Exam 70-741 CH 1 - 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is an example of a top-level domain? .business microsoft.com .local .net

.net Explanation: Traditionally, top-level domains consist of generic top-level domains (.com, .org, .edu, .gov, and .net) and international country codes (such as .us for United States, .uk for United Kingdom, .de for Germany, and .jp for Japan).

Which value for DNS cache locking is considered to be the optimal setting? 90 50 100 0

100 Explanation: The optimum setting is 100, as this prevents any record from being overwritten during the time its TTL is valid.

Which of the following is an example of a valid IPv4 address? 21cd:0053:0000:0000:e8bb:04f2:003c:c394 192.263.42.1 192.29.1.42 21cd:53::e8bb:4f2:3c:c394

192.29.1.42 Explanation: The IPv4 address space, as you probably know, consists of 32-bit addresses, notated as four 8-bit decimal values from 0 to 255, separated by periods, as in the example 192.168.43.100. This is known as dotted decimal notation, and the individual 8-bit decimal values are called octets or bytes.

Which of the following is the default size of the DNS socket pool? 10,000 5,000 2,500 7,500

2,500

Which of the following is an example of a valid IPv6 address? 21cd:0053:0000:0000:e8bb:04f2:003c:c394 192.168.42.1 192.256.1.42 21cd:53::::e8bb:4f2:3c:c394

21cd:0053:0000:0000:e8bb:04f2:003c:c394 Explanation: Instead of the four 8-bit decimal numbers separated by periods that IPv4 uses, IPv6 addresses use a notation called colon-hexadecimal format, which consists of eight 16-bit hexadecimal numbers, separated by colons, as follows: XX:XX:XX:XX:XX:XX:XX:XX.

Certain IPv6 addresses can be contracted. Which of the following is the shortened form of 21cd:0053:0000:0000/64? 21cd:53::/64 21cd:53::/32 21cd::53::/64 0:21cd:53::/64

21cd:53::/64 Explanation: When an IPv6 address has two or more consecutive 8-bit blocks of zeros, you can replace them with a double colon, as follows (but you can use only one double colon in IPv6 addresses). You can also remove the leading zeros in any block where they appear. IPv6 has no subnet masks. Network addresses use the same slash notation as CIDR to identify the network bits.

Which of the following networks represents the multicast network space, as defined? 0.0.0.0 to 127.255.255.25 128.0.0.0 to 191.255.255.255 192.0.0.0 to 223.255.255.255 224.0.0.0 to 239.255.255.255

224.0.0.0 to 239.255.255.255

Which of the following represents the correct default subnet mask used with Class A networks? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255

255.0.0.0

When creating a multicast scope in Windows Server 2012 R2, and later, the default lease time is set to which of the following? 8 days 15 days 21 days 30 days

30 days

IPv4 addresses use an address space that is _____ bits long, as compared with IPv6 addresses, which use an address space that is _____ bits long. 16, 32 32, 64 64, 128 32, 128

32, 128

How far into the lease period does a DHCP client go before requesting a renewal of the IP address? 50%, or about two days into the lease 75%, or about two days into the lease 50%, or at four days into the lease 87.5%, or about seven days into the lease

50%, or at four days into the lease

Which TCP/UDP port does the DNS service use to communicate? 53 25 80 443

53 Explanation: A DNS resolver is a service that uses the DNS protocol to query for information about DNS servers using UDP and TCP port 53.

When configuring DHCP failover partners, the time synchronization between the partners is critical. Which of the following is the maximum allowable time skew between DHCP failover partners? 15 seconds 30 seconds 45 seconds 60 seconds

60 seconds

Which of the following is the technology intended to help transition IPv4 networks to IPv6, by expressing IPv4 addresses in IPv6 format? CIDR 6to4 Stateless address autoconfiguration Tunneling

6to4 Explanation: The 6to4 mechanism essentially incorporates the IPv4 connections in a network into the IPv6 infrastructure by defining a method for expressing IPv4 addresses in IPv6 format and encapsulating IPv6 traffic into IPv4 packets. To enable IPv4 links to function as part of the IPv6 infrastructure, a 6to4 address starts with 2002 and translates public IPv4 addresses (decimal format) into IPv6 (hexadecimal format).

Which of the following is the default lease period for DHCP dynamic address allocation? 96 hours 3.5 days 4.5 days 8 days

8 Days

When configuring split scopes for DHCP, which of the following is the traditional percentage split of the scope range? 50% to the primary server, 50% to the secondary server 60% to the primary server, 40% to the secondary server 70% to the primary server, 30% to the secondary server 80% to the primary server, 20% to the secondary server

80% to the primary server, 20% to the secondary server

A client has a server named server1.blah.com and wants to use it as a web server, but wants to have requests point to www.blah.com. Which type of DNS record should he create? An A record A CNAME record A PTR record An NS record

A CNAME record Explanation: The Canonical Name (CNAME) resource record is an alias for a host name. It's used to hide the implementation details of a network from the clients that connect to it, particularly if changes need to be made in the future. For example, rather than create a Host record for www.blah.com, you can create a CNAME that specifies the web server that hosts the websites for the domain.

Which of the following is an example of Automatic Private IP Addressing (APIPA) in IPv4? An address from the 192.168.0.0/16 or the 172.16.0.0/12 network An address from the fc00::/7 address block The process of discovering, offering, requesting, and acknowledging an IP address from a DHCP server A Windows workstation that assigns itself an address on the 169.254.0.0./16 network

A Windows workstation that assigns itself an address on the 169.254.0.0./16 network Explanation: Automatic Private IP Addressing (APIPA) is the name assigned by Microsoft to a DHCP failover mechanism used by all current Microsoft Windows operating systems. On Windows computers, the DHCP client is enabled by default. If, after several attempts, a system fails to locate a DHCP server on the network, APIPA takes over and automatically assigns an address on the 169.254.0.0/16 network to the computer. The system then uses the Address Resolution Protocol (ARP) to ensure that no other computer on the local network is using the same address.

