FOR MORE OF THIS COURSE AND ANY OTHER COURSES, TEST BANKS, FINAL EXAMS, AND SOLUTION MANUALS
CONTACT US
AT WHISPERHILLS@GMAIL.COM
Chapter 4: Designing the Logical Components
TRUE/FALSE
1. LAN Manager authentication is viewed as a
security risk to any network.
2. Machine account names cannot exceed 10
characters.
3. It is possible to authenticate Linux, UNIX,
and Mac OS X clients against Active Directory through the Kerberos protocol.
4. The disadvantage of an in-place upgrade is
that user accounts have to be moved from one domain to another.
5. Restructuring domains involves moving
accounts from a nonupgraded domain to a Windows Server 2003 Active Directory
domain.
MODIFIED TRUE/FALSE
1. A properly created GPO design provides
an environment with a reduced total cost of ownership by locking systems down
and providing a consistent, standard configuration to groups of machines while
providing an overall environment that is simple to implement and maintain.
_________________________
2. Global scope information is not
replicated outside its home domain. _________________________
3. When accounts are created in a domain or
forest, ADMTs are created to correspond to the account.
_________________________
4. In a work-group or peer-to-peer design,
systems handle authentication globally. _________________________
5. Delegation by geography provides an
Active Directory design that closely mimics the organization’s hierarchical
structure. _________________________
MULTIPLE CHOICE
1. _____ work(s) in conjunction with
discretionary access control lists to provide a means for controlling user’s
access to network resources.
a.
|
Security groups
|
c.
|
Domain local scope
|
b.
|
Distribution groups
|
d.
|
Global scope
|
2. _____ is/are used to define and control
access to resources within a single domain.
a.
|
Security groups
|
c.
|
Domain local scope
|
b.
|
Distribution groups
|
d.
|
Global scope
|
3. Which of the following object types is a
container that is used to control authentication and replication traffic across
links that are not well-connected?
a.
|
Contact
|
c.
|
Site
|
b.
|
Shared folder
|
d.
|
InetOrgPerson
|
4. To create a forest trust between Windows
Server 2003 forests, it is necessary to change the forest functional level to
a(n) _____ native functionality.
a.
|
NTLM
|
c.
|
UPN
|
b.
|
Kerberos
|
d.
|
.NET
|
5. _____ domains generally exist where some
degree of autonomy or self-sufficiency is required within different portions of
an organization.
a.
|
Single
|
c.
|
Regional
|
b.
|
Peer
|
d.
|
In-place
|
6. _____ involve upgrading from a pre-Windows
Server 2003 domain environment to Windows Server 2003’s Active Directory using
the same domain name and structure as that used in the original enterprise
design.
a.
|
In-place upgrades
|
c.
|
Authorization
|
b.
|
Authentication
|
d.
|
Domain trusts
|
7. _____ is the process of verifying an identity
for the purpose of authorizing or granting certain permissions to that
identity.
a.
|
In-place upgrade
|
c.
|
Link replication
|
b.
|
Data access
|
d.
|
Authentication
|
8. _____ trust exists between a forest root and
an external Kerberos domain.
a.
|
Transitive
|
c.
|
Shortcut
|
b.
|
Realm
|
d.
|
Two-way
|
9. Delegation by _____ provides a hierarchical
model that mimics the organization’s geographic distribution.
a.
|
object type
|
c.
|
location
|
b.
|
function
|
d.
|
trust
|
10. _____ groups are used in conjunction with DACLs to regulate users’
access to resources in Active Directory.
a.
|
Domain trust
|
c.
|
Object type
|
b.
|
Machine policy
|
d.
|
Data access
|
11. Windows Server 2003 includes which of the following security
groups to provide data access control?
a.
|
Global groups
|
c.
|
OU groups
|
b.
|
Site groups
|
d.
|
Intrasite domain groups
|
12. The _____ is a new utility available in Windows Server 2003 that
provides role-based account creation and management capabilities.
a.
|
InetOrgPerson
|
c.
|
Authorization Manager
|
b.
|
NTLM
|
d.
|
Knowledge Consistency Checker
|
13. _____ contains all class and attribute definitions for the forest.
a.
|
Site container
|
c.
|
Domain partition
|
b.
|
Schema partition
|
d.
