741 Final
Where does a printer appear after it is installed?
"Devices and Printers" and i Device management
Network infrastructure requirements to implement Directaccess?
- AD Domain - Domain controller - PKI - ICMP v6 - IPv6 transition technology - IP Sec policies
Which of the following actions can be taken to change bidirectional replication into unidirectional?
- Change share permissions. - Disable one of the connections.
What can you configure in connection request policies?
- type of network access -authentication and authorization of connection request
Which protocols are supported by BranchCache
- HTTP/HTTPS - SMB - BITS
Identify the available NPS templates.
- Health Policies - RADIUS Clients - Shared Secrets
Which VPN feature provides proof that users are who they claim to be?
Authentication
Which of the following is the maximum supported size of all the replicated files on a server running Windows Server 2016 with DFS?
100 TB
When using Routing Information Protocol (RIP), which of the following is the maximum number of hops?
15
Which kind of RADIUS server is placed between the RADIUS server and RADIUS clients?
A RADIUS proxy server
Unlike traditional VPN connections, DirectAccess connections are established automatically and provide which kind of connectivity?
Always on and seamless
Before using BranchCache, several tasks must be performed. Which of the following tasks is not required to be performed to use BranchCache?
Configure switches to support BranchCache.
Which tool can be used to create and customize network connection profiles for deployment to client computers?
Connection Manager Administration Kit
Which of the following is the most efficient way to deploy VPN (virtual private network) configurations to hundreds of users?
Create and distribute an executable file that contains all the settings. (Use CMAK)
Which type of NPS authentication is recommended over password authentication?
Certificate
Which of the following is the primary metric used in Routing Information Protocol (RIP)?
Hop count
Members of which IPAM security group have the needed privileges to view all IPAM data and perform all IPAM tasks?
IPAM Administrators
Members of which IPAM security group have the privileges to view IP address
IPAM IP Audit Administrators
Members of which IPAM security group have the privileges to view server discovery, IP address space, server management information ?
IPAM Users
When DFS Replication and DFS Namespace are combined into a single service offering, the pair creates which type of file sharing service?
Fault tolerant
Distributed cache mode is designed for branch offices with which of the following number of clients?
Fewer than 50
Which VPN feature ensures packets are not modified while in transit?
Data integrity
Which VPN feature guarantees that a transferred message was sent and received by the two parties claiming to have sent and received the message?
Data integrity
Which form of authentication is used by SSTP?
Digital certificates (2048 bit certificate)
When setting up authentication to NPS services for Microsoft-only clients, which type of authentication should always be used?
MS-CHAPv2
In which of the following locations is the default connection policy configured to process all authentication requests?
Locally
Routers operate at what layer of the OSI Model?
Network Layer (Layer 3)
Which of the following is a RADIUS server known as in Microsoft parlance?
Network Policy Server
On Windows Server 2016, which command is used to view and define static routes?
Route
Which Windows tool is used to provide RIP and BPG routing?
Routing and Remote Access
RRAS has multiple options available to select one or more services to provide users. Which of the following is the correct description for the Network Address Translation (NAT) option?
Sets up the server to provide NAT services to clients on a private network that need to access the Internet
DirectAccess is for clients connected to which network?
Internet
Which type of server is the Network Location Server (NLS)?
Web
If one of the replicated folders isn't available, which of the following happens when a user requests a file?
The request is rerouted to another replicated folder.
An NPS policy is a set of permissions or restrictions that determine which three aspects of network connectivity?
Who, when, and how
The hardware that actually produces hard-copy documents is called a _______
print device
In Windows, a _________ is the software interface through which a computer communicates with a print device.
printer
Why use DFS cloning option?
to save time
Which ports do Microsoft RADIUS servers use officially?
1812 and 1813
How are routing tables created dynamically?
By using RIP
Members of which IPAM security group are able to view information in IPAM and can perform IP address space management tasks?
PAM ASM Administrators
Members of which IPAM security group are able to view information in IPAM and can perform server management tasks?
PAM MSM Administrators
Which authentication method is the weakest (least secure)?
PAP
Private IP address ranges
Class A: 10.0.0.0 - 10.255.255.255 Class B: 172.16.0.0 - 172.31.255.255 Class C: 192.168.0.0 - 192.168.255.255
In which of the following situations is it appropriate to use Windows Server 2016 as a router between two networks?
For light traffic on small networks
Which of the following is the most basic requirement for a DirectAccess implementation?
The DirectAccess server must be part of an Active Directory domain.
On Windows Server 2016, which of the following is used to configure BGP?
Windows PowerShell
An NPS Server is used as?
a RADIUS Server, authentication, authorization and accounting