Which of the following is an example of an SRV record? DNS server AD server Mail server Web server

AD server Explanation: A Service Location (SRV) record maps a DNS domain name to a specified list of host computers that offer a specific type of service, such as Active Directory domain controllers.

The main page of a company's intranet portal is accessible by the FQDN home.na.adatum.corp. Which of the following actions should be taken to configure an entry in the GlobalNames zone for this? Add a single A record with the IP of one of the web servers hosting the portal. Add multiple A records with all the IPs of the web servers hosting the portal. Add a single CNAME record pointing to the A record in another zone. Add multiple CNAME records pointing to all the A records in the other zones.

Add a single CNAME record pointing to the A record in another zone. Explanation: To access the "home" location, create a CNAME record in the GlobalNames zone that points to any records that already exist in the other zones on the forest DNS servers.

Which of the following options is the best way to delegate administrative access to those employees who need to be able to manage DNS? Add the user's Active Directory accounts to a special global security group created for this purpose (e.g., DNS Service Managers) and then add that group to the DNS Admins local group. Add the user's Active Directory accounts to the Domain Admins security group. Add the user's Active Directory accounts to the Enterprise Admins security group. Add the user's Active Directory accounts to a special universal distribution group created for this purpose (e.g., DNS Service Managers) and then add that group to the DNS Admins local group.

Add the user's Active Directory accounts to a special global security group created for this purpose (e.g., DNS Service Managers) and then add that group to the DNS Admins local group. Explanation: To delegate administration privileges to a specific user or security group, you add that user or group to the DNS Admins security group. Members of this group can view and modify all DNS data, settings, and the configuration of DNS servers within their home domain.

Which of the following is the primary reason IPv6 has not completely replaced IPv4? Administrators are hesitant and reluctant to change. IPv4 addresses have only been depleted since early 2011. Stopgap technologies have been introduced, such as Network Address Translation (NAT) and classless interdomain routing (CIDR). IPv6 has already completely replaced IPv4 on the Internet.

Administrators are hesitant and reluctant to change.

Which of the following can be imported into IPAM using the IPAM console? IP addresses IP address blocks IP address ranges All of the above

All of the above

By default, zone transfers are disabled. Three different zone transfer methods are available to choose from. Which of the following describes the To any server method? Allows a data transfer to any server that asks for a zone transfer (least secure) Retrieves only resource records that have changed within a zone Restricts zone transfers to those servers specified in the accompanied list Restricts zone transfers to secondary DNS servers as defined with NS resource records

Allows a data transfer to any server that asks for a zone transfer (least secure) Explanation: The To any server method allows a data transfer to any server that asks for a zone transfer (least secure).

Which of the followings statements regarding requirements for an IPAM server is false? An IPAM server must be a domain member. An IPAM server can be a domain controller. An IPAM server should not also provide DNS or DHCP. An IPAM server should always be logged on to with a domain account.

An IPAM server can be a domain controller.

Which IPv6 address type identifies the routers within a given address scope and sends traffic to the nearest router, as determined by the local routing protocols? Unique local unicast address Link-local unicast address Anycast address Global unicast address

Anycast address Explanation: The function of an anycast address is to identify the routers within a given address scope and send traffic to the nearest router, as determined by the local routing protocols. Organizations can use anycast addresses to identify a particular set of routers in the enterprise, such as those that provide access to the Internet.

How are values for DNS cache locking expressed? As a percentage of the TTL As a percentage of the TTL remaining As a fixed period of time in hours As a fixed period of time in days

As a percentage of the TTL

Round-robin DNS refers to which of the following kinds of distribution mechanisms for DNS responses to queries? Balanced Limited Time to Live Cached Priority weighted

Balanced Explanation: Round robin is a DNS balancing mechanism that distributes network load among multiple servers by rotating resource records retrieved from a DNS server.

Which of the following terms describes the network transmissions method where packets are sent from one host to all other hosts? Multicast Unicast Anycast Broadcast

Broadcast

Which of the following is a subnetting method that enables placing the division between the network bits and the host bits anywhere in the address, not just between octets? NAT ISATAP Teredo CIDR

CIDR Explanation: Because of that wastefulness, classful addressing was gradually obsolesced by a series of subnetting methods, including classless interdomain routing (CIDR). CIDR is a subnetting method that enables you to place the division between the network bits and the host bits anywhere in the address, not just between octets.

Which of the following is another designation for an Alias? Canonical name or CNAME A host or A record Name Server or NS record Pointer or PTR record

Canonical name or CNAME Explanation: A Canonical Name (CNAME) record—sometimes referred to as an Alias—maps an alias DNS domain name to another primary or canonical name.

As defined by the original Internet Protocol standard, which of the following choices identifies the three classes of IP addresses used for networks and what differentiates them? Class A, B, C, differing by how many bits distinguish the networks from the hosts Class 1, 2, 3, differing by the number in the first byte Class A, B, C, differing by the number in the first byte CClass 1, 2, 3, differing by how many bits distinguish the networks from the hosts

Class A, B, C, differing by how many bits distinguish the networks from the hosts Explanation: The three classes are Class A, Class B, and Class C, differing by the number of allowable hosts and networks, which is determined by the number of bits for the subnet mask. The subnet mask associated with IP addresses can vary, as can the number of bits used to identify the network and the host.

