Section 2. Exam Questions


2. Exam Questions

1.

You are part of the team of systems administrators for Sunshine Networks. Your task is to segment the Class C IP address into three subnets. You have been assigned the IP address 210.115.64.0. You must allow for the number of networks to increase. The maximum number of hosts per subnet will never surpass 14 hosts. What subnet mask would allow you to segment the network and allow for the required growth?

A.

255.255.255.224

B.

255.255.255.240

C.

255.255.255.248

D.

255.255.255.0


2.

You are the network administrator for JMS Technologies. You have a network with 100 computers running Windows XP Professional and 3 computers running Windows Server 2003. One of the servers is a DC, one is providing DHCP services, and the third is providing DNS services. When a Windows XP Professional client computer obtains an IP address from the DHCP server, what registers the computer's hostname with the DNS server?

A.

The client computer

B.

The DHCP server

C.

The WINS server

D.

Active Directory


3.

You are the systems administrator for a branch office of Little Faith Enterprises, a multinational pharmaceutical company. The office network consists of 3 Windows Server 2003 servers and 50 workstations running Windows XP Professional. In order to improve Internet DNS resolution, you have installed DNS on one of the Windows Server 2003 servers and configured it as a caching-only DNS server. Where does the new DNS server store its zone files?

A.

The zone files are stored in the server's %systemroot%\system32\etc\DNS directory.

B.

The zone files are stored in the server's RAM.

C.

The zone files are stored in Active Directory.

D.

Caching-only servers do not have any zone information.


4.

You are the administrator of a large Windows Server 2003 Active Directory network. The network consists of 1,500 Windows Server 2003 servers spread over 150 OUs that have approximately 10 servers each. You have just finished creating a customized security template that specifies the Account Policies and Audit Policy settings that are required by your organization's corporate policy for specific departments. What is the best way for you to apply this template to only the Sales, Marketing, Production, and Engineering OUs?

A.

Import the security template at the domain level into a GPO.

B.

Import the security template into each required OU by using a GPO.

C.

Script the secedit.exe command to apply the security template to the required computers.

D.

Manually apply the security template to each of the computers.


5.

You are the systems administrator for Sunshine Networks, a home-office network equipment manufacturer. The network consists of 75 locations interconnected with Windows Server 2003 servers running RRAS. Business has been very good, and you have recently added a number of segments to the network in several of the offices. You have noticed lately that you are receiving an increased number of "host unreachable" error messages. You believe that your routing tables are inaccurate. What should you enable in the Windows Server 2003 Routing and Remote Access console to prevent routing loops and count-to-infinity problems?

A.

Distance-vector routing

B.

Split horizon

C.

Poison reverse

D.

Topological database


6.

You are a systems administrator for the RollUp YoYo company. The network consists of 6 Windows Server 2003 servers running all network services. You have 200 desktop computers running Windows XP Professional on the LAN, and you have just purchased 30 laptops that need to be able to dial in to the network at night. You configure and install RRAS on one of the Windows Server 2003 servers. This server is a member of the production Active Directory domain operating at the Windows Server 2003 domain functional level. The new laptop users are unable to connect remotely. Which of the following is the most likely problem?

A.

Windows Server 2003 RRAS does not support dial-in from a Windows XP system.

B.

The Windows Server 2003 running RRAS has conflicting remote access policies, and the first one that is applied to the remote users prevents them from accessing the data.

C.

You did not enable MS-CHAP as the default authentication protocol.

D.

You did not modify the default dial-in policy, which restricts access unless it is modified.


7.

You are in the process of configuring a counter log to create a baseline log for a new Windows Server 2003 computer that you are placing on the production network. You have configured the counter log to start and stop automatically each day. You now need to configure it so that the resulting log files will be easily identified by the date and time that they were created. Which log numbering style should you use to accomplish this?

  1. nnnnnn

  2. yyyymmddhh

  3. yyyymm

  4. mmddhhmm

8.

As the administrator for a small legal firm, you are in the process of converting some IP addresses from decimal to binary. What would be the binary value of 209.168.241.158?

  1. 11010001.10101000.11110001.10011110

  2. 11001001.10101000.11110001.10011110

  3. 11010001.10101000.11101001.10011110

  4. 11010001.10101010.11110001.10011110

9.

You are the systems administrator for Long Beach Networks. Your network contains 240 computers running Windows 2000 Professional and 225 computers running Windows XP Professional and uses Class C IP addresses. All the computers are located on the same network segment. Lynne, your supervisor, has asked you to automate the process of assigning IP addresses. What do you need to do?

