Week01
Week02
Week03
Week04
Week05
100

Which IPv4 to IPv6 transition technology works through NAT IPv4 routers by establishing tunnel endpoints behind non-IPv6 routers that encapsulate IPv6 packets with UDP datagrams?

Answer

ISATAP

Teredo

6 to 4

NAT Converter

Teredo

100

Each node or leaf in the DNS tree is referred to as which of the following?

a.    Setting

b.    Resource record

c.     Property

d.    Row

Resource record

100

Which of the following is one of the primary advantages to using Active Directory to store DNS information?

Answer

Fault tolerance

Zero configuration

Low maintenance

Reverse zone lookups

Fault tolerance

100

Which of the following is the default lease period for DHCP dynamic address allocation?

Answer

96 hours

3.5 days

4.5 days

8 days

96 hours

100

When configuring split scopes for DHCP, which of the following is the traditional percentage split of the scope range?

Answer

50% to the primary server, 50% to the secondary server

60% to the primary server, 40% to the secondary server

70% to the primary server, 30% to the secondary server

80% to the primary server, 20% to the secondary server


50% to the primary server, 50% to the secondary server

200

Certain IPv6 addresses can be contracted. Which of the following is the shortened form of 21cd:0053:0000:0000/64?

Answer

21cd:53::/32

21cd::53::/64

0:21cd:53::/64

21cd:53::/64

21cd:53::/64

200

Which of the following is an example of a second-level domain?

Answer

blah.com

.net

server1

corporate.local

200

The main page of a company’s intranet portal is accessible by the FQDN home.na.adatum.corp. Which of the following actions should be taken to configure an entry in the GlobalNames zone for this?

Answer

Add a single A record with the IP of one of the web servers hosting the portal.

Add a single CNAME record pointing to the A record in another zone.

Add multiple CNAME records pointing to all the A records in the other zones.

Add multiple A records with all the IPs of the web servers hosting the portal.

Add a single CNAME record pointing to the A record in another zone.

200

Which DHCP client option is used to provide a list of domain names to use in name resolution queries?

Answer

Option 3

Option 6

Option 15

Option 44

Option 15

200

By default, how often does a backup of the DHCP database occur?

Answer

Every 60 minutes

Every 120 minutes

Every 8 hours

Every 24 hours

Every 168 hours

Every 60 minutes

300

Which of the following is the primary reason IPv6 has not completely replaced IPv4?

Answer

Administrators are hesitant and reluctant to change.

Stopgap technologies have been introduced, such as Network Address Translation (NAT) and classless interdomain routing (CIDR).

IPv4 addresses have only been depleted since early 2011.

IPv6 has already completely replaced IPv4 on the Internet.

Administrators are hesitant and reluctant to change.

300

Regarding DNSSEC, once a zone is signed, the new record(s) created is(are) which of the following?

Answer

Key Signing Key

Zone Signing Key

Trust anchor

DNSSEC resource records

Key Signing Key

300

Which of the following is the purpose of a priority number in MX records?

Answer

To set delivery priority

To designate primary, secondary, and so forth, mail servers

For fault tolerance

For mail-routing preference

To set delivery priority

300

Which of the following criteria can be used to create conditions in a DHCP policy? (Choose all that apply.)

Answer

User class

Vendor class

MAC address

Client identifier

User class

Vendor class

MAC address

Client identifier

 

300

Which of the following features needs to be installed to compact the DHCP database?

Answer

DNS

WINS

Windows Backup

File Services

WINS

400

Specify the correct order of steps necessary to calculating an IPv4 subnet mask.

a.    Calculate the subnet mask by adding the network and subnet bits in binary form and converting the binary value to decimal.

b.    Take the least significant subnet bit and the host bits, in binary form, and convert them to a decimal value.

c.     Determine how many subnet identifier bits you need to create the required number of subnets.

d.    Subtract the subnet bits you need from the host bits and add them to the network bits.

e.     Increment the network identifier (including the subnet bits) by the decimal value you calculated to determine the network addresses of your new subnets.


1-C   Determine how many subnet identifier bits you need to create the required number of subnets.

2-D   Subtract the subnet bits you need from the host bits and add them to the network bits.

