Professional Documents
Culture Documents
Network Infa Finals
Network Infa Finals
Question 1
Correct
The Protocol Stack implements protocols suchas TCP/IP and UDP/IP. These layers expose the transport layerinterface for layers
above them.
Question 2
Correct
Select one:
a. Disable-NetAdapterRss
b. Disable-NICAdapterRss
c. Disable-NetworkAdapterRss
Question 3
Correct
In Automatic software updates deployment, a set of software updates is selected the SCCM console and these updates are deployed to the
target collection.
Select one:
True
False
Question 4
Correct
Select one:
a. Event Viewer
b. Network Logger
c. System Logger
d. Resource Monitor
Question 5
Correct
Network-based firewall are network devices built into the IT infrastructure and they stand between public and internal networks. Anetwork-
based firewall can be a hardware device or a virtual solution.
Select one:
True
False
Question 6
Correct
_____________ is a wide area network (WAN) bandwidth optimization technology that is included in some editions of the Windows Server2012
and Windows 8 operating systems. To optimize WAN bandwidth when users access content on remote servers
Select one:
a. Dynamic Host Configuration Protocol (DHCP)
d. BranchCache
Disable-NetworkAdapterRss command disables RSS on the network adapter that you specify.
Select one:
True
False
Question 8
Correct
RSS is the ability to group packets together to minimize the header processing that is necessary for the host to perform. A maximum of 64 KB
of received payload can be coalesced into a single larger packet for processing.
Select one:
True
False
Question 9
Correct
These are network devices built into the IT infrastructure and they stand between public and internal networks.
Select one:
a. Network-based firewall
b. Packet-based firewall
c. Host-based firewall
d. Local-based firewall
The _________________________ feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or
more computers that are running applications in Windows Server 2012 into a single virtual cluster
Select one:
a. Network Load Balancing (NLB)
Question 11
Correct
Packet Stack is the lowest layer in the network stack, and contains the network driver that communicates directly with the network adapter.
Select one:
True
False
Question 12
Correct
This view of resource monitor lists processes by name and ID; and provides information on bits sent per second,bits received per second, and
total bits per second.
Select one:
a. Processes With Network Activity
b. TCP Connections
c. Listening Ports
d. Network Activity
_________________ exposes interfaces for the driver below it and for the layers above it,such as the Protocol Stack.
Select one:
a. Protocol Stack
c. System Drivers
d. Network interface
Question 14
Correct
A network firewall is also referred to as a gateway firewall, or an application firewall. It stands between the internet and the devices in the
private network.
Select one:
True
False
Question 15
Correct
_________________ enable you to create customized views of events across any event log stored on a server, including events in the forwarded
event log.
Select one:
a. Event views
_________ enables you to monitor how a computer running the Windows Server 2012 and Windows Server 2012 R2 operating system uses
CPU, memory, disk, and network resources.
Select one:
a. Networking Monitor
b. Message Analyzer
c. Resource Monitor
d. Computer Monitor
Question 17
Correct
____________ is the successor to Network Monitor. You can use this to perform network traffic capture and analysis. Message Analyzer also
functions as a replacement for LogParser
Select one:
a. CPU Monitor
b. Message Analyzer
c. Network Analyzer
d. Resource Monitor
This policy enables you to set the location of the collector computer.
Select one:
a. Configure Target Network Manager
Question 19
Correct
This view of resource monitor Lists network activity on a per-process basis,but also lists the destination address, sent bits per second,received
bits per second, and total bits per second.
Select one:
a. Network Activity
b. TCP Connections
d. Listening Ports
_________________ Is an Internet Engineering Task Force (IETF) standarddesigned to reduce the administration burden and complexity
ofconfiguring hosts on a TCP/IP-based network, such as a privateintranet
Select one:
a. Dynamic Host Configuration Protocol (DHCP)
c. BranchCache
Question 21
Correct
_____________________________ typically contain applications that require very fast inter-process communication (IPC) and inter-computer
communications, a high degree of predictability regarding latency and transaction response times, and the ability to handle very high
message rates.
Select one:
a. Low-latency workloads technologies
Question 22
Correct
Get-NetAdapterRss command retrieves RSS properties of the network adapter that you specify.
Select one:
True
False
Question 23
Correct
Network adapters that support this can target their interrupts to specific logical processors.
Select one:
a. Message-Signaled Interrupts (MSI/MSI-X)
Question 24
Correct
__________________ distributes incoming network I/O packets among logical processors so that packets which belong to the same TCP
connection are processed on the same logical processor, which preserves ordering
Select one:
a. NIC Teaming
c. Message-Signaled Interrupt
Question 25
Correct
This command sets the RSS properties onthe network adapter that you specify.
Answer: Set-NetAdapterRss
Question 26
Correct
RSS is a network driver technology that enables the efficient distribution of network receive processing across multiple CPUs in
multiprocessor systems.