  1. You need to install DHCP and configure DNS integration.

  2. You need to install DHCP and configure a scope.

  3. You need to install DHCP and configure a superscope.

  4. You need to install DHCP and configure BOOTP.

10.

You are the systems administrator for Mount Abora Consulting, a small computer training company. The IT Department has decided to install a Windows Server 2003 server as a primary DNS server to replace the one that is currently supplied by an ISP. The network currently consists of 300 Windows 2000 Professional computers. You need to ensure that your users will be able to resolve both hostnames and IP addresses. What type of zones do you need to configure? (Choose two.)

  1. A forward lookup zone

  2. A stub zone

  3. A reverse lookup zone

  4. A delegated zone

11.

You are the systems administrator of the Gidget's Widgets, LLC, corporate network. You have instructed Andrea, your assistant administrator, to configure file access auditing for all files in the CorpDocs folder on the file server. In which section of the Group Policy Editor will Andrea find the auditing options?

  1. Account Policies

  2. Local Policies

  3. Restricted Groups

  4. File System

12.

You are the WAN administrator for IVS Technologies. The company network consists of 10 branch offices, in a hub-and-spoke architecture. There are no redundant connections. You have decided to use RIP as the network routing protocol, but your manager has questions. He understands the benefits of RIP, although he wants to understand the drawbacks as well before he approves your funding. Which of the following is the major disadvantage of using RIP as the network routing protocol?

  1. High cost of software

  2. Low overhead on the network

  3. Count-to-infinity problem

  4. A maximum of only 12 hops

13.

You are the lead technician for Good Deal Enterprises, a Microsoft-certified training center. You are in the process of training Mary, a new administrator, to take over your administrative duties on the corporate network. The network consists of 16 training rooms with 30 PCs each, running a mix of Windows 2000 Professional and Windows XP Professional, as well as 16 Windows Server 2003 servers, which provide all network services. You are working with Mary on a remote access problem, and she wants to check the network to see if the policies have been deleted. Where should you tell her to look for these policies?

  1. Remote access policies are stored in the user properties in Active Directory.

  2. Remote access policies are stored in the computer properties in Active Directory.

  3. Remote access policies are stored on the global catalog server in Active Directory.

  4. Remote access policies are stored individually on every RRAS server.

14.

One of your Windows Server 2003 printer servers has been responding oddly lately. The Print Spooler service often seems to get stuck, requiring you to restart either the service or the server. Performing the server restart is a time-consuming task because the server is located across town in another building that your company owns. What's the most efficient way to have this troublesome server restart after the second failure of the Print Spooler service?

  1. Write a batch script that monitors this service and have it force a server restart after the service has failed twice.

  2. Write a batch script that monitors the service and emails you after the service has failed the first time so that you can travel to the server and prepare to restart it.

  3. Configure the service to restart the server after its second failure.

  4. Configure the service to restart itself after its second failure.

15.

As the administrator for a big construction company, you are in the process of converting some IP addresses from binary to decimal. What would be the decimal value of 11001100.10101110.00011101.11101010?

  1. 204.176.29.234

  2. 198.174.29.234

  3. 204.174.29.234

  4. 204.174.29.240

16.

You are the systems administrator for JMS Technologies, and you are trying to determine what settings (in addition to an IP address with your DHCP server) can be assigned to client computers running Windows XP Professional. What settings can be assigned? (Choose two.)

  1. The IP address of the DNS server

  2. The IP address of the DHCP server

  3. The IP address of the file server

  4. The IP address of the default gateway

  5. The IP address of the Active Directory domain controller

17.

You are the senior instructor for the Brighter Bulbs corporate training center, and you are teaching an introduction to Microsoft networking class to 30 students. This week you are working on DNS concepts. As part of the DNS module, you are trying to explain each part of an FQDN. What is the host portion of sarah.training.urwrite.net?

  1. sarah

  2. training

  3. urwrite

  4. net

18.

You are the systems administrator for Good Faith Enterprises, LLC. You want to increase the security of the company's client workstations, which are all Windows 2000 Professional computers, without causing any adverse effect on network communications between computers. You have already completed this configuration action on all your DCs and member servers. Which security template should you use to accomplish your goal?

  1. securews.inf

  2. securedc.inf

  3. compatws.inf

  4. hisecws.inf

19.

