Review Questions


1.  

When interviewing some of the stakeholders within an organization, Pat learns that the primary reason Windows Server 2003 and Active Directory was chosen was because Exchange Server 2003 would only run on that platform. Which reason type is this known as?

  1. Application support

  2. Domain restructuring

  3. Planned obsolescence

  4. Total cost of ownership

a. several applications require active directory, and exchange server 2003 requires windows server 2003 as the operating system with active directory in place.

2.  

What type of document details the sites, devices, and subnets within an organization?

  1. Subnet Addressing form

  2. Site Addressing form

  3. Server Location list

  4. Network diagram

d. the network diagram can be created with a tool such as visio so that you can detail how the network is laid out, showing the sites, subnets, subnet addresses, network devices, and network hosts.

3.  

Which of the following tools can be used to collect and save resource usage limits on a server? (Choose all that apply.)

  1. Performance Monitor

  2. Performance Logs And Alerts

  3. System Monitor

  4. Network Monitor

a, b. on windows nt 4 servers and workstations, you can run performance monitor and have it log the resource usage. windows 2000 server and professional and windows server 2003 have performance logs and alerts, which provides that same functionality.

4.  

Which of the following tools can be used to collect and save network usage on a server? (Choose all that apply.)

  1. Performance Monitor

  2. Performance Logs And Alerts

  3. System Monitor

  4. Network Monitor

a, b, d. system monitor is the only one of the listed utilities that cannot save the data. whereas performance monitor and performance logs and alerts only record statistics about the network segments and the server s current utilization limits, network monitor can capture packets to be analyzed.

5.  

You are reviewing the current infrastructure and notice that all of the clients are Windows NT 4. There are five systems that use a VPN connection to gain access to the network. The VPN protocol was not documented. Which of the following protocols are probably being used? (Choose all that apply.)

  1. L2TP

  2. PPTP

  3. PPP

  4. IPX/SPX

a, b. windows nt 4 has the option of using l2tp or pptp for vpn connections. ppp and ipx/spx are not vpn protocols.

6.  

You are preparing to document the network for Company B. You know that they have a mixed environment with Windows NT 4, Windows 2000 clients and servers, and Windows XP clients. What protocol can you safely assume is used?

  1. NetBEUI

  2. TCP/IP

  3. NetBIOS

  4. NWLink

c . although tcp/ip is probably used, it is not safe to assume that it is definitely in place. net-bios will be used because there are windows nt 4 clients on the network. netbios does need some type of transport protocol for it to function, but all three of the other protocols listed will transport netbios.

7.  

What tool will allow you to inventory client systems to determine the software installed on them?

  1. System Monitor

  2. System Management Server

  3. Network Monitor

  4. Performance Monitor

b. the system management server (sms) will inventory the client system and generate reports detailing the software that is currently installed.

8.  

When determining the current resources on the network, which of the following items should be documented? (Choose all that apply.)

  1. Client applications

  2. Network devices

  3. Protocols

  4. Subnet address ranges

a, b, c, d. you will need all of this information when determining how you are going to design the new infrastructure. remember the rule of thumb: document everything you find!

9.  

Which of the following options may account for a company having a multiple domain environment? (Choose all that apply.)

  1. Legal regulations

  2. Autonomy of administration

  3. Security policies

  4. Software requirements

a, b, c. legal regulations could force a company to create a completely separate domain in order to keep the data segregated. if administrators need to have control over their own resources, another domain is one of the most secure ways to keep other administrators out. if a group needs to have a different set of password restrictions, lockout policies, or kerberos settings, a separate domain will be required.

10.  

What is the term that describes collecting performance data so that you understand how a system is functioning and what the typical resource usage is?

  1. Capturing

  2. Baselining

  3. Logging

  4. Optimizing

b. the term baselining refers to the process of collecting data on systems so that you know how they are currently functioning. this process can be performed after a system has been set up and is running optimally so that you have a basis to start from when troubleshooting, or you can perform a baseline analysis during your data collection phase of the system upgrade so that you know how the system is currently running. this will give you a basis for knowing what the system is able to support.

Answers

1.  

A. Several applications require Active Directory, and Exchange Server 2003 requires Windows Server 2003 as the operating system with Active Directory in place.

2.  

D. The network diagram can be created with a tool such as Visio so that you can detail how the network is laid out, showing the sites, subnets, subnet addresses, network devices, and network hosts .

3.  

A, B. On Windows NT 4 Servers and Workstations, you can run Performance Monitor and have it log the resource usage. Windows 2000 Server and Professional and Windows Server 2003 have Performance Logs And Alerts, which provides that same functionality.

4.  

A, B, D. System Monitor is the only one of the listed utilities that cannot save the data. Whereas Performance Monitor and Performance Logs And Alerts only record statistics about the network segments and the server s current utilization limits, Network Monitor can capture packets to be analyzed .

5.  

A, B. Windows NT 4 has the option of using L2TP or PPTP for VPN connections. PPP and IPX/SPX are not VPN protocols.

6.  

C . Although TCP/IP is probably used, it is not safe to assume that it is definitely in place. Net-BIOS will be used because there are Windows NT 4 clients on the network. NetBIOS does need some type of transport protocol for it to function, but all three of the other protocols listed will transport NetBIOS.

7.  

B. The System Management Server (SMS) will inventory the client system and generate reports detailing the software that is currently installed.

8.  

A, B, C, D. You will need all of this information when determining how you are going to design the new infrastructure. Remember the rule of thumb: document everything you find!

9.  

A, B, C. Legal regulations could force a company to create a completely separate domain in order to keep the data segregated. If administrators need to have control over their own resources, another domain is one of the most secure ways to keep other administrators out. If a group needs to have a different set of password restrictions, lockout policies, or Kerberos settings, a separate domain will be required.

10.  

B. The term baselining refers to the process of collecting data on systems so that you know how they are currently functioning. This process can be performed after a system has been set up and is running optimally so that you have a basis to start from when troubleshooting, or you can perform a baseline analysis during your data collection phase of the system upgrade so that you know how the system is currently running. This will give you a basis for knowing what the system is able to support.




MCSE
MCSE: Windows Server 2003 Active Directory and Network Infrastructure Design Study Guide (70-297)
ISBN: 0782143210
EAN: 2147483647
Year: 2004
Pages: 159
Authors: Brad Price, Sybex

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net