Windows Server 2003 Network Subject

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Windows Server 2003 Network Subject as PDF for free.

More details

  • Words: 15,937
  • Pages: 39
TÀI LIỆU ÔN TẬP WINDOW SERVER 2003 1. You have created several GPOs that are linked at various levels within your Active Directory structure…… in Active Directory? Answer: Local, site, domain, OU. 2. Which of the following command-line utilities can be used to automate renaming Active Directory objects? Answer: Dsmove 3. What type of organizational structure is the domain name system? Answer: Hierarchical 4. Which is the only layer of the TCP/IP reference model that does not contain any TCP/IP protocols? Answer: The network interface layer. 5. Which of the following event items is not one of the five default Event viewer event types? Answer: Caution 6. How can you perform a bulk import of users into Active Directory to create many user accounts at one time? Answer: Use the csvde.exe command 7. What would be the FQDN of a workstation named WKS042 located in the…. Domain? Answer: wks042.sales.west.bigcorp.net 8. You have two office locations, each with its own Windows Server 2003 server. The Two locations have been networked with a T-1 connection …. Static route? Answer: route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2 9. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which of the following is an appropriate next step? Answer: Run the ipconfig/release command and then the ipconfig/renew command on every client computer 10.Your corporate network uses variable…. Is 131.39.161.17 with subnet mask of 255.255.248.0 ….? Answer: 131.39.160.0/21 11.You use a Windows XP professional computer on your company’s network….navigate to? Answer: Start, All Programs, Accessories, Communications, Remote Desktop Connection.

9. Which file system has the ability to encrypt files? a. NTFS b. FAT16 c. FAT32 d. UDF 10. Which file system has the ability to compress files? a. UDF b. NTFS c. FAT32 d. FAT16 11. You need to create a record in DNS to allow Internet mail to be sent to your domain. What kind of domain record do you need? a. A CNAME record b. A PTR record c. An MX record d. An A record 12. Which command-line tool can you use to clear the DNS resolver cache on a DNS client? a. ipconfig

b. tracert c. netsh d. pathping 12. Which of the following is used to install Active Directory and establish a server as a domain controller? a. b. c. d.

Dcpromo Ntdsutil Gpotool Gpresult

13. To start in Safe Mode: a. Select Start, Accessories, System Tools, Safe Mode. b. None of the above. c. Press the F7 key during system boot. d. Press the F8 key during system boot. 13. You are configuring security for several new workstations running Windows XP Professional. The computers are members of the Temp OU, and you noticed that users are able to reuse old passwords whenever they are prompted to change them. Which of the following account policies can be used to prevent this behavior? a. Minimum Password Age b. Maximum Password Age c. Enforce Password History d. Store Passwords Using Reversible Encryption 14. Which tool can you use to determine which ports a server has open? a. NETSH b. Security Configuration And Analysis c. NETSTAT d. Security Monitor 15. You need to determine whether the NIC drivers are digitally signed. Where do you find this information? a. System Information b. Event Viewer c. Device Manager d. Driver signing options in the System applet 16. You are experiencing a delay when you connect to a remote Web site. Which tool allows you to determine whether particular routers are responsible for the delay? a. Tracert b. Network Diagnostics c. PathPing d. Netdiag

17. You are reviewing DNS parameters, how long a node in an FQDN can be? a. 63 characters b. 512 characters c. 255 characters d. 43 characters 18. Which of the following are objects in the Active Directory? a. Shared folders b. Shared printers c. Domains d. All of these 19. Which of the following Windows Server 2003 TCP/IP configuration parameters specifies the address of a router? a. IP address b. Subnet mask c. Preferred DNS server d. Default gateway 20. What step does a DNS client perform first to resolve a DNS name? a. The client checks its local DNS resolver cache. b. The client queries its primary DNS server. c. The client queries its alternate DNS server. d. The client broadcasts on the local subnet. 14. Which of the following is most likely true if a computer with an IP address of 169.254.0.11? a. The computer has a static IP address b. No DHCP server is on the network c. A DHCP server is assigning the computer's IP address d. The network cable is disconnected 21. Which of the following is a legal NetBIOS computer name? a. host1.microsoft.com b. host10_microsoft c. host1-microsoft d. host1_local 22. How much disk space is actually available for data in RAID level 5 when there are four disks? a. 90% b. 75% c. 50% d. 65% 23. You are troubleshooting a network adapter that does not appear to have an IP address assigned to it. What command could you issue to cause this network adapter to acquire a DHCP lease?

a. ipconfig /acquire b. ipconfig /renew c. ipconfig /refresh

d. ipconfig /lease 24. When a TCP/IP computer can communicate with the local network but not with computers on other networks, which of the following configuration parameters is probably incorrect? a. Preferred DNS server b. IP address c. Subnet mask d. Default gateway 15. Which of the following command-line utilities should you use to extract user property data from the Active Directory? a. Dsget b. Dsadd c. Dsmod d. Dsquery

25. Which of the following messages is not exchanged as part of a DHCP lease initialization? a. ACK b. Renew c. Discover d. Request 26. (Windows Server 2003) What permissions are granted to the Everyone group over the share created by the following code? net share MyShare=C:\MyFiles\MyShare a. Full Control b. Read c. None d. Change 27. You are getting some error messages from the DHCP server. What counter in the Performance Console would display the number of DHCPOFFER messages sent per second by the DHCP server to a client computer? a. Discovers/Sec b. Acks/Sec c. DHCPAcks/Sec d. Offers/Sec 28. To start in Safe Mode: e. Select Start, Accessories, System Tools, Safe Mode. f. None of the above. g. Press the F7 key during system boot. h. Press the F8 key during system boot. 29. You are configuring the dial-up connection for the portable computer shown in the exhibit. What address should you use as the default gateway for the portable computer's dial-up connection?

a. b. c. d.

192.168.111.42 192.168.100.1 209.29.9.20 192.168.100.21

30. You have five Windows XP clients on a network with a Windows Server 2003 server. The server has an always-on Internet connection with an ISP. What service can you install on the server to allow the clients to access the Internet, without requiring you to obtain additional IP addresses from your ISP?

a. DNS b. PPTP c. NAT d. DHCP 31. You need to create a second DNS entry for the intranet Web server, so that users can access it using an easy-to-remember name. What type of record do you need to add if you want to create an alias in DNS for the server? a. b. c. d.

An A record A CNAME record An MX record A PTR record

16. When configuring the settings for user accounts, you want to map a drive to the location of the

operating system's files. Which of the following environmental variables would be used for this purpose?

Windows Server 2003 NetWork SubJect a. b. c. d.

%SystemDrive% %HomePath% %SystemRoot% %HomeDrive%

32. a computer named COMP2 on a Windows 2000 network as shown in the exhibit. Your network uses TCP/IP as the only network protocol. You configure COMP2 with an IP address of 192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway of 192.168.2.1 Though you are able to log onto the domain, you are not able to connect to any resources on SERV2. Users need to be able to access this server to access documents and shared printers. What should you do to ensure that COMP2 can connect to network resources?

a. b. c. d.

Configure COMP2 to use a TCP/IP address of 192.168.5.16 Create a computer account on the domain for COMP2 Configure COMP2 to use a TCP/IP address of 192.168.2.16 Configure COMP2 to use a Default Gateway of 192.168.10.1

33. Which of the following TCP/IP protocols does not function at the Internet layer? a. TCP b. ARP c. ICMP d. IP 34. If GroupA is granted the Change permission over a file share \\someserver\someshare\, it will definitely have which of the following permissions as well by default?

a. None b. Read c. Modify d. Full Control 17. One important difference between TCP and UDP is that a. TCP contains source and destination addresses and UDP does not b. UDP is connection-oriented and TCP is not c. TCP is connection-oriented and UDP is not d. UDP cannot be routed, but TCP can 36

Windows Server 2003 NetWork SubJect 35. Which of the following is a transport-layer protocol? a. UDP b. IGMP c. Ethernet d. DNS 36. You have been asked to simplify the process of configuring TCP/IP on all the client computers.

