ITN 200 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

What counter can be used for monitoring Processor time used for deferred procedure calls?

%DPC Time

Microsoft's Point-to-Point Encryption uses encryption keys that have varying length of what size?

40 bits and 128 bits

Microsoft's Point-to-Point Encryption uses encryption keys that have varying length of what size?

40 bits to 128 bits

What TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function?

443

When viewing logs in the Event Viewer, what symbol is used to indicate that log is an error log entry?

A red circle with a white exclamation point in the middle.

You are administrator for an Active Directory domain and have been tasked with improving response time for resolving DNS queries for resources in a second company owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead?

A stub zone

What type of an attack is the account lockout feature specifically designed to prevent?

Brute force attack

A DNS server can only be authoritative for a single domain.

False

Modern Windows implementations of PPTP utilize either MPPE 40-bit encryption. (True/False)

False

Only Windows 8 or newer can access Remote Desktop Services on Windows Server 2016. (True/False)

False

Pointer (PTR) resource records are kept in the forward lookup zone of a DNS server.

False

The Remote Server Administration Tools can be used to remotely manage any of Windows Server 2016, Windows Server 2012/R2, Windows Server 2008/R2, and Windows Server 2003/R2 servers. (True/False)

False

Windows Server 2016 event logs are divided into two general categories: Windows logs and Microsoft logs. (True/False)

False

The Layer Two Tunneling Protocol uses what set of standards to provide encryption and security for a tunnel?

IP Security (IPSec)

What version of Kerberos is utilized by Windows Server 2016?

Kerberos v5

What is the SYSVOL folder used for on a Windows Server 2016 system?

It is the location of scripts, GPOs, and software distribution files related to Active Directory

What Kerberos account policy can be configured to encourage users to sign out after a certain amount of time?

Maximum lifetime for user ticket

What statement correctly describes the pathping diagnostic command?

It polls another TCP/IP node showing the path through routers along the way, including packet loss.

What does the /w flag do when utilized with the cipher command?

It purges data from disk space that is flagged as unused.

What does the "Enforce user logon restrictions" option do when configuring Kerberos?

It turns on Kerberos security.

What Remote Desktop Services role related feature helps to prevent man in the middle attacks by requiring authentication before RDS connections are established?

Network Level Authentication

What Remote Desktop Services role related feature helps to prevent man-in-the-middle attacks by requiring authentication before RDS connections are established?

Network Level Authentication

When using Rights Management Services security, documents are encrypted using an AES key and what other additional key?

RSA

What role service available through Remote Desktop Services enables clients to use a web browser or the Start menu to view a list of RemoteApp programs and to start RemoteApp programs on the RDS server?

Remote Desktop Web Access

What set of tools allows you to manage multiple servers from one Windows Server 2016 server?

Remote Server Administration Tools

What RDS feature enables a client to run an application without loading a remote desktop on the client computer?

RemoteApp

What option from the Advanced Boot Options menu allows you to access system recovery and restore tools as well as diagnostics?

Repair Your Computer

You have been tasked with implementing a VPN server that will allow clients to connect from mobile networks and from networks that utilize restrictive firewalls. What VPN tunneling protocol has be best chance to be successful, given the constraints?

Secure Socket Tunneling Protocol

You have been tasked with implementing a VPN server that will allow clients to connect from mobile networks and from networks that utilize restrictive firewalls. What VPN tunneling protocol has the best chance to be successful, given the constraints?

Secure Socket Tunneling Protocol

How long is a permanent ticket, or service ticket, good for?

The ticket is good for the duration of the logon session.

AN RFC 1514 compliant router will allow broadcast traffic to pass through the router for use with VPN services. (True/False)

True

By installing and using the Active Directory Certificate Services role, a Public Key Infrastructure (PKI) is established. (True/False)

True

The IP Address Management tools do not function properly on a server that is also an Active Directory domain controller.

True

The System Image Recovery option requires that you have previously taken an image (i.e. a binary backup). (True/False)

True

The best way to reboot for clearing a temporary error is to turn the power off, wait several seconds for the hard disks to fully come to a stop, then turn on the power. (True/False)

True

The ping utility is used to quickly test connectivity between two devices on a network. (True/False)

True

The process of authorizing a DHCP server is a security precaution to ensure that IP addresses are only assigned by DHCP servers that are managed by network and server administrators.

