Term
1.1 What server roles require the Enterprise or Datacenter editions of Windows Server 2008? |
|
Definition
Active Directory Federation Services (AD FS), Failover Clustering for up to 16 nodes, The NDES and Online Responder Service with ADCS, Unlimited # of remote access and VPN connections |
|
|
Term
1.1 What are the main differences between the Enterprise and Datacenter editions? |
|
Definition
Enterprise: Hyper V licenses allows host and up to 4 virtual instances, supports up to 8 processors. Datacenter: Hyper V licensings allows unlimited # of instances and supports up to 64 processors |
|
|
Term
1.1 How many virtual instances are allowed on each Windows Server 2008 edition? |
|
Definition
Standard (1) Enterprise (4) Datacenter (Unlimited) Itanium(Unlimited with 3rd party virtualization technologies) |
|
|
Term
1.1 What server roles can run on a Web server edition of Windows Server 2008? |
|
Definition
Web Services and Domain Name System (DNS) |
|
|
Term
1.1 What is the difference between a full installation of Windows Server 2008 and a Server Core installation? |
|
Definition
Server Core is a stripped down version of WS 2008. It provides you with minimal installation of WS 2008 that supports installing only certain server roles. (no desktop or windows shell) Full Installation option for WS 2008 supports all available server roles |
|
|
Term
1.1 When can you upgrade from a Server Core installation? |
|
Definition
Never. You can only perform a clean installation of server core. You cannot upgrade to or from server core |
|
|
Term
1.2 What are the differences between Multiple Activation Key (MAK) and Key Management Services (KMS)? |
|
Definition
MAK is used in small environments, allows use of predefined pool of activations, eliminates the need for the local server or management structure for licensing. KMS is uses in larger environments, allows local licensing server in local environments, requires local server constantly running with the available pools of activations |
|
|
Term
1.2 What benefits come from using a response file during installation? |
|
Definition
Allows us to install WS 2008 without needing to enter the data throught the different prompts during the installation process (no intervention on our behalf) |
|
|
Term
1.2 What is the default file name for the unattended answer file? |
|
Definition
Autoattend.xml (notes) / Autounattend.xml (video) |
|
|
Term
1.2 Which Windows Server 2003 editions can be upgraded to Windows Server 2008 Enterprise edition? |
|
Definition
WS 2003 standard edition can be upgraded to WS 2008 standard or enterprise edition |
|
|
Term
1.2 Which Windows editions cannot be upgraded? |
|
Definition
you can't upgrade WS 2003 standard to a versio lower than itself which is Windows Web Server 2008 |
|
|
Term
1.2 How can you move from a 32-bit installation to a 64-bit installation? |
|
Definition
You cannot upgrade a 32 bit installation to a 64 bit installation |
|
|
Term
1.2 What should you do if an upgrade fails without completing? |
|
Definition
rollback to an exisiting WS installation |
|
|
Term
1.3 When would you use a discover boot image? |
|
Definition
when the computer does not support PXE environment |
|
|
Term
1.3 How many install images do you need to deploy Windows Server 2008 to computers that will install the Standard, Enterprise, and Datacenter editions? |
|
Definition
1. Each install image can have different editions of the windows o/s within it |
|
|
Term
1.3 How many images would you need if you were deploying both 32-bit and 64-bit 1.3 operating systems? |
|
Definition
since install image is architecture specific you must install the proper image for the 32 or 64 bit |
|
|
Term
1.3 What type of boot image can you use to deploy a 64-bit install image? |
|
Definition
a x64 computer can only use a x64 or x86 boot image |
|
|
Term
1.3 What is the difference between static and dynamic discovery with a boot image? |
|
Definition
Static Discovery you can manually identify the WDS server that will be used. Dynamic Discovery the client uses PXE emulated request to locate a WDS server on the network |
|
|
Term
1.3 What are the advantages of pre-staging computer accounts when using WDS? |
|
Definition
allows you to pre-create the computer accounts in Active Directory with the proper names |
|
|
Term
1.3 How does multicasting differ from unicasting? |
|
Definition