|
Configuration partition
|
14. A(n) _____ is an AD object that may be configured to mimic the
physical layout of LAN segments of the overall network design.
a.
|
object type
|
c.
|
site container
|
b.
|
shared folder
|
d.
|
single-domain
|
15. _____ provides a mechanism for incremental replication of
multivalued attributes.
a.
|
Link replication
|
c.
|
Intersite replication
|
b.
|
Intrasite replication
|
d.
|
Knowledge Consistency Checker
|
16. _____ takes place using a ring topology that Active Directory
predefines as each domain controller is introduced to the site.
a.
|
Link replication
|
c.
|
Intrasite replication
|
b.
|
Knowledge Consistency Checker
|
d.
|
Intersite replication
|
YES/NO
1. Does increasing password lengths and enabling
password complexity increase the level of security provided by Windows Server
2003?
2. Is LM authentication significantly stronger
than NTLM authentication?
3. Generally, if your Windows NT 4.0 environment
relies on LMRepl to replicate logon scripts, is the use of FRS to replicate the
contents of the sysvol folder on all Windows 2000 Server and Windows Server
2003 domain controllers a sufficient replacement solution?
4. Is the domain administrator the owner of all
the objects within the AD infrastructure?
5. In an effort to reduce latency, if users
frequently access resources in a separate domain tree, can you create a
shortcut trust to shorten the trust path that authentication must follow?
COMPLETION
1. ____________________ replication provides
administrators with the capability to make changes to information on any domain
controller within the domain, with the guarantee that changes will be
propagated to all the domain controllers within the domain.
2. ____________________ standardization refers
to common elements between forests.
3. ____________________ standardization works
within a single partition of the Active Directory forest.
4. ____________________ relationships allow
users hosted by one forest to access resources located in a separate, external
forest.
5. ____________________ domains stem from independent
domain tree roots, each carrying its own namespace.
MATCHING
Match each item with a statement below.
a.
|
Bridgehead servers
|
f.
|
Shortcut trusts
|
b.
|
Knowledge Consistency Checker
|
g.
|
Backup operators
|
c.
|
Split-brain DNS
|
h.
|
Global groups
|
d.
|
Transitive trusts
|
i.
|
GPMC
|
e.
|
Kerberos realm
|
1. Utilizes two ISP-hosted external DNS servers
and two internally hosted DNS servers.
2. May be transferred between common forests or
domains.
3. Shorten the authentication path within an
Active Directory forest.
4. The replication gateway between sites.
5. An administrative boundary for an environment
utilizing Kerberos authentication.
6. Administrative access group.
7. Provides an interface for simulating Group
Policy implementations as well as reporting functionality and other new
ease-of-use features.
8. Applicable forestwide.
9. Responsible for defining the replication
topology for intrasite replication.
SHORT ANSWER
1. How has the Inter Site Topology Generator
(ISTG) been modified from the ISTG of Windows 2000 Server?
2. List the four options that exist for
organizations that require internal and external namespace.
3. What are the responsibilities of OU owners?
4. A centralized management model may utilize
AD’s delegation capabilities to delegate specific tasks for an Active Directory
container. Provide a list of tasks that can be delegated through Active
Directory.
5. What are the major benefits of Active Directory’s
replication model?
Chapter 5: Name Resolution
TRUE/FALSE
1. By default, if during an update process WINS
is presented with both a static and dynamic-type entry for the same name, the
static entry will be preserved.
2. A caching-only name server periodically
checks for changes made to the zone on its configured primary DNS server and
performs full or incremental zone transfers as needed.
3. The best way to keep outsiders from gaining
access to your internal DNS server is to configure your firewall to explicitly
allow only UDP and TCP port 53 communications between the servers.
4. One key difference between a DNS server set
for high-level security and one set for medium-level security is that a
high-level configuration contains a domain controller as well as a DNS server,
and the DNS zone information is stored within Active Directory.
5. Primary zones are read-only and are updated
only through zone transfers.
MODIFIED TRUE/FALSE
1. A(n) external namespace is used for
managing resources on a private network. _________________________
2. BIND, version 5, provides the greatest
degree of interoperability with Windows 2003 in a heterogeneous DNS
environment. _________________________
3. A standard primary zone is hosted on
the master servers in a zone replication scheme. _________________________
4. The DACL for a particular zone can be
viewed and managed through the DNS Management console under the Security tab of
the zone properties. _________________________
5. The DNS system is a collection of zone
files that are spread out throughout the Internet as well as private networks.
