0% found this document useful (0 votes)
12 views4 pages

Practice Questions

Uploaded by

Joshua Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Practice Questions

Uploaded by

Joshua Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

INFO 0307 - Network Infrastructure

Practice Questions

DNS

You work in support at A. Datum Corporation. As a consultant for A. Datum, answer the
following questions about installing and configuring DNS within the A. Datum
organization:

1. You have asked a colleague to deploy the DNS server role to a Nano Server installed
as a member of the Adatum.com domain. What must your colleague do?

2. At a branch office, you do not want the local DNS server to perform queries for local
clients aside from those for which it is authoritative. How could you address this
objective?

3. You want only to allow recursion by your DNS servers for queries received on the
internal network and not from Internet-based clients. How could you address this
requirement?

4. Managers at A. Datum are concerned with security and your boss has asked that you
implement DNSSEC to help to secure DNS. You know that DNSSEC relies on distributing
the NRPT. How could you configure NRPT distribution easily?5. You have installed the
DNS server role on a computer running Windows Server 2016. You now want to create
zones on the server. You want to store the zone data in AD DS

5. How does DNS solve scalability problems?

6. Describe the difference between a DNS PTR record and a CNAME record.

Dynamic Host Configuration Protocol (DHCP)

1. Which port does DHCP use?


2. Name the Different Types of Scopes In Windows DHCP?
3. What is the command for renewing an IP address?
4. What is the command for releasing an IP address?
5. What is DHCP and how does it work?
6. Explain the concept of name squatting in the context of Windows Server and DHCP,
and describe the mechanisms employed to prevent various types of name squatting
situations.

7. What Is the DHCP Client Machine Process?


8. Describe the process of a DHCP client requesting an IP address and a DHCP server
fulfilling the request.
9. You want to enable DHCP high-availability by using the IPAM console. What DHCP
high- availability option(s) can you configure with the console?
10. Your manager wants you to determine which computer has obtained the IP address
11. 172.16.16.75. How could you find out using the IPAM console?

Internet Protocol Address Management (IPAM)

1. Before IPAM can successfully perform auditing events, what must be done to the
IPAMUG group and the Account Logon Events policy?
2. How is a distributed IPAM server topology configured?
3. What are the two options you have to install the IPAM server feature?
4. What function does an IPAM server provide?
5. What critical function does the IPAM feature "SERVER INVENTORY" provide?
6. What information does the IPAM scheduled task "Audit" collect?
7. What is IPAM and what specific functions does the feature provide?
8. What is an IP address range?
9. IPAM deployment includes installing the IPAM Server feature, conducting IPAM
server provisioning, performing server discovery, provisioning GPOs, selecting
servers, and collecting data.
10. Name the key mechanisms employed by an IPAM server for data collection and
maintenance of its local database.

Remote Access

1. Assuming a default setup, what two different methods can be used to make a
remote access server usable?
2. What is ISATAP, and when should it be used?
3. What is a "host route"?
4. What is the difference between NAT and PAT?
5. How does DirectAccess handle encryption and authentication?
6. On a network that does not fully support IPv6, how can DirectAccess clients
communicate with IPv4 resources?
7. When creating a new VPN connection, what does a tunnel type of "Automatic"
mean?
8. Why is an internal PKI highly recommended for a DirectAccess deployment in a
production environment?
9. Why should self-signed certificates not be used by servers in a production
environment?
10. Explain the key services provided by the Remote Access server role to ensure the
secure connectivity of a mobile workforce and branch offices to the main office.

NPS & RADIUS

1. What are the two main reasons to you should set up an NPS architecture with
RADIUS when you have different connection paths to your network?
2. What are two reasons for deploying more than one RADIUS server within a network?
3. What does a realm consist of?
4. What is the biggest difference between MS-CHAP and CHAP?
5. What is the difference between a RADIUS server and a RADIUS proxy server?
6. What is the primary difference between network policy conditions and network
policy constraints?
7. When a certificate is presented for authentication, what three criteria must it meet
for authentication to succeed?
8. When configuring a network policy's Properties dialog box, what does the NAS port
type setting control?
9. When using NPS and RADIUS templates, what must be done after you have created
an NPS or RADIUS template to effect a server's configuration?
10. Why is the Password Authentication Protocol not recommended as the
authentication method for passing credentials to NAS?

ADVANCED NETWORKS

1. In HNV, tunnelling works by associating each virtual network adapter with what two
IP address names?
2. In RAS Gateway implementations, what does being "multitenant aware" mean?
3. The use of static teaming requires a switch that is compatible with what IEEE
standard?
4. What SDN feature allows a hosting provider to distribute tenant network traffic
across virtual network resources to increase virtual network performance and
provide fault tolerance?
5. What are the two types of network traffic found in a datacentre? (Choose all that
apply.)
6. What interface is used to send policies from the SDN controller to the network
device?
7. What particular role does the SLB Host Agent component fulfil?

8. What standard and widely supported tunnelling protocol, operating over UDP port
4789, allows you to communicate between virtual networks and between virtual
networks and the physical network?
9. What technology provides fault tolerance and improved performance in a
connection between a client and a server providing an SMB share?
10. What type of load-balancing is utilized when team members are connected to a
Hyper-V switch?

You might also like