The network consists of 40 computers running Windows 2000 Professional and 60 computers running Windows XP Professional. Installing and configuring what service of Windows Server 2003 will help you accomplish your task? a. DHCP b. BOOTP c. WINS d. DNS 37. Which of the following command-line tools can you use to delete a user from Active Directory? a. dsrm b. dsadd c. dsquery d. dsmove 38. What is the functionality of ARP (Address Resolution Protocol) ? a. Resolve machine names to IP addresses b. Resolve IP addresses to MAC addresses c. Resolve IP address to machine names d. Resolve MAC addresses to IP addresses 39. What is the functionality of RARP (Reverse Address Resolution Protocol) ?

a. Resolve IP addresses to MAC addresses b. Resolve IP address to machine names c. Resolve machine names to IP addresses d. Resolve MAC addresses to IP addresses 40. Which of the following is NOT default hidden share under Windows Server 2003? a. ADMIN$ b. PRINTER$ c. C$ d. IPC$ 41. Which protocol provides names and name resolution for workgroups in Windows? a. Kerberos b. NetBIOS c. DNS d. CIFS 2. What are the default share permissions in Windows Server 2003? a. Everyone:Allow Full Control 36

Windows Server 2003 NetWork SubJect b. Users:Allow Full Control c. Everyone:Allow Read d. Users:Allow Read and Execute 3. You need to back up critical data on your server. However, you do not have enough backup tapes to back up everything on your server. You want to make sure that, in addition to the user data you are backing up, you back up the Registry on your server. What should you select in addition to the data files that you want to back up? a. System State b. My Computer c. C: drive d. My Documents 4. What utility do you use to view audit information? a. Audit Log Viewer b. Audit Viewer c. Event Viewer d. Log Viewer 5. Which of the following is not a legal top-level domain name? a. findem.org b. findem.net c. findem.art d. findem.com 6. When a DNS server converts a computer name to a dotted decimal address, this is called e. Name resolution f. Name recognition g. Piping h. Pinging 7. You are in the process of configuring a counter log to create a baseline log for a new Windows Server 2003 computer that you are placing on the production network. You have configured the counter log to start and stop automatically each day. You now need to configure it so that the resulting log files will be easily identified by the date and time that they were created. Which log numbering style should you use to accomplish this? a. yyyymmddhh b. yyyymm c. mmddhhmm d. nnnnnn 8. You've installed network monitor and configured a network to monitor. What do you need to do to capture data? a. Click Capture --> Trigger b. Click Capture --> Start c. Click Capture --> Networks d. Click Capture --> Filter 9. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level Domain? a. west.bigcorp.net 36

Windows Server 2003 NetWork SubJect b. .net c. wks042 d. bigcorp.net 10. How many primary partitions without an extended partition can reside on a basic disk under Windows Server 2003? a. Four b. Unlimited c. One d. Three 11. You are troubleshooting network connectivity between two computers on a routed IP network. What command can you use to send a continuous flow of ICMP echo request packets to the destination IP address? a. ping -t b. ping -l c. ping -a d. ping -f 12. You have just completed a default installation of Windows 2003 Server. Where can you look on your computer's hard disk to see the Windows 2003 Server files? a. WINNT Folder b. WINDOWS2003 Folder c. WINDOWSNT Folder d. WINDOWS Folder 13. Which of the following is not a valid Safe mode option? a. Safe Mode with Command Prompt b. Safe Mode c. Safe Mode with Base Video d. Safe Mode with Networking 14. You are troubleshooting user complaints of slow Internet access to a partner Web site. You have been told by the partner that they are experiencing high latency on several links leading to their network. What tool can you use to determine exactly which routers and links are dropping packets and what the ping time is for each link? a. tracert b. nslookup c. pathping d. ping 15. What tool should you use if you suspect an application is not responding? a. Computer Management b. Performance c. Task Manager d. System Monitor 16. What tool should you use to configure security templates? a. Security Templates snap-in b. Network Monitor c. Active Directory Users And Computers d. Security Configuration And Analysis snap-in

36

Windows Server 2003 NetWork SubJect 17. You've just written a new script and need to ensure that new policy settings are immediately applied when the script has been completed. Which of the following command-line utilities should you use? a. secedit.exe b. gpresult.exe c. gpapply.exe d. gpupdate.exe

18. You are currently logged in to the Sales server as an Administrator. You want to add additional security to the D:\Data folder. When you attempt to set permissions, you see the following dialog box that does not display a Security tab. What is the most likely reason for this?

a. b. c. d.

The folder has already been encrypted with EFS. You need to be logged on as a member of the Server Operators group. Your account has been assigned No Access rights through the user account or through group membership. The partition is not configured as NTFS. 19. What are the default share permissions in Windows Server 2003? a. Everyone: Allow Full Control b. Everyone: Allow Read c. Users: Allow Full Control d. Users: Allow Read and Execute 20. Which type of NIC is likely to provide the fastest performance? e. EISA f. ISA 36

Windows Server 2003 NetWork SubJect g. MCA h. PCI 18. What type of zone should you create if you want to create a read-only copy of the master DNS data for the zone? a. Stub b. Root Hints c. Primary d. Secondary 19. Which of the following network/transport layer protocols can you use for Windows file sharing when installed alone? a. TCP/IP and IPX only b. TCP/IP, IPX, and NetBEUI c. TCP/IP only d. TCP/IP and NetBEUI only 20. What type of resource record must you configure to enable reverse lookups for host computers? a. Pointer (PTR) records b. Mail Exchanger (MX) records c. Name Server (NS) records d. Host (A) records 21. You are using Windows Server 2003 as the network operating system in all four of company's

locations. You are using a server in corporate headquarters and another in the Boston sales office to establish an ISDN-based demand-dial routing connection. In order to control costs, this has been implemented as an on-demand connection. During operation, however, you notice that the connection is coming up fairly regularly, even during the evening, when you know that there is no communication occurring between the offices. What could be the problem? a. A default route has been configured on the answering router, and anytime a packet is received, it is forwarded to the destination demand-dial router. b. This is normal; it is an indication that the demand-dial routing solution is functioning normally. c. A default route has been configured on the calling router, and anytime a packet is received, it is forwarded to the destination demand-dial router. d. Legitimate data is being transferred during the connection. 22. You are the WAN administrator for General Telecommunications, a large manufacturer of network equipment. When you started with the company, you had 10 office locations, each with its own Windows Server 2003 servers. These locations were networked using fractional T-1s and Windows Server 2003 servers running RRAS, and they used RIP for routing information. General Telecommunications now has 120 sales offices throughout the United States and Europe, and you have been tasked with networking these locations by using hardware routers. You have been asked to design a solution that will support both the Windows Server 2003 servers and the hardware routers. The solution must also support failover connections between the original 10 locations. What routing method should you select? a. EIGRP b. RIP 36

Windows Server 2003 NetWork SubJect c. Autostatic updates

d. OSPF

23. You are running in a mixed environment, and you are using a Windows Server 2003 DHCP service to support three network segments. Your client computers consist of Windows 2000 Professional, Windows NT Workstation, and Windows 98 SE workstations. What do you need to do to ensure that all the client computers can receive DHCP addresses? a. Configure a scope for each network segment. Configure each client computer to receive IP addresses dynamically. For the Windows NT Workstation client computers, ensure that the DHCP update from Service Pack 6 has been installed. b. Configure a scope for each network segment. Configure each client computer to receive IP addresses dynamically. Configure the DHCP service for mixed mode. c. Configure a scope for each network segment. Configure each client computer to receive IP addresses dynamically. Configure the DHCP service for backward compatibility. d. Configure a scope for each network segment. Configure each client computer to receive IP addresses dynamically. 24. Which OU structure in the Active Directory is likely to result in the most CPU resource use? a. 15 OUs on the same level c. 5 OUs on the same level b. OUs nested 5 layers deep d. OUs nested 15 layers deep 25. You have installed a new file server on server, you notice the DHCPServer the network and formatted it to use service is being shutdown and you can't NTFS. After formatting is complete,you get the service to stay running.What is use EFS to encrypt a folder containing the most likely cause of this problem? files belonging to users. If a user a. The DHCP server has not be authorized accesses a file belonging to him in this in Active Directory. folder, and then copies it across the b. The DHCP Server service is improperly network for another user to access, installed which of the following will occur? c. The active scope has invalid TCP/IP a. The file on the hard disk and the data options sent over the network will be decrypted d. The DHCP server does not have an and remain that way. active scope b. The file on the hard disk and the data sent over the network will remain 27. You set up a share in the computer lab encrypted. but neither students nor lab c. The file on the hard disk will be administrators can access it. You decrypted, so EFS can send it encrypted checked the share permissions, which over the network. are configured properly. Students and d. The file on the hard disk will remain lab administrators see an "Access is encrypted, but data sent over the denied" message when they try to access network will be nencrypted. the share. Joe has no problem accessing the share. 26. You are a network administrator for an What should you do to resolve the p1:5HUI Active Directory domain with servers CENTER FOR INFORMATION running Windows Server 2003. You TECHNOLOGY recently installed a second DHCP server a. Change the share permissions so that on the local subnet. When testing the everyone has Full Control. 36

Windows Server 2003 NetWork SubJect b. Check and modify as necessary the NTFS permissions on the folder being shared. c. Instruct the users on the proper way to connect to the share d. Nothing; the users must be mapping to the share improperly 28. You have been asked to implement

dynamic IP addressing the company's newly installed network, which has two subnets in one Active Directory domain with servers running Windows Server 2003. After you install and configure the DHCP server in SubnetA, client 29. Your network consists of servers running Windows 2003 Server and workstations running Windows 2000 Professional. You have applied several custom security templates to GPOs linked to the OU, domain, and site levels in Active Directory. In addition to this, there are security settings that have also been applied at the local computer level of all machines that are on the network. Because several policies now affect the computer accounts within the domain, site, and OU, which of the following will occur when the user logs on to the domain? a. The security settings at the local computer level will override those of the GPOs.

computers in SubnetA are able to obtain DHCP leases and the proper TCP/IP configuration. However, client computers on SubnetB are unable to obtain DHCP leases. What is the most likely cause of this problem? a. The DHCP server is not authorized is SubnetB b. The DHCP Server service is stopped c. A DHCP Relay Agent is not installed in SubnetB. d. The DHCP scope for SubnetB is not active b. The policy settings will be cumulative and applied in the order of policies at the site level, domain level, and finally OU level. c. The policy setting at the local computer level will be overwritten by the OUlevel GPO, which will be overwritten by the domain-level GPO, which will finally be overwritten by the site-level GPO. For this reason, major security settings must be made at the site-level GPO; all others will be overwritten. d. Security settings in the GPOs will not be applied to machines running Windows 2000 that have joined the domain.

