Windows Routing Tables Trivia Quiz

50 Questions | Total Attempts: 488

SettingsSettingsSettings
Please wait...
Windows Quizzes & Trivia

Questions and Answers
  • 1. 
    How do you secure DFS Namespaces?
    • A. 

      NTFS and shared folder permissions

    • B. 

      NFS and shared folder permissions

    • C. 

      Shared folder permissions

    • D. 

      NTFS permissions

  • 2. 
    Which VPN feature prevents readable access to data without possession of the appropriate key?
    • A. 

      Encryption

    • B. 

      Authentication

    • C. 

      Data integrity

    • D. 

      Non-repudation

  • 3. 
    Which Windows tool is used to provide routing?
    • A. 

      Internet Security and Acceleration Server

    • B. 

      DirectAccess

    • C. 

      Routing and Remote Access

    • D. 

      Server Manager

  • 4. 
    In which of the following situations is it appropriate to use Windows Server 2016 as a router between two networks?
    • A. 

      For heavy traffic on small networks

    • B. 

      For light traffic on small networks

    • C. 

      For light traffic on large networks

    • D. 

      For heavy traffic on large networks

  • 5. 
    RRAS has multiple options available to select one or more services to provide users. Which of the following is the correct description for the Network Address Translation (NAT) option?
    • A. 

      Sets up the server to support incoming VPN connections and to provide NAT services

    • B. 

      Sets up a demand-dial or persistent connection between two private networks

    • C. 

      Sets up the server to provide NAT services to clients on a private network that need to access the internet

    • D. 

      Sets up the server to accept incoming remote access connections (dial-up or VPN)

  • 6. 
    Which of the following terms is defined as "an ordered list of servers or targets that a client computer receives from a domain controller or name space server when the user with targets"?
    • A. 

      Reference

    • B. 

      Target list

    • C. 

      Namespace

    • D. 

      Referral

  • 7. 
    Which of the following do you use to simplify the management of file screens?
    • A. 

      File screen template

    • B. 

      Active screen template

    • C. 

      Passive screen template

    • D. 

      Quota template

  • 8. 
    Which of the following is the primary disadvantage of DFS Replication?
    • A. 

      Additional memory required

    • B. 

      Additional network bandwidth required

    • C. 

      Additional storage space required

    • D. 

      Additional CPU power required

  • 9. 
    Which type of quota used with FSRM prevents users from saving files when the quota is exceeded?
    • A. 

      Disk quota

    • B. 

      Soft quota

    • C. 

      File quota

    • D. 

      Hard quota

  • 10. 
    Which type of screening prevents users from saving the defined unauthorized files?
    • A. 

      Passive screening

    • B. 

      Hard screening

    • C. 

      Active screening

    • D. 

      Soft screening

  • 11. 
    On Windows, which command is used to view and define static routes?
    • A. 

      Router

    • B. 

      Route

    • C. 

      Staticr

    • D. 

      IPConfig

  • 12. 
    How are routing tables created dynamically?
    • A. 

      By using the MAC address protocol

    • B. 

      By using a routing protocol

    • C. 

      By using a Layer 2 switch

    • D. 

      With static routes

  • 13. 
    Which of the following can use to show a list of duplicate files on a volume?
    • A. 

      Reports

    • B. 

      Disk quotas

    • C. 

      File screens

    • D. 

      Folder quotas

  • 14. 
    Which mode of BranchCache conifguration uses one or more dedicated servers to provide the cached copy in the branch office?
    • A. 

      Dedicated cache mode

    • B. 

      Hosted cache mode

    • C. 

      Local copy mode

    • D. 

      Central cache mode

  • 15. 
    What must be configured for a Windows desktop client to support BranchCache
    • A. 

      Install the BranchCache

    • B. 

      Download the BranchCache add-on from http://technet.microsoft.com

    • C. 

      BranchCache is only supported by servers not desktop clients

    • D. 

      Turn-on via Active Directory

  • 16. 
    DFS Namespace shared folders are reffered to as which of the following in relation to the virtual folders?
    • A. 

      Redirects

    • B. 

      Links

    • C. 

      Folder Spaces

    • D. 

      Targets

  • 17. 
    Which VPN feature guarantees that a transferred message was sent and received by the two parties claiming to have sent and received the message?
    • A. 

      Data integrity

    • B. 

      Encryption

    • C. 

      Authentication

    • D. 

      Non-repudation

  • 18. 
    Which of the following is the primary difference between domain-based namespace and stand-alone namespace?
    • A. 

      The requirement for at least one Windows Server 2008 system

    • B. 

      Where the namespaces are stored

    • C. 

      The names given to namespaces

    • D. 

      The number of servers participating in the namespace

  • 19. 
    Your company has two a server called FS1. FS1 has a folder named Folder1 that contains MS Excel financial files. After several days, you discover that random Word and PowerPoint files are showing up. You need to ensure that all of the files in Folder1 are MS Excel file format, how can you do this?
    • A. 

      Create a file screen using FSRM to restrict file types save on the shared folder

    • B. 

      Implement disk quotas to restrict users from saving unrelated data on the shared folder

    • C. 

      Implement DFS and have it replicate with a second server to guarantee that at least one server has the files you want

    • D. 

      Modify the size of the partition hosting folder to prevent running out of space

  • 20. 
    Which VPN tunneling protocol uses IPsec with 3DES for data confidentiality?
    • A. 

      PPTP

    • B. 

      IKEv2

    • C. 

      SSTP

    • D. 

      L2TP

  • 21. 
    Of the four VPN tunneling protocols, which has the weakest encryption?
    • A. 

      PPTP

    • B. 

      L2TP

    • C. 

      SSTP

    • D. 

      IKEv2

  • 22. 
    Which authentication method is the weakest (least secure)?
    • A. 

      CHAP

    • B. 

      MS-CHAPv2

    • C. 

      EAP

    • D. 

      PAP

  • 23. 
    Which of the following DON'T you perform when you change a quota template?
    • A. 

      Warning level

    • B. 

      Hard vs Soft

    • C. 

      File type

    • D. 

      Size limit

  • 24. 
    Your network consists of an Active Directory domain. You have 1 domain controller and 2 file servers at the main site, all locations are connected to the main one via a high-speed and reliable connection. You have a shared folder accessed by numerous users across an enterprise with multiple locations. You need to suggest a solution to make the access to the shared documents more efficient for users on outside locations in the most-cost effective way.
    • A. 

      Create an FSRM file screen filter to prevent users from saving unnecessary files within the shared folders

    • B. 

      Install BranchCache in hosted mode

    • C. 

      Install servers at all other locations, create a DFS namespace and add the shared folder as a target

    • D. 

      Install BranchCache in distributed mode

  • 25. 
    A company's administrator has installed the FSRM role service to manage stored data on a file server. The administrator would like to configure quotas limits for users when they create new folders. Which of the following should the administrator configure to enforce quota limits for users when they create new folders?
    • A. 

      File quota

    • B. 

      File screen

    • C. 

      File quota template

    • D. 

      File group

Back to Top Back to top