You are the systems administrator for Sunshine Networks. You have a network of 17 sites, running Windows Server 2003 servers and RRAS to provide routing, and you're using OSPF as the dynamic routing protocol. You recently installed a Layer 3 switch in the core of your headquarters network, and the help desk has been receiving calls about "host unreachable" error messages. After you make sure the hosts are up, you decide to look at a network capture to determine what the problem could be. You start Network Monitor to capture network traffic, but when you go to view the capture, you realize there is more information available than you need or want to see. What can you do to make it easier to find the information you're looking for?

  1. Create a capture filter.

  2. Create a display filter.

  3. Enable OSPF on the network adapter.

  4. Start Network Monitor from the command line using the netmon command.

20.

You are the systems administrator for LFE Technologies, a leading LCD panel manufacturer. You are in the process of configuring your first Windows Server 2003 RRAS server, for use in conjunction with a VPN connection. You need to install and configure the protocols that use PPP to provide the original envelope for the data. Which protocols should you install and configure? (Choose two.)

  1. PPTP

  2. L2TP

  3. EAP

  4. SPAP

21.

You recently have been having unexplained problems with the Print Spooler service on two of your Windows Server 2003 printer servers. You can find nothing wrong with the Print Spooler service itself, and you have restarted it numerous times, with no effect. What else might you consider examining to determine the cause of the problems for the Print Spooler service? (Choose two.)

  1. The currently installed drivers for the printers attached to the printer server

  2. The services that are dependent on the Print Spooler service

  3. The services on which the Print Spooler service is dependent

  4. The account with which the Print Spooler service is logging on to the network

  5. The cables being used to connect the printers to the printer server

22.

You are part of the team of systems administrators for Sunshine Networks. Your task is to segment the Class B IP address 145.65.0.0 into 20 different subnets. You must allow for the number of networks to increase. The maximum number of hosts per subnet will never surpass 950 hosts. What subnet mask would enable you to segment the network and allow for the required growth?

  1. 255.255.255.252

  2. 255.255.0.0

  3. 255.255.240.0

  4. 255.255.252.0

23.

A Windows XP Professional client computer will receive a DHCPACK broadcast message from the DHCP server after which of the following events?

  1. When the client computer first requests an IP address

  2. Successfully receiving or renewing a TCP/IP address from the DHCP server

  3. When a DHCP server offers it a lease

  4. When the client computer sends a request to use a lease it was offered

24.

You are the systems administrator for MAC Technologies, a venture capital firm. Your network consists of 70 Windows XP Professional workstations and 2 Windows Server 2003 servers. One server is acting as the local DNS server, providing name resolution services to users. This morning the users are complaining that they cannot connect to www.quepublishing.com. They are able to access it by directly going to the IP address, so this appears to be a DNS-related problem. You go to your DNS server to determine what the problem could be. What is the order the DNS server should use to resolve a forward lookup request?

  1. Root server, cache server

  2. Cache server, zone server

  3. Zone server, cache server

  4. Cache server, root server

25.

You are an assistant systems administrator for the Nimbus Flying Broom corporation. You are responsible for 75 Windows XP Professional workstations and 5 Windows Server 2003 member server computers. You have been directed to perform a security analysis on each computer, comparing its settings to those contained in the hisecws.inf template. How can you accomplish the assigned task with the least amount of administrative effort and the smallest number of trips to remote computers?

  1. The only way to perform this analysis is to physically visit each computer and use the Security Configuration and Analysis snap-in.

  2. You can create a script that runs Security Configuration and Analysis on each computer and collect the results in a central location for later viewing.

  3. You can create a script that runs the secedit /analyze command on each computer and collect the results in a central location for later viewing.

  4. You can analyze remote computers from the Security Configuration and Analysis snap-in by targeting it at the desired computer.

26.

You are the WAN administrator for CMS Technologies. Your network consists of 20 Windows NT 4.0 servers and 30 Windows Server 2003 servers. Some of the NT 4.0 servers are configured as routers. You have just started to configure some of the Windows Server 2003 servers as routers, but you are having some problems. The new routers cannot communicate with the old routers. You confirm that all the routers are configured to use RIP. What could be the problem?

  1. You have to change the RIPv2 outgoing packet protocol to use broadcast instead of multicast.

  2. You need to install and configure OSPF.

  3. RIP does not propagate more than 15 hops.

  4. You have to change the RIPv2 incoming packet protocol to use only RIPv1.

27.