_________________________
MULTIPLE CHOICE
1. A(n) _____ zone is an authoritative DNS zone
that is used primarily to resolve IP addresses to network resource names.
a.
|
reverse lookup
|
c.
|
recursive
|
b.
|
stub
|
d.
|
transitive
|
2. A(n) _____ query is a request from a host to
a resolver to find data on other name servers.
a.
|
reverse
|
c.
|
recursive
|
b.
|
stub
|
d.
|
zone
|
3. _____ are useful for reducing the number of
DNS queries on a network, and consequently the resource consumption on the
primary DNS servers for that particular namespace.
a.
|
Zone transfers
|
c.
|
Address records
|
b.
|
Incremental transfers
|
d.
|
Stub zones
|
4. _____ is the process of copying contents of
the zone file on a primary DNS server to a secondary DNS server.
a.
|
DNSSEC
|
c.
|
DNS notify
|
b.
|
Zone transfer
|
d.
|
Reverse lookup
|
5. When using _____ zone transfers, the
secondary server retrieves only resource records that have changed within a
zone so that it remains synchronized with the primary DNS server.
a.
|
DNS notify
|
c.
|
recursive
|
b.
|
full
|
d.
|
incremental
|
6. _____ allows a primary DNS server to utilize
a “push” mechanism for notifying secondary servers that it has been updated
with records that need to be replicated.
a.
|
Incremental transfer
|
c.
|
Full transfer
|
b.
|
DNS notify
|
d.
|
Recursive transfer
|
7. A(n) _____ is part of DNS’ database structure
that contains the name information for a particular host or zone.
a.
|
Resource Record
|
c.
|
BIND
|
b.
|
PTR
|
d.
|
CNAME
|
8. _____ resource records identify the name of
the root of the zone and contain the name of the server that is the primary
source for information about the zone.
a.
|
Canonical Name
|
c.
|
Address
|
b.
|
SOA
|
d.
|
Stub
|
9. _____ records are used for creating aliases
for hosts.
a.
|
PTR
|
c.
|
Address
|
b.
|
SOA
|
d.
|
CNAME
|
10. _____ allow for the distribution of data and also for the
management of localized DNS databases.
a.
|
SOAs
|
c.
|
Reverse lookups
|
b.
|
Zones
|
d.
|
Addresses
|
11. _____ is a set of extensions to DNS that adds the capability to
authenticate resource records and was designed to protect the Internet from
certain attacks.
a.
|
DNS notify
|
c.
|
Hub-and-Spoke topology
|
b.
|
DNSSEC
|
d.
|
Replication
|
12. _____ is the Microsoft implementation of a NetBIOS name server.
a.
|
BIND
|
c.
|
CNAME
|
b.
|
WINS
|
d.
|
DNSSEC
|
13. _____ is the process of copying updated data from a data store or
file system on a source computer to a matching data store or file system on one
or more destination computers to synchronize the data.
a.
|
DNS notify
|
c.
|
Replication
|
b.
|
Reverse lookup
|
d.
|
Zone transfer
|
14. A(n) _____ is a WINS component that requests replication of
updated WINS database entries from its push partner.
a.
|
Hub-and-Spoke topology
|
c.
|
pull partner
|
b.
|
BIND
|
d.
|
PTR
|
15. The most important step in creating a DNS namespace is _____.
a.
|
choosing a name
|
c.
|
choosing the address
|
b.
|
choosing the zone
|
d.
|
choosing the pull partner
|
16. _____ zones contain the SOA resource record of the zone, the DNS
resource records that list the zone’s authoritative servers, and the glue
address resource records that are required for contacting the zone’s
authoritative servers.
a.
|
Recursive
|
c.
|
Incremental
|
b.
|
Stub
|
d.
|
Transfer
|
YES/NO
1. If you are migrating to Windows Server 2003
or integrating Windows Server 2003 DNS with a third-party DNS infrastructure
such as BIND or UNIX, do you need to change the namespace design used in your
third-party DNS infrastructure?