3-A   Calculate the subnet mask by adding the network and subnet bits in binary form and converting the binary value to decimal.

4-B    Take the least significant subnet bit and the host bits, in binary form, and convert them to a decimal value.

5-E    Increment the network identifier (including the subnet bits) by the decimal value you calculated to determine the network addresses of your new subnets.

400

Specify the correct order of steps necessary to deploying DNS. Not all steps will be used.

_____  Configure the DNS server.

____  Configure the clients to use DNS servers.

_____  Add resource records to the forward and reverse lookup zones.

_____    Migrate resource records from a database.

_____  Install DNS on one or more servers.

_____    Configure sequence numbers.

_____  Create forward and reverse lookup zones.

2_____  Configure the DNS server.

5_____  Configure the clients to use DNS servers.

4_____  Add resource records to the forward and reverse lookup zones.

_____    Migrate resource records from a database.

1_____  Install DNS on one or more servers.

_____    Configure sequence numbers.

3_____  Create forward and reverse lookup zones.

400

Describe the definition of a zone transfer.

The complete or partial transfer of DNS data from a zone on a DNS server to another DNS server
 
Zone transfers are the complete or partial transfer of DNS data from a zone on a DNS server to another DNS server.

400

Identify the machine that always initiates the communication between the DHCP server and the client in lease negotiation.


The client
 
The client always initiates DHCP communication.

400

Specify the correct order of steps necessary to configuring a split scope by placing the number of the step in the appropriate space. Not all steps will be used.

_____          Create the scope on the primary server.

_____            Increase the delay for the primary server.

_____          Increase the delay for the secondary server.

_____          Specify the percentage of split.

_____            Create the scope on the secondary server.

_____          Run the DHCP Split-Scope Configuration Wizard.

1_____          Create the scope on the primary server.

_____            Increase the delay for the primary server.

4_____          Increase the delay for the secondary server.

3_____          Specify the percentage of split.

_____            Create the scope on the secondary server.

2_____          Run the DHCP Split-Scope Configuration Wizard.

500

Describe how IPv6 multicast addresses always begin.

Multicast addresses always begin with an FP value of 11111111, in binary, or ff in hexadecimal.
 
Multicast addresses always begin with an FP value of 11111111, in binary, or ff in hexadecimal. The entire multicast address format is as follows:
FP: An 8-bit field that identifies the message as a multicast
Flags (4 bits): A 4-bit field that specifies whether the multicast address contains the address of a rendezvous point (0111), is based on a network prefix (0010), and is permanent (0000) or transient (0001)
Scope: A 4-bit field that specifies how widely routers can forward the address; values include interface-local (0001), link-local (0010), site-local (0101), organization-local (1000), and global (1110)
Group ID: A 112-bit field uniquely identifying a multicast group

500

When disabling recursion in the Advanced properties of a DNS server, identify what else is also being disabled for that server.

Forwarding
 
Disabling recursion for a DNS server also disables the ability for that DNS server to use forwarders.

500

Explain DNS aging and scavenging.

Aging uses time stamps for tracking the age of dynamically registered resource records; scavenging uses specified refresh time periods to remove stale resource records.
 
To help with stale data, you can configure zone scavenging to clean up the stale records. Aging in DNS is the process of using time stamps to track the age of dynamically registered resource records. Scavenging is the mechanism to remove stale resource records.

500

Identify what an administrator can configure to ensure that a DHCP client always receives the same IP address, while taking advantage of the benefits of DHCP?


A DHCP reservation
 
DHCP client reservations allow administrators to reserve an IP address for permanent use by a DHCP client. By using reservations, you can ensure that the host will always have the same IP address. As with any other lease, when a client receives a reserved address, the client also receives all assigned options such as addresses of the default gateway and DNS servers. If these options are changed, they will automatically be updated on the client when the lease is renewed.

500

Describe how many Windows firewall rules are created to support DHCP failover when DHCP is installed.

Two

The DHCP installation automatically creates the following inbound and outbound firewall rules:

  • Microsoft-Windows-DHCP-Failover-TCP-In
  • Microsoft-Windows-DHCP-Failover-TCP-Out