Which of the following services does Dynamic Host Configuration Protocol (DHCP) provide? Resolves web addresses to IP addresses Resolves NetBIOS names to host names Configures the IP address and other TCP/IP settings on network computers Blocks unsolicited inbound traffic from entering the network perimeter

Configures the IP address and other TCP/IP settings on network computers

Which of the following steps must be completed in order to ensure a network printer is assigned the same address through the DHCP server? Create a reservation in the DHCP scope. Create an exclusion in the DHCP scope. Create a special scope on the DHCP server. Define the DHCP server on the client in the Advanced TCP/IP Advanced Settings.

Create a reservation in the DHCP scope.

Which of the following DHCP high-availability options in Windows Server 2016 allows you to configure two servers to provide DHCP with a load sharing arrangement? Split scopes Server cluster DHCP failover Standby server

DHCP failover

There are three identities within an organization: contoso.com, adatum.com, and litware.com. Which of the following can be used to specify an FQDN-based condition based on the DNS suffix? DHCP policy DHCP waiver DHCP redirector DNS policy

DHCP policy

Which of the following is the name of the configurable objects in DHCP that contain the range of IP addresses that can be allocated to clients? DHCP options DHCP ranges DHCP scopes DHCP leases

DHCP scopes

Which of the following is the first packet sent to a DHCP server when a computer boots up? DHCPINFORM DHCPDISCOVER DHCPOFFER DHCPACK

DHCPDISCOVER

How do DHCP servers respond to a DHCPDISCOVER message? DHCPINFORM DHCPRELEASE DHCPACK DHCPOFFER

DHCPOFFER

Which of the following categories will you not find in the Monitor and Manage section of the IPAM console? DNS and DHCP Servers DHCP Scopes DNS Zone Records DNS Zone Monitoring

DNS Zone Records

Which of the following is another term for DNS client? Top-level host DNS resolver DNS query DNS server

DNS resolver Explanation: The DNS client is also known as the DNS resolver. Because a client computer or server depends on a DNS server to resolve IP addresses and identify certain network services, a client computer and servers alike can be DNS clients.

Regarding DNSSEC, once a zone is signed, the new record(s) created is(are) which of the following? Key Signing Key DNSSEC resource records Zone Signing Key Trust anchor

DNSSEC resource records Explanation: Once a zone is signed, there are a number of new DNSSEC resource records available. These records are in addition to the standard A, NS, and SRV records in an unsigned zone. These DNSSEC resource records include DNSKEY, RRSIG, and NSEC.

The dnscmd command can be used to create zones. Which other tasks can be performed with it? Starting/stopping the DNS service Installing DNS services Performing name service queries Deleting resource records

Deleting resource records Explanation: You can use the dnscmd command to manage resource records. For more information about the command, run dnscmd.exe /? to see the available options. You can also search for dnscmd on the technet.microsoft.com website.

After a DNS zone has been secured with DNSSEC, which additional data will be returned to a client as a result of a query? Information about the server providing the DNS zone Information about the organization administering the zone Digital signatures for the returned records Digital signatures of the administrators of the zone

Digital signatures for the returned records Explanation: The process for securing a zone using DNSSEC is called signing the zone. Once signed, any queries on the signed zone will return digital signatures along with the normal DNS resource records. The digital signatures will be for the returned records.

Which kinds of servers should not be DHCP clients? Servers on a subnet outside the broadcast domain of the DHCP server DHCP servers Domain controllers, Internet web servers, and DHCP servers DHCP Relay Agents

Domain controllers, Internet web servers, and DHCP servers

Which of the following is the name of the special resource record that Windows Server 2016 DHCP will create to track which machine originally requested a specific name in DNS? DHCP Name Protection Dynamic Host Configuration Identifier DNS Host Owner Record DDNS Host Protection Identifier

Dynamic Host Configuration Identifier

Once all IPAM server setup tasks are complete, several scheduled tasks run on the IPAM server. How often does the process run that collects IP address space usage data from DHCP servers? Every 1 day Every 2 hours Every 4 hours Every 1 hour

Every 2 hours

Once all IPAM server setup tasks are complete, several scheduled tasks run on the IPAM server. How often does the process run that collects zone status events from DNS servers? Every 5 minutes Every 15 minutes Every 30 minutes Every 60 minutes

Every 30 minutes

By default, how often does a backup of the DHCP database occur? Every 60 minutes Every 120 minutes Every 8 hours Every 24 hours Every 168 hours

Every 60 minutes

If a DNS server problem is corrected, such as renaming a system or changing its IP address, but the local system still attempts to connect to the old system, which of the following should be done to obtain the new information from the DNS server quickly? Disable/enable the NIC. Clear the DNS cache on the DNS server. Execute ipconfig /flushdns. Reboot.

Execute ipconfig /flushdns. Explanation: The ipconfig /flushdns command flushes and resets the contents of the DNS client resolver cache.

Which of the following forces a system to update its DNS record? Disable/enable the NIC. Change IP addresses. Execute ipconfig /flushdns. Execute ipconfig /registerdns.

Execute ipconfig /registerdns. Explanation: The ipconfig /registerdns command initiates manual dynamic registration for the DNS names and IP addresses configured on a computer. You can use this parameter to troubleshoot a failed DNS name registration or resolve a dynamic update problem between a client and the DNS server without rebooting the client computer.

Which of the following is one of the primary advantages to using Active Directory to store DNS information? Zero configuration Reverse zone lookups Low maintenance Fault tolerance

Fault tolerance Explanation: Microsoft recommends using Active Directory to store DNS and for good reason. One benefit is fault tolerance: Because each server is an authoritative read-write copy of DNS, you have the DNS information stored on multiple servers. You also can update the DNS records from any DNS server.

