InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
What Is The Use Of Stateless Address Autoconfiguration? |
|
Answer» Stateless ADDRESS Autoconfiguration is used to CONFIGURE the link-local addresses and ADDITIONAL non-link-local addresses by exchanging Router Solicitation and Router Advertisement messages with NEIGHBOURING routers. Stateless Address Autoconfiguration is used to configure the link-local addresses and additional non-link-local addresses by exchanging Router Solicitation and Router Advertisement messages with neighbouring routers. |
|
| 202. |
How Does Remote Access Client Uses Dhcp To Obtain An Ip Address Configuration? |
|
Answer» The REMOTE ACCESS clients use the Internet Protocol CONTROL Protocol (IPCP) to OBTAIN an IP address configuration. The remote access clients use the Internet Protocol Control Protocol (IPCP) to obtain an IP address configuration. |
|
| 203. |
How Does The Authorization Process Work For Dhcp Server Computers? |
|
Answer» The AUTHORIZATION process for DHCP server computers depends on the installed role of the server on your NETWORK. There are following three roles or server types for which each server COMPUTER can be installed:
The authorization process for DHCP server computers depends on the installed role of the server on your network. There are following three roles or server types for which each server computer can be installed: |
|
| 204. |
How Is The Dhcp Server Service Integrated With Active Directory? |
|
Answer» The DHCP Server service is integrated with Active Directory to provide AUTHORIZATION for DHCP servers. A DHCP server, which is a domain controller or a member of an Active Directory domain, QUERIES Active Directory for the list of authorized servers. If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its start up sequence and automatically shuts down. The DHCP Server service is integrated with Active Directory to provide authorization for DHCP servers. A DHCP server, which is a domain controller or a member of an Active Directory domain, queries Active Directory for the list of authorized servers. If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its start up sequence and automatically shuts down. |
|
| 205. |
How Does The Dhcp Server Determine The Originating Subnet Of The Dhcp Client? |
|
Answer» DHCP servers STORE RANGES of addresses that can be assigned to hosts on individual subnets. When a DHCP CLIENT starts up and if the DHCP client is on the same subnet as the DHCP server, the DHCP server can identify the subnet from the interface on which the DHCP messages from the client were received. DHCP servers store ranges of addresses that can be assigned to hosts on individual subnets. When a DHCP client starts up and if the DHCP client is on the same subnet as the DHCP server, the DHCP server can identify the subnet from the interface on which the DHCP messages from the client were received. |
|
| 206. |
List The Different Kinds Of Dhcp Messages? |
|
Answer» The following messages are USED to COMMUNICATE during the DHCP CONFIGURATION process:
The following messages are used to communicate during the DHCP configuration process: |
|
| 207. |
What Protocols And Ports Are Used By Dhcp Traffic? |
Answer»
|
|
| 208. |
How Does Dhcp Work? |
|
Answer» When DHCP CLIENTS start up on a network, they DISCOVER the DHCP servers on the network and request IP configuration information. The DHCP servers respond with an offered IP address configuration. The DHCP client REQUESTS the USE of a specific IP address configuration from among those offered, which is acknowledged by the DHCP server that offered it. The DHCP server allocates an IP address configuration for a specific amount of time known as the lease time; whereas, the DHCP client must renew the lease time of its IP address configuration on regular basis. When DHCP clients start up on a network, they discover the DHCP servers on the network and request IP configuration information. The DHCP servers respond with an offered IP address configuration. The DHCP client requests the use of a specific IP address configuration from among those offered, which is acknowledged by the DHCP server that offered it. The DHCP server allocates an IP address configuration for a specific amount of time known as the lease time; whereas, the DHCP client must renew the lease time of its IP address configuration on regular basis. |
