Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Net Infra

1. Use this option to configure the default IPsec


settings that the local computer will use when attempting
to establish secure connections with other IPsec-enabled computers

answer: IPsec Tunnel Authorization

2. Extends the Dynamic Host Configuration Protocol (DHCP) client


to support IPv6 and allows stateful address autoconfiguration with
a DHCPv6 server.Prevents address scanning of IPv6 addresses based on
the known company IDs of network-adapter manufacturers. By default,
Windows Vista and later generate random interface IDs for nontemporary
autoconfigured IPv6 addresses, including public and link-local addresses.

Answer: Random interface IDs

3. InAnswer
dhcp failover, two servers operate in a failover relationship where an active
server is responsible for leasing IP addresses and configuration information to
all clients in a scope or subnet.

Answer: Hot Standby Mode

4. Use this option to configure the users and computers that you want to be
authorized to establish IPsec communications with the local computer.

Answer: IPsec Exemptions

5. This option places a DHCP server in a cluster with another DHCP server that
assumes the load if the primary DHCP server fails.

Answer:
windows failover cluster

6.

7. Which one is not an official version of windows server 2012?

Select one:
home edition?

8. IPsec encapsulation mode where the payload is encapsulated with an additional IP


header

Answer: Tunnel mode

9. This edition of windows server 2012 is suited for small businesses, but with up
to 25 users,
it is also available on retail stores making it accessible to small businesses,

answer: Essentials

10.
provides redundancy and load balancing for DHCP services, enabling administrators
to deploy
a highly resilient DHCP service.
Answer: DHCP failover

11. Use this option to configure how IPsec handles Internet Control Message
Protocol (ICMP)
traffic. By default, ICMPtraffic is not exempted from using IPsec, but you can
change this by
selecting Yes from the list control.

Answer: IPsec Tunnel Authorization

12. With
Answer: DHCP client requests
, the DHCP the server evaluates DHCP requests against policies that you define.

13. This data integrity algorithm is stronger than MD5 but uses more resources.

Answer: Sha 1

14. Internet Key Exchange (IKE) mechanism is defined in RFC2409 and combines
the Internet Security Association and KeyManagement Protocol (ISAKMP) of RFC
2408 with the Oakley KeyDetermination Protocol (Oakley) of RFC 2412.IKE is
supported
oncomputers that are running Windows 2000 or later.

Answer: True?

15. This data integrity algorithm is not recommended and is provided for backward
compatibility only.

Answer: MD 5

16. This data integrity algorithm is not recommended and is provided for backward
compatibility only.

Answer: DES

17. Authenticated IP (AuthIP) mechanism is defined in RFC2409 and combines the


Internet Security
Association and KeyManagement Protocol (ISAKMP) of RFC 2408 with the Oakley
KeyDetermination Protocol
(Oakley) of RFC 2412.IKE is supported oncomputers that are running Windows 2000 or
later.

Answer: true?

18. This algorithm is faster and stronger than DES. It is supported on Windows
Vista and later.

Answer: Advanced Encryption Standard-Cipher Block Chaining 128-bit(AES-CBC 128)

19. The default signing algorithm for this authentication method is RSA, but
Elliptic
Curve Digital Signature Algorithm (ECDSA)�P256 and ECDSA-P384 are also supported
signing algorithms.

Answer: Computer health certificate

20. IPsec Encapsulation Model where the payload is encapsulated with an IPsec
header
Answer: Transport mode

21. This algorithm is not recommended and is provided for backward compatibility
only.

Answer: MD 5

22. uses two independent DHCP servers that share responsibility for a scope.
Typically,
70% of the addresses in the scope are assigned to the primary server and the
remaining
30% are assigned to a backup server.

Answer: Split Scope DHCP

23. This edition of windows server 2012 the flagship product under the brand name
of windows server 2012,

Answer:

24. This phase of IPsec negotiation is performed first and isused to generate a
shared master key that the computers
can use tosecurely exchange keying information.

Answer: Main mode

25. AES-GMAC 192 algorithm can be used for quick mode only and is supported on
Windows Vista SP1 and later.
It is equivalent to AES-GCM 192 for integrity.