30. Hannah reports that she's having a tough time connecting to resources on your Windows Server

2003 domain.You ask for more information, and Hannah reveals that she is trying to connect to a server in Washington. Other users can connect to that server, but she cannot. Hannah can ping the IP address of other hosts on her segment, her default gateway, and even the IP address of the server in Washington, but when she uses the server's hostname to enter the name of the server, she cannot connect. What do you suspect is the problem? a. Hannah needs to renew her IP address by running the command ipconfig/release and then ipconfig/renew. b. Hannah has a faulty network adapter card. c. Hannah has a blank or invalid subnet mask. 36

Windows Server 2003 NetWork SubJect d. Hannah has a blank or invalid DNS server IP address.

31. You need to ensure that your users will be able to resolve hostnames to IP addresses. What type of zones do you need to configure? a. A reverse lookup zone c. A delegated zone b. A forward lookup zone d. A stub zone b. Authorize the DHCP server 32. (DHCP) You want to migrate a subnet c. Run the Ipconfig /release command and to a new scope. You create a new scope then the Ipconfig /renew command on and then deactivate the old scope. every client computer. Which of the following is an appropriate d. Restart the DHCP Server service next step? a. Delete the old scope. 33. All your Windows XP Professional client computers are configured to get DHCP leases from your Windows Server 2003 DHCP server. This morning, one of your client computers no longer had connectivity with the rest of the network. The user claims that she did not change any network settings and has verified that the network cable is properly connected to both the network adapter and the wall jack. What is the most likely reason for the problem that the computer is experiencing? a. The computer is not a member of the domain and is being refused an IP address. b. The network cable has been damaged and is no longer passing a signal. c. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address. d. The TCP/IP stack on the computer is corrupt and needs to be reset. 34. Your Windows Server 2003 DHCP server issues a block of 40 addresses to 120 salespeople on

the Sales network. These users are frequently in and out of the office, so no more than 40 users are ever on the network at one time. What do you need to do to ensure that users get addresses when needed? a. Configure an exclusion for each user. c. Set the DHCP lease duration to 60 minutes. b. Set the DHCP lease duration to 5 days d. Configure a reservation for each user. 35. A user has the username JohnB. He wants to access a Microsoft Access database called db.mdb that’s located on a DC called syngress.com, in a directory called DB. Using the URL, what will this user enter into a browser to access the database? a. [email protected] c. http://syngress.com/DB/db.mdb b. syngress.com d. \\syngress.com\DB\db.mdb 36. A client computer that makes a DNS query to a DNS server for name resolution of a remote host is referred to as what? a. A recursive query c. An iterative query b. A DNS resolver d. A DNS forwarder 36

Windows Server 2003 NetWork SubJect

37. Which of the following is NOT default hidden share under Windows Server 2003? e. ADMIN$ g. C$ f. PRINTER$ h. IPC$ 38. You have installed a Windows Server 2003 DNS server, but people are unable to resolve names.

You need to test the DNS server. Where should you start in your troubleshooting efforts? a. From the command prompt of a Windows XP Professional host, run the nslookup utility to check the functionality of the DNS service. b. From the Windows Server 2003 DNS server, type ping -R and the address of the DNS server. Examine the results to see if the server is working. c. From the command prompt of a Windows XP Professional host, run the ipconfig utility to check the functionality of the DNS service. d. From the Windows Server 2003 DNS server, type ping -a and the address of the DNS server. Examine the results to see if the server is working. 39. You install a new FireWire adapter card and the server immediately stops responding. You need

the server up on the network as soon as possible. How do you fix this problem? a. You need to use Last Known Configuration. b. You need to restore the System State.

Good

c. You need to use Safe Mode. d. You need to the ASR utility.

40. The network consists of 6 Windows Server 2003 servers running all network services. You have 200 desktop computers running Windows XP Professional on the LAN, and you have just purchased 30 laptops that need to be able to dial in to the network at night. You configure and install RRAS on one of the Windows Server 2003 servers. This server is a member of the production Active Directory domain operating at the Windows Server 2003 domain functional level. The new laptop users are unable to connect remotely. Which of the following is the most likely problem? a. You did not enable MS-CHAP as the default authentication protocol. b. The Windows Server 2003 running RRAS has conflicting remote access policies, and the first one that is applied to the remote users prevents them from accessing the data. c. You did not modify the default dial-in policy, which restricts access unless it is modified. d. Windows Server 2003 RRAS does not support dial-in from a Windows XP system. 41. Which statement is NOT correct? a. An organizational unit can be a member of a group. b. A group can be located within an organizational unit. c. A group can be a member of other groups. d. An organizational unit can be located within another organizational unit. 42. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level Domain? e. west.bigcorp.net g. wks042 f. .net h. bigcorp.net 36

Windows Server 2003 NetWork SubJect 43. The development team of your company

has started a new research project. They want to ensure that only the members of their project team are allowed to see the new directories that they create. You created a new OU that contains the user accounts of the development team, the computers they will be using, a shared folder where they are going to place their research documents, and several printers that are to be isolated from the rest of the company. They are concerned about who will have access to the new directories. How will you protect the directories from unauthorized access? a. Do nothing. Since the directories and files are part of an OU, no one outside the OU can access them. b. Create a security group that contains the members of the research group. Remove the Everyone group from the ACL. Add the new group to the ACL and grant it the appropriate permissions. c. Create a GPO that will limit access to the directories. Apply the GPO to the domain. d. Create a GPO that will limit access to the directories. Apply the GPO to the new OU. 44. Your Active Directory domain has two

OUs. The Corp OU is a parent OU to the Technical OU. You have implemented a GPO linked to the Corp OU. You do not want those settings affecting the users in the Technical OU. How can you accomplish this with minimal effort?

a. On the GPO linked to the Corp OU, select Block Policy inheritance. b. On the GPO linked to the Technical OU, negate any options set in the Corp OU by choosing Disabled for those options. c. On the GPO linked to the Technical OU, select Block Policy inheritance. d. On the GPO linked to the Technical OU, select No Override. 45. Which of the following statements are NOT true regarding access permissions? a. NTFS permissions are available for files stored on NTFS-formatted partitions b. Share permissions are available for shared folders on FAT32-formatted partitions c. NTFS permissions are available for files stored on FAT32-formatted partitions d. Share permissions are available for shared folders on NTFS-formatted partitions 46. A user attempts to access a resource,

and entries in the ACL are analyzed to match the SID. The system examines the entire ACL, but no match is found. Which of the following will occur? a. The account will be disabled b. Each ACE in the ACL will be read until a match is eventually found c. The user will be denied access d. The user will be granted access

47. In the IP address assignment 10.54.113.0/24, what does the number 24 represent? a. The number of bits in the host identifier b. The number of bits in the combined network and subnet identifiers c. The number of bits in the combined subnet and host identifiers 36

Windows Server 2003 NetWork SubJect d. The number of bits in the subnet identifier 48. You have been asked to simplify the process of configuring TCP/IP on all the client computers.

The network consists of 40 computers running Windows 2000 Professional and 60 computers running Windows XP Professional. Installing and configuring what service of Windows Server 2003 will help you accomplish your task? e. DHCP g. WINS f. BOOTP h. DNS

49. You use Network Monitor to capture network traffic, but when you go to view the capture, you realize there is more information available than you need or want to see. What can you do to make it easier to find the information you're looking for? a. Create a capture filter. b. Create a display filter. c. Enable OSPF on the network adapter. d. Start Network Monitor from the command line using the netmon command. 50. When both share permissions and NTFS permissions exist on the same shared folder, how is access control to the shared folder affected for users trying to access the files stored in the shared folder over the network? a. The most liberal permissions take precedence. b. NTFS permissions take precedence. c. Share permissions take precedence.

d. The most restrictive permissions take precedence. 51. A user had trouble remembering his

password and tried several things. Now, he says his account is telling him he is locked out. You need to restore his ability to log on as quickly as possible with the least amount of administrative effort. How should you accomplish this? a. You should use the Active Directory Users and Computers MMC snap-in to unlock the user's account. b. You should use the Active Directory Users and Computers MMC snap-in to change the user's password. c. You should use the Active Directory Users and Computers MMC snap-in to copy the user's account and create a new unlocked copy. d. You should use the command-line utility Dsmod to change the user's password.