You are the security administrator for Smith, Underwood, and Evens, Unlimited, a mid-sized legal firm. The company has about 50 attorneys on staff, and the majority of them work remotely, connecting to the headquarters office through broadband Internet connections and a VPN. The firm has just been hired to defend a high-profile technology company, and you are very concerned about case-related information being compromised and leaked to the press. You are already connecting by using a 3DES VPN connection through a Windows Server 2003 server running RRAS, but you are concerned about password integrity because of some problems you have had in the past with attorneys using weak passwords. You have decided to outfit each attorney with a smart card reader and a smart card to use for authenticating to the network. You have the card reader drivers working, but you need to configure the remote access server to recognize the smart cards. Which protocol is needed to add smart card support for the solution?

  1. PPTP

  2. L2TP

  3. IPSec

  4. EAP

  5. MS-CHAPv2

28.

You are troubleshooting user complaints of slow Internet access to a partner Web site. You have been told by the partner that they are experiencing high latency on several links leading to their network. What tool can you use to determine exactly which routers and links are dropping packets and what the ping time is for each link?

  1. ping

  2. nslookup

  3. pathping

  4. Network Diagnostics

  5. TRacert

29.

Chris is the network administrator for Sprectronomical Productions, Inc. This morning she received a call from a user who said that he could not access any network resources. Upon investigation, Chris has determined that the workstation has an IP address of 169.254.170.145. What is the most likely reason for the user's inability to connect to any network resources?

  1. The network cable has been damaged and is no longer passing a signal.

  2. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.

  3. The computer is not a member of the domain and is being refused an IP address.

  4. The TCP/IP stack on the computer is corrupt and needs to be reset.

30.

You are the systems administrator for Balzac Petroleum. You currently have a supernetted network and would like to simplify the management of DHCP. What component should you configure in DHCP?

  1. Scope

  2. Superscope

  3. Multicast scope

  4. BOOTP scope

31.

You are the systems administrator for Balzac Petroleum, a leading oil refiner. Your network consists of a mix of Windows 2000 Professional and Windows XP Professional clients, with seven Windows Server 2003 servers. Two of the Windows Server 2003 servers act as the DNS servers for the company. You need to create a second DNS entry for the intranet Web server, so that users can access it using an easy-to-remember name. What type of record do you need to add if you want to create an alias in DNS for the server?

  1. An A record

  2. An MX record

  3. A CNAME record

  4. A PTR record

32.

Austin is the systems administrator for the Eternal Light Group, LLC. He is attempting to perform an analysis of a computer by using the Security Configuration and Analysis snap-in. Austin knows he needs to complete the following steps:

Select the security template to be used in the analysis.

Right-click Security Configuration and Analysis and select Analyze Computer Now.

Select the log file to be used in the analysis.

Right-click Security Configuration and Analysis and select Open Database.

Right-click Security Configuration and Analysis and select Configure Computer Now.

Select the database to be used in the analysis.

What is the order in which Austin should perform these steps?

  1. 2, 1, 3, 4, 6, 5

  2. 4, 1, 6, 2, 5, 3

  3. 4, 6, 1, 3, 2, 5

  4. 2, 6, 1, 3, 4, 5

33.

You are the WAN administrator for JMS Technologies, and you are trying to decide what routing technology you should be using for the company. You finally decide to go with distance-vector routing. You are aware that one of the major problems with distance-vector routing is count to infinity. What are some avoidance mechanisms that could be implemented to prevent any problems? (Choose three.)

  1. Split horizon

  2. Split horizon with poison reverse

  3. Triggered update

  4. Link-state routing

  5. Dynamic DNS

  6. Strong user passwords

34.

You are the systems administrator for FuelMeUp Petroleum, a medium-sized oil refiner. Your network consists of a central site with 60 local users, 120 remote sales representatives who travel 90 percent of the time, and 16 Windows Server 2003 servers providing core network services, including remote access using RRAS. Your sales representatives need the ability to dial in to access resources on the network while traveling. The problem you are having is that the sales organization is split into eight geographic regions covering eight time zones, and the sales representatives from each region are only allowed to make remote connections during specific hours. Each region has a Windows security group that contains all of the sales representatives in that region. What do you need to do to ensure that the sales representatives can connect the remote access server, but only during the allowed times for their regions?

  1. Create different remote access policies for the different users.

  2. Configure multiple RRAS servers with different local policies and get the different groups to dial in to their respective servers.

  3. Create local security policies with the Group Policy Editor.

  4. Give all remote users the same policy.

35.

You have recently configured and implemented a networkwide IPSec solution for your company's internal corporate network. You are using multiple IPSec polices, each of which is tailored to the specific needs of the different groups within the network. While monitoring the IPSec statistics, you notice a high level of negotiation failures. What are the most likely causes of this problem? (Choose two.)