Mutlicast -sends the data once with multiple clients as it is requested. Unicast -sends requested image directly to the client as it is requested |
|
|
Term
1.3 How does auto-cast differ from scheduled-casting? |
|
Definition
Auto-cast transmission -starts as one client requests it. Client joins the transmission that has already started. Scheduled-cast transmission -starts based on the number of clients waiting and/or on the specific day and time. |
|
|
Term
2.1 In which situation should you use different internal and external domain names? |
|
Definition
1) use .local or .private namespaces so they are not available on the internet. 2) when you don't want records to be readable from the outside |
|
|
Term
2.1 Which DNS zone has a read-only copy of the zone database? |
|
Definition
|
|
Term
2.1 What are the differences between a forwarder and conditional forwarder? |
|
Definition
Forwarder -resolves queries for records that cannot be resolved through cache Conditional Forwarding -is a forwarder that is used for a specific domain |
|
|
Term
2.1 What is the name of a root zone? |
|
Definition
|
|
Term
2.1 When should you use the HOSTS file for DNS name resolution? |
|
Definition
1) to provide a single name resolution. 2) to map a hostname to an IP address that's different from what is provided by the DNS server. 3) to provide a name resolution outside of local subnet when DNS server is unavailable |
|
|
Term
2.1 Which protocol allows computers to resolve names without the use of a DNS server or broadcasts? |
|
Definition
Link Local Multicast Name Resolution (LLMNR) |
|
|
Term
2.2 What is the difference between placing a DHCP server on each subnet and using a multihomed server? |
|
Definition
DHCP on each subnet leases addresses to hosts on the subnet. Multihomed configures a single DHCP server to service multiple subnets |
|
|
Term
2.2 What is the disadvantage of BOOTP forwarding? |
|
Definition
Forwarding across multiple networks increases traffic and might negatively impact performance |
|
|
Term
2.2 How many DHCP relay agents should be placed on a single subnet? |
|
Definition
|
|
Term
2.2 When should you use a superscope? |
|
Definition
1) to combine multiple scopes into a single logical scope. 2) to add more IP addresses to an exisiting scope. 3) to migrate clients from one scope to another over a period of time |
|
|
Term
2.2 How is the preferred DHCP server selected? |
|
Definition
because the client computer accepts the first DHCP lease offer it receives you cannot control which DHCP server will be used. Only way to control is to configure a 4 second or longer delay to give the preferred server time to respond before the backup server |
|
|
Term
2.3 When would you use the GlobalNames zone? |
|
Definition
1) to allow clients to use simple host names. 2) to allow DNS clients to contact NET-BIOS only hosts. 3) to allow IPv6 only hosts to contact NET-BIOS hosts |
|
|
Term
2.3 What type of records do you create in the GlobalNames zone? |
|
Definition
|
|
Term
2.3 How can you extend the GlobalNames zone across multiple forests? |
|
Definition
use the SRV resource to publish the location of the global name zone |
|
|
Term
2.3 Which strategies can you use to provide single-label name resolution for IPv6 hosts? |
|
Definition
1) GlobalNames 2) Local Link Multicast Name Resolution (LLMNR) |
|
|
Term
2.3 What is the disadvantage of using the HOSTS file in large networks? |
|
Definition
file must be configured on each host |
|
|
Term
2.3 When will a Windows client use LLMNR? What are the limitations of relying on LLMNR? |
|
Definition
Client will use LLMNR to create ad-hoc networks or to find hosts on the local subnet without use of a DNS server. LLMNR replaces the NET-BIOS broadcast capabilities but requires LLMNR capable hosts. |
|
|
Term
2.4 Which role service must you add to allow remote clients to access the private network, and not just the resources on the remote access server? |
|
Definition
WS 2008 routing and remote access server role |
|
|
Term
2.4 What are the ways that you can configure a remote access client to get an address for the remote access connection? |
|
Definition
1) configure the remote access server to use DHCP to obtain addresses for remote clients. 2) configure a static pool of addresses on the RAS. 3) configure a static address on the client |
|
|
Term
2.4 Which role service do you add to configure network policies on a server? |
|
Definition
network policy server role |
|
|
Term