52. You install Active Directory and creates an AD-integrated DNS server for your domain. You are concerned about DNS fault tolerance. What can you do to provide fault tolerance for your AD domain? a. Install a primary DNS server b. Install a secondary DNS Server c. Install a caching-only DNS server 36

Windows Server 2003 NetWork SubJect d. Install another AD-integrated DNS server 53. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the

old scope. Which of the following is an appropriate next step? a. Restart the DHCP Server service b. Run the Ipconfig /release command and then the Ipconfig /renew command on every client computer. c. Delete the old scope d. Authorize the DHCP server 54. You recently have been having unexplained problems with the Print Spooler service on two of

your Windows Server 2003 printer servers. You can find nothing wrong with the Print Spooler service itself, and you have restarted it numerous times, with no effect. What else might you consider examining to determine the cause of the problems for the Print Spooler service? a. The services that are dependent on the Print Spooler service b. The services on which the Print Spooler service is dependent c. The currently installed drivers for the printers attached to the printer server d. The cables being used to connect the printers to the printer server 55. You have just installed the DHCP service through the Windows Component Wizard. You now

need to configure DHCP to support a scope that will be used for streaming multimedia delivery. In the MMC, you right-click the server icon under DHCP. What option should you select to configure the scope? a. New IP Scope c. New Multicast Scope b. New Scope d. New Superscope 56. You’ve configured a DHCP server to use the following range of IP addresses when assigning addresses to clients: 131.107.0.0/19 through 131.107.224.0/19. You set the subnet mask for this range of addresses to 255.255.240.0. Users are complaining that they cannot connect to the network. What is the most likely cause of this problem? a. The subnet mask is wrong. It should be 255.255.224.0. b. The subnet mask is wrong. It should be 255.224.0.0. c. The range of addresses is illegal.The first address cannot be 131.107.0.0/19. d. The range of addresses is illegal. It should end at 131.107.192.0/19. 57. You are a network administrator. Multiple users have reported that they can access some local

resources but not all, and they have no access to resources on the Internet. You try to diagnose the problem and find that the preferred DNS server used by the clients having the problem can only resolve names for zones stored on the server. The TCP/IP settings on the DNS server are configured correctly. What is the likely cause of the problem? a. The DNS server is not getting zone transfers. b. The DNS server's resolver cache is corrupted. c. The DNS server doesn't have any forwarders configured. d. The DNS server has incorrect or corrupt root hints. 36

Windows Server 2003 NetWork SubJect 58. Which of the following is the major disadvantage of using RIP as the network routing protocol? a. High cost of software c. Count-to-infinity problem b. A maximum of only 12 hops d. Low overhead on the network 59. You have a single DNS server resolving names for your internal domain, and you have an Internet connection. You need to configure DNS on the client computers to resolve Internet addresses. How will you make this configuration? a. Install a new DNS server to resolve Internet domain names. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN connection to resolve to the DNS server. b. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN connection to resolve to the DNS server. c. On each client computer, install the Microsoft DNS client. Configure the client computer to resolve to the DNS server. Configure the root hints on the server to point at the Internet root servers. d. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN connection to resolve to the DNS server. Configure the root hints on the server to point at the Internet root servers. 60. You are responsible for maintaining the company's Windows Server 2003 DHCP server. While

doing your daily system checks, you notice that the number of DHCPDISCOVER packets spiked at 9:00 this morning. What could cause the Discovers/Sec counter to spike at 9:00 a.m.? a. The DHCP service being restarted b. A network problem c. A large number of computers entering the network at approximately the same time d. A rogue DHCP server issuing duplicate addresses 61. You have three office locations, each with its own Windows Server 2003 servers. Each office has

a local LAN that is very stable, and the company has no plans to add locations for the next three years. There are plans to network the three locations by using the existing Windows Server 2003 servers and ISDN lines. You have been asked to design a solution that will have the lowest impact on the servers, with no requirements for redundancy or failover. What routing method should you select? a. OSPF c. RIP b. Static routes d. Autostatic updates 62. You are running in a purely Windows Server 2003 environment, and you need to make sure workstations are registered properly in DNS for Active Directory integration. How should you configure DNS integration? a. Configure the DHCP server to be sure to send dynamic updates. b. Install the Windows Server 2003 DNS client on the workstations. c. Configure the DNS server to accept dynamic updates d. Configure the appropriate zones to accept dynamic updates 36

Windows Server 2003 NetWork SubJect 63. Which is NOT folder share permission? a. Full control b. Execute

c. Change d. Read

64. You are attempting to troubleshoot and correct a network connectivity problem that was

reported by users between a server and several workstations. What communication troubleshooting tool should you start with to determine where the problem lies? a. ipconfig c. nslookup b. ping d. telnet 65. You are in the process of configuring a counter log to create a baseline log for a new Windows Server 2003 computer that you are placing on the production network. You have configured the counter log to start and stop automatically each day. You now need to configure it so that the resulting log files will be easily identified by the date and time that they were created. Which log numbering style should you use to accomplish this? e. yyyymmddhh g. mmddhhmm f. yyyymm h. nnnnnn d. Make sure all your domain client 66. You are running a purely Windows computers are running Windows 2000 Server 2003 network using Active or higher. Directory and the Windows Server 2003 DHCP service. A user in another 67. (DHCP) You want to configure multiple department has installed a DHCP server standard scopes so that they can be on a Unix server. easily activated or deactivated. What How do you prevent your client computers should you do? from receiving DHCP addresses from that a. Create a multicast scope and add the server? standard scopes to it. a. Reconfigure BOOTP on the router. b. Configure server options instead of b. Disable the unauthorized server in scope options. Active Directory. c. Create a superscope and add the c. Go to each client computer and enter standard scopes to it. the address of the production DHCP d. Delete all the scopes except one. server in the Internet Protocol (TCP/IP) Properties dialog box. 68. You have just completed an analysis of a computer by using the Security Configuration and Analysis snap-in. When you examine the results, you notice several items that have red X icons next to them. What does this type of icon indicate? a. The item is defined in the analysis database but not on the computer. b. The item is defined in the analysis database and on the computer, and it matches the currently configured setting. c. The item is defined in the analysis database and on the computer, but it does not match the currently configured setting. 36

Windows Server 2003 NetWork SubJect d. The item is not defined in the analysis database and was not examined on the computer 69. You are responsible for maintaining the company's Windows Server 2003 DHCP server. The

company recently added a new router and routed a segment to the network. Now that segment must be added to the DHCP server. The address of the router port is 10.10.25.1, and the router is subnetted with a Class C subnet mask. You need to provide 40 addresses, starting at 10.10.25.20. What needs to occur for you to get DHCP working on that segment? a. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP forwarder for the new segment's router, using the address of the DHCP server. You need to activate the scope. b. You need to install and configure an additional DHCP server on that segment to provide DHCP services. c. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through 10.10.25.59. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP forwarder for the new segment's router, using the address of the DHCP server. You need to activate the scope. d. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through 10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP forwarder for the new segment's router, using the address of the DHCP server. You do not need to activate the scope because that happens automatically when the scope is created. 70. To configure file access auditing for all files in the CorpDocs folder on the file server. In which section of the Group Policy Editor will you find the auditing options? a. Account Policies c. File System b. Restricted Groups d. Local Policies 71. DNS servers can be configured to perform name resolution using several types of queries. With which type of query does the server return results only from its records or from its cache? a. Iterative query c. Recursive query b. Forward query d. Reverse query b. You could use Event Viewer. 72. You would like to be able to verify some c. You could type nslookup at a command entries on one of your Windows Server prompt. 2003 DNS servers. How could you verify d. You could type ipconfig at a command the entries in the DNS zone? prompt. a. You could use the Properties dialog box of the DNS server in the MMC. 73. (DNS) What is the next step a forwarder takes when it is unable to resolve a query? a. The forwarder returns an error to the originating DNS server. b. The forwarder performs a broadcast to determine the root name server to contact c. The forwarder returns an error directly to the client. d. The forwarder uses the root hints Cache.dns file to determine the root name server to contact. 74. Which resource record is used to resolve domain names specified in e-mail addresses to the IP address of the mail server associated with the domain? a. PTR b. A 36

Windows Server 2003 NetWork SubJect c. CNAME

75. Which of the following are NOT true regarding names assigned to users, groups, and computers in workgroups under Windows Server 2003? a. Group names must be unique, but only on a per-machine basis.

d. MX b. User names must be unique, but only on a per-machine basis c. Each computer must have a unique name. d. User names must be unique throughout the workgroup

76. Your task is to segment the Class B IP address 145.65.0.0 into 20 different subnets. You must allow for the number of networks to increase. The maximum number of hosts per subnet will never surpass 950 hosts. What subnet mask would enable you to segment the network and allow for the required growth? a. 255.255.240.0 c. 255.255.0.0 b. 255.255.252.0 d. 255.255.255.252

77. Your company has 75 users running Windows XP Professional that need to be able to access the company's network remotely. You would like to be able to provide redundant remote access servers by using Windows Server 2003 running RRAS to allow users to dial in to the network, but you want to maintain only one set of remote access profiles. How can you accomplish this? a. Install ISA Server and use it as the central repository for the profiles.

b. Install both servers in Active Directory, and on the Profiles tab of each server's Properties dialog box, select the Store Profiles in Active Directory option. Make sure both servers are in the same domain. c. Install IAS and use it as the central repository for the profiles. d. Install both servers in Active Directory, and on the Profiles tab of each server's Properties dialog box, select the Store Profiles in Active Directory option. Configure each server to point at the same domain in the Profile Location field.