True

When deploying a web server, the web server should be placed in a demilitarized zone.

True

You are deploying VPN services behind a router that is not RFC 1541 compliant. What will you need to do to ensure that clients receive IPs from the DHCP server on the network?

Utilize a DHCP relay agent to forward broadcasts to the client devices

You are deploying VPN services behind a router that is not RFC 1541 compliant. What will you need to do to ensure that clients receive IPs from the DHCP server on the network?

Utilize a DHCP relay agent to forward broadcasts to the client devices.

You are troubleshooting a network connectivity issue and have utilized the netstat -e command, only to discover that both columns of output contain 0 bytes. What is your next best step to troubleshoot this issue?

Use the Network Connection window to disable and re-enable the computer's connection.

What command provides the account using it with a new encryption key, meaning that previous keys associated with other accounts are no longer valid?

cipher /k

What command line utility can be used to verify TCP and UDP connectivity to services, as well as display TCP/IP sessions?

netstat

What command can you use to display ports that are currently listening for communications on your computer?

netstat -a -n

What is the T-Carrier communication technology?

T-Carriers are dedicated leased telephone line that can be used for data communications over multiple channels.

What is T-Carrier communication technology?

T-Carriers are dedicated leased telephone lines that can be used for data communications over multiple channels

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. What is NOT one of the ports that needs to be opened on the firewall for this configuration to work?

TCP 1723

You care configuring a Windows Server 2016 VPN server using L2TP and NAT. What is NOT one of the ports that need to be opened on the firewall for this configuration to work?

TCP 1723

You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the update will be successful?

You must disable BitLocker Drive Encryption and then re-enable it after the update.

What is NOT a valid file format that can be used to save individual logs?

.doc

What encryption standard is utilized with Kerberos on Windows Server 2016 and Windows 10?

Advanced Encryption Standard (AES)

While using your Windows Server 2016 install, you receive a 0x00000023 NTFS File System stop message. What should you do first to attempt to fix the issue?

Boot into Safe Mode and run chkdsk

What is NOT a requirement for the use of DirectAccess?

Client computers must be running Windows 10 or later

What is NOT a requirement for the use of DirectAccess?

Client computers must be running Windows 10 or later.

After installing Routing and Remote Access, a default remote access policy is created. What is the default access permission defined in this policy?

Deny Access

After installing Routing and Remote Access, a default remote access policy is created. What is the default access permission defined in this policy?

Deny access

When using msconfig to change the startup type, what startup selection loads basic devices and services only, and has no configurable options?When viewing logs in the Event Viewer, what symbol is used to indicate that log is an error log entry?

Diagnostic startup

What logs should you check to possibly find out why Active Directory replication is failing?

Directory Service Logs

After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on Active Directory. What Advanced Boot Option should be used to perform the restoration?

Directory Services Repair Mode

What password security option ensures that a user must choose new passwords when a password change is required?

Enforce password history

What statement regarding the ability to filter events is not accurate?

Events can be filtered by IP address for network events

When selecting authentication types for an RAS (Remote Access Service) server, what is considered to be the most secure authentication type?

Extensible Authentication Protocol

What key should be pressed as soon as the computer boots in order to enter Safe Mode?

F8

What communications technology utilizes packet switching and virtual connection techniques to transmit at rates from 56 Kbps to 45 Mbps?

Frame Replay

What communications technology utilizes packet switching and virtual connection techniques to transmit at rates from 56 Kbps to 45 Mbps?

Frame relay

Under what msconfig tab can you change the default system startup type?

General

What statement regarding the use of Group Policies is accurate?

Group policy cannot be set for non-OU folder containers.

You are attempting to recover from an issue that is preventing you from logging in to your Windows Server 2016 system, and are about to utilize the Last Known Good Configuration boot option. Where is this configuration information stored in the Registry?

HKEY_LOCAL_MACHINE\System\CurrentControlSet

What VPN tunneling protocol enables forwarding on the basis of MAC addressing?

Layer Two Tunneling Protocol

What VPN tunneling protocol enables fowarding on the basis of MAC addressing?

Layer Two Tunneling Protocol

What statement regarding the Password Authentication Protocol is accurate?

PAP can perform authentication, but does not require it

What statement regarding the Point-to-Point Protocol (PPP) is NOT accurate?