2. Does Windows Server 2003 DNS interoperate
with other implementations of DNS?
3. Can dynamic DNS updates allow a computer on
your network to register and update its DNS resource records whenever a change
occurs?
4. Can network topology influence your decision
about replication frequency?
5. Is the Hub-and-Spoke topology best suited for
small networks?
COMPLETION
1. A(n) ____________________ is a set or group
of names that are assigned according to some naming convention.
2. For the actual DNS database, a(n)
____________________ is a contiguous portion of the domain tree that is
administered as a single separate entity by a DNS server.
3. In the ____________________ topology, every
WINS server is configured as a replication partner to every other WINS server.
4. Active Directory-____________________ zones
are the only type of zones that can use multi-master replication and Active
Directory security features.
5. There are two methods for populating entries
in the WINS database: manually and ____________________.
MATCHING
Match each item with a statement below.
a.
|
Burst handling
|
f.
|
Multi-master replication model
|
b.
|
Zone transfers
|
g.
|
Primary DNS server
|
c.
|
DNS zones
|
h.
|
DNSSEC
|
d.
|
DNS forwarding
|
i.
|
Caching-only name server
|
e.
|
Conditional forwarders
|
1. Provides fault tolerance by synchronizing the
zone file in a primary DNS server with the zone file in a secondary DNS server.
2. Used to divide the namespace and use servers
to allocate resources and divide services.
3. Can be configured to forward DNS queries
based on specific domain names.
4. Works by adding three additional record types
into DNS - NXT, KEY, and SIG - that will be used for authentication.
5. The mechanism in which one DNS server passes
on an unresolved query to another DNS server for resolution.
6. Removes the need for secondary zones when all
zones are stored in Active Directory.
7. Hosts read-write copies of zone data, has a
DNS database of resource records, and resolves queries.
8. Performs name resolution using forwarders or
root hints.
9. Enables WINS to support high volumes of
simultaneous WINS client name registration.
SHORT ANSWER
1. List eight features of Windows Server 2003.
2. What are the benefits of Active
Directory-integrated zones?
3. Describe the conditions under which pull
partners and push partners should be used.
4. Describe the steps involved in a typical
DNSSEC-enabled query.
5. What is the advantage and disadvantage of
employing the Fully Meshed topology?
Chapter 7: Service Sizing and Placement
TRUE/FALSE
1. The more Group Policy Objects a computer and
user need to process at boot and logon, the longer the process will take.
2. DCs should always be located in secure sites.
3. Domain controllers automatically defragment
their local copy of the Active Directory database every 24 hours.
4. The sizing of each individual Application
Directory Partition can be done precisely.
5. The Domain Naming Master role must be
assigned to at least two DCs in the forest.
MODIFIED TRUE/FALSE
1. Active Directory can be used to store
data relating to applications. _________________________
2. Each Domain Controller houses a local
copy of the Active Directory database. _________________________
3. For DCs accessed by fewer than 1000 users,
all four (database, logs, operating system, SYSVOL) components can be
collocated on the same RAID 5 array. _________________________
4. A role should be seized only if the
current holder cannot be contacted to transfer the role in a graceful manner.
_________________________
5. A FSMO role should be seized if the
hosting DC is to be made unavailable for an extended period of time.
_________________________
MULTIPLE CHOICE
1. _____ house the Active Directory database.
a.
|
Domain Naming Masters
|
c.
|
FQDNs
|
b.
|
Domain Controllers
|
d.
|
Application Directory Partitions
|
2. _____ is a database that is used to store
objects that exist within the organization.
a.
|
FQDN
|
c.
|
Dcpromo
|
b.
|
Schema
|
d.
|
Active Directory
|
3. Which of the following statements is correct?
a.
|
Size of domain partition in GB =
(number of users in domain/1000) * 0.7
|
b.
|
Size of domain partition in GB =
(1000) * 0.4
|
c.
|
Size of domain partition in GB =
(number of users in domain/1000) * 0.4
|
d.
|
Size of domain partition in GB =
(number of users in domain/10) * 0.4
|
4. A(n) _____ can be used to store data
pertinent to a particular application.
a.
|
Application Directory Partition
|
c.
|
PDCe
|
b.
|
schema
|
d.
|
security ID
|
5. Which of the following statements is correct?
a.
