Questions and Answers


Lesson 1 Review

Page 14-14

1.

You are installing Exchange Server 2003, Enterprise Edition, on a standalone server. The server meets the recommended hardware requirements and Windows Server 2003, Enterprise Edition, is installed. You have installed and enabled SMTP, NNTP, the World Wide Web service, and ASP.NET. The server is a standard primary DNS server. Will the installation succeed? If not, why not?

the installation will fail because the server is standalone and windows server 2003 requires access to active directory.

2.

You migrate an Exchange Server 5.5 organization to Exchange Server 2003. You use the Active Directory Migration Tool to migrate the mailboxes. You find that the mailboxes have migrated with all the user permissions intact, but user passwords have not migrated. What is the probable reason?

you have probably used version 1 of the active directory migration tool. you need version 2 to migrate passwords.

3.

Your Exchange Server 2003 organization connects to a UNIX e-mail system over an X.400 connector. You establish connectivity with the system, but e-mail messages are garbled. How do you solve the problem?

you clear the allow exchange contents option on the x.400 connector and allow standard x.400 formatting to be used.

Answers

1.

The installation will fail because the server is standalone and Windows Server 2003 requires access to Active Directory.

2.

You have probably used version 1 of the Active Directory Migration Tool. You need version 2 to migrate passwords.

3.

You clear the Allow Exchange Contents option on the X.400 connector and allow standard X.400 formatting to be used.

Lesson 2 Review

Page 14-24

1.

You are the administrator of an Exchange Server 2003 organization. During busy times the performance of one of your Exchange Server 2003 servers slows. The server uses a RAID-1 array to store system files, a RAID-5 array to store database files, and a RAID-0+1 array to store transaction logs. Currently all of the disk arrays are used at less than 60 percent of total capacity. You check your performance counters during a busy period and find that your Processor\%Processor Time counter is consistently at 70 percent or above and your Memory\Pages/sec counter is typically between 30 and 40. You notice that there is an unusually high amount of disk activity. What is the most likely cause of the poor performance?

  1. A disk in one of your arrays is faulty.

  2. One of your disk controllers is faulty.

  3. The server needs additional memory.

  4. You need to upgrade your processor.

the correct answer is c.

2.

You set alerts on all the nodes on a cluster group to warn you if the value that the MSExchangeIS\VM Total 16m Free Blocks counter returns is three or less. What action should you take on any node on which the alert is triggered?

if the value in this counter drops below 3, it is an indication that memory has become fragmented in the node. you should restart all the services on the affected node.

3.

You want to test your backup and restore procedures by restoring a mailbox store. You do not want to dismount the store while you are performing the restore, and you do not want to overwrite the data in the store with backed up data that might be faulty. You do not have a recovery server. How can you test the restore?

you need to create a recovery group. you can then restore to that recovery group and examine the contents.

Answers

1.

The correct answer is c.

2.

If the value in this counter drops below 3, it is an indication that memory has become fragmented in the node. You should restart all the services on the affected node.

3.

You need to create a recovery group. You can then restore to that recovery group and examine the contents.

Lesson 3 Review

Page 14-34

1.

You are configuring authentication on an IMAP4 virtual server. You discover that the check boxes appear dimmed, and you cannot change the authentication setting, which is basic authentication. What is the reason for this?

the imap4 virtual server is on a front-end server and can only use basic authentication. you can, however, specify encryption, assuming you have obtained the necessary certificate.

2.

Files in a public folder are being added and deleted without official sanction. How can you prevent this happening?

you need to review the permission settings on the public folder. it is probable that a group such as users or everyone has write and delete permissions. such groups should have (at most) read, execute, read permissions, and list contents permissions. you should severely restrict write and delete permissions to public folders.

3.

You want to increase the amount of information that is written to the application log in Event Viewer. What should you configure?

  1. Protocol logging

  2. Diagnostic logging

  3. Performance logging

  4. Event filtering

the correct answer is b.

Answers

1.

The IMAP4 virtual server is on a front-end server and can only use basic authentication. You can, however, specify encryption, assuming you have obtained the necessary certificate.

2.

You need to review the permission settings on the public folder. It is probable that a group such as Users or Everyone has write and delete permissions. Such groups should have (at most) read, execute, read permissions, and list contents permissions. You should severely restrict write and delete permissions to public folders.

3.

The correct answer is b.

Lesson 4 Review

Page 14-44

1.

Kim Akers sends an encrypted e-mail message to Don Hall. Which of the following statements is true?

  1. The message is encrypted using Don's public key and decrypted using Don's private key.

  2. The message is encrypted using Kim's private key and decrypted using Kim's public key.

  3. The message is encrypted using Don's private key and decrypted using Don's public key.

  4. The message is encrypted using Kim's public key and decrypted using Kim's private key.

the correct answer is a.

2.

You suspect that someone is attacking your organization with Trojan horse probes. Where would you look to confirm this suspicion and to find out what ports are under attack?

you would look in virus logs, which list identified viruses, worms, and trojan horses (described in chapter 11 ). you would also look in firewall logs, which identify (among other things) the ports that are under attack.

Answers

1.

The correct answer is a.

2.

You would look in virus logs, which list identified viruses, worms, and Trojan horses (described in Chapter 11). You would also look in firewall logs, which identify (among other things) the ports that are under attack.

Lesson 5 Review

Page 14-59

1.

You suspect that a router somewhere in your intranet is causing transmission delays and may be dropping frames. Which tool would give you the most information about the problem?

  1. pathping

  2. ping

  3. tracert

  4. netstat

the correct answer is a.

2.