|
| 209. |
What Is Dhcp For Ipv6? |
|
Answer» DHCPv6 is DHCP for IPv6 networks. The DHCP Server service supports both DHCPv6 stateless and STATEFUL OPERATIONS. DHCPv6 is DHCP for IPv6 networks. The DHCP Server service supports both DHCPv6 stateless and stateful operations. |
|
| 210. |
Does The Windows Server 2008 Dhcp Server Service Support Bootp? |
|
Answer» YES, the DHCP Server service in Windows Server 2008 SUPPORTS BOOTP clients through the configuration of a BOOTP table. Yes, the DHCP Server service in Windows Server 2008 supports BOOTP clients through the configuration of a BOOTP table. |
|
| 211. |
How Does Microsoft Windows 2008 Support Dhcp? |
|
Answer» Windows support the following three ELEMENTS of a DHCP infrastructure:
Windows support the following three elements of a DHCP infrastructure: |
|
| 212. |
What Is Dynamic Host Configuration Protocol (dhcp)? |
|
Answer» DHCP is an Internet Engineering Task FORCE (IETF) standard for SIMPLIFYING management of host IP configuration. The DHCP servers manage dynamic allocation of IP addresses and other related configuration details for DHCP-enabled clients on a NETWORK. DHCP is an Internet Engineering Task Force (IETF) standard for simplifying management of host IP configuration. The DHCP servers manage dynamic allocation of IP addresses and other related configuration details for DHCP-enabled clients on a network. |
|
| 213. |
Which Command Is Used To Check The Ipv6 Address? |
|
Answer» The IPCONFIG COMMAND is used to check the IPv6 address. You can also USE the NETSH interface ipv6 show address command to view the IPv6 addresses. The ipconfig command is used to check the IPv6 address. You can also use the netsh interface ipv6 show address command to view the IPv6 addresses. |
|
| 214. |
What Is Role Special Domain For Ipv6 Address Translation In Microsoft? |
|
Answer» Microsoft has ESTABLISHED a SPECIAL domain for IPv6 address TRANSLATION. You can include an IPv6 address within a Universal Naming Convention by replacing the colons with dashes and appending .ipv6.literal.net to the end of the address; for example, FE80-AB00-200D-617B.ipv6.literal.net. Microsoft has established a special domain for IPv6 address translation. You can include an IPv6 address within a Universal Naming Convention by replacing the colons with dashes and appending .ipv6.literal.net to the end of the address; for example, FE80-AB00-200D-617B.ipv6.literal.net. |
|
| 215. |
How Do You Make Ipv6 Compatible With Ipv4 Networks? |
|
Answer» TRANSITION technologies use TUNNELING to facilitate cross network compatibility. TWO such technologies are Teredo and 6to4 that encapsulate IPv6 packets inside IPV4 packets. The tunnel endpoints are required on both ends to encapsulate and EXTRACT the IPv6 packets. Transition technologies use tunneling to facilitate cross network compatibility. Two such technologies are Teredo and 6to4 that encapsulate IPv6 packets inside IPv4 packets. The tunnel endpoints are required on both ends to encapsulate and extract the IPv6 packets. |
|
| 216. |
Which Domain Is Used For Reverse Hostname Resolution In Ipv6? |
|
Answer» The ip6.arpa DOMAIN is USED for REVERSE HOSTNAME RESOLUTION. The ip6.arpa domain is used for reverse hostname resolution. |
|
| 217. |
Is Domain Name System (dns) Used In Ipv6? |
|
Answer» Yes, DNS is used in IPv6; instead of HOST (A) RECORDS, IPv6 uses AAAA RESOURCE records, which are sometimes REFERRED to as Quad A records. Yes, DNS is used in IPv6; instead of Host (A) records, IPv6 uses AAAA resource records, which are sometimes referred to as Quad A records. |
|
| 218. |
How Do You Represent The Sequential Zeros In Ipv6? |
|
Answer» There are four SEQUENTIAL sections separated by zeros in IPv6. INSTEAD of suppressing the leading zeros, you can represent all the sequential zeros and REPLACE them with two colons. The two colons INFORM the OPERATING system that everything in between them is a zero. There are four sequential sections separated by zeros in IPv6. Instead of suppressing the leading zeros, you can represent all the sequential zeros and replace them with two colons. The two colons inform the operating system that everything in between them is a zero. |