Which of the following is the purpose of a priority number in MX records? For fault tolerance For mail-routing preference To designate primary, secondary, and so forth, mail servers To set delivery priority

For fault tolerance Explanation: For fault tolerance, you can designate a second mail server. Therefore, if the primary mail server is not available, the email can be sent to the secondary server. Although each external mail server requires an MX record, the primary server is designated with a lower priority number.

Which type of DNS zone resolves host names to IP addresses? Forward lookup zone Reverse lookup zone Backward lookup zone Null lookup zone

Forward lookup zone Explanation: A forward lookup zone contains most of the resource records for a domain. Of course, as the name indicates, a forward lookup zone is used primarily to resolve host names to IP addresses.

The acronym FQDN stands for which of the following? Full query domain name Fully qualified domain name File quota domain number Fully qualified domain number

Fully qualified domain name Explanation: DNS uses fully qualified domain names (FQDNs) to map a host name to an IP address.

In the IPv6 space, which of the following is the equivalent of a registered IPv4 address, routable worldwide and unique on the Internet? Link-local unicast address Global unicast address Unique local unicast address Anycast address

Global unicast address Explanation: A global unicast address is the equivalent of a registered IPv4 address, routable worldwide and unique on the Internet.

Which of these IPv6 address types is best used for hosts that are reachable from the Internet? Global unicast addresses Link-local addresses Unique local addresses Protected global addresses

Global unicast addresses

Which feature of Windows Server 2016 DNS is intended to eliminate the need for WINS by providing support for single-label names? DomainDNSZones container GlobalNames zone WINS forward lookup ForestDNSZones container

GlobalNames zone Explanation: Windows Server 2016 DNS provides support for single-label names without the need for NETBIOS or WINS through the usage of the GlobalNames zone. This allows a large multi-DNS environment to support a single name, such as addressbook, rather than an FQDN, such as addressbook.adatum.com.

IPv6 addresses are written using which number system? Decimal Binary Hexadecimal Octal

Hexadecimal

DNS has which of the following types of structures? Flat distributed Hierarchical distributed Wheel-spoke distributed Top-down distributed

Hierarchical distributed Explanation: DNS is a hierarchical distributed naming system used to locate computers and services on a TCP/IP network

Any specific, individual computer or other network device with an IP address in a domain is known as which of the following? Entity Top-level system Host Server

Host Explanation: A host is a specific computer or other network device in a domain. For example, computer1.sales.contoso.com is the host called computer1 in the sales subdomain of the contoso.com domain.

In Window Server 2016 PAM, which of the following is the highest-level entity within the IP address space? IP address range IP address block IP address container IP address

IP address block

In Window Server 2016 IPAM, which of the following is the second-highest-level entity within the IP address space? IP address range IP address block IP address container IP address

IP address range

The Domain Name System (DNS) works much like a phone book to associate URLs (names) with which kinds of numbers? Domain addresses World Wide Web numbers IP addresses ID numbers

IP addresses Explanation: The Domain Name System (DNS) is a naming service used by TCP/IP networks and the Internet. Every time a user accesses a web page, that user must type a URL. Before the client communicates with the web server, the client computer needs to use DNS to retrieve the IP address of the web server, similar to how someone uses a phone book to find a phone number.

Which of the following is the best answer regarding the management capabilities of Windows Server 2016 IPAM? IPAM can manage any BIND DNS server above 9.7.3 and any Windows DNS server. IPAM can manage any BIND DNS server above 9.8.2 and any Windows DNS server on Windows 2008 and later. IPAM cannot manage DNS servers other than those running on Windows Server 2003 and later. IPAM cannot manage DNS servers other than those running on Windows Server 2008 and later.

IPAM cannot manage DNS servers other than those running on Windows Server 2008 and later.

As it pertains to IPAM, which of the following is the name of the process of retrieving a list of all domain controllers, DNS servers, and DHCP servers? Server discovery IPAM discovery Provisioning IPAM Verifying IPAM access

IPAM discovery

Which tunneling protocol emulates an IPv6 link using an IPv4 network, primarily for Windows workstation operating systems? Teredo ISATAP DirectAccess remote networking NAT

ISATAP Explanation: Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an automatic tunneling protocol used by the Windows workstation operating systems that emulates an IPv6 link using an IPv4 network.

Which of the following best describes Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)? ISATAP converts IPv4 address for an IPv6 network just as 6to4 offers. ISATAP is a method of multicasting for IPv6 networks. ISATAP translates between IPv4 and IPv6 networks without client configuration. ISATAP emulates an IPv6 link for use on an IPv4 network.

ISATAP emulates an IPv6 link for use on an IPv4 network. Explanation: Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an automatic tunneling protocol used by the Windows workstation operating systems that emulates an IPv6 link using an IPv4 network.

DNS servers contain several different types of resource records with which administrators need to be familiar. Which of the following is the correct definition for Name Server (NS) records? Resolves host names from IP addresses Identifies an alias for a host name Maps a domain/host name to an IP address Identifies a DNS server that is authoritative for a zone

Identifies a DNS server that is authoritative for a zone Explanation: The most common resource records found in DNS are the Host (A and AAAA) records. The A stands for address. The A record maps a domain/host name to an IPv4 address; the AAAA record maps a domain/host name to an IPv6 address.

