Answers to Exam Prep Questions


A1:

1. C. By configuring a display filter within Network Monitor, you can filter captured data to display only specific types of information. Answer A is incorrect because triggers enable actions to be performed based on a set of conditions that must first be met. Answer B is incorrect because capture filters are configured to specify the type of information that is captured. Answer D is incorrect because packet filters are configured to specify the type of inbound and outbound traffic a computer can accept.

A2:

2. C. By adding a user account to the Performance Monitor Users group, he will be capable of viewing performance counter data within System Monitor locally or from across the network. Answer A is incorrect because adding the user's account to the Performance Log Users group will give him permission to manage logs and alerts as well. Answers B and D are incorrect because they would give the user administrative permissions to the server. This goes against the principle of least privilege.

A3:

3. B. Configuring a capture filter instructs Network Monitor to capture only data that meets the criteria you specify. Answer A is incorrect because display filters are used to filter data that has already been captured. Answer C is incorrect because packet filters are configured to control inbound and outbound traffic. Answer D is incorrect because alerts are used to notify an administrator when certain events occur.

A4:

4. C. By monitoring IP Datagrams/Sec, you can monitor the total number of IP datagrams sent and received by the computer per second. Answer A is incorrect because this is the number of outbound packets that could not be transmitted because of errors. Answer B is incorrect because this counter monitors only the number of TCP segments sent per second. Answer D is incorrect because this counter monitors the number of logon requests received per second by the computer.

A5:

5. A. The IPCONFIG command can be used to verify the TCP/IP configuration of a computer. Answer B is incorrect because the PING command is used to verify connectivity with a remote host. Answer C is incorrect because TRACERT is used to trace the route a packet takes to reach a remote host. Answer D is incorrect because PATHPING is a combination of PING and trACERT used to determine which routers and gateways between two hosts might not be functioning.

A6:

6. D. Device Manager can be used to verify that a hardware device is functioning properly. Answer A is incorrect because System Monitor is used to monitor the performance. Answer B is incorrect because Network Monitor is used to capture and analyze network traffic. Answer C is incorrect because PING is a command-line utility used to verify network connectivity.

A7:

7. B. The Logon Total counter determines the number of logon requests that the domain controller has received since the last time it was restarted. Answers A and C are incorrect because there are no such counters within System Monitor. Answer D is incorrect because this counter determines the number of logon requests received per second.

A8:

8. B. If the service will not start, use the Services console to verify that any services that DHCP is dependent upon are also started. Therefore, answer A is incorrect. Answer C is incorrect because if the service fails to start, attempting to start it within the DHCP console will make no difference. Answer D is incorrect because this should be a last resort in terms of troubleshooting.

A9:

9. A and B. If a service fails to start, you can configure the computer to automatically attempt to restart the service, or you can have the computer automatically reboot. The third option is to have a specific program run. Answers C and D are incorrect because recovery actions do not include the capability to automatically restart the failed service's dependencies or to send an email to the network administrator.

A10:

10. C. Network Monitor can be used to capture and analyze network traffic. Answer A is incorrect because Task Manager is used to view the programs and processes running on a computer, as well as the performance statistics. Answer B is incorrect because Network Diagnostics is used to gather information about the hardware, software, and services running on a local computer. Answer D is incorrect because Event Viewer is used to view the contents of the various event logs.

A11:

11. A and D. To reduce the chance that captured data will be overwritten, you should increase the size of the buffer. This will allow Network Monitor to store more data. By decreasing the frame size, you can capture only header information instead of entire frames. Therefore, answers B and C are incorrect.

A12:

12. You must assign the Client (Respond Only) IPSec policy to the client computers. Clients will always respond to requests to secure communications.



Exam Cram(c) 70-291 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
Exam Cram(c) 70-291 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
ISBN: 131516345
EAN: N/A
Year: 2006
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net