Michael Marcus
Quiz by , created more than 1 year ago

70-411 college exam

115
1
0
Michael Marcus
Created by Michael Marcus over 8 years ago
Close

Quiz 9&10

Question 1 of 32

1

What is another designation for an Alias

Select one of the following:

  • a host or A record

  • canonical name or CNAME

  • pointer or PTR record

  • Name Server or NS record

Explanation

Question 2 of 32

1

What does Time to Live (TTL) mean in DNS parlance?

Select one of the following:

  • the length of time it takes a DNS query to process

  • the length of time required to process an iterative query

  • the length of time between zone updates

  • the length of time a record remains in DNS cache

Explanation

Question 3 of 32

1

What is the primary advantage to enabling round-robin DNS?

Select one of the following:

  • load balancing

  • speed

  • efficiency

  • fault tolerance

Explanation

Question 4 of 32

1

What does issuing the nslookup command with no parameters do on your system?

Select one of the following:

  • It returns an error: Missing paramter

  • It places you into nslookup's interactive mode

  • It returns you to a prompt with no result

  • It displays your DNS query cache

Explanation

Question 5 of 32

1

You can use the dnscmd command to create zones. What other tasks can you perform with it?

Select one of the following:

  • delete resource records

  • start/stop the DNS service

  • perform name service queries

  • install DNS services

Explanation

Question 6 of 32

1

Which DNS record contains the serial number for the zone?

Select one of the following:

  • NS record

  • A record

  • PTR record

  • SOA record

Explanation

Question 7 of 32

1

How are routing tables created dynamically?

Select one of the following:

  • through the use of RIP

  • with static routes

  • by using the routing table protocol (RTP)

  • by using a layer 2 switch

Explanation

Question 8 of 32

1

Which authentication protocol allows you to change an expired password during the connection process?

Select one of the following:

  • PAP

  • CHAP

  • MS-CHAPv2

  • EAP-MS-CHAPv2

Explanation

Question 9 of 32

1

Why are phone lines and ISDM not used today for remote access services (RAS)?

Select one of the following:

  • They're too expensive

  • They're not secure enough

  • They create dedicated access

  • They no longer supply acceptable bandwidth

Explanation

Question 10 of 32

1

How is data verified when transferred through the Internet?

Select one of the following:

  • by cryptogrpahic checksum

  • by RAS callback options

  • by correct firewall settings

  • by using PPTP for VPN connections

Explanation

Question 11 of 32

1

When is it appropriate to use Windows Server 2012 as a router between two networks?

Select one of the following:

  • for heavy traffic on large networks

  • for heavy traffic on small networks

  • for light traffic on large networks

  • for light traffic on small networks

Explanation

Question 12 of 32

1

For Dial-up RAS connectivity, what is the most secure setting to use?

Select one of the following:

  • deny access

  • a static IP address

  • verify caller ID

  • always call back to a particular number

Explanation

Question 13 of 32

1

How can you force a system to update its DNS record?

Select one of the following:

  • Change IP addresses

  • Disable/enable the NIC

  • Execute ipconfig /flushdns

  • Execute ipconfig /registerdns

Explanation

Question 14 of 32

1

In Windows Server 2012 R2, what is used as a reverse proxy?

Select one of the following:

  • Web Application proxy

  • Reverse Lookup

  • AD FS proxy

  • Reverse Web

Explanation

Question 15 of 32

1

If you have a server named server1.blah.com, want to use it as your web server, and have requests point to www.blah.com what kind of DNS record would you create?

Select one of the following:

  • an A record

  • a CNAME record

  • a PTR record

  • an NS record

Explanation

Question 16 of 32

1

Which VPN protocol provides constant connectivity?

Select one of the following:

  • L2TP

  • IKEv2

  • SSTP

  • PPTP

Explanation

Question 17 of 32

1

What is the first thing to check when troubleshooting VPN problems?

Select one of the following:

  • network connectivity

  • usernames and passwords

  • DNS lookups

  • firewall settings

Explanation

Question 18 of 32

1

Why use a VPN for client-to-server connections over the Internet?

Select one of the following:

  • VPN traffic is protected by a firewall

  • VPN traffic is encrypted

  • VPN traffic goes undetected on the Internet

  • VPN traffic is proxy-proof

Explanation

Question 19 of 32

1

Before creating PTR records, what DNS objects must you create?

Select one of the following:

  • reverse lookup zones

  • CNAME records

  • SOA records

  • NS records

Explanation

Question 20 of 32

1

If you have corrected a DNS server problem, such as renamed a system or changed its IP address, but your local system still attempts to connect to the old system, what can you do to obtain the new information from the DNS server quickly?

Select one of the following:

  • Reboot

  • Disable/enable the NIC

  • Clear the DNS cache on the DNS server

  • Execute ipconfig /flushdns.

Explanation

Question 21 of 32

1

Which of the following is an example of an SRV record?

Select one of the following:

  • DNS server

  • AD server

  • mail server

  • web server

Explanation

Question 22 of 32

1

A Start of Authority record specifies what kind of information about a zone?

Select one of the following:

  • a list of host or A name

  • a list of canonical (CNAME) records

  • the zone serial number

  • a reverse lookup record

Explanation

Question 23 of 32

1

which of the following is correct for querying a PTR record?

Select one of the following:

  • nslookup Microsoft.com

  • nslookup www.technet.com

  • nslookup server1

  • nslookup 192.160.3.50

Explanation

Question 24 of 32

1

What is the purpose of a priority number in MX records?

Select one of the following:

  • to set delivery priority

  • to designate primary, secondary and so forth , mail servers

  • for fault tolerance

  • for mail-routing preference

Explanation

Question 25 of 32

1

Which command do you use to verify local DNS settings?

Select one of the following:

  • nslookup <dns_servername>

  • ipconfig / all

  • ping localhost

  • tracert <dns_servername>

Explanation

Question 26 of 32

1

Which authentication method is weakest (least secure)?

Select one of the following:

  • PAP

  • CHAP

  • MS-CHAPv2

  • EAP-MS-CHAPv2

Explanation

Question 27 of 32

1

Why would you set Verify Caller ID on a remote dial-up connection for a user?

Select one of the following:

  • for enhanced security

  • because you don't trust the user

  • because you want users to call in only from specific numbers

  • because it's the default setting

Explanation

Question 28 of 32

1

What term is defined as private data placed in a packet with a header containing routing information that allows the data to traverse a transit network, such as the Internet?

Select one of the following:

  • routing

  • VPN

  • encapsulation

  • tunneling

Explanation

Question 29 of 32

1

What special hardware configuration should a RAS server have?

Select one of the following:

  • two network interface cards

  • a dedicated phone line

  • a dedicated internet connection

  • secure access to the internet

Explanation

Question 30 of 32

1

Which Windows Server 2012 R2 server role is used to install the Web Application proxy for AD FS?

Select one of the following:

  • AD FS

  • remote access

  • remote desktop

  • web service

Explanation

Question 31 of 32

1

Setting up a NAT gateway is an excellent way to provide Internet access to a LAN. What is the best reason for setting up Internet access via NAT?

Select one of the following:

  • to allow multiple computers access to the internet

  • to provide a type of firewall for a group of computers

  • to provide proxy services to a LAN

  • to use private IP addresses on the LAN

Explanation

Question 32 of 32

1

When would you want to use a split tunnel for users?

Select one of the following:

  • if your users work only from the office

  • if your users might compromise security by browsing to insecure sites

  • if your users have laptop computers and work from home or office

  • if your users often need remote assistance

Explanation