DNS servers contain several different types of resource records with which administrators need to be familiar. Which of the following is the correct definition for Canonical Name (CNAME) records? Resolves host names from IP addresses Identifies a DNS server that is authoritative for a zone Identifies an alias for a host name Maps a domain/host name to an IP address

Identifies an alias for a host name Explanation: The Canonical Name (CNAME) resource record is an alias for a host name. It is used to hide the implementation details of the network from the clients that connect to it, particularly if changes need to be made in the future.

How does DHCP scope creation differ in Windows Server 2012, and Windows Server 2016? In Windows Server 2012 and Windows Server 2016, creating the scope is done separately, before being allowed to add the DHCP Server role. In Windows Server 2012 and Windows Server 2016, you create the scope as you install the DHCP Server role. In Windows Server 2012 and Windows Server 2016, creating the scope is done separately, after adding the DHCP Server role. There are no fundamental differences in scope creation.

In Windows Server 2012 and Windows Server 2016, creating the scope is done separately, after adding the DHCP Server role

Which PowerShell cmdlet is the correct one to use to create the IPAM provisioning GPOs? Set-IpamGpoProvisioning Initiate-IpamGpoProvisioning Perform-IpamGpoProvisioning Invoke-IpamGpoProvisioning

Invoke-IpamGpoProvisioning

Issuing the nslookup command with no parameters on a system results in which of the following? It places you into nslookup's interactive mode. It displays the DNS query cache. It returns an error: Missing parameter. It returns you to a prompt with no result.

It places you into nslookup's interactive mode. Explanation: Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters. Executing ipconfig /all displays the full TCP/IP configuration for all adapters, including host name, DNS servers, and physical address (or MAC address).

Which of the following is the purpose of DNS cache locking? It prevents an attacker from replacing records in the resolver cache while the Time to Live (TTL) is still in force. It prevents an attacker from inserting records into the resolver cache while the Time to Live (TTL) is still in force. It prevents clients from performing dynamic DNS updates into the resolver cache while the Time to Live (TTL) is still in force. It prevents zone transfers of records in the resolver cache while the Time to Live (TTL) is still in force.

It prevents an attacker from replacing records in the resolver cache while the Time to Live (TTL) is still in force. Explanation: DNS cache locking prevents an attacker from replacing records in the resolver cache while the Time to Live (TTL) is still in force. When cache locking is enabled, records cannot be overwritten.

Which database engine is used for the DHCP database in Windows Server 2012 R2? SQLite Jet ESE SQL Express

Jet

Regarding DNSSEC, which of the following is used to sign the DNSKEY records at the root of the zone? Key Signing Key Zone Signing Key Trust anchor DNSSEC resource records

Key Signing Key Explanation: The KSK is an authentication key that signs all the DNSKEY records at the root of the zone.

In the IPv6 space, which type of network address do systems automatically assign themselves, similar to an APIPA address in IPv4? Global unicast address Unique local unicast address Link-local unicast address Anycast address

Link-local unicast address Explanation: In IPv6, systems that assign themselves an address automatically create a link-local unicast address, which is essentially the equivalent of an APIPA address in IPv4.

Which of the following is the primary advantage to enabling round-robin DNS? Fault tolerance Efficiency Speed Load balancing

Load balancing Explanation: The round-robin DNS balancing mechanism distributes network load among multiple servers by rotating resource records retrieved from a DNS server

DNS servers contain several different types of resource records with which administrators need to be familiar. Which of the following is the correct definition for Host (A and AAAA) records? Identifies a DNS server that is authoritative for a zone Resolves host names from IP addresses Identifies an alias for a host name Maps a domain/host name to an IP address

Maps a domain/host name to an IP address Explanation: The most common resource records found in DNS are the Host (A and AAAA) records. The A stands for address. The A record maps a domain/host name to an IPv4 address; the AAAA record maps a domain/host name to an IPv6 address.

If an A record maps a host name to an IP address, which of the following does an AAAA record do? Maps multiple hosts to a single IP address Provides round-robin DNS services to multiple hosts Maps multiple services to a single IP address Maps a host name to a single IPv6 address

Maps a host name to a single IPv6 address Explanation: The A record maps a domain/host name to an IPv4 address; the AAAA record maps a domain/host name to an IPv6 address. There are four As for IPv6's Host record because it uses four times as many bits in its address than those in IPv4.

Which term describes the network transmissions method where packets are sent from one to a specific group of other hosts? Multicast Unicast Anycast Broadcast

Multicast

By using the Active Directory-integrated zone, DNS follows which kind of model? Primary-secondary Multimaster Master-slave Forward-reverse

Multimaster Explanation: By using Active Directory-integrated zones, DNS follows a multimaster model, where each server enables all DNS servers to have authoritative read-write copies of the DNS zone. When a change is made on one DNS server, it is replicated to the other DNS servers.

How can multiple IPAM servers be configured to communicate with each other? Configure network load balancing. Configure a failover cluster. Configure IPAM replication. Multiple IPAM servers cannot be configured to communicate with each other.

Multiple IPAM servers cannot be configured to communicate with each other.

A stub zone is a zone copy that contains only which type of records? Query record entries Host entries Subdomain entries Necessary resource entries

Necessary resource entries Explanation: A stub zone is a copy of a zone that contains only necessary resource records—Start of Authority (SOA), Name Server (NS), and Address/Host (A) record—in the master zone and acts as a pointer to the authoritative name server.

Which Windows Server 2016 DNS feature prioritizes DNS responses based on the subnet of the requesting client? Conditional forwarding Iterative queries Recursive queries Netmask ordering

Netmask ordering Explanation: Netmask ordering prioritizes DNS responses based on the subnet of the requesting client. If several A records exist for a single name, then the one that exists in the subnet of the client is returned.