Answer: True

26. Elliptic Curve Diffie-Hellman P-256 algorithm is stronger than DH Group 2. It


has medium resource usage
and is compatible only with Windows Vista and later.

Answer: true

27. Authenticated IP (AuthIP) mechanism is a Microsoftproprietary extension of IKE


that provides improved
negotiation ofauthentication methods and supports additional authenticationmethods
not included in IKE. AuthIP
is supported on computersrunning Windows Vista, Windows Server 2008, or later.

Answer: true

28. dhcp failover is the default mode of deployment. In this mode, two DHCP servers

simultaneously serve IP addresses and options to clients on a given subnet.

Answer: Load balance mode

29. In transport mode, The payload is encapsulated with an IPsec header

Answer: yes

30. Encapsulating Security Protocol (ESP) mechanism provides data-origin


authentication,
data integrity, and anti-replay protection for the entire packet (both the IP
header and
the data payload carried in the packet), except for the fields in the IP header
that are allowed to change in transit.

Answer: false

31. Extends the Dynamic Host Configuration Protocol (DHCP) client to


support IPv6 and allows stateful address autoconfiguration with a DHCPv6 server.

Answer: DHCPv6-Capable DHCP client

32. Computer (NTLMv2) authentication method can be used on networks that


include systems running an earlier version of the Windows operating system and on
standalone systems.

Answer: true

33.

34. Will have the IP addresses of DNS servers where records can be acquired.

Answer: DNS record

35. Advanced Encryption Standard-Cipher Block Chaining 128-bit(AES-CBC 128)


algorithm is faster and
stronger than DES. It is supported on Windows Vista and later.

Answer: False?

36. is a DNS function that takes a domain name and resolves it to an IP address.

Answer: DNS name resolution

37. This algorithm can be used for quick mode only and is faster and stronger than
DES.
It is supported on Windows Vista and later.

Answer: #35

38. This algorithm is stronger than DH Group 2. It has medium resource usage and is
compatible only
with Windows Vista and later

Answer: Elliptic curve Diffie-helman p-256

39. Maps the internal (private) address and port number to different external
(public)
addresses and ports, depending on the external destination address.

Answer: Symmetric Network Address Translators

40. his algorithm has the strongest security but also the highest resource usage.
It is compatible only with Windows Vista and later.

Answer: Elliptic Curve Diffie-Hellman P-384

41. is a DNS function that takes an IP address andresolves it to a domain name.


Answer: reverse lookup zone

42. If you want to use the command line to configure your DNS, use the

Answer: Interface ip show config

43. This authentication method can be used on networks that include systems running
an
earlier version of the Windows operating system and on standalone systems.

Answer: Computer (NTLMv2)

44. In computer certificate, default signing algorithm for this authentication


method is AES,
but Elliptic Curve Digital Signature Algorithm (ECDSA)�P256 and ECDSA-P384 are also
supported signing algorithms.

Answer: False

45. This mechanism is defined in RFC2409 and combines the Internet


Security Association and
Key Management Protocol (ISAKMP) of RFC 2408 with the Oakley Key Determination
Protocol (Oakley) of RFC 2412

46. Elliptic Curve Diffie-Hellman P-500 algorithm has the strongest security but
also the highest resource usage.
It iscompatible only with Windows Vista and later.

Answer: false

47. AES-GMAC 128 algorithm can be used for quick mode only andis supported on
Windows Vista SP1 and later.
It is equivalent to AES-GCM 256 for integrity.

Answer: False

48. AES-GCM 256 algorithm can be used for quick mode only and is supported on
Windows Vista SP1 and later.
It is equivalent to AES-GMAC 256 for integrity.

Answer: True

49. enables you to monitor how a computer running the Windows Server 2012 and
Windows Server 2012 R2 operating
system uses CPU, memory, disk, and network resources.

Answer: Resource monitor

50. is the successor to Network Monitor. You can use this to perform network
traffic capture and analysis.
Message Analyzer also functions as a replacement for LogParser

Answer: message analyzer

51. This policy determines the maximum event forwarding rate in events per second.
If this policy is not configured,
events will be transmitted as soon as they are recorded.

Answer:
52. This policy enables you to set the location of the collector computer.

Answer: Configure target subscription manager

53.

You might also like