Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Home / My courses / UGRD-IT6311-2023T / Week 14 / Final Exam

Started on Friday, 19 February 2021, 5:45 PM


State Finished
Completed on Friday, 19 February 2021, 5:53 PM
Time taken 7 mins 49 secs
Grade 48.00 out of 50.00 (96%)

Question 1
Correct

Mark 1.00 out of 1.00

The Protocol Stack  implements protocols suchas TCP/IP and UDP/IP. These layers expose the transport layerinterface for layers
above them.

Question 2
Correct

Mark 1.00 out of 1.00

This command disables RSS on thenetwork adapter that you specify.

Select one:
a. Disable-NetAdapterRss 

b. Disable-NICAdapterRss

c. Disable-NetworkAdapterRss

Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

In Automatic software updates deployment, a set of software updates is selected the SCCM console and these updates are deployed to the
target collection.

Select one:
True

False 
Question 4
Correct

Mark 1.00 out of 1.00

____________ enables you to access recorded event information.

Select one:
a. Event Viewer 

b. Network Logger

c. System Logger

d. Resource Monitor

Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Network-based firewall are network devices built into the IT infrastructure and they stand between public and internal networks. Anetwork-
based firewall can be a hardware device or a virtual solution.

Select one:
True 

False

Question 6
Correct

Mark 1.00 out of 1.00

_____________ is a wide area network (WAN) bandwidth optimization technology that is included in some editions of the Windows Server2012
and Windows 8 operating systems. To optimize WAN bandwidth when users access content on remote servers

Select one:
a. Dynamic Host Configuration Protocol (DHCP)

b. Domain Name System (DNS)

c. Data Center Bridging (DCB)

d. BranchCache 

Your answer is correct.


Question 7
Correct

Mark 1.00 out of 1.00

Disable-NetworkAdapterRss command disables RSS on the network adapter that you specify.

Select one:
True

False 

Question 8
Correct

Mark 1.00 out of 1.00

RSS is the ability to group packets together to minimize the header processing that is necessary for the host to perform. A maximum of 64 KB
of received payload can be coalesced into a single larger packet for processing.

Select one:
True

False 

Question 9
Correct

Mark 1.00 out of 1.00

These are network devices built into the IT infrastructure and they stand between public and internal networks.

Select one:
a. Network-based firewall 

b. Packet-based firewall

c. Host-based firewall

d. Local-based firewall

Your answer is correct.


Question 10
Correct

Mark 1.00 out of 1.00

The _________________________ feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or
more computers that are running applications in Windows Server 2012 into a single virtual cluster

Select one:
a. Network Load Balancing (NLB) 

b. Low-latency workloads technologies

c. IP Address Management (IPAM)

d. Hyper-V virtual switch

Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00

Packet Stack is the lowest layer in the network stack, and contains the network driver that communicates directly with the network adapter.

Select one:
True

False 

Question 12
Correct

Mark 1.00 out of 1.00

This view of resource monitor lists processes by name and ID; and provides information on bits sent per second,bits received per second, and
total bits per second.

Select one:
a. Processes With Network Activity 

b. TCP Connections

c. Listening Ports

d. Network Activity

Your answer is correct.


Question 13
Correct

Mark 1.00 out of 1.00

_________________ exposes interfaces for the driver below it and for the layers above it,such as the Protocol Stack.

Select one:
a. Protocol Stack

b. Network Driver Interface Specification (NDIS) 

c. System Drivers

d. Network interface

Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00

A network firewall is also referred to as a gateway firewall, or an application firewall. It stands between the internet and the devices in the
private network.

Select one:
True

False 

Question 15
Correct

Mark 1.00 out of 1.00

_________________ enable you to create customized views of events across any event log stored on a server, including events in the forwarded
event log.

Select one:
a. Event views

b. System log views

c. Event log views 

Your answer is correct.


Question 16
Correct

Mark 1.00 out of 1.00

_________ enables you to monitor how a computer running the Windows Server 2012 and Windows Server 2012 R2 operating system uses
CPU, memory, disk, and network resources.

Select one:
a. Networking Monitor

b. Message Analyzer

c. Resource Monitor 

d. Computer Monitor

Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

____________ is the successor to Network Monitor. You can use this to perform network traffic capture and analysis. Message Analyzer also
functions as a replacement for LogParser

Select one:
a. CPU Monitor

b. Message Analyzer 

c. Network Analyzer

d. Resource Monitor

Your answer is correct.


Question 18
Correct

Mark 1.00 out of 1.00

This policy enables you to set the location of the collector computer.

Select one:
a. Configure Target Network Manager

b. Configure Forwarder Resource Usage

c. Configure Target Subscription Manager 

d. Configure Target Server Manager

Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

This view of resource monitor Lists network activity on a per-process basis,but also lists the destination address, sent bits per second,received
bits per second, and total bits per second.