Given the IPv6 address: 21cd:001b:0000:0000/8, the "/8" at the end of the address signifies which of the following? Number of possible networks Number of hosts per this network Number of address bytes Network bits

Network bits Explanation: IPv6 network addresses use the same slash notation as CIDR to identify the network bits. In this case, the /8 signifies the network bits.

Which of the following is the primary benefit of the IPv6 address space over the IPv4 address space? Number of possible hosts and networks Motive to update and upgrade hardware and software Complexity Length

Number of possible hosts and networks

Which DHCP client option is used to provide a list of domain names to use in name resolution queries? Option 3 Option 6 Option 15 Option 44

Option 15

Which DHCP client option is used to provide a list of IP addresses for the default gateway to the client? Option 3 Option 6 Option 15 Option 44

Option 3

Which DHCP client option is used to provide a list of IP addresses for WINS servers? Option 3 Option 6 Option 15 Option 44

Option 44

Which DHCP client option is used to provide a list of IP addresses for DNS servers? Option 3 Option 6 Option 15 Option 44

Option 6

In general terms, there are three ways a computer receives an IPv4 or IPv6 address. Which of the following is not one of them? Stateless address autoconfiguration Manual allocation Peer allocation Dynamic allocation

Peer allocation Explanation: The processes by which you assign IPv6 addresses to network computers are similar to those in IPv4. As with IPv4, a Windows computer can obtain an IPv6 address by three possible methods: • Manual allocation: A user or administrator manually supplies an address and other information for each network interface. • Self-allocation: The computer creates its own address using a process called stateless address autoconfiguration. • Dynamic allocation: The computer solicits and receives an address from a Dynamic Host Configuration Protocol (DHCPv6) server on the network.

Which of the following is the first and most important step in installing and deploying DNS in your network? Splitting the network into subdomains Planning the infrastructure and service requirements Configuring the forward and reverse lookup zones correctly Setting up Active Directory so that DNS can be integrated into it

Planning the infrastructure and service requirements Explanation: As with any server role, before you deploy DNS, you need to plan your infrastructure. Some of the considerations involve how busy the servers are, what kind of fault tolerance is needed, what kind of performance is required, and what kind of security is needed.

Which of the following roles must be installed in order to deploy a DHCP Relay Agent on Windows Server 2012, and later? DHCP DNS AD DS Remote Access

Remote Access

DNS servers contain several different types of resource records with which administrators need to be familiar. Which of the following is the correct definition for Pointer (PTR) records? Identifies an alias for a host name Resolves host names from IP addresses Maps a domain/host name to an IP address Identifies a DNS server that is authoritative for a zone

Resolves host names from IP addresses Explanation: The Pointer (PTR) records are used for the opposite reason of the Host records. They resolve host names from an IP address. Different from the Host record, the IP address is written in reverse in the PTR record, but forward when referred to in nslookup commands.

By default, zone transfers are disabled. Three different zone transfer methods are available to choose from. Which of the following describes the Only to servers listed on the Name Servers tab method? Retrieves only resource records that have changed within a zone Restricts zone transfers to secondary DNS servers as defined with NS resource records Allows a data transfer to any server that asks for a zone transfer (least secure) Restricts zone transfers to those servers specified in the accompanied list

Restricts zone transfers to secondary DNS servers as defined with NS resource records Explanation: The Only to servers listed on the Name Servers tab method restricts zone transfers to secondary DNS servers as defined with NS resource records.

By default, zone transfers are disabled. Three different zone transfer methods are available to choose from. Which of the following describes the Only to the following servers method? Allows a data transfer to any server that asks for a zone transfer (least secure) Restricts zone transfers to secondary DNS servers as defined with NS resource records Retrieves only resource records that have changed within a zone Restricts zone transfers to those servers specified in the accompanied list

Restricts zone transfers to those servers specified in the accompanied list Explanation: The Only to the following servers method restricts zone transfers to those servers specified in the accompanied list.

Which of the following is the function of the NSEC record? Used to sign the records Used to sign the zone Returned to the client in response to a successful query along with the A record Returned to positively deny that the requested A record exists in the zone

Returned to positively deny that the requested A record exists in the zone Explanation: The NSEC record is returned to positively deny that the requested A record exists in the zone.

Which of the following is the function of the RRSIG record? Returned to the client in response to a successful query along with the A record Returned to positively deny that the requested A record exists in the zone Used to sign the zone Used to sign the records

Returned to the client in response to a successful query along with the A record Explanation: The RRSIG record is returned to the client in response to a successful query along with the A record.

Before creating PTR records, which DNS objects must be created? CNAME records Reverse lookup zones SOA records NS records

Reverse lookup zones Explanation: If the reverse lookup zone does not exist to store the PTR record, a warning is issued that the associated Pointer (PTR) record cannot be created.

Which DNS record contains the serial number for the zone? SOA record PTR record NS record A record

SOA record Explanation: A Start of Authority (SOA) record specifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and the expiration and reload timers of the zone.

Which DNS security feature in Windows Server 2016 can be configured to allow source port randomization for DNS queries? Socket pool Name Resolution Policy Table Initialization vector Randomization factor

Socket pool Explanation: The DNS socket pool is a tool used to allow source port randomization for DNS queries, which reduces the chances of an attacker guessing which IP address and port (socket) the DNS traffic uses.

Rather than manually assign IPv6 addresses to computers, administrators can ensure each Windows computer receives a link-local unicast address upon starting in which of the following ways? Site-local unicast addressing Booting Stateless IPv6 address autoconfiguration CIDR

Stateless IPv6 address autoconfiguration Explanation: When a Windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each interface a link-local unicast address. This assignment always occurs, even when the interface is to receive a global unicast address later. The link-local address enables the system to communicate with the router on the link, which provides additional instructions.

