Windows Routing Tables Trivia Quiz

50 Questions

Settings
Please wait...
Windows Quizzes & Trivia

.


Questions and Answers
  • 1. 
    How do you secure DFS Namespaces?
    • A. 

      NTFS and shared folder permissions

    • B. 

      NFS and shared folder permissions

    • C. 

      Shared folder permissions

    • D. 

      NTFS permissions

  • 2. 
    Which VPN feature prevents readable access to data without possession of the appropriate key?
    • A. 

      Encryption

    • B. 

      Authentication

    • C. 

      Data integrity

    • D. 

      Non-repudation

  • 3. 
    Which Windows tool is used to provide routing?
    • A. 

      Internet Security and Acceleration Server

    • B. 

      DirectAccess

    • C. 

      Routing and Remote Access

    • D. 

      Server Manager

  • 4. 
    In which of the following situations is it appropriate to use Windows Server 2016 as a router between two networks?
    • A. 

      For heavy traffic on small networks

    • B. 

      For light traffic on small networks

    • C. 

      For light traffic on large networks

    • D. 

      For heavy traffic on large networks

  • 5. 
    RRAS has multiple options available to select one or more services to provide users. Which of the following is the correct description for the Network Address Translation (NAT) option?
    • A. 

      Sets up the server to support incoming VPN connections and to provide NAT services

    • B. 

      Sets up a demand-dial or persistent connection between two private networks

    • C. 

      Sets up the server to provide NAT services to clients on a private network that need to access the internet

    • D. 

      Sets up the server to accept incoming remote access connections (dial-up or VPN)

  • 6. 
    Which of the following terms is defined as "an ordered list of servers or targets that a client computer receives from a domain controller or name space server when the user with targets"?
    • A. 

      Reference

    • B. 

      Target list

    • C. 

      Namespace

    • D. 

      Referral

  • 7. 
    Which of the following do you use to simplify the management of file screens?
    • A. 

      File screen template

    • B. 

      Active screen template

    • C. 

      Passive screen template

    • D. 

      Quota template

  • 8. 
    Which of the following is the primary disadvantage of DFS Replication?
    • A. 

      Additional memory required

    • B. 

      Additional network bandwidth required

    • C. 

      Additional storage space required

    • D. 

      Additional CPU power required

  • 9. 
    Which type of quota used with FSRM prevents users from saving files when the quota is exceeded?
    • A. 

      Disk quota

    • B. 

      Soft quota

    • C. 

      File quota

    • D. 

      Hard quota

  • 10. 
    Which type of screening prevents users from saving the defined unauthorized files?
    • A. 

      Passive screening

    • B. 

      Hard screening

    • C. 

      Active screening

    • D. 

      Soft screening

  • 11. 
    On Windows, which command is used to view and define static routes?
    • A. 

      Router

    • B. 

      Route

    • C. 

      Staticr

    • D. 

      IPConfig

  • 12. 
    How are routing tables created dynamically?
    • A. 

      By using the MAC address protocol

    • B. 

      By using a routing protocol

    • C. 

      By using a Layer 2 switch

    • D. 

      With static routes

  • 13. 
    Which of the following can use to show a list of duplicate files on a volume?
    • A. 

      Reports

    • B. 

      Disk quotas

    • C. 

      File screens

    • D. 

      Folder quotas

  • 14. 
    Which mode of BranchCache conifguration uses one or more dedicated servers to provide the cached copy in the branch office?
    • A. 

      Dedicated cache mode

    • B. 

      Hosted cache mode

    • C. 

      Local copy mode

    • D. 

      Central cache mode

  • 15. 
    What must be configured for a Windows desktop client to support BranchCache
    • A. 

      Install the BranchCache

    • B. 

      Download the BranchCache add-on from http://technet.microsoft.com

    • C. 

      BranchCache is only supported by servers not desktop clients

    • D. 

      Turn-on via Active Directory

  • 16. 
    DFS Namespace shared folders are reffered to as which of the following in relation to the virtual folders?
    • A. 

      Redirects

    • B. 

      Links

    • C. 

      Folder Spaces

    • D. 

      Targets

  • 17. 
    Which VPN feature guarantees that a transferred message was sent and received by the two parties claiming to have sent and received the message?
    • A. 

      Data integrity

    • B. 

      Encryption

    • C. 

      Authentication

    • D. 

      Non-repudation

  • 18. 
    Which of the following is the primary difference between domain-based namespace and stand-alone namespace?
    • A. 

      The requirement for at least one Windows Server 2008 system

    • B. 

