| Term 
 
        | What are the benefits of DHCP? |  | Definition 
 
        | 1. Centralized administration of IP configuration 2. Dynamic host configuration
 3. Seamless IP host configuration
 4. Flexibility
 5. Scalability
 |  | 
        |  | 
        
        | Term 
 
        | What is the DHCP based on? |  | Definition 
 
        | BOOTP (Bootstrap Protocol) |  | 
        |  | 
        
        | Term 
 
        | Defines the Duration for which a DHCP server loans an IP address to a DHCP client. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the minimum and maximum for the DHCP lease? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the default that is set for the DHCP lease? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is an administrative grouping of scopes that is used to support multinets? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of operating systems can you deploy DHCP on? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Enables permanent address lease assigned by the DHCP server. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | ___________ is limited sequence of IP's within a scope range that are to be excluded from DHCP service offering. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A computer receives _____ when it changes subnets and cannot renew the lease. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | To change the scope lease you ______________ and _________. |  | Definition 
 
        | Right click on scope and change |  | 
        |  | 
        
        | Term 
 
        | What must you do before you issue out an IP address? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | When you are in APIPA the system automatically looks for a new IP address every _________. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the IP range for APIPA? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is used to check the database for all scopes?  One scope? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A new log file is created when one of the following occurs... |  | Definition 
 
        | The DHCP server is started or the local time passes 12AM |  | 
        |  | 
        
        | Term 
 
        | Depending on whether the audit file has been modified in the past 24 hours, the following action occurs... |  | Definition 
 
        | If the file previously existed for more than a day then it is overwritten. 
 If the file existed but was modified within the previous 24 hours, it is not overwritten.  The new logging activity is appended to the end of the existing file and the DHCP server is started.
 |  | 
        |  | 
        
        | Term 
 
        | What are the types of clients that can dynamically update the "A" record? |  | Definition 
 
        | Any system after Server 2000. |  | 
        |  | 
        
        | Term 
 
        | To uncover unused space you will _________. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | DHCP database backups are done every ____________. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Command used to renew its DNS IP is... |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Active Directory and integrated zones must be in ______________. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | ______ record identifies a host. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the types of servers? |  | Definition 
 
        | Primary Name Secondary Name
 Master Name
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 
        | A list of IP's of authoritative servers.  It is stored in the cache of DNS. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the security levels? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What security attacks does IPSec prevent? |  | Definition 
 
        | 1. Packet Sniffing 2. Data Modification
 3. Identity Spoofing
 4. Man-in-the-middle attacks
 5. Denial of Service
 |  | 
        |  | 
        
        | Term 
 
        | Which attack prevents the normal use of computers or network resources? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which protocol provides authentication, integrity, and anti-replay for the entire packet (both the IP header and the data payload carried in the packet)? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which protocol provides confidentiality (in addition to authentication, integrity, and anti-replay) for the IP payload? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What standard defines a mechanism to establish SAs? |  | Definition 
 
        | IKE (Internet Key Exchange) |  | 
        |  | 
        
        | Term 
 
        | IPSec verifies the identity of the peer computer before data is sent. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What native Windows Serve 2003 command line script tool do you use to display or modify the local or remote network configuration of a computer running Windows Server 2003. |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | It is used to check the security setting of multiple computers |  | 
        |  | 
        
        | Term 
 
        | What group only appears in the forest root domain? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The _______________ states that no user or object (such as a service) should have more privileges or access to information and resources than is absolutely necessary. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A file cannot be encrypted on __________. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Why should file be encrypted? |  | Definition 
 
        | To protect secure information |  | 
        |  | 
        
        | Term 
 
        | What are the network protocols that are used to manage and secure? |  | Definition 
 
        | 1. Authentication 2. Authorization
 3. Confidentiality
 4. Integrity
 5. Non repudiation
 |  | 
        |  | 
        
        | Term 
 
        | ____________ is always the first domain in the forest. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is required to grant permissions for individual files and folders in Windows Server 2003? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What should you enable to help determine whether your security settings are effective? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the major protocols used for Windows Server 2003? |  | Definition 
 
        | Kerberos, NTLM, and IPSec |  | 
        |  | 
        
        | Term 
 
        | Can you encrypt files on a compressed volume? |  | Definition 
 
        | No.  Compression and Encryption are mutually exclusive. |  | 
        |  | 
        
        | Term 
 
        | What can be used to query DNS zone information? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What verifies the consistency of a particular set of DNS records on multiple servers? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | ___________ is load balancing mechanism used by DNS servers to share and distribute network resource loads. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | DNS uses the __________________ to map a host name to an IP address. |  | Definition 
 
        | FQBN (Fully Qualified Domain Name) |  | 
        |  | 
        
        | Term 
 
        | What are the 3 standard zones? |  | Definition 
 
        | Primary Secondary
 in-addr.arpa
 |  | 
        |  |