Select one:
a. Network Activity 

b. TCP Connections

c. Processes With Network Activity

d. Listening Ports

Your answer is correct.


Question 20
Correct

Mark 1.00 out of 1.00

_________________ Is an Internet Engineering Task Force (IETF) standarddesigned to reduce the administration burden and complexity
ofconfiguring hosts on a TCP/IP-based network, such as a privateintranet

Select one:
a. Dynamic Host Configuration Protocol (DHCP) 

b. Domain Name System (DNS)

c. BranchCache

d. Data Center Bridging (DCB)

Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00

_____________________________ typically contain applications that require very fast inter-process communication (IPC) and inter-computer
communications, a high degree of predictability regarding latency and transaction response times, and the ability to handle very high
message rates.

Select one:
a. Low-latency workloads technologies 

b. Network Load Balancing (NLB)

c. Hyper-V virtual switch

d. IP Address Management (IPAM)

Your answer is correct.

Question 22
Correct

Mark 1.00 out of 1.00

Get-NetAdapterRss command retrieves RSS properties of the network adapter that you specify.

Select one:
True 

False
Question 23
Correct

Mark 1.00 out of 1.00

Network adapters that support this can target their interrupts to specific logical processors.

Select one:
a. Message-Signaled Interrupts (MSI/MSI-X) 

b. Moment-Signaled Interrupts (MSI/MSI-X)

c. Memo-Signaled Interrupts (MSI/MSI-X)

Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00

__________________ distributes incoming network I/O packets among logical processors so that packets which belong to the same TCP
connection are processed on the same logical processor, which preserves ordering

Select one:
a. NIC Teaming

b. Receive Side Scaling (RSS) 

c. Message-Signaled Interrupt

Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00

This command sets the RSS properties onthe network adapter that you specify.

Answer: Set-NetAdapterRss 
Question 26
Correct

Mark 1.00 out of 1.00

RSS is a network driver technology that enables the efficient distribution of network receive processing across multiple CPUs in
multiprocessor systems.

Select one:
True 

False

Question 27
Correct

Mark 1.00 out of 1.00

These are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK) interface to expose interfaces to user-mode
applications.

Answer: System Drivers 

Question 28
Correct

Mark 1.00 out of 1.00

This view of resource monitor lists the ports and addresses that services and applications are listening on. Also provides information about
the firewall status for these roles and services.

Select one:
a. Network Activity

b. Listening Ports 

c. TCP Connections

d. Processes With Network Activity

Your answer is correct.


Question 29
Correct

Mark 1.00 out of 1.00

____________ is a virtual layer-2 network switch that provides programmatically managed and extensible capabilities to connect virtual
machines to the physical network

Select one:
a. Dynamic Host Configuration Protocol (DHCP)

b. Hyper-V network virtualization

c. Domain Name System (DNS)

d. Hyper-V virtual switch 

Your answer is correct.

Question 30
Correct

Mark 1.00 out of 1.00

This method of firewall filtering analyzes the header of every packet and checks if it matches the configured rules.

Select one:
a. Proxy Server

b. Packet Filtering 

c. IP Filtering

d. Stateful Inspection

Your answer is correct.


Question 31
Correct

Mark 1.00 out of 1.00

This authentication method can be used on networks that include systems running an earlier version of the Windows operating system and
on standalone systems.

Select one:
a. Computer (Kerberos V5)

b. Computer (NTLMv2) 

c. Computer certificate

d. Pre-shared key

Your answer is correct.

Question 32
Correct

Mark 1.00 out of 1.00

This is the lowest layer in the networkstack, and contains the network driver that communicates directlywith the network adapter.

Select one:
a. Network interface 

b. Protocol Stack

c. Network Driver Interface Specification (NDIS)

d. User-Mode Applications

e. System Drivers

Your answer is correct.


Question 33
Correct

Mark 1.00 out of 1.00

This data integrity algorithm is not recommended and is provided for backward compatibility only.

Select one:
a. SHA-384

b. SHA 256-bit (SHA-256)

c. Secure Hash Algorithm 1 (SHA-1)

d. Message-Digest  algorithm  5  (MD5) 

Your answer is correct.

Question 34
Correct

Mark 1.00 out of 1.00

This data integrity algorithm is stronger than MD5 but uses more resources.

Select one:
a. AES-GMAC 192

b. Advanced Encryption Standard-Galois Message AuthenticationCode 128 bit (AES-GMAC 128)

c. Secure Hash Algorithm 1 (SHA-1) 

d. SHA 256-bit (SHA-256)

Your answer is correct.