  1. IPSec is not enabled on the computers.

  2. There is no matching security method configured between the computers.

  3. The Domain Controllers are not responding.

  4. There is no matching authentication method configured between the computers.

36.

You are the second-shift systems administrator for Rick's Rockets, Inc. You are attempting to troubleshoot and correct a network connectivity problem that was reported by users on the first shift between a server and several workstations. What communication troubleshooting tool should you start with to determine where the problem lies?

  1. ipconfig

  2. nslookup

  3. ping

  4. telnet

37.

You are the network administrator for Balzac Petroleum. You just installed and configured a DHCP server. After the installation, the wizard asked you to activate the scope, and you did. Staff from your company are complaining, however, that they are not obtaining IP addresses. What could be the problem?

  1. You did not activate the server.

  2. You were not authorized to activate the scope; only administrators can activate the scope.

  3. You did not authorize the server.

  4. Your scope is misconfigured.

38.

You are the senior instructor at U-Learn Fast, Inc., a corporate training center. As you are reviewing DNS parameters, someone asks how long a node in an FQDN can be. What is the answer?

  1. 43 characters

  2. 63 characters

  3. 255 characters

  4. 512 characters

39.

You have just completed an analysis of a computer by using the Security Configuration and Analysis snap-in. When you examine the results, you notice several items that have red X icons next to them. What does this type of icon indicate?

  1. The item is not defined in the analysis database and was not examined on the computer.

  2. The item is defined in the analysis database and on the computer, and it matches the currently configured setting.

  3. The item is defined in the analysis database but not on the computer.

  4. The item is defined in the analysis database and on the computer, but it does not match the currently configured setting.

40.

You are the LAN administrator for Gonzo Candy, a lollipop manufacturer. You have three office locations, each with its own Windows Server 2003 servers. Each office has a local LAN that is very stable, and the company has no plans to add locations for the next three years. There are plans to network the three locations by using the existing Windows Server 2003 servers and ISDN lines. You have been asked to design a solution that will have the lowest impact on the servers, with no requirements for redundancy or failover. What routing method should you select?

  1. Static routes

  2. RIP

  3. OSPF

  4. Autostatic updates

41.

You are the systems administrator for a small nursing home, and you have 200 computers running Windows XP Professional. Of those, 30 are laptops that need to be able to dial in to the network at night. You configure and install RRAS on one of your Windows Server 2003 servers. Your Windows Server 2003 network is running at the Windows Server 2003 domain functional level. Because this is the first time you have configured RRAS, you first modify the default policy. Then, as part of your testing, you configure 12 additional remote access policies. After this, the users complain that they cannot successfully access any information on the network. What is the most likely source of the problem?

  1. You need to enable IPSec to ensure that the connections are encrypted.

  2. You have some conflicting policies, and the first one that the users apply refuses them access to the information on the network.

  3. You did not enable MS-CHAP.

  4. You did not modify the default dial-in policy.

42.

While monitoring the IPSec statistics for your network, you notice a large number of soft associations. What is the most likely reason for this occurrence?

  1. The packets have data that could not be verified, meaning that the integrity hash verification failed.

  2. SAs are being formed with computers that do not support IPSec or were not able to negotiate successful IPSec connections.

  3. The IPSec policies are using unmatched shared keys between the communicating computers.

  4. The operating systems do not match between the two computers attempting communications.

43.

You are in the process of configuring three new Windows Server 2003 servers that will be placed on an Active Directory network as file servers. The network is large and contains six different IP subnets with clients and servers spread out over all six subnets. The three new servers you are configuring will be communicating with clients and servers from all six subnets. Which of the following items will you need to configure on the Internet Protocol (TCP/IP) Properties dialog box to ensure that these three new member servers can communicate with all the computers on the network? (Choose all correct answers.)

  1. IP address

  2. Subnet mask

  3. Default gateway

  4. DNS server IP address

  5. DNS suffix

  6. WINS server IP address

44.

You are the administrator of a very large multinational organization. You are getting some error messages from the DHCP server. What counter in the Performance Console would display the number of DHCPOFFER messages sent per second by the DHCP server to a client computer?

  1. Offers/Sec

  2. Discovers/Sec

  3. Acks/Sec

  4. DHCPAcks/Sec

45.