|
If the domain controller requirement
is 3.2GB then the global catalog requirement is 6.4GB.
|
b.
|
Each DC stores transaction log files
relating to the database and a local operating system.
|
c.
|
If the number of resource records
housed by a server is 100, the RAM requirement is 1MB.
|
d.
|
If the number of resource records
housed by a server is 1000, the RAM requirement is 5MB.
|
6. Rather than directly provide answers to
various questions and thus promote a member server to a DC manually, the
process is automated using a(n) _____.
a.
|
dcpromo answer file
|
c.
|
FSMO file
|
b.
|
replication file
|
d.
|
SYSVOL
|
7. Dcpromo can be executed in the following way
_____.
a.
|
dcpromo /answerfile.txt
|
c.
|
dcpromo /answerfile.txt
|
b.
|
dcpromo = answer:answerfile.txt
|
d.
|
dcpromo /answer:answerfile.txt
|
8. What is the Domain Controller disk space
requirement when there are 2000 users per domain?
a.
|
0.8GB
|
c.
|
2.4GB
|
b.
|
1.6GB
|
d.
|
3.2GB
|
9. Each domain in a forest must have a unique
_____.
a.
|
schema
|
c.
|
FQDN
|
b.
|
replication file
|
d.
|
FSMO
|
10. The DNS representation of the domain name is the _____.
a.
|
FSMO
|
c.
|
dcpromo
|
b.
|
FQDN
|
d.
|
Active Directory
|
11. It is the job of the _____ to ensure that each domain created has
a unique name within the forest.
a.
|
PDCe
|
c.
|
FQDN
|
b.
|
Domain Naming Master
|
d.
|
PDC
|
12. The _____ exists as a partition within Active Directory and is
replicated as a read-only partition to every DC in the forest.
a.
|
replication file
|
c.
|
schema
|
b.
|
FQDN
|
d.
|
infrastructure master
|
13. When a new security principal is created, it is assigned a unique
_____.
a.
|
DNM
|
c.
|
Security ID
|
b.
|
FSMO role
|
d.
|
PDCe
|
14. The _____ role is responsible for updating the referenced objects
whenever changes are made in the source domain.
a.
|
Infrastructure Master
|
c.
|
dcpromo
|
b.
|
FSMO
|
d.
|
DC
|
15. The _____ role will be housed on the first DC built in the forest,
by default.
a.
|
infrastructure master
|
c.
|
Domain Naming Master
|
b.
|
FSMO
|
d.
|
FQDN
|
16. The _____ role will be housed on the first DC built in each domain
in the forest, by default.
a.
|
FQDN
|
c.
|
DNM
|
b.
|
PDCe
|
d.
|
dcpromo
|
YES/NO
1. Is there an associated replication traffic
overhead with every Domain Controller deployed?
2. Does Microsoft advise that you place SYSVOL
and the database on separate RAID arrays?
3. Is the minimum requirement for Logs (DC
component) at least 500 MB free space?
4. Is the domain controller requirement for 6000
users per domain approximately 1.6GB?
5. Is the space requirement for GC servers
equivalent to the space requirements of a DC in the same domain?
COMPLETION
1. Startup and logon scripts are located in the
SYSVOL share, which is replicated using the ____________________ System between
each DC in the same domain.
2. In order that ADPs can be created and
configured, the DC hosting the Domain Naming Master (DNM) FSMO role must first
be upgraded to ____________________.
3. The most popular approach to promoting
servers to become DCs is the ____________________ approach.
4. The Active Directory “equivalent” of the
Windows NT PDC is the ____________________.
5. The ____________________ role will be housed
on the first DC built in each domain in the forest, by default.
MATCHING
Match each item with a statement below.
a.
|
Transfer the role
|
f.
|
Active Directory database
|
b.
|
FSMO roles
|
g.
|
SYSVOL
|
c.
|
Domainwide roles
|
h.
|
PDCe
|
d.
|
Startup and logon scripts
|
i.
|
Forestwide roles
|
e.
|
Domain Controllers
|
1. Housed on precisely one DC at any one point
in time.
2. Should be thoroughly tested in an environment
that simulates the actual production environment.
3. House the Active Directory database.
4. Allows at least 500MB free space.
5. Used to implement all changes to GPOs, by
default.