      Where the namespaces are stored

    • C. 

      The names given to namespaces

    • D. 

      The number of servers participating in the namespace

  • 19. 
    Your company has two a server called FS1. FS1 has a folder named Folder1 that contains MS Excel financial files. After several days, you discover that random Word and PowerPoint files are showing up. You need to ensure that all of the files in Folder1 are MS Excel file format, how can you do this?
    • A. 

      Create a file screen using FSRM to restrict file types save on the shared folder

    • B. 

      Implement disk quotas to restrict users from saving unrelated data on the shared folder

    • C. 

      Implement DFS and have it replicate with a second server to guarantee that at least one server has the files you want

    • D. 

      Modify the size of the partition hosting folder to prevent running out of space

  • 20. 
    Which VPN tunneling protocol uses IPsec with 3DES for data confidentiality?
    • A. 

      PPTP

    • B. 

      IKEv2

    • C. 

      SSTP

    • D. 

      L2TP

  • 21. 
    Of the four VPN tunneling protocols, which has the weakest encryption?
    • A. 

      PPTP

    • B. 

      L2TP

    • C. 

      SSTP

    • D. 

      IKEv2

  • 22. 
    Which authentication method is the weakest (least secure)?
    • A. 

      CHAP

    • B. 

      MS-CHAPv2

    • C. 

      EAP

    • D. 

      PAP

  • 23. 
    Which of the following DON'T you perform when you change a quota template?
    • A. 

      Warning level

    • B. 

      Hard vs Soft

    • C. 

      File type

    • D. 

      Size limit

  • 24. 
    Your network consists of an Active Directory domain. You have 1 domain controller and 2 file servers at the main site, all locations are connected to the main one via a high-speed and reliable connection. You have a shared folder accessed by numerous users across an enterprise with multiple locations. You need to suggest a solution to make the access to the shared documents more efficient for users on outside locations in the most-cost effective way.
    • A. 

      Create an FSRM file screen filter to prevent users from saving unnecessary files within the shared folders

    • B. 

      Install BranchCache in hosted mode

    • C. 

      Install servers at all other locations, create a DFS namespace and add the shared folder as a target

    • D. 

      Install BranchCache in distributed mode

  • 25. 
    A company's administrator has installed the FSRM role service to manage stored data on a file server. The administrator would like to configure quotas limits for users when they create new folders. Which of the following should the administrator configure to enforce quota limits for users when they create new folders?
    • A. 

      File quota

    • B. 

      File screen

    • C. 

      File quota template

    • D. 

      File group

  • 26. 
    Which of the following allows central configuration and management of physical and virtual network devices, including routers, switches, and gateways in a data center?
    • A. 

      RRAS Multi-tenant Gateway

    • B. 

      Software-Defined Networking

    • C. 

      Hyper-V Network Virtualization

    • D. 

      Network Controller

  • 27. 
    Which additional role should be installed in Windows Server 2016 hosts running Hyper-V?
    • A. 

      RemoteApp

    • B. 

      File Services

    • C. 

      ISCSI

    • D. 

      None

    • E. 

      DNS Server

  • 28. 
    Which NLB control command would be the correct one to use to gracefully prepare a node for a planned maintenance activity?
    • A. 

      Stand by

    • B. 

      Pause

    • C. 

      Drainstop

    • D. 

      Stop

  • 29. 
    Which type of quorum configuration can sustain the loss of one-half of the cluster nodes (rounded up), minus one?
    • A. 

      Failover Witness

    • B. 

      Node Majority with Witness Disk

    • C. 

      No Majority (disk witness only)

    • D. 

      Node Majority (no witness)

  • 30. 
    Which of the following statements about Network Load Balancing is NOT true?
    • A. 

      Windows Server 2016 NLB clusters have between 2 and 32 nodes

    • B. 

      NLB detects the failure of a cluster node using a hearbeat

    • C. 

      All hosts in the NLB cluster receive the incoming traffic

    • D. 

      Network adapters in the NLB cluster can use both multicast and unicast simultaneously

  • 31. 
    Which of the following names is given to the Fibre Channel network used by failover clusters to connect to a shared storage device?
    • A. 

      A fiber

    • B. 

      A stretched network

    • C. 

      The APIPA network

    • D. 

      A fabric

  • 32. 
    Which of the following enables centralized management of virtualized workloads?
    • A. 

      SCOM

    • B. 

      SCCM

    • C. 

      SCVMM

    • D. 

      SCDPM

  • 33. 
    Which of the following is the function of port rules in an NLB cluster?
    • A. 