|
| 219. |
Do You Need Subnet Mask In Ipv6? |
|
Answer» IPv6 uses SUBNETS, but the subnet Identifier (ID) is built into the address. First 48 characters of the address are the network prefix, next 16 characters (which are OFTEN all ZEROS) are the subnet ID, and the last 64 characters are the interface identifier. IPv6 uses subnets, but the subnet Identifier (ID) is built into the address. First 48 characters of the address are the network prefix, next 16 characters (which are often all zeros) are the subnet ID, and the last 64 characters are the interface identifier. |
|
| 220. |
What Is Loophack Address For Ipv4 And Ipv6? |
|
Answer» The LOOPBACK ADDRESS for IPv4 Is 127.0.0.1; WHEREAS, the loopback address for IPV6 is The loopback address for IPv4 Is 127.0.0.1; whereas, the loopback address for IPv6 is |
|
| 221. |
What Is Ipv6 Address? |
|
Answer» IPv6 ADDRESS is ASSIGNED to a network interface of a computer participating in a network using the IP suite. It is 128 bits LONG hexadecimal NUMBER. IPv6 address is assigned to a network interface of a computer participating in a network using the IP suite. It is 128 bits long hexadecimal number. |
|
| 222. |
What Is The Structure Of Teredo Ipv6 Addressing? |
|
Answer» The structure of Teredo IPv6 addressing is as FOLLOWS:
The structure of Teredo IPv6 addressing is as follows: |
|
| 223. |
What Is Teredo? |
|
Answer» Teredo is a tunnelling PROTOCOL that grants IPv6 connectivity to the NODES located behind IPv6-unaware NETWORK Address Translation (NAT) devices. It describes a way of encapsulating IPv6 packets within the IPv4 UDP datagrams that can be routed through NAT devices on the IPv4-based Internet. Teredo is a tunnelling protocol that grants IPv6 connectivity to the nodes located behind IPv6-unaware Network Address Translation (NAT) devices. It describes a way of encapsulating IPv6 packets within the IPv4 UDP datagrams that can be routed through NAT devices on the IPv4-based Internet. |
|
| 224. |
Name The Drivers Used For Ipv4 And Ipv6 Protocol Stacks? |
|
Answer» The tcpip.sys driver is used for the IPv4 PROTOCOL STACK; whereas, the tcpip6.sys driver is used for the IPV6 protocol stack. The tcpip.sys driver is used for the IPv4 protocol stack; whereas, the tcpip6.sys driver is used for the IPv6 protocol stack. |
|
| 225. |
What Is Built-in User Account? |
|
Answer» Windows XP AUTOMATICALLY creates built-in ACCOUNTS, which are of the FOLLOWING two types:
Windows XP automatically creates built-in accounts, which are of the following two types: |
|
| 226. |
What Is The Difference Between Local User Account And Domain User Account? |
|
Answer» In the local user account, users LOG on to the computer where the account is LOCATED and gain access to RESOURCES on that computer. In the DOMAIN user account, users log on to the domain and gain access to resources anywhere on the NETWORK. In the local user account, users log on to the computer where the account is located and gain access to resources on that computer. In the domain user account, users log on to the domain and gain access to resources anywhere on the network. |
|
| 227. |
What Is The Role Of Remote Server Administration Tools (rsat)? |
|
Answer» The following preference ITEMS can be managed by using RSAT in Windows Server 2008 R2 and Windows 7: The following preference items can be managed by using RSAT in Windows Server 2008 R2 and Windows 7: |
|
| 228. |
List The Logical Elements That Can Be Combined To Define An Active Directory Topology? |
|
Answer» The logical elements that can be combined to define an ACTIVE DIRECTORY topology are as FOLLOWS: The logical elements that can be combined to define an Active Directory topology are as follows: |
|
| 229. |
What Is The Role Of Administrative Templates? |
|
Answer» Administrative TEMPLATES (.ADMX FILES) are registry-based policy settings that are LISTED under the Administrative Templates node of both the Computer and User Configuration NODES. Administrative templates (.ADMX files) are registry-based policy settings that are listed under the Administrative Templates node of both the Computer and User Configuration nodes. |