6. Will be transferred to a DC in the same
domain, or any DC in the forest if necessary.
7. The preferred method of moving FSMO roles
from one DC to another.
8. Comprised of discrete partitions, or naming
contexts.
9. Will be transferred to another DC in the same
domain.
SHORT ANSWER
1. When designing service placement, we must
take into consideration the actual time to start up. What are the factors that
will affect the actual time?
2. List the four partitions supported by Windows
Server 2003 Active Directory.
3. Before commencing with the promotion of a
member server into a DC, several checks and best practices should be performed
to ascertain whether the server is ready and able to be promoted. List five
items on the pre-promotion checklist.
4. What is the Active Directory infrastructure
requirement for providing a self-sufficient startup and logon?
5. What are the functions that should be
performed by the designer or architect of an active Directory infrastructure
deployment?
Chapter 8: The Physical Design
TRUE/FALSE
1. Using technology embedded in networking
hardware, such as virtual LANs (VLNs), you can aggregate individual client
connections from many LANs who work together into VLANs.
2. Some routers have built-in firewall features
to help alleviate having multiple pieces of equipment.
3. Every device on each side of a router can
broadcast information to other devices on the same subnet.
4. A router is designed to better handle network
perimeter security than a firewall can and should always be used in a network
design.
5. You do not need to establish authentication
in order to support a secure, remote access solution.
MODIFIED TRUE/FALSE
1. Any organization that wants to conduct
business over the Internet needs a(n) domain name.
_________________________
2. Scope options allow you to create
default TCP/IP settings to be delivered to the DHCP client when they receive
the IP address assignment. _________________________
3. A(n) firewall merely reassigns packets
based on the address and port without inspecting the type of packet.
_________________________
4. If you are planning to incorporate more than
one RRAS server, then Windows Server 2003 should be configured to use DHCP
for authentication purposes. _________________________
5. Bus topology is suited for small
networks because it does not require the use of a switch or hub.
_________________________
MULTIPLE CHOICE
1. _____ are mostly used to filter what IP
traffic can pass from the Internet to the intranet.
a.
|
NATs
|
c.
|
Subnets
|
b.
|
Firewalls
|
d.
|
Intranets
|
2. _____ and authentication servers are mostly
used for filtering and monitoring what IP traffic flows from the intranet to
the Internet.
a.
|
Proxy servers
|
c.
|
Bus topology
|
b.
|
Gateways
|
d.
|
Subnets
|
3. A(n) _____ is a server that acts on behalf of
other servers.
a.
|
gateway
|
c.
|
bus topology
|
b.
|
star topology
|
d.
|
proxy server
|
4. _____ converts the private IP addresses of an
internal addressing schema to one or more public IP addresses for the Internet
by altering packet headers to the new address and keeps track of each session.
a.
|
A firewall
|
c.
|
RRAS
|
b.
|
RADIUS
|
d.
|
NAT
|
5. A(n) _____ is a division of a network into an
interconnected, but independent, segment, or domain, in order to improve
performance and security.
a.
|
network perimeter
|
c.
|
bandwidth
|
b.
|
subnet
|
d.
|
firewall
|
6. There is no termination in a(n) _____
topology.
a.
|
star
|
c.
|
NAT
|
b.
|
bus
|
d.
|
ring
|
7. In a(n) _____ topology, each device is
connected centrally to a concentrator.
a.
|
bus
|
c.
|
star
|
b.
|
ring
|
d.
|
NAT
|
8. Router placement in your network is important
in controlling access and _____.
a.
|
authentication
|
c.
|
bandwidth
|
b.
|
gateway
|
d.
|
scope
|
9. Your _____ will consist of a combination of
firewalls, routers, and perhaps, remote access equipment.
a.
|
network perimeter
|
c.
|
bandwidth
|
b.
|
scope
|
d.
|
gateway
|
10. _____ is an access control protocol that uses a challenge/response
method for authentication.
a.
|
Extranet
|
c.
|
Superscope
|
b.
|
Intranet
|
d.
|
RADIUS
|
11. _____ policies allow you to control connection times, user and
group access, connection security, and others.
a.
|
RRAS
|
c.
|
Gateway
|
b.
|
RADIUS
|
d.
