connectionless integrity and data authentication but does not provide confidentiality. It ensures that the data has not been tampered with during transmission by adding a header that includes a cryptographic checksum. However, AH does not encrypt the data, so it does not provide confidentiality or privacy.

    Rate this question:

  • 11. 

    Which IPsec component includes the most security, including confidentiality?

    • A.

      SA

    • B.

      AH

    • C.

      ESP

    • D.

      MPPE

    Correct Answer
    C. ESP
    Explanation
    ESP (Encapsulating Security Payload) is the correct answer because it provides the most security, including confidentiality. ESP encrypts the entire IP packet, including the payload, to ensure that the data remains confidential and cannot be intercepted or read by unauthorized parties. It also provides authentication and integrity checks to ensure that the data has not been tampered with during transmission. AH (Authentication Header) only provides authentication and integrity checks but does not encrypt the payload, while SA (Security Association) and MPPE (Microsoft Point-to-Point Encryption) do not provide the same level of security and confidentiality as ESP.

    Rate this question:

  • 12. 

    What port does DNS use?

    • A.

      443

    • B.

      389

    • C.

      51

    • D.

      53

    Correct Answer
    D. 53
    Explanation
    DNS (Domain Name System) uses port number 53. DNS is responsible for translating domain names into IP addresses. When a client wants to access a website, it sends a DNS query to a DNS server using port 53. The DNS server then responds with the corresponding IP address, allowing the client to establish a connection with the desired website. Port 53 is specifically designated for DNS communication, making it the correct answer.

    Rate this question:

  • 13. 

    What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?

    • A.

      DNS

    • B.

      WINS

    • C.

      DHCP

    • D.

      LDAP

    Correct Answer
    B. WINS
    Explanation
    WINS (Windows Internet Name Service) is the correct answer for this question. WINS is a service used on Windows networks to translate between NetBIOS names/computer names and IP addresses. It provides a way for computers to resolve NetBIOS names to IP addresses, allowing them to communicate with each other on the network. DNS (Domain Name System) is also used for name resolution, but it primarily translates domain names to IP addresses, whereas WINS specifically handles NetBIOS name resolution. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network, and LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and maintaining directory information.

    Rate this question:

  • 14. 

    What feature within Windows allows the server to act as a router?

    • A.

      IPsec

    • B.

      DHCP

    • C.

      IP forwarding

    • D.

      RDC

    Correct Answer
    C. IP forwarding
    Explanation
    IP forwarding is a feature within Windows that allows the server to act as a router. This feature enables the server to receive network packets on one network interface and then forward them to another network interface, effectively routing traffic between different networks. By enabling IP forwarding, the server can perform the necessary routing functions and facilitate communication between different network segments.

    Rate this question:

  • 15. 

    You use the ________ to connect to a terminal server.

    Correct Answer
    RDC
    Explanation
    The correct answer is RDC. RDC stands for Remote Desktop Connection, which is a Windows feature that allows users to connect to and control a remote computer or server. It enables users to access files, applications, and network resources on the remote computer as if they were sitting in front of it. Therefore, RDC is the appropriate tool to use when connecting to a terminal server.

    Rate this question:

  • 16. 

    ________ provides name resolution between domain names and IP addresses.

    Correct Answer
    DNS
    Explanation
    DNS stands for Domain Name System. It is a decentralized naming system that translates domain names into IP addresses. When a user enters a domain name in a web browser, the DNS system resolves the domain name to its corresponding IP address, allowing the user to access the desired website. DNS plays a crucial role in providing name resolution between domain names and IP addresses, ensuring that users can easily navigate the internet by using human-readable domain names instead of complex numerical IP addresses.

    Rate this question:

  • 17. 

    ________ allows a user to connect to a corporate network using the Internet.

    Correct Answer
    VPN
    Explanation
    A VPN (Virtual Private Network) allows a user to connect to a corporate network using the Internet. It creates a secure and encrypted connection between the user's device and the corporate network, ensuring that the data transmitted over the Internet remains private and protected. This enables remote workers or employees in different locations to access the corporate network and its resources as if they were physically present in the office. VPNs are commonly used for remote access, telecommuting, and to enhance security when accessing sensitive information over public networks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 07, 2017
    Quiz Created by
    Lauraborkent
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.