741 Final

Ace your homework & exams now with Quizwiz!

Where does a printer appear after it is installed?

"Devices and Printers" and i Device management

Network infrastructure requirements to implement Directaccess?

- AD Domain - Domain controller - PKI - ICMP v6 - IPv6 transition technology - IP Sec policies

Which of the following actions can be taken to change bidirectional replication into unidirectional?

- Change share permissions. - Disable one of the connections.

What can you configure in connection request policies?

- type of network access -authentication and authorization of connection request

Which protocols are supported by BranchCache

- HTTP/HTTPS - SMB - BITS

Identify the available NPS templates.

- Health Policies - RADIUS Clients - Shared Secrets

Which VPN feature provides proof that users are who they claim to be?

Authentication

Which of the following is the maximum supported size of all the replicated files on a server running Windows Server 2016 with DFS?

100 TB

When using Routing Information Protocol (RIP), which of the following is the maximum number of hops?

15

Which kind of RADIUS server is placed between the RADIUS server and RADIUS clients?

A RADIUS proxy server

Unlike traditional VPN connections, DirectAccess connections are established automatically and provide which kind of connectivity?

Always on and seamless

Before using BranchCache, several tasks must be performed. Which of the following tasks is not required to be performed to use BranchCache?

Configure switches to support BranchCache.

Which tool can be used to create and customize network connection profiles for deployment to client computers?

Connection Manager Administration Kit

Which of the following is the most efficient way to deploy VPN (virtual private network) configurations to hundreds of users?

Create and distribute an executable file that contains all the settings. (Use CMAK)

Which type of NPS authentication is recommended over password authentication?

Certificate

Which of the following is the primary metric used in Routing Information Protocol (RIP)?

Hop count

Members of which IPAM security group have the needed privileges to view all IPAM data and perform all IPAM tasks?

IPAM Administrators

Members of which IPAM security group have the privileges to view IP address

IPAM IP Audit Administrators

Members of which IPAM security group have the privileges to view server discovery, IP address space, server management information ?

IPAM Users

When DFS Replication and DFS Namespace are combined into a single service offering, the pair creates which type of file sharing service?

Fault tolerant

Distributed cache mode is designed for branch offices with which of the following number of clients?

Fewer than 50

Which VPN feature ensures packets are not modified while in transit?

Data integrity

Which VPN feature guarantees that a transferred message was sent and received by the two parties claiming to have sent and received the message?

Data integrity

Which form of authentication is used by SSTP?

Digital certificates (2048 bit certificate)

When setting up authentication to NPS services for Microsoft-only clients, which type of authentication should always be used?

MS-CHAPv2

In which of the following locations is the default connection policy configured to process all authentication requests?

Locally

Routers operate at what layer of the OSI Model?

Network Layer (Layer 3)

Which of the following is a RADIUS server known as in Microsoft parlance?

Network Policy Server

On Windows Server 2016, which command is used to view and define static routes?

Route

Which Windows tool is used to provide RIP and BPG routing?

Routing and Remote Access

RRAS has multiple options available to select one or more services to provide users. Which of the following is the correct description for the Network Address Translation (NAT) option?

Sets up the server to provide NAT services to clients on a private network that need to access the Internet

DirectAccess is for clients connected to which network?

Internet

Which type of server is the Network Location Server (NLS)?

Web

If one of the replicated folders isn't available, which of the following happens when a user requests a file?

The request is rerouted to another replicated folder.

An NPS policy is a set of permissions or restrictions that determine which three aspects of network connectivity?

Who, when, and how

The hardware that actually produces hard-copy documents is called a _______

print device

In Windows, a _________ is the software interface through which a computer communicates with a print device.

printer

Why use DFS cloning option?

to save time

Which ports do Microsoft RADIUS servers use officially?

1812 and 1813

How are routing tables created dynamically?

By using RIP

Members of which IPAM security group are able to view information in IPAM and can perform IP address space management tasks?

PAM ASM Administrators

Members of which IPAM security group are able to view information in IPAM and can perform server management tasks?

PAM MSM Administrators

Which authentication method is the weakest (least secure)?

PAP

Private IP address ranges

Class A: 10.0.0.0 - 10.255.255.255 Class B: 172.16.0.0 - 172.31.255.255 Class C: 192.168.0.0 - 192.168.255.255

In which of the following situations is it appropriate to use Windows Server 2016 as a router between two networks?

For light traffic on small networks

Which of the following is the most basic requirement for a DirectAccess implementation?

The DirectAccess server must be part of an Active Directory domain.

On Windows Server 2016, which of the following is used to configure BGP?

Windows PowerShell

An NPS Server is used as?

a RADIUS Server, authentication, authorization and accounting


Related study sets

Lab Simulation 8-1: MAC Address Filtering

View Set

EAQ Sedatives, Hypnotics and Anxiety

View Set

Chapter 29 Multiple Choice Questions

View Set

Life Insurance and Annuities: Policy Replacement and Cancellation

View Set

ch 3-- Types and Patterns of Innovation

View Set