2.4 What role do network policies play when you configure the remote access server? |
|
Definition
a firewall like role because they identify a single client connection |
|
|
Term
2.4 How do network policy constraints differ from conditions? |
|
Definition
Conditions identify which network policies apply to incoming connections. Constraints specify additional connection characteristics that must be matched before the connection is granted |
|
|
Term
2.4 What advantages does using SSTP have over using either PPTP or L2TP for a VPN connection? |
|
Definition
Uses HTTP over SSL to establish the VPN connection. Uses port 443 |
|
|
Term
2.4 What ports must you open in a firewall to allow SSTP? |
|
Definition
|
|
Term
2.5 When using a RADIUS solution, where are network access policies configured? |
|
Definition
|
|
Term
2.5 What is the difference between a RADIUS client and a remote access client? |
|
Definition
RADIUS client forwards authenication requests to a RADIUS server. Remote Access Client connect to the access server and log in credentials are then forwarded to RADIUS server for authentication |
|
|
Term
2.5 Why would you implement a RADIUS proxy? |
|
Definition
to route connection requests and accounting data between RADIUS clients |
|
|
Term
2.5 What is the difference between a RADIUS client and a RADIUS proxy? |
|
Definition
RADIUS client forwards authentication requests to a RADIUS server. RADIUS proxy forwards connection requests between RADIUS clients |
|
|
Term
2.5 What is the difference between a connection request policy and a network access policy? |
|
Definition
Network Policy is configured on the RADIUS server to identify users who can connect to the network. Connection Policy is configured on the RADIUS proxy and determine if authentication request is forwarded to the RADIUS server or processed locally |
|
|
Term
2.5 How does the RADIUS proxy use the remote RADIUS server group when processing authentication requests? |
|
Definition
Authentication requests are received by the proxy are forwarded to the server(s) defined in one of the remote server groups |
|
|
Term
2.5 What are the three types of RADIUS accounting events, and which event records actual logon requests by remote users? |
|
Definition
1) Accounting Requests. 2) Authentication Requests. 3)Periodic Status Information. |
|
|
Term
2.5 How many types of logging can be enabled at the same time on a RADIUS server? |
|
Definition
All 3 types can be enabled at the same time. (Event logging, local file logging, SQL server logging) |
|
|
Term
2.6 What functions are performed by the System Health Validator (SHV)? |
|
Definition
Specify which benchmarks the client must meet to be granted access |
|
|
Term
2.6 What does the enforcement server do with State of Health information? |
|
Definition
Enforcement server forwards the state of health information to the NAP server and returns the corresponding state of health response |
|
|
Term
2.6 How do remediation servers and auto-remediation help clients become compliant? |
|
Definition
they provide a set of resources that a non-compliant computer can access on the limined access network |
|
|
Term
2.6 What server role service do you add to configure a server as an enforcement point for NAP? |
|
Definition
|
|
Term
2.6 Which enforcement method uses a Health Registration Authority (HRA)? |
|
Definition
|
|
Term
2.6 What type of communication occurs in the boundary network when using IPsec enforcement? |
|
Definition
Ipsec is requested but not required to communicate between hosts in the restricted network and hosts in the boundary network |
|
|
Term
2.7 By default, which type of traffic is allowed through the firewall? |
|
Definition
|
|
Term
2.7 How can a policy help you maintain security integrity in your network? |
|
Definition
Policy can allow you to isolate certain network resources from untrusted computers. You can apply policies to multiple computers. |
|
|
Term
2.7 What is the benefit of using connection security rules? |
|
Definition
it requires both communicating computers to have matching connection security rules or an Ipsec policy |
|
|
Term
2.7 Which profile is applied on a server running Windows Server 2008 R2? |
|
Definition
In WS 2008 R2 each network adapter applies the firewall profile best suited for the connection network |
|
|
Term
What is a virtual machine? |
|
Definition
is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine |
|
|