Lesson: Lesson 3: Configuring and Managing the DHCP Server Role

Multiple Choice

1. The Reverse Address Resolution Protocol (RARP) was designed for what reason?

a) to discover the Media Access Control (MAC) address (an address unique to a Network Interface Card) that corresponds to a particular IP address

b) for diskless workstations that had no means of permanently storing their TCP/IP settings

c) to provide a subnet mask and a default gateway

d) to enable a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run

2. RARP was essentially the opposite of what protocol?

a) BOOTP

b) TFTP

c) MAC

d) ARP

3. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option?

a) subnet mask

b) default gateway

c) workstation settings

d) IP address

4. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network?

a) IP host configuration

b) dynamic host configuration

c) flexibility and scalability

d) de-centralized administration

5. The core function of DHCP is to ______.

a) manage resources

b) assign addresses

c) host configuration

d) manage protocols

6. What computer provides DHCP configuration information to multiple clients?

a) DHCP client

b) DHCP server

c) DHCP lease

d) DHCP discover

7. Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address and lease duration?

a) DHCPDECLINE

b) DHCPREQUEST

c) DHCPOFFER

d) DHCPDISCOVER

8. Which of the following is sent by a DHCP server to a DHCP client to confirm an IP address and provide the client with those configuration parameters that the client has requested and the server is configured to provide?

a) DHCPACK

b) DHCPNACK

c) DHCPRELEASE

d) DHCPINFORM

9. The initial DHCP lease process is accomplished by using a series of exchanges between a DHCP client and DHCP server that utilizes four messages. Which of the following is not a message that is used?

a) DHCPDISCOVER

b) DHCPOFFER

c) DHCPRELEASE

d) DHCPACK

10. All DHCP servers that receive the DHCPDISCOVER message and have a valid configuration for the client will broadcast ______.

a) DHCPACK

b) DHCPOFFER

c) DHCPNACK

d) DHCPINFORM

11. The broadcast DHCPREQUEST message contains all of the following information except ______.

a) the IP address of the DHCP server chosen by the client

b) the requested IP address for the client

c) a list of requested parameters (subnet mask, router, DNS server list, domain name, vendor-specific information, WINS server list, NetBIOS node type, NetBIOS scope)

d) DNS information for the client

12. A DHCP client will perform the initial lease process in all of the following situations with the exception of ______.

a) the very first time the client boots

b) after every reboot

c) after releasing the IP address

d) after receiving a DHCPNACK message

13. If you use DHCP with an alternate configuration and the DHCP client cannot locate a DHCP server, the alternate configuration is used to configure the network adapter. Additional discovery attempts are made under what condition?

a) The network adapter is disabled and then enabled again.

b) Media is disconnected and then reconnected again.

c) TCP/IP settings for the adapter are changed, and DHCP remains enabled after these changes.

d) All of the above

14. The IP addresses defined in a DHCP scope must be ______.

a) contiguous

b) associated with a subnet mask

c) both A and B

d) none of the above

15. Which of the following apply to all clients within a scope and are the most frequently used set of options?

a) server options

b) scope options

c) class options

d) client options

16. Which of the following is not a database function used to manage the DHCP database?

a) compact

b) reconciliation

c) connect

d) restore

17. What criteria must be met by the server before using the Reconcile feature to verify client information for a DHCP scope from the registry?

a) You must restore the DHCP server registry keys, or they must remain intact from previous service operations on the server computer.

b) You must delete and recreate the DHCP database.

c) You must reboot the server.

d) None of the above

18. Which file is used by the DHCP database as a temporary storage file during database index maintenance operations (this file sometimes resides in the %systemroot%\System32\Dhcp directory after a system failure)?

a) temp.log

b) Dhcp.mdb

c) J50.log

d) Temp.edb

19. The MAC address can be obtained by keying in ______at the command line.

a) ipconfig -a

b) ipconfig t

c) ipconfig /all

d) ipconfig/*

20. After the client receives an offer from at least one DHCP server, it broadcasts a DHCPREQUEST message to all DHCP servers with 0.0.0.0 as the source address and ______as the destination address.

a) 265.265.265.265

b) 225.225.225.225

c) 255.255.255.255

d) 205.205.205.205

True/False

21. DHCP frees system administrators from manually configuring each host on the network.

22. The smaller the network, the greater the benefit of using a dynamic address assignment.

23. DHCP provides three key benefits to those managing and maintaining a TCP/IP network.

24. The key aspect of the DHCP process is that it is dynamic.

25. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address pool within the scope.

Fill-in-the-Blank

26. The ______Address Resolution Protocol was designed for diskless workstations that had no means of permanently storing their TCP/IP settings. RARP, as its name suggests, was essentially the opposite of Address Resolution Protocol.

27. Using ______File Transfer Protocol, a lightweight version of FTP that uses the UDP protocol, a workstation also can download an executable boot file from a BOOTP server.

28. DHCP functions at the ______layer of the Open System Interconnection (OSI) reference model.

29. All DHCP messages are carried in User Datagram Protocol datagrams using the well-known port numbers 67 (from the server) and ______(to the client).

30. A DHCP client first attempts to reacquire its lease at half the lease time, which is known as ______.

31. Active Directory must be present to ______DHCP servers and block unauthorized servers.

32. To allow for the possibility that some IP addresses in the scope might already be assigned and in use, the DHCP administrator can specify a(n) ______range, which is one or more IP addresses in the scope that are not handed out to DHCP clients.

33. The DHCP server database in the Windows Server 2008 family uses the Joint ______Technology storage engine.

34. A(n) ______file indicates the location of the last information that was successfully written from the transaction logs to the database.

35. Once a DHCP scope is defined and exclusion ranges are applied, the remaining addresses form what is called an available address ______within the scope.

Short Answer

36. DHCP is defined by the Internet Engineering Task Force (IETF) in which two Requests for Comments?

37. All DHCP messages are carried in what protocol?

38. What is either a host or IP router that listens for DHCP (and BOOTP) client messages being broadcast on a subnet and then forwards those DHCP messages to a DHCP server?

39. When the DHCP client and DHCP server are on the same subnet, what messages are sent by means of broadcast traffic?

40. What are four types of DHCP options in Windows Server 2008?

41. When creating a reservation, what must you know for each device for which you are reserving an address?

42. What is another name for a unauthorized DHCP server?

43. Since the advent of TCP/IP, several solutions have been developed to address the challenge of configuring TCP/IP settings for organizations with a large number of workstations. Name three of the solutions.