Question 35
Correct

Mark 1.00 out of 1.00

Enable-NetworkAdapterRss command enables RSS on the network adapter that you specify.

Select one:
True

False 
Question 36
Correct

Mark 1.00 out of 1.00

This policy determines the maximum event forwarding rate in events per second. If this policy is not configured, events will be transmitted as
soon as they are recorded.

Select one:
a. Configure Target Server Manager

b. Configure Forwarder Resource Usage 

c. Configure Target Network Manager

d. Configure Target Subscription Manager

Your answer is correct.

Question 37
Correct

Mark 1.00 out of 1.00

Set-NetAdapterRss command sets the RSS properties onthe network adapter that you specify.

Select one:
True 

False

Question 38
Incorrect

Mark 0.00 out of 1.00

This view of resource monitor provides information on connections on the basis of local address, port, and remote address and port.

Select one:
a. Network Activity

b. TCP Connections

c. Processes With Network Activity

d. Listening Ports 

Your answer is incorrect.


Question 39
Correct

Mark 1.00 out of 1.00

The default signing algorithm for this authentication method is RSA, but Elliptic Curve Digital Signature Algorithm (ECDSA)–P256 and ECDSA-
P384 are also supported signing algorithms.

Select one:
a. Computer certificate 

b. Pre-shared key

c. Computer health certificate

d. Computer (NTLMv2)

Your answer is correct.

Question 40
Correct

Mark 1.00 out of 1.00

______________ is used in TCP/IP networks for naming computers and network services

Select one:
a. Data Center Bridging (DCB)

b. BranchCache

c. Hyper-V network virtualization 

d. Dynamic Host Configuration Protocol (DHCP)

Your answer is correct.

______________ Provides policy-based, software-controlled network virtualization that reduces the management overhead that is faced by
enterprises when they expandde dicated IaaS clouds

Question 41
Correct

Mark 1.00 out of 1.00

System Drivers is the lowest layer in the networkstack, and contains the network driver that communicates directlywith the network adapter.

Select one:
True

False 
Question 42
Incorrect

Mark 0.00 out of 1.00

distributes incoming network I/O packets among logical processors so that packets which belong to the same TCP connection are processed
on the same logical processor, which preserves ordering

Answer: Receive Side Scaling 

Question 43
Correct

Mark 1.00 out of 1.00

________ is a suite of Institute of Electrical and Electronics Engineers (IEEE)standards that enable Converged Fabrics in the data center, where
storage, data networking, cluster IPC and management traffic all share the same Ethernet network infrastructure.

Select one:
a. BranchCache

b. Domain Name System (DNS)

c. Dynamic Host Configuration Protocol (DHCP)

d. Data Center Bridging (DCB) 

Your answer is correct.

Question 44
Correct

Mark 1.00 out of 1.00

This type of firewall runs on individual systems, physical or virtual. It is a piece of software installed on an operating system which stands
between the host and other network devices.

Select one:
a. Packet-based firewall

b. Local-based firewall

c. Network-based firewall

d. Host-based firewall 

Your answer is correct.


Question 45
Correct

Mark 1.00 out of 1.00

This method of firewall filtering inspects every packet and keeps the information for the current connection. This includes TCP protocol
information, source and destination IP addresses, and port numbers.

Select one:
a. Stateful Inspection 

b. Proxy Server

c. Packet Filtering

d. IP Filtering

Your answer is correct.

Question 46
Correct

Mark 1.00 out of 1.00

Network-based firewall runs on individual systems, physical or virtual. It is a piece of software installed on an operating system which stands
between the host and other network devices.

Select one:
True

False 

Question 47
Correct

Mark 1.00 out of 1.00

System Drivers are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK) interface to expose interfaces to user-
mode applications. The WSK interface was introduced in Windows Server® 2008 and Windows Vista, and it is exposed by AFD.sys. The
interface improves performance by eliminating the switching between user mode and kernel mode

Select one:
True 

False
Question 48
Correct

Mark 1.00 out of 1.00

This command enables RSS on the network adapter that you specify.

Select one:
a. Enable-NetworkAdapterRss

b. Enable-NICAdapterRss

c. Enable-NetAdapterRss 

Your answer is correct.

Question 49
Correct

Mark 1.00 out of 1.00

_______________ Provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain
Name System (DNS).

Select one:
a. Network Load Balancing (NLB)

b. IP Address Management (IPAM) 

c. Low-latency workloads technologies

d. Hyper-V virtual switch

Your answer is correct.

Question 50
Correct

Mark 1.00 out of 1.00

The network stack implements protocols such as TCP/IP and UDP/IP. These layers expose the transport layerinterface for layers above them.

Select one:
True

False 

◄ Final Quiz 2

Jump to...

You might also like