Select one:
True
False
Question 27
Correct
These are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK) interface to expose interfaces to user-mode
applications.
Question 28
Correct
This view of resource monitor lists the ports and addresses that services and applications are listening on. Also provides information about
the firewall status for these roles and services.
Select one:
a. Network Activity
b. Listening Ports
c. TCP Connections
____________ is a virtual layer-2 network switch that provides programmatically managed and extensible capabilities to connect virtual
machines to the physical network
Select one:
a. Dynamic Host Configuration Protocol (DHCP)
Question 30
Correct
This method of firewall filtering analyzes the header of every packet and checks if it matches the configured rules.
Select one:
a. Proxy Server
b. Packet Filtering
c. IP Filtering
d. Stateful Inspection
This authentication method can be used on networks that include systems running an earlier version of the Windows operating system and
on standalone systems.
Select one:
a. Computer (Kerberos V5)
b. Computer (NTLMv2)
c. Computer certificate
d. Pre-shared key
Question 32
Correct
This is the lowest layer in the networkstack, and contains the network driver that communicates directlywith the network adapter.
Select one:
a. Network interface
b. Protocol Stack
d. User-Mode Applications
e. System Drivers
This data integrity algorithm is not recommended and is provided for backward compatibility only.
Select one:
a. SHA-384
Question 34
Correct
This data integrity algorithm is stronger than MD5 but uses more resources.
Select one:
a. AES-GMAC 192
Question 35
Correct
Enable-NetworkAdapterRss command enables RSS on the network adapter that you specify.
Select one:
True
False
Question 36
Correct
This policy determines the maximum event forwarding rate in events per second. If this policy is not configured, events will be transmitted as
soon as they are recorded.
Select one:
a. Configure Target Server Manager
Question 37
Correct
Set-NetAdapterRss command sets the RSS properties onthe network adapter that you specify.
Select one:
True
False
Question 38
Incorrect
This view of resource monitor provides information on connections on the basis of local address, port, and remote address and port.
Select one:
a. Network Activity
b. TCP Connections
d. Listening Ports
The default signing algorithm for this authentication method is RSA, but Elliptic Curve Digital Signature Algorithm (ECDSA)–P256 and ECDSA-
P384 are also supported signing algorithms.
Select one:
a. Computer certificate
b. Pre-shared key
d. Computer (NTLMv2)
Question 40
Correct
______________ is used in TCP/IP networks for naming computers and network services
Select one:
a. Data Center Bridging (DCB)
b. BranchCache
______________ Provides policy-based, software-controlled network virtualization that reduces the management overhead that is faced by
enterprises when they expandde dicated IaaS clouds
Question 41
Correct
System Drivers is the lowest layer in the networkstack, and contains the network driver that communicates directlywith the network adapter.
Select one:
True
False
Question 42
Incorrect
distributes incoming network I/O packets among logical processors so that packets which belong to the same TCP connection are processed
on the same logical processor, which preserves ordering
Question 43
Correct
________ is a suite of Institute of Electrical and Electronics Engineers (IEEE)standards that enable Converged Fabrics in the data center, where
storage, data networking, cluster IPC and management traffic all share the same Ethernet network infrastructure.
Select one:
a. BranchCache
Question 44
Correct
This type of firewall runs on individual systems, physical or virtual. It is a piece of software installed on an operating system which stands
between the host and other network devices.
Select one:
a. Packet-based firewall
b. Local-based firewall
c. Network-based firewall
d. Host-based firewall
This method of firewall filtering inspects every packet and keeps the information for the current connection. This includes TCP protocol
information, source and destination IP addresses, and port numbers.
Select one:
a. Stateful Inspection
b. Proxy Server
c. Packet Filtering
d. IP Filtering
Question 46
Correct
Network-based firewall runs on individual systems, physical or virtual. It is a piece of software installed on an operating system which stands
between the host and other network devices.
Select one:
True
False
Question 47
Correct
System Drivers are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK) interface to expose interfaces to user-
mode applications. The WSK interface was introduced in Windows Server® 2008 and Windows Vista, and it is exposed by AFD.sys. The
interface improves performance by eliminating the switching between user mode and kernel mode
Select one:
True
False
Question 48
Correct
This command enables RSS on the network adapter that you specify.
Select one:
a. Enable-NetworkAdapterRss
b. Enable-NICAdapterRss
c. Enable-NetAdapterRss
Question 49
Correct
_______________ Provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain
Name System (DNS).
Select one:
a. Network Load Balancing (NLB)
Question 50
Correct
The network stack implements protocols such as TCP/IP and UDP/IP. These layers expose the transport layerinterface for layers above them.
Select one:
True
False
◄ Final Quiz 2
Jump to...