Term
What are the benefits of DHCP? |
|
Definition
1. Centralized administration of IP configuration 2. Dynamic host configuration 3. Seamless IP host configuration 4. Flexibility 5. Scalability |
|
|
Term
What is the DHCP based on? |
|
Definition
BOOTP (Bootstrap Protocol) |
|
|
Term
Defines the Duration for which a DHCP server loans an IP address to a DHCP client. |
|
Definition
|
|
Term
What is the minimum and maximum for the DHCP lease? |
|
Definition
|
|
Term
What is the default that is set for the DHCP lease? |
|
Definition
|
|
Term
What is an administrative grouping of scopes that is used to support multinets? |
|
Definition
|
|
Term
What type of operating systems can you deploy DHCP on? |
|
Definition
|
|
Term
Enables permanent address lease assigned by the DHCP server. |
|
Definition
|
|
Term
___________ is limited sequence of IP's within a scope range that are to be excluded from DHCP service offering. |
|
Definition
|
|
Term
A computer receives _____ when it changes subnets and cannot renew the lease. |
|
Definition
|
|
Term
To change the scope lease you ______________ and _________. |
|
Definition
Right click on scope and change |
|
|
Term
What must you do before you issue out an IP address? |
|
Definition
|
|
Term
When you are in APIPA the system automatically looks for a new IP address every _________. |
|
Definition
|
|
Term
What is the IP range for APIPA? |
|
Definition
|
|
Term
What is used to check the database for all scopes? One scope? |
|
Definition
|
|
Term
A new log file is created when one of the following occurs... |
|
Definition
The DHCP server is started or the local time passes 12AM |
|
|
Term
Depending on whether the audit file has been modified in the past 24 hours, the following action occurs... |
|
Definition
If the file previously existed for more than a day then it is overwritten.
If the file existed but was modified within the previous 24 hours, it is not overwritten. The new logging activity is appended to the end of the existing file and the DHCP server is started. |
|
|
Term
What are the types of clients that can dynamically update the "A" record? |
|
Definition
Any system after Server 2000. |
|
|
Term
To uncover unused space you will _________. |
|
Definition
|
|
Term
DHCP database backups are done every ____________. |
|
Definition
|
|
Term
Command used to renew its DNS IP is... |
|
Definition
|
|
Term
Active Directory and integrated zones must be in ______________. |
|
Definition
|
|
Term
______ record identifies a host. |
|
Definition
|
|
Term
What are the types of servers? |
|
Definition
Primary Name Secondary Name Master Name |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
A list of IP's of authoritative servers. It is stored in the cache of DNS. |
|
Definition
|
|
Term
What are the security levels? |
|
Definition
|
|
Term
What security attacks does IPSec prevent? |
|
Definition
1. Packet Sniffing 2. Data Modification 3. Identity Spoofing 4. Man-in-the-middle attacks 5. Denial of Service |
|
|
Term
Which attack prevents the normal use of computers or network resources? |
|
Definition
|
|
Term
Which protocol provides authentication, integrity, and anti-replay for the entire packet (both the IP header and the data payload carried in the packet)? |
|
Definition
|
|
Term
Which protocol provides confidentiality (in addition to authentication, integrity, and anti-replay) for the IP payload? |
|
Definition
|
|
Term
What standard defines a mechanism to establish SAs? |
|
Definition
IKE (Internet Key Exchange) |
|
|
Term
IPSec verifies the identity of the peer computer before data is sent. |
|
Definition
|
|
Term
What native Windows Serve 2003 command line script tool do you use to display or modify the local or remote network configuration of a computer running Windows Server 2003. |
|
Definition
|
|
Term
|
Definition
It is used to check the security setting of multiple computers |
|
|
Term
What group only appears in the forest root domain? |
|
Definition
|
|
Term
The _______________ states that no user or object (such as a service) should have more privileges or access to information and resources than is absolutely necessary. |
|
Definition
|
|
Term
A file cannot be encrypted on __________. |
|
Definition
|
|
Term
Why should file be encrypted? |
|
Definition
To protect secure information |
|
|
Term
What are the network protocols that are used to manage and secure? |
|
Definition
1. Authentication 2. Authorization 3. Confidentiality 4. Integrity 5. Non repudiation |
|
|
Term
____________ is always the first domain in the forest. |
|
Definition
|
|
Term
What is required to grant permissions for individual files and folders in Windows Server 2003? |
|
Definition
|
|
Term
What should you enable to help determine whether your security settings are effective? |
|
Definition
|
|
Term
What are the major protocols used for Windows Server 2003? |
|
Definition
Kerberos, NTLM, and IPSec |
|
|
Term
Can you encrypt files on a compressed volume? |
|
Definition
No. Compression and Encryption are mutually exclusive. |
|
|
Term
What can be used to query DNS zone information? |
|
Definition
|
|
Term
What verifies the consistency of a particular set of DNS records on multiple servers? |
|
Definition
|
|
Term
___________ is load balancing mechanism used by DNS servers to share and distribute network resource loads. |
|
Definition
|
|
Term
DNS uses the __________________ to map a host name to an IP address. |
|
Definition
FQBN (Fully Qualified Domain Name) |
|
|
Term
What are the 3 standard zones? |
|
Definition
Primary Secondary in-addr.arpa |
|
|