This website uses cookies to ensure you have the best experience. Learn more

Server Questions Essay

4577 words - 19 pages

Server question
Ques 1 :-Which of the following is not a benefit of DHCP?
1.       centralized administration of IP configuration
2.       dynamic host configuration
3.       seamless IP host configuration
4.       portability of workstations

ques 2:- Which of the following is not a component of DNS?
1.       DNS namespace
2.       DNS zones
3.       DNS resource records
4.       DNS relay agent

Ques 3:- A starting address of and an ending address of is a member of which network class?
1.       Class a
2.       Class b
3.       Class c
4.       Class d

Ques 4:- Which of the following is not a function of DHCP?
1.       transmitting data from one network to ...view middle of the document...

       subnet mask
2.       default gateway
3.       workstation settings
4.       IP address

Ques 10:- The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used?
2.       DHCPOFFER
4.       DHCPACK

Ques 11:- Which of the following is not a database function used to manage the DHCP database?
1.       Compact
2.       Reconciliation
3.       Connect
4.       Restore

Ques 12;- A DHCP client will perform the initial lease process in all of the following situations with the exception of __________.
1.       the very first time the client boots
2.       after every reboot
3.       after releasing the IP address
4.       after receiving a DHCPNACK message

ques 13:- In a Windows Server 2008 network, the primary means of locating network devices and network services is through the use of __________.
1.       DHCP
2.       DNS
3.       TCP/IP
4.       BOOTP

Ques 14:- DNS zone file resource records are represented as __________.
1.       binary packets
2.       DHCP data entries
3.       form packets
4.       text entries

ques 15:- Which zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone?
1.       standard primary zone
2.       standard secondary zone
3.       reverse lookup zone
4.       stub zone

ques 16:- After sending a zone transfer request, which option shows how long (in seconds) the zone’s secondary server waits before sending another request?
1.       Refresh
2.       Retry
3.       Expire
4.       Minimum TTL

Ques 17:- For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?
1.       5
2.       7
3.       10
4.       12

Ques18:- Of the four types of routes that can be found in a routing table, which of the following cannot be found?
1.       directly attached network routes
2.       remote network routes
3.       client routes
4.       host routes

ques19:- Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?
1.       Password Authentication Protocol (PAP)
2.       Shiva Password Authentication Protocol (SPAP)
3.       Challenge Handshake Authentication Protocol (CHAP)
4.       Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP)

Ques20:- One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option?
1.       Server Must Supply an IP Address
2.       Client Must Supply an IP Address
3.       Client May Request an IP Address
Server Settings Determine IP Address Assignment

Ques 21:- The process of deploying and configuring a simple file server using Windows...

Other Papers Like Server Questions

Unit 1 Net+ Essay

1105 words - 5 pages Project Instructions: Respond to each of the project requirements and submit all work to the Dropbox as a single file. Project requirements: 1. Unit 1 reviews questions: a. The functions provided by a network are usually referred to as network services _. b. A (n) remote access server may also be known as simply an access server. c. True or False: A client/server network is the simplest network model. d. True or False: A

Networking Essay

1477 words - 6 pages have any RAID- yes it is a RAID 10. Any redundancy in it? Yes power, yes NIC card (4 in server) data is RAID 10 configured. How you present it is how you say it- I’m the project manager I’m going to manage this project but I want to get an engineer on the call to answer your questions. (Terry). Say you have the Site spec sheet that you will send. Knowing how to say the answer so they are comfortable with the expertise level. Acronyms

Unit 2 Assignment 1

559 words - 3 pages Lab Assessment Questions & Answers 1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data. Windows Server 2012 Active Directory achieves C-I-A for departmental LANs, departmental folders and data through the two-way authentication and Global Policy Management for secure networking within domains. 2. Is it a good practice

Payment Processing System

293 words - 2 pages Main system I would consider to adding a central server at the headquarters of RFC. Especially since they are considering to expand in the next three years. Using a central server gives the branches the opportunity to be up-to-date in real-time. To accomplish this, all branches need an Internet connection with a VPN connection to the headquarters central server. Every branch has its own ERP branch software that is connected to the headquarters

It 240 Appendix B

643 words - 3 pages Associate Level Material Appendix B LAN Operating Systems Scenarios Read the three scenarios below and answer the questions that follow each scenario. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and


379 words - 2 pages desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective security program for information systems? 2. Of these three fundamental controls, which two are used by the Domain

Tdtfyh Jvhkbvjkn Hvhkb, Jb

1246 words - 5 pages Wireshark Lab: HTTP SOLUTION Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross © 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved The following screen shots showing the HTTP GET and HTTP reply answer these questions: 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? 2. What languages (if any) does your browser indicate that it can accept to

Chapter 4 Solutions

1179 words - 5 pages Chapter 4 Review Questions 1. Your company has four departments: Marketing and Sales, Manufacturing, Product Research, and Business. Which of the following Active Directory container design plans might you use to best manage the user accounts and network access needs of each department? a. Create four trees. b. Create four parent domains in one site. c. Create four OUs in one domain. d. Create four trees and map them to four domains

The Execution of the Second World War

762 words - 4 pages two alternatives for developing the new tools for better customer service with the retail stores. The first alternative will have a special software tool developed in C++ program (application software) that clients ( 500 employees) will download onto their computers to run. The tool will communicate with the server to select data to analyze. The second alternative will have the C++ program running on the server in the headquarters; the

Atlantic Computers

1158 words - 5 pages pricing. 4. Arrive at price based on value-in use pricing. • Also other questions regarding product’s target market, competitor’s and customer’s reaction need to be answered. Atlantic Computer Analysis- Group3 • 5. Option-1 • This option include charging for Tronn server only and give PESA tool for free. • Cost Of Atlantic bundle = $2,000 • Atlantic will have to forego the amount of R&D investments done in PESA software here. This amounts to

Programming Sockets In Java

2003 words - 9 pages Programming sockets in Java and writing simple SMTP client.Programming sockets in JavaIn this section we will answer the most frequently asked questions about programming sockets in Java. Then we will show some examples of how to write client and server applications.Note: In this tutorial we will show how to program sockets in Java using the TCP/IP protocol only since it is more widely used than UDP/IP. Also: All the classes related to sockets

Related Essays

Dns Senario Essay

660 words - 3 pages DNS scenario Dear junior IT, First off thank you for contacting my with your questions ill will try to help you to the best of my ability. So you are working at two branch offices and have been tasked with where to place Active-Directory Integrated DNS Servers and what type to use. Before I answer these questions I will ask you one myself. Do you know what an ADI DNS is and the different type of zones there are? If not I will enclose some

Unit 1 Research Paper

1627 words - 7 pages :// MSDN: MSDN: SQL Server Express Features: BC Burleson Consulting:

12345 Essay

827 words - 4 pages Chapter 2 Review Questions Joshua Archuleta 06/19/2013 Your colleague is trying to upgrade from Windows Server 2003, Datacenter Edition to

Mcts Server 2008 Chapter Seven Review

879 words - 4 pages Chapter Seven Review Questions  MCTS Guide to Microsoft Windows Network Infrastructure Configuration  1. What protocol is used by Windows clients for accessing shared resources in Windows Server 2008?    c. SMB  2. User‐level permissions in Windows Server 2008 are based on NTFS, or the New Technology File  Service.  3. Which of the following are not share‐level permissions in Windows Server 2008?  b. Execute  c. Write  e. Modify