78. The network consists of 1,500 Windows Server 2003 servers spread over 150 OUs that have

approximately 10 servers each. You have just finished creating a customized security template that specifies the Account Policies and Audit Policy settings that are required by your organization's corporate policy for specific departments. What is the best way for you to apply this template to only the Sales, Marketing, Production, and Engineering OUs? a. Script the secedit.exe command to apply the security template to the required computers. b. Import the security template into each required OU by using a GPO. c. Import the security template at the domain level into a GPO. d. Manually apply the security template to each of the computers. 36

Windows Server 2003 NetWork SubJect 79. You're writing a logon script that will be used to automatically link a remote file share as the

home directory for the current logon account. Which option would be best used to create a link for the home file share? a. Utilize the net start command to create the home file share link b. Utilize the net share command to create the home file share link c. Utilize the net use command to create the home file share link d. Utilize the net send command to create the home file share link 80. Your network includes two Domain Controllers and three member servers that provide file,

print, andbackup/restoration services. You want to implement a more secure configuration on all five Windows Server 2003 servers. You have decided to use the secure templates, but is not sure what the current configuration is on each server. What is the best way for you to get these servers configured with the secure templates? a. You should apply the Default security template from one of her member servers to all five servers and then apply the securews.inf and securedc.inf templates to them. b. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securedc.inf template to the DCs and the securews.inf template to the member servers. c. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securews.inf template to the DCs and the securedc.inf template to the member servers. d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After doing this, you should apply the securews.inf and securedc.inf templates to the servers. 81. In what role should a DNS server be configured if it should maintain a cache of resolve queries but not have zone files? a. Forwarding-only c. Primary b. Secondary d. Stub 82. You are trying to determine what settings (in addition to an IP address with your DHCP server)

can be assigned to client computers running Windows XP Professional. What settings can be assigned? a. The IP address of the file server b. The IP address of the Active Directory domain controller c. The IP address of the DHCP server d. The IP address of the DNS server 83. You've been tasked with using the Dsmod command-line utility for administration. Which of the

following object types you can NOT modify using Dsmod? a. GPO c. User accounts b. Groups d. Computer accounts 84. After installing and configuring DNS on

a Windows Server 2003 server, you set up an Active Directory-integrated zone.

Where does the server store the zone information? a. In the server's cache 36

Windows Server 2003 NetWork SubJect b. In the %systemroot%\system32\DNS directory c. In the %systemroot%\DNS directory d. In Active Directory

c. The BOOTP forwarder service is not enabled on the DHCP server. d. The BOOTP forwarder service is not enabled on the routers.

85. The corporation is running a routed

86. Replacing the hubs and routers on an internetwork with switches creates a network that has which of the following? a. One collision domain and multiple broadcast domains b. One broadcast domain and multiple collision domains c. One broadcast domain and one collision domain d. Several collision domains and several broadcast domains

network with a centrally located Windows Server 2003 DHCP server. The server is able to issue addresses to users on the local segment but cannot issue addresses to any of the sites that are across a router. What is the most probable cause of this problem? a. The DHCP forwarder service is not enabled on the DHCP server. b. The DHCP forwarder service is not enabled on the routers.

87. The company has 200 end users running Windows XP Professional that need to be able to access the company's network remotely. Several months ago you installed a Windows Server 2003 server running RRAS to allow users to dial in to the server for remote access. This server is in the corporate Active Directory tree, and after you configured it, the profiles worked perfectly. Last weekend you added another Windows Server 2003 server with RRAS loaded to provide a failover access device in the event of a server crash. Both servers are in the same native-mode Active Directory domain, and test users are unable to log in to the new RAS server. What is the most likely problem? a. The Windows Server 2003 RRAS service needs to be authorized in Active Directory. b. You need to add the new Windows Server 2003 server to the Global Remote Access Servers group in Active Directory. c. You can have only a single Windows Server 2003 server running RRAS in an Active Directory domain. d. The remote access profiles are not shared and need to be re-created on the new Windows Server 2003 server before anyone can access the server. 88. The network consists of 3 Windows Server 2003 servers and 50 workstations running Windows

XP Professional. In order to improve Internet DNS resolution, you have installed DNS on one of the Windows Server 2003 servers and configured it as a caching-only DNS server. Where does the new DNS server store its zone files? a. The zone files are stored in Active Directory. b. The zone files are stored in the server's %systemroot%\system32\etc\DNS directory. c. Caching-only servers do not have any zone information. d. The zone files are stored in the server's RAM. 89. You must decide the security settings that will be applied to the MyGuestLogon account (for

guest only). Which of the following settings is most appropriate to the solution presented? 36

Windows Server 2003 NetWork SubJect a. User cannot change password b. Account is disabled

c. User must change password at next logon d. Password never expires

90. Which of the following statements about a network’s infrastructure is true? a. A network infrastructure includes both hardware and software products. b. A network infrastructure is a design that does not include specific hardware or software products. c. A network infrastructure includes software products only. d. A network infrastructure includes hardware products only. 91. You have not modified the default settings for DNS on the DHCP client or server. Which of the following client record or records will be updated in DNS by the DHCP server? (Assume that the clients are running Windows XP.) a. Neither the PTR nor the A resource record c. Both the PTR and A resource records b. The PTR resource record d. The A resource record 92. Which of the following statements are NOT true regarding Remote Desktop connections to a Terminal Services host server running Microsoft Windows Server 2003? a. Application processing occurs on the host system b. Application processing occurs on the client system c. Input is directed to the host system d. Keyboard and mouse input are directed from the client system to the host. 93. The company has a T-1 connection to a local ISP, which is shared by all clients. Clients access

the Internet using NAT. Several users have reported that they can't access the Internet. You start diagnosing the problem and find that all users reporting the problem are on the same subnet. Users on other subnets are not experiencing any problems accessing the Internet. Which of the following could be the cause of the problem? a. The NAT router is malfunctioning b. The users' DNS Server is down c. The users' DHCP server is down. d. The users' default gateway for the subnet is malfunctioning 94. Your company has 14 locations and is using OSPF as part of its WAN implementation. You are

training a new WAN engineer to support the WAN. She asks you for the correct name of the area with an ID of 0.0.0.0. What do you call this area? a. The AS c. The LSDB b. The default route d. The OSPF backbone b. Because the DHCP client must inform 95. Why must a DHCP client use broadcast all the other clients on the network of transmissions to request an IP address its intention to request an IP address from a DHCP server? c. Because the DHCP server can service a. Because the DHCP client does not yet requests only from computers on the have an IP address same LAN

36

Windows Server 2003 NetWork SubJect d. Because the DHCP server can only receive broadcasts

96. You are attempting to perform an analysis of a computer by using the Security Configuration and Analysis snap-in. You know you need to complete the following steps: 1. Select the security template to be used in the analysis. 2. Right-click Security Configuration and Analysis and select Analyze Computer Now. 3. Select the log file to be used in the analysis. 4. Right-click Security Configuration and Analysis and select Open Database. 5. Right-click Security Configuration and Analysis and select Configure Computer Now. 6. Select the database to be used in the analysis. What is the order in which you should perform these steps? a. 4, 1, 6, 2, 5, 3 c. 2, 6, 1, 3, 4, 5 b. 2, 1, 3, 4, 6, 5 d. 4, 6, 1, 3, 2, 5 97. You want to enable the user account for Will Carver.You decide to use the dsmod.exe tool. Which of the following commands will enable the Will Carver account? a. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled no b. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled yes c. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled no d. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled yes 98. One of your Windows Server 2003 printer servers has been responding oddly lately. The Print

Spooler service often seems to get stuck, requiring you to restart either the service or the server. Performing the server restart is a time-consuming task because the server is located across town in another building that your company owns. What's the most efficient way to have this troublesome server restart after the second failure of the Print Spooler service? a. Configure the service to restart itself after its second failure. b. Write a batch script that monitors this service and have it force a server restart after the service has failed twice. c. Configure the service to restart the server after its second failure. d. Write a batch script that monitors the service and emails you after the service has failed the first time so that you can travel to the server and prepare to restart it. e. 99. You are trying to explain each part of an FQDN. What is the host portion of sarah.training.urwrite.net? a. net c. training b. sarah d. urwrite use to communicate with each other on 100.You are trying to explain how two the same IP subnet? computers on the same subnet a. The packets will be sent to the MAC communicate with each other. Which of address of the destination computer. the following statements should you use b. The packets will be sent to the IP to explain the process that two computers address of the destination computer. 36