You have been hired as a network consultant to install DNS in the new corporate headquarters of Zanzibar Sports, a large sporting goods manufacturing company. The network currently consists of 3,000 computers running Windows XP Professional and 4,000 computers running Windows 2000 Professional. The servers providing DNS for the network are presently located in the largest branch location, but you want to move them into the new corporate data center. You also want to ensure that all remote offices and manufacturing sites can perform DNS resolution queries without adding additional traffic on your WAN links. What should you do to ensure that the remote offices and manufacturing sites do not add additional traffic to your WAN links?

  1. Configure the DNS servers at the corporate data center as Active Directory integrated.

  2. Configure standard secondary zone DNS servers at all remote offices and manufacturing sites.

  3. Configure the DNS servers at the corporate data center with standard secondary zones.

  4. Create a stub zone at the corporate data center.

46.

Christopher is preparing to use the secedit.exe command to analyze the security on one of his member servers. If Christopher is using the Secure Workstation security template as his comparison point and needs to ensure that the analysis database is clear before importing the security template, which of the following choices represents the correct command that Christopher should enter to perform the analysis?

  1. secedit /analyze /overwrite /db c:\sectst\sectst1.sdb /cfg C:\WINDOWS\security\templates\securedc.inf /log c:\sectst\sectst1.log

  2. secedit /configure /db c:\sectst\sectst1.sdb /cfg C:\WINDOWS\security\templates\securedc.inf /log c:\sectst\sectst1.log

  3. secedit /analyze /db c:\sectst\sectst1.sdb /cfg C:\WINDOWS\security\templates\securews.inf /log c:\sectst\sectst1.log

  4. secedit /analyze /overwrite /db c:\sectst\sectst1.sdb /cfg C:\WINDOWS\security\templates\securews.inf /log c:\sectst\sectst1.log

47.

You are the LAN administrator for Zanzibar Dream Enterprises, a small technology reseller. You have two office locations, each with its own Windows Server 2003 server. The two locations have been networked with a T-1 connection that runs between the Windows Server 2003 servers, which are running RRAS. You just added a new network in the main location, and you need to add a static route on the far end to provide connectivity to the location; you are not using any dynamic routing protocols. The network address, which you are using as a Class C address, is 10.10.10.0. The correct gateway address is 10.10.10.254. What command do you need to use to add a static route?

  1. ipconfig /addroute 10.10.10.0 mask 255.255.255.0

    10.10.10.254 metric 2

  2. route add 10.10.10.0 mask 255.255.255.0

    10.10.10.254 metric 2

  3. route /addroute 10.10.10.0 mask 255.255.255.0

    10.10.10.254 meTRic 2

  4. netstat add 10.10.10.0 mask 255.255.255.0

    10.10.10.254 metric 2

  5. netstat add 10.10.10.0 mask 255.255.255.252

    10.10.10.254 metric 2

48.

You are the lead engineer for Mount Abora Consulting, a small technical consulting shop. You have just hired an intern to assist with some of the routine duties around the shop, and you are explaining to the intern some of the differences between using PPTP and L2TP to create VPNs for customers. Which of the following are accurate statements regarding PPTP and L2TP? (Choose three.)

  1. L2TP requires an IP-based transit internetwork.

  2. L2TP supports header compression.

  3. PPTP supports header compression.

  4. L2TP supports tunnel authentication.

  5. L2TP requires IPSec for encryption.

  6. L2TP can be used only on Windows networks.

49.

You are the WAN administrator for IVS Technologies. You are trying to decide what routing technology you should be using for the company, and you finally decide to go with distance-vector routing. What is one of the major disadvantages of distance-vector routing?

  1. It has problems with slow convergence.

  2. It involves high overhead on the network.

  3. It suffers from the count-to-infinity problem.

  4. A network that uses it can connect to a maximum of only 15 hops.

50.

You are the LAN administrator for the Oui Find-em detective agency. You would like to be able to verify some entries on one of your Windows Server 2003 DNS servers. How could you verify the entries in the DNS zone?

  1. You could use the Properties dialog box of the DNS server in the MMC.

  2. You could type nslookup at a command prompt.

  3. You could type ipconfig at a command prompt.

  4. You could use Event Viewer.

51.

You are the systems administrator for the ShoeBox Shoe company. The corporation is running a routed network with a centrally located Windows Server 2003 DHCP server. The server is able to issue addresses to users on the local segment but cannot issue addresses to any sites across a router. What is the most probable cause of this problem?

  1. The DHCP forwarder service is not enabled on the DHCP server.

  2. The BOOTP forwarder service is not enabled on the DHCP server.

  3. The DHCP forwarder service is not enabled on the routers.

  4. The BOOTP forwarder service is not enabled on the routers.

52.