You successfully ping a host on a remote network. You examine the ARP cache on your computer and find that it contains one IP address/MAC address pair. What are these addresses?

  1. The IP address and MAC address of your default gateway

  2. The IP address and MAC address of the remote host

  3. The IP address of the remote host and the MAC address of your default gateway

  4. The IP address of your default gateway and the MAC address of the remote host

the correct answer is c.

3.

You ask all users to work offline while you fix a connectivity problem. When the users come back online, one of them is unable to access a server by hostname. All other users can access the server without any problems. The user admits that he was slow coming offline and tried to access the same server unsuccessfully before doing so. What command will fix the problem?

  1. ipconfig /release

  2. ipconfig /renew

  3. ipconfig /registerdns

  4. ipconfig /flushdns

the correct answer is d.

Answers

1.

The correct answer is a.

2.

The correct answer is c.

3.

The correct answer is d.

Case Scenario Exercise: Requirement 1

Page 14-61

1.

You need to be able to restore mailbox stores and individual mailboxes. You do not want to restore on top of existing data in case restore errors cause the data to be lost. You do not have a recovery server. How do you solve the problem?

you create a recovery storage group. if you had more than one administrative group, you would create a recovery storage group for each administrative group, but this is unlikely in this size of organization. you can restore an entire mailbox store or a single mailbox to the recovery group and merge the data with that in the appropriate mailbox store after you ascertain that the restore ran without errors.

2.

You recover a mailbox that has been corrupted. Your chief executive officer (CEO) asks if you can also recover a lost file that was in the public store. She does not want the store dismounted, and she wants to recover only the one item, not the entire store. What do you tell her?

recovery storage groups cannot be used to restore public stores. without a recovery server, the only way to restore a public store item is to restore to the same public store that was backed up. you have to restore the entire store and cannot restore just a single item. you need to dismount the public store while you are restoring it.

3.

You have restricted write and delete rights to the public store to a very small group and have limited the size of the store. However, users report that they are having problems finding items in public stores and that the public store hierarchy is becoming complex. What other limitation should you impose?

you should limit the right to create a top-level public store to an even more select group (possibly only yourself).

Answers

1.

You create a recovery storage group. If you had more than one administrative group, you would create a recovery storage group for each administrative group, but this is unlikely in this size of organization. You can restore an entire mailbox store or a single mailbox to the recovery group and merge the data with that in the appropriate mailbox store after you ascertain that the restore ran without errors.

2.

Recovery storage groups cannot be used to restore public stores. Without a recovery server, the only way to restore a public store item is to restore to the same public store that was backed up. You have to restore the entire store and cannot restore just a single item. You need to dismount the public store while you are restoring it.

3.

You should limit the right to create a top-level public store to an even more select group (possibly only yourself).

Case Scenario Exercise: Requirement 2

Page 14-62

1.

A user reports that he was unable to log on and be authenticated on one of the client machines. When he tried another computer, he was required to change his password, but otherwise had no problems. What is the likely cause, and how do you confirm it?

the user probably tried to log on at a windows nt 4 workstation after his password had expired. if the pdc emulator operations master were offline, then none of the other domain controllers would be able to implement the password change. when the user subsequently logged on at a client that was active directory-aware, another domain controller could process the password change. it may be the case that the domain controller that is experiencing reliability problems is the pdc emulator. if you enter the command netdom query fsmo from the command console, you can confirm the identity of the pdc emulator. you can then find out whether it is operational and connected to the network and transfer, or, if necessary, seize the operations master role.

2.

NetBT is still widely used on Coho's network. What tool can you use to troubleshoot NetBIOS name resolution and obtain NetBIOS statistics?

  1. netstat

  2. nslookup

  3. ipconfig

  4. nbtstat

the correct answer is d.

Answers

1.

The user probably tried to log on at a Windows NT 4 Workstation after his password had expired. If the PDC emulator operations master were offline, then none of the other domain controllers would be able to implement the password change. When the user subsequently logged on at a client that was Active Directory-aware, another domain controller could process the password change. It may be the case that the domain controller that is experiencing reliability problems is the PDC emulator. If you enter the command netdom query fsmo from the Command console, you can confirm the identity of the PDC emulator. You can then find out whether it is operational and connected to the network and transfer, or, if necessary, seize the operations master role.

2.

The correct answer is d.

Case Scenario Exercise: Requirement 3

Page 14-62

1.

You want to be informed when the suspect domain controller is experiencing memory problems. You want a message sent to yourself and to your chief information officer, an entry written to Event Viewer, and a performance log started. What counter do you use and how should you set it up?

you use the performance logs and alerts tool to generate an alert when the memory\pages/sec counter reaches a critical level (such as over 20). you can configure this alert to send messages to you and your chief executive officer and to start a performance log. it will write an entry to the application log in event viewer by default.

2.

You have been asked to produce statistics that can be used to analyze the performance of the suspect domain controller over a period of time. What tool will give you the information you want in a suitable format?

  1. System Monitor

  2. The report view of a performance log

  3. The applications log in Event Viewer

  4. Diagnostic logging

the correct answer is b.

Answers

1.

You use the Performance Logs And Alerts tool to generate an alert when the Memory\Pages/sec counter reaches a critical level (such as over 20). You can configure this alert to send messages to you and your chief executive officer and to start a performance log. It will write an entry to the application log in Event Viewer by default.

2.

The correct answer is b.




MCSA/MCSE Self-Paced Training Kit (Exam 70-284(c) Implementing and Managing Microsoft Exchange Server 2003)
MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing MicrosoftВ® Exchange Server 2003 (Pro-Certification)
ISBN: 0735618992
EAN: 2147483647
Year: 2003
Pages: 221

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net