Windows Server 2003 NetWork SubJect c. The packets will be sent to the IP address of the default gateway for routing to the destination computer's MAC address. d. The packets will be sent to the MAC address of the default gateway for routing to the destination computer's IP address. 101.Your network consists of 15 Windows

Server 2003 computers, 5 of which are domain controllers. The remaining 10 servers are file and print servers for your 750 Windows XP Professional workstation clients. The previous administrator had carefully assigned every computer a static IP address, equally split up among five Class C subnets. Now some users have started moving their computers from one location in the building to another; this trend will be the norm for your company. After moving, the users complain to you that they can no longer access network resources. What is the most likely cause of this problem, and what should you do about it? The senior systems administrator has DHCP servers available for you to use, should you decide to use them? a. The statically configured IP addresses are no longer valid on the subnet to which the computers have been moved. You should reconfigure the computers with the correct static IP addresses. b. The port to which the computers are connecting on the switch may be failing. You should replace the switches where computers cannot connect to network resources. c. There are not enough client access licenses (CALs) for the Windows Server 2003 computers. You should purchase the required number of CALs. d. The statically configured IP addresses are no longer valid on the subnet to

which the computers have been moved. You should reconfigure the computers so that they are DHCP clients. 102.You are trying to troubleshoot one of

your DNS servers. It seems that your computers running Windows XP Professional have not registered dynamically with your DNS server. You would like to force these computers to register with DNS. What should you do? a. At the command prompt, type ipconfig /renew. b. At the command prompt, type ipconfig /registerdns. c. Get the user to reboot the system. d. At the command prompt, type ipconfig /release. 103.You decide that you want to enforce account lockout to occur after three unsuccessful logon attempts across the company. How would you achieve this? a. Set the Block Policy Inheritance on the group policy. b. Set group policy in a domain GPO to lock out accounts after three unsuccessful logon attempts c. Remove the local policies from each PC. d. Set the local policy on each PC to lock out accounts after three attempts, and set No Override on the local policy. 104.What is one of the major disadvantages of distance-vector routing? a. It involves high overhead on the network. b. It suffers from the count-to-infinity problem. c. It has problems with slow convergence. d. A network that uses it can connect to a maximum of only 15 hops.

36

Windows Server 2003 NetWork SubJect

105.The company network consists of 3 Windows Server 2003 servers and 100 Windows XP Professional workstations. The Sales Department spends a lot of time doing Web research at a variety of supplier, customer, and competitor Web sites. You have been asked to provide a solution to speed up name resolution for these users. You configure a cache-only server. Which of the following will have the largest impact on the response time for DNS requests? a. The processor speed c. The speed and type of the hard drive b. The amount of RAM installed d. The speed of the network adapter card 106.When a client can successfully ping a DNS server, but fails to receive any response to a name resolution query from that server, which of the following might be the cause of the problem? a. The server’s cache is polluted b. The server has an incorrect IP address c. The DNS Server service is not started d. The server is not the authority for the requested name 107.Which of the following command-line tools can you use to delete a user from Active Directory? e. dsrm g. dsquery f. dsadd h. dsmove 108.You are designing a new network and plan to use Class C IP addresses. You want to be able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID. Which of the following subnet masks should you use for the network? a. 255.255.255.192 c. 255.255.255.128 b. 255.255.255.240 d. 255.255.255.224 security settings as necessary, and then 109.What is the proper way to create and apply the database to the computer. then apply a custom security template c. Use the Security Templates snap-in to to a computer? create a custom template, configure the a. Create a database in the SECEDIT security settings as necessary, and then utility, modify the security settings as apply the settings using Security necessary in Security Configuration And Analysis. Configuration And Analysis, and then d. Create a database in Security apply the template to the computer Configuration And Analysis, modify the using the Security Templates snap-in. security settings as necessary, and then b. Create a database in Security apply the settings using the SECEDIT Configuration And Analysis, modify the utility. 110.Which of the following is the FQDN for the host home in the sales domain for the UR write company if the company's domain is urwrite.net? a. home.sales.net c. home b. home.urwrite.net d. home.sales.urwrite.net 36

Windows Server 2003 NetWork SubJect

111.A customer has asked you to install the DHCP service on her Windows Server 2003 computer,

get one scope configured, and issue addresses. What minimum steps do you need to take in order to accomplish this? a. Install the DHCP service from the Windows Components Wizard. After the service is installed, authorize it in Active Directory. Next, create the scope. Finally, configure the DNS integration. b. Install the DHCP service from the Windows Components Wizard. After the service is installed, create the scope. Create a superscope and add the scope to it. Authorize the server in Active Directory. c. Install the DHCP service from the Windows Components Wizard. After the service is installed, create the scope. Authorize the server in Active Directory. d. Install the DHCP service from the Windows Components Wizard. After the service is installed, create the scope and then configure the DNS integration. 112.You're creating a saved query within the Active Directory Users and Computers MMC snap-

in. Which of the following query types are NOT directly available for query selection by default? a. Users, contacts, and groups c. Exchange recipients b. Printers d. Computers 113.What is the correct subnet mask to use on a Class B network with a 10-bit subnet identifier? a. 255.255.255.192 c. 255.192.0.0 b. 255.255.192.0 d. 255.192.255.255 114.Which of the following is used to uninstall Active Directory and demote a domain controller? a. Gpotool c. Dcpromo b. Gpresult d. Ntdsutil 115.You have just set up a Windows Server 2003 Active Directory network, and you want to use group policies to control user configuration. You have configured local policies on some of the machines in your domain, and you also want to configure some site and OU policies for more granular control, but you are concerned about policies at different levels “canceling each other out.” Which of the following types of GPOs will override settings applied at the domain level? a. Site c. Domain b. OU d. Local 116.You configure and install RRAS on one of your Windows Server 2003 servers. Your Windows Server 2003 network is running at the Windows Server 2003 domain functional level. Because this is the first time you have configured RRAS, you first modify the default policy. Then, as part of your testing, you configure 12 additional remote access policies. After this, the users complain that they cannot successfully access any information on the network. What is the most likely source of the problem? a. You need to enable IPSec to ensure that the connections are encrypted. 36

Windows Server 2003 NetWork SubJect b. You did not modify the default dial-in policy. c. You have some conflicting policies, and the first one that the users apply refuses them access to the information on the network. d. You did not enable MS-CHAP. 117.The network consists of 16 training rooms with 30 PCs each, running a mix of Windows 2000

Professional and Windows XP Professional, as well as 16 Windows Server 2003 servers, which provide all network services. You are working on a remote access problem, and you want to check the network to see if the policies have been deleted. Where should you look for these policies? a. Remote access policies are stored in the computer properties in Active Directory. b. Remote access policies are stored in the user properties in Active Directory. c. Remote access policies are stored individually on every RRAS server. d. Remote access policies are stored on the global catalog server in Active Directory. 118.You have created several GPOs that are linked at various levels within your Active Directory structure. You are preparing to run the Resultant Set of Policies (RSoP) tool to examine the net result of the various GPOs that have been applied on the Accounting OU. In what order are Group Policy Objects applied in Active Directory? a. Domain, OU, local, site c. Local, site, domain, OU b. OU, local, site, domain d. Site, domain, OU, local 119.You need to create a new GPO to enable settings for a particular OU. You open Active Directory Users and Computers and select the OU in the tree. What is the next step in the process of creating a GPO for this OU? a. From the Actions menu, select Create New GPO. 120.You have a 50-host network and are running a Windows Server 2003 DHCP server to assign IP addresses. You also have five IP-based printers with static IP addresses. Your assistant administrator has been working on the DHCP server and has made some changes. Now, your users cannot print to one of the printers. What is most likely the problem? a. The scope from which the printers were receiving their IP addresses has been deleted. b. The existing scope has been modified so that it overlaps the addresses reserved for the printers.

b. From the Actions menu, select Group Policy Object Editor. c. Right-click on the OU and select Properties. d. Right-click on the OU and select Create New GPO. c. The DHCP service was inadvertently stopped. d. The existing scope has been modified so that it overlaps the addresses reserved for the printers, and a workstation has been assigned the same address as one of the printers. 121.An application using NetBIOS needs a

NetBIOS name resolved. To resolve the NetBIOS name, local cache is checked first. The needed resolution is not already cached, so the LMHOSTS file is checked next. The desired entry is not in the LMHOSTS file. Based on this, what

36

Windows Server 2003 NetWork SubJect is the next step taken in resolving the NetBIOS name? a. The DNS server issues a recursive query b. The DNS server is queried using an NS type record c. NetBIOS over TCP resolves the name to an IP address d. The WINS server is queried 122.How the client computer requests and receives an address from the DHCP server? a. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and sends a request to use that address back to the DHCP server. The client computer uses the address to communicate on the network. b. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and

sends a request to use that address back to the DHCP server. The DHCP server acknowledges the request and grants the client computer a lease to use the address. The client computer responds with an acknowledgement of the lease and uses the address to connect to the network. c. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and sends a request to use that address back to the DHCP server. The DHCP server acknowledges the request and grants the client computer a lease to use the address. The client computer uses the address to connect to the network. d. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and uses it to communicate on the network.