|
Bandwidth
|
12. Windows Server 2003 can support _____ concurrent VPN connections.
a.
|
1000
|
c.
|
2000
|
b.
|
1500
|
d.
|
3000
|
13. A(n) _____ is a point of access from one network to another.
a.
|
scope
|
c.
|
gateway
|
b.
|
NAT
|
d.
|
packet
|
14. _____ are devices that are used to aggregate network connections
from workstations and to connect different network segments within the same
physical network.
a.
|
Routers
|
c.
|
Scope options
|
b.
|
Switches and hubs
|
d.
|
Superscopes
|
15. _____ are a grouping of scopes to support a particular subnet.
a.
|
Megascopes
|
c.
|
Superscopes
|
b.
|
Gateways
|
d.
|
Packets
|
16. _____ contains ranges of IP addresses that can be used on an
internal network.
a.
|
RFC 1918
|
c.
|
RFC 19200
|
b.
|
RFC 1900
|
d.
|
RFC 1823
|
YES/NO
1. Is DHCP a client/server process?
2. Can superscopes use noncontiguous IP address
ranges?
3. Can you use encryption with dial-on-demand?
4. Are superscopes normally used in networks
with only one DHCP server?
5. Is the use of one DHCP server sufficient to
provide fault tolerance?
COMPLETION
1. A(n) ____________________ is an internal Web
environment that serves an organization’s personnel and is generally not
accessible to the public.
2. A(n) ____________________ is a means of
selectively extending an organization’s intranet to individuals and
organizations through the Internet who are not physically connected to the
organization’s network.
3. A(n) ____________________ is a network
segment between an organization’s trusted internal network and an untrusted
external network such as the Internet.
4. ____________________ topology uses an
open-ended cable in which all network devices are connected.
5. A(n) ____________________ is a range of IP
addresses that will be used by a subnet to assign needed IP addresses.
MATCHING
Match each item with a statement below.
a.
|
Proxy server
|
b.
|
Perimeter defenses
|
c.
|
Subnet
|
d.
|
DHCP
|
e.
|
Router
|
f.
|
Firewall
|
g.
|
RRAS policies
|
h.
|
Dial-on-demand
|
i.
|
Microsoft Internet Security and
Acceleration Server
|
1. Operates as a relay agent between the client
and server.
2. First line of defense against the Internet.
3. Can filter by MAC address, IP address, TCP
and UDP port, and protocol.
4. Consist of devices and software that sit at
the edge of your network.
5. Suitable for use as a firewall and a proxy
server.
6. Enables the use of asynchronous telephone
lines, cable, and DSL.
7. Allow you to control how you want clients to
connect to your organization’s network.
8. A way of taking a complete network and
reducing it to manageable and optimized chunks.
9. Provides automatic TCP/IP addressing.
SHORT ANSWER
1. What are the four levels for defining scope
options or TCP/IP options on a DHCP server?
2. What are the issues involved when designing
router placement?
3. What are some common questions that need to
be asked when designing a remote access infrastructure?
4. What are the components of a physical
topology?
5. Availability and failover go hand-in-hand. To
ensure availability, you need to provide the means for failover. How is this
accomplished?
For The Students Who Need
Grade ‘A’ In Their Studies
Hi, hope you are having a great day…
We are a group of 24 writers having
profound expertise in Business and Computer Science subjects. We can help you
score A grade in your Accounting, Marketing, Finance, Economics, Management,
Mathematics, Statistics, Information System, System Modeling, C++, Java
Programming, Network Administration, Enterprise Administration, Database, Web
Design, Networking, Internetworking, Data warehouse etc…
We can also provide help with Psychology,
Nursing, Health, History, English Literature, Political Science, Ethics,
Humanity etc classes.
We can help with essays, term papers,
research papers, dissertation, Ilabs, mymatlab, Wileplus, quizzes, exams,
discussion questions etc.
You can expect:
We understand each student has different
requirement and we tend to treat each student according to his/her
satisfaction.
We will provide original assignments,
plagiarism free and to custom requirement.
We will always meet deadlines.
Our support will be 24/27, even in
holidays.
Our pricing will be fair.
We will do free revisions if you want to
make changes in provided work.
Email us for more information, query and
quote.
WHISPERHILLS@GMAIL.COM
|
No comments:
Post a Comment