PPP supports only the TCP/IP protocol

What statement regarding the Point-to-Point Protocol (PPP) is NOT accurate?

PPP supports only the TCP/IP protocol.

Regarding the deployment of Windows Server 2016 VPN services, what VPN protocol is considered the least secure option?

PPTP

Regarding the deployment of Windows Server 2016 VPN services, what VPN protocol is considered the least secure option?

PPTP (Point-to-Point Tunneling Protocol)

What authentication protocol can perform authentication, but does not require it, so that operating systems without password encryption capabilities can still connect to RAS (Remote Access Service)?

Password Authentication Protocol

What authentication protocol can perform authentication, but does not require it, so that operating systems without password encryption capabilities can still connect to RAS?

Password Authentication Protocol

What Remote Desktop Service role can be used when multiple RDS servers are on a network, and ensure that a client connects to the right server, as well as ensuring that clients are load balanced amongst servers?

Remote Desktop Connection Broker

What Remote Desktop Services role can be used when multiple RDS servers are on a network, and ensures that a client connects to the right server, as well as ensuring that clients are load balanced amongst servers?

Remote Desktop Connection Broker

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

Remote Desktop Gateway

What type of DNS resource record associates a particular TCP/IP service to a server along with the domain of the server and its protocol?

SRV

What remote access tunneling protocol encapsulates data within HTTP packets for transit across the Internet?

SSTP

What remote access tunneling protocol encapsulates data within HTTP packets for transit across the Internet?

SSTP (Secure Socket Transport Protocol)

What statement regarding the Secure Socket Tunneling Protocol is NOT accurate?

SSTP is viewed as more secure than PPTP or L2TP because it encrypts using a 128-bit key

What statement regarding the Secure Socket Tunneling Protocol is NOT accurate?

SSTP is viewed as more secure that PPTP or L2TP because it encrypts using a 128-bit key.

What happens when a Group Policy setting is defined in User Configuration and in Computer configuration?

The Computer configuration items take precedence over the User configuration items.

After using the chkdsk utility via a command prompt running from the Windows installation DVD, you receive a message that says "Failed to transfer logged messages to the event log with status 50". What does this message mean?

The chkdsk run has completed, but does not have the ability to write to the event log in this mode

After experiencing an unexpected reboot, you receive the 0x0000002E Data Bus Error stop message. What is most likely the issue?

The system has defective memory

While using your Windows Server 2016 install, you receive a 0x0000000A IRQL Not Less or Equal stop message. What is most likely the issue?

There is a hardware resource conflict.

A DSL adaptor is a digital communications device that links a computer (or sometimes router) to a DSL telecommunications line. (True/False)

True

What RAS (Remote Access Service) capability allows an organization to publish applications to be accessible to users outside of the organization, while still maintaining those applications on the organization's servers?

Web Application Proxy

What RAS capability allows an organization to publish applications to be accessible to users outside of the organization, while still maintaining those applications on the organization's servers?

Web Application Proxy

What authentication standard is utilized for Windows Server 2016 if Active Directory is not installed?

Windows NT LAN Manager version 2

What security feature created by Microsoft enables the ability to define security rights for documents, spreadsheets, e-mail, and other types of files created by applications, going beyond what is possible with ACLs and the Windows Firewall?

Windows Rights Assignment Service

In order to utilize SSTP, what is the minimum supported Windows version that must be installed for the client?

Windows Vista

What command prompt command can be used to partition a disk and mange multiple partitions on a system?

diskpart

You are troubleshooting a network issue on your server, and suspect the issue exists beyond your gateway / router, in your provider's network. What utility could you use to show routing information between your server and an external remote host?

tracert


Conjuntos de estudio relacionados

PrepU Chapter 3: Health, Wellness, and Health Disparities

View Set

Inventor Assessment 2 Study Guide

View Set

Population Health Exam 2 Book and PCA Questions

View Set

THE ULTIMATE TEAS COMBINATION EAT YOUR HEART OUT (ONLY SOME SCIENCE)

View Set

AP Psych Vocab Unit 3/Study Guide

View Set

Health Policy Provisions, Clauses, and Riders (Quiz)

View Set

Lesson 1 & 2 & 3 Econ 304k Word problems, Lesson 4 5 6 Econ 304K, Lesson 7 8 9 Econ 304K

View Set

Intro to Business Ch. 13 - Promotion and Pricing Strategy

View Set