123.You install and create a primary DNS for a subnet. You are concerned about DNS fault tolerance for the Primary DNS zone. What can you do to provide load balancing and fault tolerance for the primary DNS server? a. Install an AD-integrated DNS server c. Install a secondary DNS server b. Install a second NIC card d. Install DHCP 124.You need to manage several servers remotely. What is the best tool for you to use? a. The runas command c. AD Users and Computers b. The Remote Desktop connection utility d. MMC snap-in tools 125.Which of the following servers does not require a computer with a registered IP address? a. Internet Web servers c. Internet e-mail servers b. DNS servers used for Internet name resolution d. DNS servers used for Internet domain hosting 126.Your network consists of 20 Windows NT 4.0 servers and 30 Windows Server 2003 servers. Some of the NT 4.0 servers are configured as routers. You have just started to configure some of the Windows Server 2003 servers as routers, but you are having some problems. The new routers cannot communicate with the old routers. You confirm that all the routers are configured to use RIP. What could be the problem? a. You need to install and configure OSPF. 36

Windows Server 2003 NetWork SubJect b. RIP does not propagate more than 15 hops. c. You have to change the RIPv2 incoming packet protocol to use only RIPv1. d. You have to change the RIPv2 outgoing packet protocol to use broadcast instead of multicast. 127.What would be the decimal value of 11001100.10101110.00011101.11101010? a. 198.174.29.234 c. 204.174.29.240 b. 204.174.29.234 d. 204.176.29.234 128.A Windows Server 2003 has startup problems. A message displays stating that at least one service has failed during startup. How do you determine which service failed? a. You need to use Event Viewer to investigate system events. b. You need to use Device Manager. c. You need to use Event Viewer to investigate application events. d. You need to use the System Information utility. 129.The network consists of 75 locations interconnected with Windows Server 2003 servers running RRAS. Business has been very good, and you have recently added a number of segments to the network in several of the offices. You have noticed lately that you are receiving an increased number of "host unreachable" error messages. You believe that your routing tables are inaccurate. What should you enable in the Windows Server 2003 Routing and Remote Access console to prevent routing loops and count-to-infinity problems? a. Poison reverse c. Split horizon b. Topological database d. Distance-vector routing 130.You currently have a supernetted network and would like to simplify the management of DHCP. What component should you configure in DHCP? a. BOOTP scope c. Superscope b. Scope d. Multicast scope b. Configure a caching-only server and have 131.You are responsible for maintaining the all the DNS client computers resolve from Windows Server 2003 network for the that server. company, including the Windows Server c. Create a delegated zone for the remote 2003 DNS servers. You have one remote office and have all the DNS client office that is located across a slow WAN computers in that office resolve from that link. What is the best way to set up DNS to zone. resolve internal hostnames? d. Use a centralized DNS server and a. Configure the DNS client computers to configure it for incremental updates. autodiscover the closest DNS server. 132.While troubleshooting a Windows XP Professional computer, you discover that it has an IP address of 169.254.176.132, a subnet mask of 255.255.0.0, and no configured default gateway. What is the most likely reason this computer has gotten these IP settings? a. The TCP/IP stack on the computer is corrupt. b. The DHCP server scope has become corrupt. c. The user of the computer has configured new settings without fully understanding how routed IP networks function. 36

Windows Server 2003 NetWork SubJect d. The computer has been unable to contact a DHCP server. 133.You are responsible for 75 Windows XP Professional workstations and 5 Windows Server 2003

member server computers. You have been directed to perform a security analysis on each computer, comparing its settings to those contained in the hisecws.inf template. How can you accomplish the assigned task with the least amount of administrative effort and the smallest number of trips to remote computers? a. You can create a script that runs Security Configuration and Analysis on each computer and collect the results in a central location for later viewing. b. You can analyze remote computers from the Security Configuration and Analysis snap-in by targeting it at the desired computer. c. You can create a script that runs the secedit /analyze command on each computer and collect the results in a central location for later viewing. d. The only way to perform this analysis is to physically visit each computer and use the Security You are installing Configuration and Analysis snap-in.

134.In what situation would you design your network as a workgroup instead of a domain? a. When you have several hundred clients spread out over multiple geographic regions. b. When the network has multiple servers. c. When you need to use Active Directory. d. When the network is small and has no servers. 135.You have two office locations, each with its own Windows Server 2003 server. The two

locations have been networked with a T-1 connection that runs between the Windows Server 2003 servers, which are running RRAS. You just added a new network in the main location, and you need to add a static route on the far end to provide connectivity to the location; you are not using any dynamic routing protocols. The network address, which you are using as a Class C address, is 10.10.10.0. The correct gateway address is 10.10.10.254. What command do you need to use to add a static route? a. route /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2 b. route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2 c. netstat add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2 d. ipconfig /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2 136.Identify the underlying network ID for this IP address: 199.214.36.132/25. a. 199.214.36.128/25 c. 199.214.36.0/24 b. 199.214.36.0/25 d. 199.214.36.128/24 137.You're in the process of evaluating which users should be members of the Power Users group, but first want to make sure that they require the rights that accompany that group assignment. Which of the following rights are NOT granted to the local Power Users group by default? a. Reset local account passwords c. Take ownership of local files b. Create local file shares d. Log on locally 36

Windows Server 2003 NetWork SubJect

138.A user with the username of JaneD works in the Sales department. Her account is located in the syngress.com domain. Based on this information, what canonical name would be used to identify this object in Active Directory? a. /syngress.com/Sales/JaneD b. OU=Sales c. /CN=JaneD /OU=Sales /DC=syngress /DC=com d. CN=JaneD 139.Your computer is configured to use DHCP. When you log on, you notices you can't connect to the network. The computer has no IP address according to ipconfig. Which of the following is most likely true? a. No DHCP server is on the network b. The computer is using dynamic IP addressing c. The network cable to the computer is disconnected d. The computer is using Automatic Private IP Addressing. 140.You are configuring a new Windows Server 2003 server to be a file server for your home office intranet that will be used only by local users. Which of the following will NOT need to have to suitably configure the IP address with a statically assigned address? a. A valid subnet mask c. A valid IP address for the server b. A valid WINS server IP address d. A valid default gateway

141.You are designing a network for a large branch office and have been assigned the network address 10.10.0.0/18. What are the maximum number of subnets and the maximum number of hosts on each subnet? a. 512 subnets; 32,766 hosts c. 1024 subnets; 16,382 hosts b. 256 subnets; 65,534 hosts d. 128 subnets; 131,070 hosts

142.Although you can use the Configure Your Server Wizard to configure a server as domain

controller, which program or utility do you use to promote or demote a domain controller? a. Active Directory Users And Computers c. NETSH DIAG b. NTDSUTIL.EXE d. DCPROMO.EXE

143.Which of the following are NOT true regarding IP addresses used with NAT? a. NAT uses public IP addresses when client computers need to access the Internet.

b. A pool of IP addresses is required. c. Public IP addresses are assigned by your ISP. d. IP address reservations can be defined.

36

Windows Server 2003 NetWork SubJect 144.You maintain a Windows Server 2003

DHCP server to dynamically assign addresses. You have three superscopes set up, and within each superscope are four scopes. One day, you start experiencing problems with one of the scopes issuing bad addresses. You check the server and suspect that there is a database problem. How can you verify that the database is intact? a. Open the DHCP console. Select the superscope that contains the scope in question and then select Action, Reconcile All Scopes.

b. Open the DHCP console. Select the DHCP server that contains the scope in question and then select Action, Reconcile All Scopes. c. Open the DHCP console. Select the DHCP server that contains the scope in question and then select Action, Reconcile DHCP Database. d. Open the DHCP console. Select the scope in question and select Action, Reconcile Scope.