On which port does DHCP failover listen for failover traffic? UDP port 67 UDP port 68 TCP port 647 TCP port 648

TCP port 647

Which of the following encapsulates IPv6 packets within User Datagram Protocol (UDP) datagrams between two registered IPv4 nodes in order to traverse IPv4 networks? IPv4 Teredo 6to4 ISATAP

Teredo Explanation: Teredo enables devices behind non-IPv6 NAT routers to function as tunnel endpoints. To do this, Teredo encapsulates IPv6 packets within Transport layer User Datagram Protocol (UDP) datagrams, rather than Network layer IPv4 datagrams, as 6to4 does.

Which IPv4 to IPv6 transition technology works through NAT IPv4 routers by establishing tunnel endpoints behind non-IPv6 routers that encapsulate IPv6 packets with UDP datagrams? Teredo ISATAP NAT Converter 6to4

Teredo Explanation: Teredo enables devices behind non-IPv6 NAT routers to function as tunnel endpoints. To do this, Teredo encapsulates IPv6 packets within Transport layer User Datagram Protocol (UDP) datagrams.

By default, where are the DNS debug logs written? The %SYSTEMROOT%\System32\Logs folder The %SYSTEMROOT%\System32\Dns folder The System log The Application log

The %SYSTEMROOT%\System32\Dns folder Explanation: Dns.log contains the debug logging activity. By default, this is located in the %SYSTEMROOT%\System32\Dns folder.

To make use of Preboot Execution Environment (PXE) and Windows Deployment Services (WDS), which special configuration is needed on the server and client? The client must have a special PXE-enabled network adapter. Both the client and server are capable by default. The client and server both require some preparatory configuration. The DHCP server on the network must have a custom PXEClient option (option 60) configured with the location of the WDS server on the network.

The DHCP server on the network must have a custom PXEClient option (option 60) configured with the location of the WDS server on the network.

Which of the following is the net effect if recursion is disabled on a DNS server and the DNS server does not have any forwarding or root hints configuration present? The DNS server will be able to provide only answers to queries about internal DNS zones. The DNS server will be able to provide only answers to queries about external DNS zones. The DNS server will be able to provide answers to queries about internal and external DNS zones. None of the above

The DNS server will be able to provide only answers to queries about internal DNS zones. Explanation: If recursion is disabled and root hints and forwarders are not used on the server, then no external queries will ever be resolved.

The command nslookup 192.168.1.50 is issued but gets no response. Then, the command nslookup server1 is issued and receives 192.168.1.50 as a response. Based on this scenario, which of the following must be true? The CNAME record is incorrect. The PTR record doesn't exist. The A record doesn't exist. The SOA for the zone is malformed

The PTR record doesn't exist. Explanation: PTR records resolve host names from an IP address. Different from the Host record, the IP address is written in reverse in the PTR record, but forward when referred to in nslookup commands.

In which of the following ways does a DHCP client communicate which offered IP address it will accept from which DHCP server? The client sends a DHCPREQUEST message to the server. The client selects the closest server and beeps audibly to accept the offer. The client sends a DHCPACK message to all servers with the IP address of the chosen DHCP server. The client sends a DHCPREQUEST message to all servers with the IP address of the chosen DHCP server.

The client sends a DHCPREQUEST message to all servers with the IP address of the chosen DHCP server.

As an administrator for your company, you are trying to determine why a user cannot connect to any network resources. When you execute the ipconfig command, you see that the user has a 169.254.4.4/16 address. Which of the following is the problem? The static address is assigned. The user's computer has a virus. The client was not able to connect to a DHCP server. There is a faulty DHCP reservation.

The client was not able to connect to a DHCP server.

Time to Live (TTL) means which of the following in DNS parlance? The length of time required to process an iterative query The length of time it takes a DNS query to process The length of time between zone updates The length of time a record remains in a DNS cache

The length of time a record remains in a DNS cache Explanation: The Time to Live (TTL) value defines the default time a resource record remains in a DNS cache after a DNS query has retrieved a record. If a resource record has its own TTL value, that value is used instead of the TTL defined in the SOA record.

Which of the following statements regarding the server requirements for an IPAM server is false? The server must have a dual-core CPU of at least 2.0 GHz. The server must be running Windows Server 2008 R2 or later. The server must have at least 4 GB of RAM installed. The server must have at least 80 GB of free disk space available.

The server must be running Windows Server 2008 R2 or later.

A Start of Authority record specifies which kind of information about a zone? A list of hosts or A names A list of Canonical (CNAME) records The zone serial number A reverse lookup record

The zone serial number Explanation: A Start of Authority (SOA) record specifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and the expiration and reload timers of the zone.

Which of the following is one advantage of subdomains? They allow you to break up larger domains into smaller, more manageable ones. They allow you to use fewer IP addresses per domain. They provide better overall network performance for large networks. They offer more efficient network segmentation with inherent VLAN capability.

They allow you to break up larger domains into smaller, more manageable ones. Explanation: Subdomains allow you to break up larger domains into smaller, more manageable domains. For example, on contoso.com, you can create a sales subdomain and a support subdomain. When done, you will have the parent domain contoso.com and two subdomains: sales.contoso.com and support.contoso.com.

Which of the following is the key benefit of DHCP manual IP address allocation compared with an administrator manually configuring the IP address? The DHCP server then contains a centralized list of permanently assigned addresses. The DHCP server might pass on more information than just an IP address. This prevents accidental duplication of permanently assigned IP addresses. This manually assigned address is officially known as a reservation.

