1. What are some of the common configuration options that DHCP can configure on a client computer?
Default router, DNS server, WINS server, and domain name.
2. How can you use DHCP and still ensure that a computer always uses the same IP address?
By creating a DHCP reservation for the computer.
3. How can you use DHCP to configure client computers to use a WINS or DNS server?
By configuring the addresses of the WINS or DNS servers as global or scope options on the DHCP server.
4. How do you configure two WINS servers to exchange name-to-IPaddress mappings with each other?
By configuring them as replication partners.
5. How can you use the WINS snap-in to manage more than one WINS server at once?
By configuring the snap-in to connect to the other WINS servers and display their information.
6. How do you ensure that WINS clients can look up the IP addresses of servers that aren’t compatible with WINS?
By creating static WINS entry for the non-WINS servers.
7. What type of DNS record allows another computer to determine the IP address of your company’s e-mail server?
An MX record.
8. How can your DNS server help resolve Internet host names that are not contained within its database?
By forwarding the request to another DNS server.
9. What type of DNS record allows a computer to have a nickname?
A CNAME record.
10. How does a computer decide whether or not data should be sent to the computer’s default gateway?
By examining the network ID portion of the destination IP address. If it is the same as the computer’s own network ID, then the default gateway is not used. If the network IDs are different, then the default gateway is used.
11. What protocol does a computer use to determine the physical address of another computer?
The Address Resolution Protocol, or ARP.
12. What TCP/IP protocol does a computer use when it wants to ensure that data transmissions are received by the destination computer?
The Transport Control Protocol, or TCP, which allows the destination computer to confirm receipt of individual packets.
13. What piece of information allows a computer to determine which portion of an IP address identifies a network and which identifies a computer?
The subnet mask.
14. What tool enables you to apply a security template to a computer by using a batch file?
Secedit.exe.
15. Why are security templates better than configuring security on individual computers? Because templates can be centrally configured and then applied to computers, enabling you to create a consistent security policy across all of your computers.
16. How does the Security Configuration Manager enable you to analyze the result of applying several security templates?
By showing you the effective policies after analyzing the templates you want to apply.
17. How do you configure domain security policies?
By configuring the local security policy of a domain controller.
18. What are three major classes of security policies?
Account policy, lockout policy, and security options.
19. What effect does a policy have when it is undefined?
Undefined policies have no effect.
20. How can you create your own security templates?
By using the Security Configuration Manager, or SCM, to define the policies in the template and then saving the template to a file.
No comments:
Post a Comment