145.Your network includes two Domain Controllers and three member servers that provide file, print, and backup/restoration services. You want to implement a more secure configuration on all five Windows Server 2003 servers. You have decided to use the secure templates, but is not sure what the current configuration is on each server. What is the best way for you to get these servers configured with the secure templates? a. You should apply the Default security template from one of her member servers to all five servers and then apply the securews.inf and securedc.inf templates to them. b. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securedc.inf template to the DCs and the securews.inf template to the member servers. c. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securews.inf template to the DCs and the securedc.inf template to the member servers. d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After doing this, you should apply the securews.inf and securedc.inf templates to the servers. 146.You manage the Windows Server 2003 DHCP servers for a Corporation. You are running in a

purely Windows Server 2003 environment with all Windows XP Professional clients, and you need to make sure that workstations are registered properly in DNS for Active Directory integration. How should you configure DNS integration? a. Set DNS integration to enable updates for DNS clients that do not support dynamic updates. b. Set DNS integration to enable DNS keepalives. c. Set DNS integration to automatically update DHCP client information in DNS d. Set DNS integration to discard A and PTR records when a lease is deleted. 147.Which of the following performance counters you could NOT use to determine a possible problem with memory or a memory leak? a. Processor\%Processor Time c. Memory\Available Kbytes b. Memory\Nonpaged Kbytes d. Process(process_name)\Pool Paged Bytes

36

Windows Server 2003 NetWork SubJect 148.You are installing a new domain controller. You want the domain controller to be in a separate

domain that is not part of an existing forest. What type of domain should you install? a. A parent domain b. A forest root domain c. A domain in a new domain tree in the existing forest d. A child domain 149.You 3.0 mbsigning a new network and plan to use Class C IP addresses. You want to be able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID. Which of the following subnet masks should you use for the network? a. 255.255.255.192 c. 255.255.255.224 b. 255.255.255.128 d. 255.255.255.240 150.Your network consists of a central site with 60 local users, 120 remote sales representatives who travel 90 percent of the time, and 16 Windows Server 2003 servers providing core network services, including remote access using RRAS. Your sales representatives need the ability to dial in to access resources on the network while traveling. The problem you are having is that the sales organization is split into eight geographic regions covering eight time zones, and the sales representatives from each region are only allowed to make remote connections during specific hours. Each region has a Windows security group that contains all of the sales representatives in that region. What do you need to do to ensure that the sales representatives can connect the remote access server, but only during the allowed times for their regions? a. Create local security policies with the Group Policy Editor. b. Configure multiple RRAS servers with different local policies and get the different groups to dial in to their respective servers. c. Give all remote users the same policy. d. Create different remote access policies for the different users. 151.You received a call from a user who said that he could not access any network resources. Upon investigation, you have determined that the workstation has an IP address of 169.254.170.145. What is the most likely reason for the user's inability to connect to any network resources? a. The TCP/IP stack on the computer is corrupt and needs to be reset. b. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address. c. The computer is not a member of the domain and is being refused an IP address. d. The network cable has been damaged and is no longer passing a signal. 152.You have installed a new file server on the network and formatted it to use NTFS. After formatting is complete, you use EFS to encrypt a folder containing files belonging to users. If a user accesses a file belonging to him in this folder, and then copies it across the network for another user to access, which of the following will occur? a. The file on the hard disk will remain encrypted, but data sent over the network will be unencrypted. b. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network. c. The file on the hard disk and the data sent over the network will remain encrypted. d. The file on the hard disk and the data sent over the network will be decrypted and remain that way. 153. YoDL: 0.0 kb UL: 0.0 kbhoot a user's account. Which of the following statements are true regarding user account membership?

36

Windows Server 2003 NetWork SubJect a. b. c. d.

A user account can be a member of multiple organizational units at the same time. A user account can be a member of only a single organizational unit. A user account can be a member of only a single domain. A user account can be a member of only a single group

154.You're responsible for review of shared resources on several servers within a corporate domain. To accomplish this task, you've decided to use an automated script that will run several times per day to determine what shared resources are being used. Which of the following options would be most useful in meeting this requirement? a. Utilize the net session command to review the shared resources b. Utilize the net file command to review the shared resources c. Utilize the net accounts command to review the shared resources d. Utilize the net config command to review the shared resources 155.A Windows XP Professional client computer will receive a DHCPACK broadcast message from the DHCP server after which of the following events? a. When the client computer sends a request to use a lease it was offered b. When a DHCP server offers it a lease c. When the client computer first requests an IP address d. Successfully receiving or renewing an IP address from the DHCP server 156.You have just installed DNS on the network, and configured a primary server and a secondary server. What must you do to specify the authoritative name servers for the zone? a. Create the NS records for the primary and secondary name server. b. Create the NS record for the secondary name server. c. Create the NS record for the primary name server. d. Nothing, all necessary NS records are created automatically. 157.You maintain a Windows Server 2003 DHCP server to dynamically assign addresses. You have threesuperscopes set up, and within each superscope are four scopes. One day, you start experiencing problems with one of the scopes issuing bad addresses. You check the server and suspect that there is a database problem. How can you verify that the database is intact? a. Open the DHCP console. Select the superscope that contains the scope in question and then select Action, Reconcile All Scopes. b. Open the DHCP console. Select the DHCP server that contains the scope in question and then select Action, Reconcile DHCP Database. c. Open the DHCP console. Select the scope in question and select Action, Reconcile Scope. d. Open the DHCP console. Select the DHCP server that contains the scope in question and then select Action, Reconcile All Scopes. 158.Your Windows XP computer has several shared folders. You are conducting a security audit and wish to view the permissions on each of the shared folders. How can you quickly view all shared folders on your computer? What should you do? a. Use Windows Explorer to search for shared folders. b. Use disk management to view the shared folders on each drive. c. Use System information in Computer Management to view shared folders. d. Use Shared Folders in Computer Management to view shared folders. 159.The network con 3.0 mbf 1,500 Windows Server 2003 servers spread over 150 OUs that have approximately 10 servers each. You have just finished creating a customized security template that specifies the Account Policies and Audit Policy settings that are required by your organization's

36

Windows Server 2003 NetWork SubJect corporate policy for specific departments. What is the best way for you to apply this template to only the Sales, Marketing, Production, and Engineering OUs? a. Import the security template into each required OU by using a GPO. b. Manually apply the security template to each of the computers. c. Script the secedit.exe command to apply the security template to the required computers. d. Import the security template at the domain level into a GPO. 160.Your network contains 240 computers running Windows 2000 Professional and 225 computers running Windows XP Professional and uses Class C IP addresses. All the computers are located on the same network segment. You has been asked to automate the process of assigning IP addresses. What do you need to do? a. You need to install DHCP and configure a scope b. You need to install DHCP and configure a superscope c. You need to install DHCP and configure DNS integration d. You need to install DHCP and configure BOOTP 161.You have been hired as a network consultant to install DNS in the new corporate headquarters of Zanzibar Sports. The network currently consists of 3,000 computers running Windows XP Professional and 4,000 computers running Windows 2000 Professional. The servers providing DNS for the network are presently located in the largest branch location, but you want to move them into the new corporate data center. You also want to ensure that all remote offices and manufacturing sites can perform DNS resolution queries without adding additional traffic on your WAN links. What should you do to ensure that the remote offices and manufacturing sites do not add additional traffic to your WAN links? a. Configure the DNS servers at the corporate data center with standard secondary zones. b. Create a stub zone at the corporate data center. c. Configure the DNS servers at the corporate data center as Active Directory integrated. d. Configure standard secondary zone DNS servers at all remote offices and manufacturing sites. 162.You are trying to explain DNS and reverse lookup zones to your co-workers. What should you tell your co-workers that reverse lookup zone allows users to resolve? a. A hostname to an FQDN c. A hostname to an IP address b. An IP address to a hostname d. An IP address to a MAC address d. The file on the hard disk and the data sent over 163.You have installed a new file server on the the network will remain encrypted. network and formatted it to use NTFS. After formatting is complete, you use EFS to encrypt a folder containing files belonging to users. If a 164.You just installed and configured a DHCP server. user accesses a file belonging to him in this After the installation, the wizard asked you to folder, and then copies it across the network activate the scope, and you did. Staff from your for another user to access, company are complaining, however, that they are which of the following will occur? not obtaining IP addresses. What could be the a. The file on the hard disk will remain problem? encrypted, but data sent over the network will a. You did not authorize the server. be unencrypted. b. You did not activate the server. b. The file on the hard disk and the data sent over c. You were not authorized to activate the scope; the network will be decrypted and remain that only administrators can activate the scope. way. d. Your scope is misconfigured. c. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network.

36

Windows Server 2003 NetWork SubJect 165.You are experiencing a delay when you connect to a remote Web site. Which tool allows you to determine whether particular routers are responsible for the delay? a. Tracert c. PathPing b. Network Diagnostics d. Netdiag 166.Your corporate network uses variable length subnetting to make more efficient use of IP addresses. One of the IP addresses for a host is 131.39.161.17 with a subnet mask of 255.255.248.0.What is the proper notation for the network to which this host is connected? a. 131.39.161.17/21 c. 131.36.161.0/20 b. 131.36.160.0/20 d. 131.39.160.0/21 On each computer, at the command 167.You have been assigned the task of identifying prompt, type ipconfig /renewdns. and correcting a problem with one of the On each computer, at the command Windows Server 2003DNS servers. Computers prompt, type ipconfig /renew. running Windows 2000 Professional have not On each computer, at the command registered dynamically with the DNS server. prompt, type ipconfig /registerdns. You would like to force these computers to Reboot the system so that the computer is register with DNS as quickly as possible. What issued a new DHCP address. should you do?

168.You need to create several new file shares on your server. Which of the following options can NOT be used for this purpose in a default installation of Windows Server 2003? a. Utilize the net share command-line utility b. Create the file shares within the Windows Explorer c. Create the file shares within the Internet Explorer d. Utilize the Computer Management MMC snap-in 169.Which of the following best describes the function of a subnet mask? A subnet mask enables an IP address to be visible from the Internet. A subnet mask specifies the sizes of the network and host identifiers in an IP address. A subnet mask indicates whether an IP address is registered or unregistered. A subnet mask is a value assigned by the IANA to uniquely identify a specific network on the Internet.

36

Related Documents