You are the network administrator for JMS Technologies, a small consulting company. After installing and configuring DNS on a Windows Server 2003 server, you set up an Active Directory-integrated zone. Where does the server store the zone information?

  1. In the %systemroot%\DNS directory

  2. In the %systemroot%\system32\DNS directory

  3. In Active Directory

  4. In the server's cache

53.

Andrea is an administrator for Carmine's Circus Clowns, Inc. She was recently hired because the last administrator, oddly enough, ran off to join the circus. Carmine's network includes two Domain Controllers and three member servers that provide file, print, and backup/restoration services. Carmine, the president of the company, has instructed Andrea to implement a more secure configuration on all five Windows Server 2003 servers. Andrea has decided to use the secure templates, but is not sure what the current configuration is on each server because the last administrator did not keep any records. What is the best way for Andrea to get these servers configured with the secure templates?

  1. Andrea should apply the Default security template from one of her member servers to all five servers and then apply the securews.inf and securedc.inf templates to them.

  2. Andrea should apply the Default security template found on each computer to that specific computer. After doing this, she should apply the securews.inf template to the DCs and the securedc.inf template to the member servers.

  3. Andrea should reinstall Windows Server 2003 on all five servers and re-create the domain. After doing this, she should apply the securews.inf and securedc.inf templates to the servers.

  4. Andrea should apply the Default security template found on each computer to that specific computer. After doing this, she should apply the securedc.inf template to the DCs and the securews.inf template to the member servers.

54.

You are the WAN administrator for Bifurcated Plumbing, a large plumbing manufacturer. You have 12 office locations, each with its own Windows Server 2003 servers. Today the corporate headquarters has a WAN connection to the warehouse, but none of the other sites have WAN connections outside dial-in access. There are plans to network the remaining locations by using the existing Windows Server 2003 servers and ISDN lines. You have been asked to design a solution that will be easy to set up and maintain and that will still allow for a failover connection between the headquarters and the warehouse. What routing method should you select?

  1. Static routes

  2. RIP

  3. OSPF

  4. Autostatic updates

55.

You are the lead system administrator for the Zanzibar Dream Ice Cream company. The company has 200 end users running Windows XP Professional that need to be able to access the company's network remotely. Several months ago you installed a Windows Server 2003 server running RRAS to allow users to dial in to the server for remote access. This server is in the corporate Active Directory tree, and after you configured it, the profiles worked perfectly. Last weekend you added another Windows Server 2003 server with RRAS loaded to provide a failover access device in the event of a server crash. Both servers are in the same native-mode Active Directory domain, and test users are unable to log in to the new RAS server. What is the most likely problem?

  1. You can have only a single Windows Server 2003 server running RRAS in an Active Directory domain.

  2. The Windows Server 2003 RRAS service needs to be authorized in Active Directory.

  3. You need to add the new Windows Server 2003 server to the Global Remote Access Servers group in Active Directory.

  4. The remote access profiles are not shared and need to be re-created on the new Windows Server 2003 server before anyone can access the server.

56.

You are the systems administrator for Gidget's Widgets, LLC. You are trying to explain DNS and reverse lookup zones to your co-workers. What should you tell your co-workers that reverse lookup zone allows users to resolve?

  1. An IP address to a hostname

  2. A hostname to an IP address

  3. An IP address to a MAC address

  4. A hostname to an FQDN

57.

You are the WAN administrator for General Telecommunications, a large manufacturer of network equipment. When you started with the company, you had 10 office locations, each with its own Windows Server 2003 servers. These locations were networked using fractional T-1s and Windows Server 2003 servers running RRAS, and they used RIP for routing information. General Telecommunications now has 120 sales offices throughout the United States and Europe, and you have been tasked with networking these locations by using hardware routers. You have been asked to design a solution that will support both the Windows Server 2003 servers and the hardware routers. The solution must also support failover connections between the original 10 locations. What routing method should you select?

  1. EIGRP

  2. RIP

  3. OSPF

  4. Autostatic updates

  5. BGP

58.

You are a consultant for Champagne Glasses Corporation, and you have been asked to simplify the process of configuring TCP/IP on all the client computers. The network consists of 40 computers running Windows 2000 Professional and 60 computers running Windows XP Professional. Installing and configuring what service of Windows Server 2003 will help you accomplish your task?

  1. DHCP

  2. DNS

  3. WINS

  4. BOOTP

59.