This prevents accidental duplication of permanently assigned IP addresses.

When using automatic Group Policy-based provisioning of an IPAM server, several Group Policy Objects are created. How many Group Policy Objects are created? Three Four Five Six

Three

Which of the following represents the best usage of a superscope in DHCP? To add IP addresses to the available lease pool To add more IP addresses in a new subnet To ease administrative overhead for management of DHCP To allow routers to recognize new subnets

To add more IP addresses in a new subnet

Which of the following is the major reason for using a forwarder? To decrease client DNS lookups outside your network To justify the use of multiple DNS server layers So that your servers only perform recursive queries To improve the efficiency of name resolution for your computers

To improve the efficiency of name resolution for your computers Explanation: By using a forwarder, you control name resolution queries and traffic, which can improve the efficiency of name resolution for the computers in your network.

Regarding DNSSEC, against which of the following will DNS clients verify digital signatures returned alongside a requested resource record? Key Signing Key DNSSEC resource records Trust anchor Zone Signing Key

Trust anchor Explanation: Once signed, any queries on the signed zone will return digital signatures along with the normal DNS resource records. The digital signatures are verified using the public key of the server or zone from the trust anchor

In the IPv6 space, which of the following is the equivalent of the 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 private network addresses in IPv4? Anycast address Link-local unicast address Global unicast address Unique local unicast address

Unique local unicast address Explanation: Unique local unicast addresses are the IPv6 equivalent of the 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 private network addresses in IPv4.

Which of the following does classless interdomain routing do to help reduce waste of IP addresses? Uses Network Address Translation Uses subnetting method that divides between network bits and host bits anywhere, not only between octets Uses subnetting method also called variable length subnet masking Converts between IPv4 and IPv6

Uses subnetting method that divides between network bits and host bits anywhere, not only between octets Explanation: Because of its wastefulness, classful addressing was gradually obsolesced by using a series of subnetting methods, including classless interdomain routing (CIDR). CIDR is a subnetting method that enables you to place the division between the network bits and the host bits anywhere in the address, not just between octets.

Which of the following features needs to be installed to compact the DHCP database? DNS WINS Windows Backup File Services

WINS

By default, which database is used with IPAM? Windows Internal Database SQL Server Express External SQL server XML generator

Windows Internal Database

A company's environment includes multiple Windows Server versions: 2008 (including R2), 2012 (including R2), and 2016. Desktop operating systems include Windows Vista, 7, 8/8.1, and 10. To transition to IPv6, which versions have IPv6 support running by default? All but the Windows Server 2008 servers have IPv6 support running by default. Windows Server 2008 and Windows Vista both include support for IPv6, but they do not install it by default. Windows Server 2008 through Windows Server 2016 and Windows 7 through Windows 10 have IPv6 support running by default. Only Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 have IPv6 support running by default.

Windows Server 2008 through Windows Server 2016 and Windows 7 through Windows 10 have IPv6 support running by default. Explanation: Windows Server 2008 and later and Windows Vista and later include support for IPv6, which is installed and enabled by default.

Regarding DNSSEC, which of the following is used to sign the zone data? Key Signing Key Zone Signing Key Trust anchor DNSSEC resource records

Zone Signing Key Explanation: The ZSK is used to sign zone data.

Which of the following is an example of a second-level domain? blah.com .net server1 corporate.local

blah.com Explanation: Second-level domains are registered to individuals or organizations—for example, microsoft.com or mit.edu. Second-level DNS domains can have many subdomains, and any domain can have hosts

Which of the following is an example of an FQDN? 192.168.1.50 computer1.sales.microsoft.com C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS SERVER1

computer1.sales.microsoft.com Explanation: The URL computer1.sales.microsoft.com represents an FQDN: The computer1 host is located in the sales organizational unit, which is located in the Microsoft second-level domain, which is located in the .com top-level domain. Both sales.microsoft.com and computer1.sales.microsoft.com are examples of FQDNs.

Which of the following commands would correctly set the DNS socket pool to a value of 7,000? dnscmd /Configure /PoolSize 7000 dnscmd /Config /SocketPoolSize 7000 dnscmd /Set /SocketPoolSize 7000 dnscmd /GetSocketPoolSize | dnscmd /Set /SocketPoolSize 7000

dnscmd /Config /SocketPoolSize 7000 Explanation: You will use the dnscmd /Config /SocketPoolSize 7000 command to set the DNS socket pool size to a value of 7,000.

Which command is used to verify local DNS settings? ping localhost ipconfig /all nslookup <dns_servername> tracert <dns_servername>

ipconfig /all Explanation: Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters. Executing ipconfig /all displays the full TCP/IP configuration for all adapters, including host name, DNS servers, and physical address (or MAC address).

Which of the following is correct for querying a PTR record? nslookup server1 nslookup Microsoft.com nslookup 192.168.1.50 nslookup www.technet.com

nslookup 192.168.1.50 Explanation: The Pointer (PTR) records are used for the opposite reason of the Host records. They resolve host names from an IP address. Different from the Host record, the IP address is written in reverse in the PTR record, but forward when referred to in nslookup commands.


संबंधित स्टडी सेट्स

Linux -Chapter 13 - Configuring Network Services

View Set

CHAPTER 6 - Privacy and Security

View Set

BIO 103 - Chapter 4 - Pearson #5

View Set

Chapter 6 Responsibilities in the Cloud

View Set

Chapter 1 - Nurse's Role in Health Assessment: Collecting & Analyzing Data

View Set

Chp 9: Production and Operations Management

View Set