|
| 230. |
What Are The Services Hosted On Domain Controllers? |
|
Answer» The services that are hosted on domain controllers are as follows:
The services that are hosted on domain controllers are as follows: |
|
| 231. |
What Is Global Catalog Server? |
|
Answer» Global catalog is a distributed DATA repository to FACILITATE searches and logons in an Active Directory forest. The global catalog data is automatically built by the Active Directory replication system. The domain CONTROLLERS that host the global catalog are called global catalog servers. Global catalog is a distributed data repository to facilitate searches and logons in an Active Directory forest. The global catalog data is automatically built by the Active Directory replication system. The domain controllers that host the global catalog are called global catalog servers. |
|
| 232. |
What Is The Role Of Netlogon Service? |
|
Answer» NetLogon service is used to verify NT LAN Manager (NTLM) LOGON requests, and registers, AUTHENTICATES, and locates DOMAIN controllers. It manages replication of the USER account DATABASE to back up domain controllers running Windows NT 4.0 and earlier. NetLogon service is used to verify NT LAN Manager (NTLM) logon requests, and registers, authenticates, and locates domain controllers. It manages replication of the user account database to back up domain controllers running Windows NT 4.0 and earlier. |
|
| 233. |
Name The Policy Used To Manage Trust Relationship Between Domains And Forests? |
|
Answer» Local SECURITY Authority (LSA) POLICY is used to manage trust RELATIONSHIP between DOMAINS and FORESTS. Local Security Authority (LSA) policy is used to manage trust relationship between domains and forests. |
|
| 234. |
What Is Relative Identifier (rid) Manager Responsible For? |
|
Answer» RID manager is RESPONSIBLE for PROVIDING numbers that are USED to create unique SIDS for each ACCOUNT in a domain. RID manager is responsible for providing numbers that are used to create unique SIDs for each account in a domain. |
|
| 235. |
What Is Account Management? |
|
Answer» ACCOUNT MANAGEMENT includes CREATING, modifying, and deleting user ACCOUNTS and detection of duplicate accounts and SECURITY Identifiers (SIDs). Account Management includes creating, modifying, and deleting user accounts and detection of duplicate accounts and Security Identifiers (SIDs). |
|
| 236. |
What Is Security Accounts Manager (sam)? |
|
Answer» SAM is a database that has INFORMATION about USER accounts and security descriptors for users on the local COMPUTER. SAM is a database that has information about user accounts and security descriptors for users on the local computer. |
|
| 237. |
What Is The Function Of Windows Time Service? |
|
Answer» Windows TIME service automatically synchronizes the LOCAL COMPUTER's time with other COMPUTERS on the NETWORK. Windows Time service automatically synchronizes the local computer's time with other computers on the network. |
|
| 238. |
What Is Active Directory Schema? |
|
Answer» ACTIVE DIRECTORY schema is the set of attributes and CLASSES that defines the types of objects and information about the objects STORED in Active Directory Domain Services. Active Directory schema is the set of attributes and classes that defines the types of objects and information about the objects stored in Active Directory Domain Services. |
|
| 239. |
What Is Lightweight Directory Access Protocol (ldap)? |
|
Answer» LDAP is a protocol that directory clients USE to gain ACCESS to data, which is held by directory servers. It supports bind, unbind, read, and modify operations. It is also responsible for packaging and interpreting LDAP PACKETS over the network. LDAP is a protocol that directory clients use to gain access to data, which is held by directory servers. It supports bind, unbind, read, and modify operations. It is also responsible for packaging and interpreting LDAP packets over the network. |
|
| 240. |
What Is Forest? |
|
Answer» Forest CONTAINS all the DOMAINS, sites, and trusts that are PART of Active DIRECTORY DOMAIN Services. It also contains a single domain by default, which is called the forest root domain. Forest contains all the domains, sites, and trusts that are part of Active Directory Domain Services. It also contains a single domain by default, which is called the forest root domain. |