You are the systems administrator for Dulcimer Heating and Plumbing. The company network consists of 3 Windows Server 2003 servers and 100 Windows XP Professional workstations. The Sales Department spends a lot of time doing Web research at a variety of supplier, customer, and competitor Web sites. You have been asked to provide a solution to speed up name resolution for these users. You configure a cache-only server. Which of the following will have the largest impact on the response time for DNS requests?

  1. The speed and type of the hard drive

  2. The speed of the network adapter card

  3. The processor speed

  4. The amount of RAM installed

  5. The speed of the network connection

60.

Kirsten is the systems administrator for Ike's Spikes, Inc., a leading manufacturer of railroad spikes. She has recently finished configuring and implementing an auditing plan for the company network. Kirsten needs to be able to track unsuccessful user logon attempts to the company network because she suspects that someone is trying to perform a dictionary attack against several user accounts. After two weeks, she has not found any unsuccessful user logon attempts recorded in the security log, even though she tried password-guessing several users' accounts just this morning. What does Kirsten need to correct in her auditing implementation?

  1. Kirsten needs to ensure that she has configured failure audits for the Audit Logon Events option.

  2. Kirsten needs to ensure that she has configured success audits for the Audit Account Logon Events option.

  3. Kirsten needs to ensure that she has configured success audits for the Audit Policy Change option.

  4. Kirsten needs to ensure that she has configured failure audits for the Audit Account Management option.

61.

You are the lead administrator for Red Rabbit Motors, a chain of car dealerships. Red Rabbit has 14 locations and is using OSPF as part of its WAN implementation. You are training a new WAN engineer to support the WAN. She asks you for the correct name of the area with an ID of 0.0.0.0. What do you call this area?

  1. The AS

  2. The LSDB

  3. The OSPF backbone

  4. The default route

62.

You are the lead system administrator for the Mellow Music Guitar Company, a custom guitar manufacturing company. The company has 75 users running Windows XP Professional that need to be able to access the company's network remotely. You would like to be able to provide redundant remote access servers by using Windows Server 2003 running RRAS to allow users to dial in to the network, but you want to maintain only one set of remote access profiles. How can you accomplish this?

  1. Install both servers in Active Directory, and on the Profiles tab of each server's Properties dialog box, select the Store Profiles in Active Directory option. Configure each server to point at the same domain in the Profile Location field.

  2. Install both servers in Active Directory, and on the Profiles tab of each server's Properties dialog box, select the Store Profiles in Active Directory option. Make sure both servers are in the same domain.

  3. Install ISA Server and use it as the central repository for the profiles.

  4. Install IAS and use it as the central repository for the profiles.

63.

As a junior systems administrator for Alph Construction, you have been assigned the task of identifying and correcting a problem with one of the Windows Server 2003 DNS servers. Computers running Windows 2000 Professional have not registered dynamically with the DNS server. You would like to force these computers to register with DNS as quickly as possible. What should you do?

  1. Reboot the system so that the computer is issued a new DHCP address.

  2. On each computer, at the command prompt, type ipconfig/renew.

  3. On each computer, at the command prompt, type ipconfig/registerdns.

  4. On each computer, at the command prompt, type ipconfig/renewdns.

64.

You are the systems administrator for ZFE, Inc., a medium-sized box manufacturer. You are using Windows Server 2003 as the network operating system in all four of ZFE's locations. You are using a server in corporate headquarters and another in the Boston sales office to establish an ISDN-based demand-dial routing connection. In order to control costs, this has been implemented as an on-demand connection. During operation, however, you notice that the connection is coming up fairly regularly, even during the evening, when you know that there is no communication occurring between the offices. What could be the problem?

  1. This is normal; it is an indication that the demand-dial routing solution is functioning normally.

  2. Legitimate data is being transferred during the connection.

  3. A default route has been configured on the calling router, and anytime a packet is received, it is forwarded to the destination demand-dial router.

  4. A default route has been configured on the answering router, and anytime a packet is received, it is forwarded to the destination demand-dial router.

65.

You are the systems administrator for JMS Technologies. You have just installed the DHCP service through the Windows Component Wizard. You now need to configure DHCP to support a scope that will be used for streaming multimedia delivery. In the MMC, you right-click the server icon under DHCP. What option should you select to configure the scope?

  1. New Scope

  2. New Superscope

  3. New IP Scope

  4. New Multicast Scope




MCSA(s)MCSE 70-291(c) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
MCSA/MCSE 70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam Prep)
ISBN: 0789736497
EAN: 2147483647
Year: 2006
Pages: 196
Authors: Will Schmied

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net