      They define which ports are balanced among the hosts of the cluster

    • B. 

      They define the ports for which the cluster will not listen

    • C. 

      They define which ports are allowed to pass through the cluster

    • D. 

      They define the ports for which the cluster will listen

  • 34. 
    How many virtual adapters are included by default, after creating a VM?
    • A. 

      4

    • B. 

      0

    • C. 

      1

    • D. 

      16

  • 35. 
    Server virtualization in Windows Server 2016 is based on a module called:
    • A. 

      Hyper Sphere

    • B. 

      Citrix

    • C. 

      Hyper-V

    • D. 

      VSphere

  • 36. 
    Which of the following is the primary graphical tool for creating and managing virtual machines?
    • A. 

      Hyper-V Manager

    • B. 

      Server Manager

    • C. 

      Add Roles and Features Wizard

    • D. 

      PowerShell

  • 37. 
    When the Hyper-V role is added to a Windows Server 2016 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer's hardware via the hypervisor. Which term refers to those individual environments?
    • A. 

      Partitions

    • B. 

      Servers

    • C. 

      Processors

    • D. 

      Machines

  • 38. 
    Which of the following is used to communicate with the network?
    • A. 

      Westbound API

    • B. 

      Northbound API

    • C. 

      Southbound A

    • D. 

      Eastbound API

  • 39. 
    In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device drivers. Which Hyper-V software package can help remedy compatibility issues?
    • A. 

      Guest integration services

    • B. 

      Smart paging

    • C. 

      Resource Metering

    • D. 

      Hyper-V server

  • 40. 
    Which of the following is required to use the Client Hyper-V feature in Windows Server 2016?
    • A. 

      The computer must be using two or more SAS disk drives on separate storage buses

    • B. 

      Which of the following requirements must be met to use the Client Hyper-V feature in Windows Server 2016

    • C. 

      The computer must have a 64-bit processor that incorporates second level address translation (SLAT) technology

    • D. 

      The computer must have a minimum of 32 GB of memory

  • 41. 
    Which of the following is the minimum number of nodes that a production-ready failover cluster requires?
    • A. 

      3

    • B. 

      7

    • C. 

      2

    • D. 

      5

    • E. 

      4

  • 42. 
    Which cluster operation mode is designed to prevent the network switch from flooding with traffic?
    • A. 

      IGMP Multicast

    • B. 

      Single

    • C. 

      Unicast

    • D. 

      Multicast

  • 43. 
    In which NLB cluster operation mode is the MAC address of every node's network adapter replaced with a single shared MAC address?
    • A. 

      Multicast

    • B. 

      Unicast

    • C. 

      Telecast

    • D. 

      Singlecast

  • 44. 
    Which of the following options is NOT used when configuring port rules for NLB clusters?
    • A. 

      The node IP address to which the rule should apply

    • B. 

      The filtering mode

    • C. 

      The node IP address to which the rule should apply

    • D. 

      The filtering mode

  • 45. 
    Which of the following technologies transparently distributes traffic across multiple servers by using virtual IP addresses and a shared name?
    • A. 

      Rendundant network cards

    • B. 

      RAID array

    • C. 

      Network Load Balancing

    • D. 

      Failover cluster

  • 46. 
    Which of the following operating systems can NOT be used in Hyper V virtual machines for Windows Server 2016?
    • A. 

      Windows 10

    • B. 

      Windows 10 Home

    • C. 

      Windows Server 2012

    • D. 

      Windows Server 2003

    • E. 

      SuSE Linux

  • 47. 
    According to Microsoft, Windows Server 2016 can run many virtual machines on each failover cluster; how many?
    • A. 

      4000

    • B. 

      8000

    • C. 

      16

    • D. 

      1000

    • E. 

      2

  • 48. 
    Which of the following can be used to add Network Load Balancing (NLB) to a Windows Server 2016 computer?
    • A. 

      Add/Remove Programs

    • B. 

      Programs and Features

    • C. 

      Server Manager

    • D. 

      Computer Management

  • 49. 
    Which Windows Server 2016 feature can be used to run a virtual machine inside another virtual machine?
    • A. 

      Nested virtualization

    • B. 

      Virtual Machine Monitor Engine

    • C. 

      VNode

    • D. 

      Hyper-V-in-Hyper-V

  • 50. 
    Hyper-V server
    • A. 

      VHDX files, up to 2 TB

    • B. 

      VHD files, up to 64 TB

    • C. 

      VHD files, up to 2 TB

    • D. 

      VHDX files, up to 64 TB