Exam Prep Questions

Question 1

John has just captured a large amount of network traffic using Network Monitor. He wants to limit the captured information to display only traffic containing the SMB protocol. What should he do?

  • A. Configure a trigger.

  • B. Configure a capture filter.

  • C. Configure a display filter.

  • D. Configure a packet filter.

A1:

Answer C is correct. By configuring a display filter within Network Monitor, you can filter captured data to display only specific types of information. Answer A is incorrect because triggers enable actions to be performed based on a set of conditions that must first be met. Answer B is incorrect because capture filters are configured to specify the type of information that is captured. Answer D is incorrect because packet filters are configured to specify the type of inbound and outbound traffic a computer can accept.

Question 2

Mary is the network administrator. She wants to give Joe the capability to view real-time data as it is captured using System Monitor. Joe should be capable of performing this task from the server or from his workstation. What should Mary do?

  • A. Add his user account to the Performance Log Users group .

  • B. Add his user account to the Administrators group.

  • C. Add his user account to the Performance Monitor Users group.

  • D. Add his user account to the Domain Admins group.

A2:

Answer C is correct. By adding a user account to the Performance Monitor Users group, Joe will be capable of viewing performance counter data within System Monitor locally or from across the network. Answer A is incorrect because adding Joe to the Performance Log Users group will give him permission to manage logs and alerts as well. Answers B and D are incorrect because they would give Joe administrative permissions to the server.

Question 3

Bob has been running Network Monitor to analyze specific types of network traffic. He wants to configure Network Monitor to gather only information pertaining to specific protocols and traffic types. What should he do?

  • A. Configure a display filter.

  • B. Configure a capture filter.

  • C. Configure a packet filter.

  • D. Configure an alert.

A3:

Answer B is correct. Configuring a capture filter instructs Network Monitor to capture only data that meets the criteria you specify. Answer A is incorrect because display filters are used to filter data that has already been captured. Answer C is incorrect because packet filters are configured to control inbound and outbound traffic. Answer D is incorrect because alerts are used to notify an administrator when certain events occur.

Question 4

Susan is putting together a performance report for her managers. She wants to gather statistics about the total amount of TCP/IP traffic on the local computer. Which of the following counters should she monitor?

  • A. Packet Outbound Errors

  • B. TCP Segments/Sec

  • C. IP Datagrams/Sec

  • D. Logons /Sec

A4:

Answer C is correct. By monitoring IP Datagrams/Sec, you can monitor the total number of IP datagrams sent and received by the computer per second. Answer A is incorrect because this is the number of outbound packets that could not be transmitted because of errors. Answer B is incorrect because this counter monitors only the number of TCP segments sent per second. Answer D is incorrect because this counter monitors the number of logon requests received per second by the computer.

Question 5

You are having trouble connecting to your ISP using a dialup connection. Which command should you use to verify the TCP/IP configuration on the local computer?

  • A. IPCONFIG

  • B. PING

  • C. TRACERT

  • D. PATHPING

A5:

Answer A is correct. The IPCONFIG command can be used to verify the TCP/IP configuration of a computer. Answer B is incorrect because the PING command is used to verify connectivity with a remote host. Answer C is incorrect because TRACERT is used to trace the route a packet takes to reach a remote host. Answer D is incorrect because PATHPING is a combination of PING and TRACERT used to determine which routers and gateways between two hosts might not be functioning.

Question 6

A computer running Windows Server 2003 connects to the Internet through a dialup connection. You are having problems establishing a connection and want to verify that the modem is working. Which of the following utilities can you use to verify the status of the modem?

  • A. System Monitor

  • B. Network Monitor

  • C. PING

  • D. Device Manager

A6:

Answer D is correct. Device Manager can be used to verify that a hardware device is functioning properly. Answer A is incorrect because System Monitor is to used monitor the performance. Answer B is incorrect because Network Monitor is used to capture and analyze network traffic. Answer C is incorrect because PING is a command-line utility used to verify network connectivity.

Question 7

Mary is gathering network-performance statistics on a Windows Server 2003 domain controller. She wants to determine the number of logons the domain controller has received since the last time it was restarted. Which counter should she monitor?

  • A. Total Logons Received

  • B. Logon Total

  • C. Logons Received/Sec

  • D. Logons/Sec

A7:

Answer B is correct. The Logon Total counter determines the number of logon requests that the domain controller has received since the last time it was restarted. Answers A and C are incorrect because there are no such counters within System Monitor. Answer D is incorrect because this counter determines the number of logon requests received per second.

Question 8

Clients on the network cannot obtain an IP address from the DHCP server on the network. You soon discover that the DHCP service on the server has failed to start. You reboot the server, and the service still does not start. What should you do?

  • A. Continue to reboot the server until the service starts.

  • B. Verify that any services DHCP is dependent on are started using the Services console.

  • C. Use the DHCP console to start the service.

  • D. Reinstall the DHCP service.

A8:

Answer B is correct. If the service will not start, use the Services console to verify that any services that DHCP is dependent upon are also started. Therefore, answer A is incorrect. Answer C is incorrect because if the service fails to start, attempting to start it within the DHCP console will make no difference. Answer D is incorrect because this should be a last resort in terms of troubleshooting.

Question 9

Bill is configuring the service recovery options for the server service on a Windows Server 2003 domain controller. If a service fails to start, which of the following actions can be performed? (Choose all correct answers.)

  • A. The computer can attempt to restart the service.

  • B. The computer can be rebooted.

  • C. The services that it is dependent upon can be restarted.

  • D. An email message can be sent to the network administrator.

A9:

Answers A and B are correct. If a service fails to start, you can configure the computer to automatically attempt to restart the service, or you can have the computer automatically reboot. The third option is to have a specific program run. Answers C and D are incorrect because recovery actions do not include the capability to automatically restart the failed service's dependencies or to send an email to the network administrator.

Question 10

A new network service is added to the existing infrastructure. You want to determine how much more traffic has been generated since its installation. Which of the following tools can be used to capture and analyze network traffic?

  • A. Task Manager

  • B. Network Diagnostics

  • C. Network Monitor

  • D. Event Viewer

A10:

Answer C is correct. Network Monitor can be used to capture and analyze network traffic. Answer A is incorrect because Task Manager is used to view the programs and process running on a computer, as well as the performance statistics. Answer B is incorrect because Network Diagnostics is used to gather information about the hardware, software, and services running on a local computer. Answer D is incorrect because Event Viewer is used to view the contents of the various event logs.




Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam 70-291)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736187
EAN: 2147483647
Year: 2002
Pages: 118
Authors: Diana Huggins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net