Professional Documents
Culture Documents
Network Infrastructure and Directory Services Source 2
Network Infrastructure and Directory Services Source 2
3. InAnswer
dhcp failover, two servers operate in a failover relationship where an active
server is responsible for leasing IP addresses and configuration information to
all clients in a scope or subnet.
4. Use this option to configure the users and computers that you want to be
authorized to establish IPsec communications with the local computer.
5. This option places a DHCP server in a cluster with another DHCP server that
assumes the load if the primary DHCP server fails.
Answer:
windows failover cluster
6.
Select one:
home edition?
9. This edition of windows server 2012 is suited for small businesses, but with up
to 25 users,
it is also available on retail stores making it accessible to small businesses,
answer: Essentials
10.
provides redundancy and load balancing for DHCP services, enabling administrators
to deploy
a highly resilient DHCP service.
Answer: DHCP failover
11. Use this option to configure how IPsec handles Internet Control Message
Protocol (ICMP)
traffic. By default, ICMPtraffic is not exempted from using IPsec, but you can
change this by
selecting Yes from the list control.
12. With
Answer: DHCP client requests
, the DHCP the server evaluates DHCP requests against policies that you define.
13. This data integrity algorithm is stronger than MD5 but uses more resources.
Answer: Sha 1
14. Internet Key Exchange (IKE) mechanism is defined in RFC2409 and combines
the Internet Security Association and KeyManagement Protocol (ISAKMP) of RFC
2408 with the Oakley KeyDetermination Protocol (Oakley) of RFC 2412.IKE is
supported
oncomputers that are running Windows 2000 or later.
Answer: True?
15. This data integrity algorithm is not recommended and is provided for backward
compatibility only.
Answer: MD 5
16. This data integrity algorithm is not recommended and is provided for backward
compatibility only.
Answer: DES
Answer: true?
18. This algorithm is faster and stronger than DES. It is supported on Windows
Vista and later.
19. The default signing algorithm for this authentication method is RSA, but
Elliptic
Curve Digital Signature Algorithm (ECDSA)�P256 and ECDSA-P384 are also supported
signing algorithms.
20. IPsec Encapsulation Model where the payload is encapsulated with an IPsec
header
Answer: Transport mode
21. This algorithm is not recommended and is provided for backward compatibility
only.
Answer: MD 5
22. uses two independent DHCP servers that share responsibility for a scope.
Typically,
70% of the addresses in the scope are assigned to the primary server and the
remaining
30% are assigned to a backup server.
23. This edition of windows server 2012 the flagship product under the brand name
of windows server 2012,
Answer:
24. This phase of IPsec negotiation is performed first and isused to generate a
shared master key that the computers
can use tosecurely exchange keying information.
25. AES-GMAC 192 algorithm can be used for quick mode only and is supported on
Windows Vista SP1 and later.
It is equivalent to AES-GCM 192 for integrity.
Answer: True
Answer: true
Answer: true
28. dhcp failover is the default mode of deployment. In this mode, two DHCP servers
Answer: yes
Answer: false
Answer: true
33.
34. Will have the IP addresses of DNS servers where records can be acquired.
Answer: False?
36. is a DNS function that takes a domain name and resolves it to an IP address.
37. This algorithm can be used for quick mode only and is faster and stronger than
DES.
It is supported on Windows Vista and later.
Answer: #35
38. This algorithm is stronger than DH Group 2. It has medium resource usage and is
compatible only
with Windows Vista and later
39. Maps the internal (private) address and port number to different external
(public)
addresses and ports, depending on the external destination address.
40. his algorithm has the strongest security but also the highest resource usage.
It is compatible only with Windows Vista and later.
42. If you want to use the command line to configure your DNS, use the
43. This authentication method can be used on networks that include systems running
an
earlier version of the Windows operating system and on standalone systems.
Answer: False
46. Elliptic Curve Diffie-Hellman P-500 algorithm has the strongest security but
also the highest resource usage.
It iscompatible only with Windows Vista and later.
Answer: false
47. AES-GMAC 128 algorithm can be used for quick mode only andis supported on
Windows Vista SP1 and later.
It is equivalent to AES-GCM 256 for integrity.
Answer: False
48. AES-GCM 256 algorithm can be used for quick mode only and is supported on
Windows Vista SP1 and later.
It is equivalent to AES-GMAC 256 for integrity.
Answer: True
49. enables you to monitor how a computer running the Windows Server 2012 and
Windows Server 2012 R2 operating
system uses CPU, memory, disk, and network resources.
50. is the successor to Network Monitor. You can use this to perform network
traffic capture and analysis.
Message Analyzer also functions as a replacement for LogParser
51. This policy determines the maximum event forwarding rate in events per second.
If this policy is not configured,
events will be transmitted as soon as they are recorded.
Answer:
52. This policy enables you to set the location of the collector computer.
53.