|
| 241. |
What Is The Function Of Active Directory Domain Services? |
|
Answer» ACTIVE Directory DOMAIN SERVICES defines the data structure and those services that PROVIDE organization, management, and security of accounts and resources in a Microsoft network. Active Directory Domain Services defines the data structure and those services that provide organization, management, and security of accounts and resources in a Microsoft network. |
|
| 242. |
What Is Active Directory Web Services? |
|
Answer» In WINDOWS SERVER 2008 R2, Active Directory WEB Services is a new service that PROVIDES a Web service interface to Active Directory domains. In Windows Server 2008 R2, Active Directory Web Services is a new service that provides a Web service interface to Active Directory domains. |
|
| 243. |
What Is The Use Of User Account Control (uac)? |
|
Answer» UAC helps protect the network by preventing USERS from RUNNING malicious SOFTWARE. UAC helps protect the network by preventing users from running malicious software. |
|
| 244. |
What Is The New Feature Of The Smart Cards Used In Windows 2008 R2? |
|
Answer» The new feature of the smart card in WINDOWS 2008 R2 is the enhanced support for smart card-related Plug and Play and the Personal Identity VERIFICATION (PIV) standard from the National INSTITUTE of STANDARDS and Technology (NIST). The new feature of the smart card in Windows 2008 R2 is the enhanced support for smart card-related Plug and Play and the Personal Identity Verification (PIV) standard from the National Institute of Standards and Technology (NIST). |
|
| 245. |
What Is The Function Of Applocker? |
|
Answer» AppLocker defines the rules based on FILE ATTRIBUTES DERIVED from the DIGITAL signature. These rules specify which files are allowed to RUN. Files that are not included in rules are not allowed to run. AppLocker defines the rules based on file attributes derived from the digital signature. These rules specify which files are allowed to run. Files that are not included in rules are not allowed to run. |
|
| 246. |
If The Smart Card Used For The Logon Is Removed From The Smart Card Reader Before Any Encryption Operations Are Performed, Will The User Be Prompted For A Smart Card And Pin At The First Efs Operation? |
|
Answer» Yes, if the smart card USED for the logon is REMOVED from the smart card reader before any ENCRYPTION operations are performed, then SSO gets disabled and the user will be prompted for a smart card and PIN at the first EFS operation. Yes, if the smart card used for the logon is removed from the smart card reader before any encryption operations are performed, then SSO gets disabled and the user will be prompted for a smart card and PIN at the first EFS operation. |
|
| 247. |
How And When Smart Card Single Sign-on (sso) Is Triggered? |
|
Answer» Smart card SSO is triggered whenever a user LOGS on with a smart card in one of the following CONDITIONS: Smart card SSO is triggered whenever a user logs on with a smart card in one of the following conditions: |
|
| 248. |
What New Functionalities Are Added To Efs? |
|
Answer» The new functionality of EFS is the ABILITY to store ENCRYPTION certificates on smart cards, per-user encryption of FILES in the client-side cache, additional Group Policy options, and a new REKEYING wizard. The new functionality of EFS is the ability to store encryption certificates on smart cards, per-user encryption of files in the client-side cache, additional Group Policy options, and a new rekeying wizard. |
|
| 249. |
What Is The Use Of Robocopy Utility? |
|
Answer» The Robocopy UTILITY, added as a NEW feature in Windows Server 2008, is used to copy EFS-encrypted FILES without needing the decryption key. The Robocopy utility, added as a new feature in Windows Server 2008, is used to copy EFS-encrypted files without needing the decryption key. |
|
| 250. |
Give The Full Forms Of Kra And Dra? |
|
Answer» KRA STANDS for KEY RECOVERY Agent and DRA stands for DATA Recovery Agent. KRA stands for Key Recovery Agent and DRA stands for Data Recovery Agent. |
|