Chapter 8. Practice Exam 1


Question 1

Jane is the network administrator for Wiggin Enterprises. She needs to change Group Policy settings for the Sales group to give the salespeople access to new specs on their latest product. Jane decides to use the GPMC for this task. Which of the following types of policy settings can she change using this tool? (Select all that apply.)

  • A. Domain

  • B. Organizational unit

  • C. Security

  • D. Site

  • E. User

  • F. Computer

  • G. Forest

Question 2

John is the IT assistant for EDGE Services Group. He has been assigned the task of DNS server management. To which group must John belong to manage and perform administrative tasks on DNS servers?

  • A. Local Administrators group

  • B. DomainAdmin group

  • C. System Operator

  • D. Power User

Question 3

Mary is the network administrator for SmallCorp, and is responsible for documentation of the Active Directory domain used by SmallCorp for its information technology needs. As a part of this documentation, Mary has to provide a comma-separated ( .csv ) file that details the attributes for Active Directory accounts. Which utility should Mary use for this purpose?

  • A. Csvde

  • B. Dsget

  • C. Dsmod

  • D. Dsquery

  • E. Ldifde

Question 4

Dan needs to delegate control to an assistant to manage and perform most administrative tasks using Security Templates on Windows Server 2003. What group membership is required for the assistant assigned to this task?

  • A. Local Administrators group

  • B. Domain Admin group

  • C. System Operator

  • D. Power User

Question 5

Ed has been tasked to set up Kerberos authentication, with a high level of security, for all users on the network. Which of the following options should he select?

  • A. Advanced Digest Authentication

  • B. Digest Authentication

  • C. Integrated Windows Authentication

  • D. .NET Passport Authentication

Question 6

Craig is upgrading his company's network to Windows Server 2003 and needs to provide a report to management on the new features for storage management with a focus on disaster recovery. Which options in the following are new disaster recovery features in Windows Server 2003? (Select two.)

  • A. Backup

  • B. Driver Rollback

  • C. ASR

  • D. Emergency Repair Disk (ERD)

  • E. System State

Question 7

You would like to delegate control to certain users to allow them to manage and perform most administrative tasks using the Security Configuration and Analysis tool on Windows Server 2003 domain controller. What is the most common group membership required? (Select two.)

  • A. Local Administrators group

  • B. Domain Admin group

  • C. System Operator

  • D. Enterprise Admin group

  • E. Power Users group

Question 8

You want to set up secure remote access and integrated dial-up and VPN connections for remote client access. Which of the following Microsoft services makes the best use of these technologies?

  • A. RRAS

  • B. IIS

  • C. Terminal Services

  • D. SUS

Question 9

Dorothy needs to change certain settings for a user's GPO. Which privileges can be restricted to filter the application of a GPO's settings?

  • A. Apply Group Policy

  • B. Change

  • C. Modify

  • D. Read

  • E. Full Control

Question 10

AdepTek operates a Windows Server 2003 Active Directory domain that has 3,500 Windows 2000 Professional computers and users. AdepTek uses Microsoft Systems Management Server (SMS) 2.0 for centralized management and software deployment. AdepTek's management learns that Microsoft manages a Software Update Services (SUS) Web site for automated deployment of security fixes and patches. According to Microsoft's recommendations, what should AdepTek use for software deployment?

  • A. Use Software Update Services instead

  • B. Use SMS 2.0

  • C. Use SMS 2.0 and wait for an SMS-compatible integrated version release of SUS to be released

  • D. Wait for SMS 3.0

Question 11

You've been tasked with the creation of a new script that will create an .ldf file listing all user accounts on a server named SomeServer. Which of the following parameters would be used to specify the type of account to include?

  • A. -b

  • B. -f

  • C. -s

  • D. -r

  • E. /?

Question 12

Max, a local administrator, manages seven DNS servers in three domains for AdepTek. All seven DNS servers are Active Directory “integrated DNS servers. Max needs to change the zone type on one of the DNS servers to a stub zone. Max right-clicks the forward lookup zone and chooses Properties. He clicks the Change button on the General tab. What is the next selection Max must make to change the zone type to stub?

  • A. Target DNS server IP address

  • B. Source DNS server computer name

  • C. Source DNS server IP address

  • D. Target DNS server computer name

Question 13

Upper management has tasked Madelaine with using ASR to implement a disaster recovery solution. What is the first step she needs to take?

  • A. Create a full backup

  • B. Back up the users company data files and folders

  • C. Back up the server's system files

  • D. Create an ASR floppy disk

Question 14

You're the network administrator responsible for backing up a large number of GPOs monthly to have the ability to roll back to previous policy settings, as needed. Which of the following methods can be used to accomplish this with the least administrative effort using the Group Policy Management Console?

  • A. You should perform monthly backups of each GPO to a separate location for each GPO.

  • B. You should perform monthly backups of all GPOs to a standard location.

  • C. You should perform monthly backups of all GPOs to a location for each month.

  • D. You should perform monthly backups of all GPOs to a separate location for each GPO each month.

Question 15

Your boss has tasked you with explaining the uses for the command-line utilities Csvde and Ldifde . How would you best describe the uses for each command-line tool? (Choose two.)

  • A. The Csvde command-line utility can be used to modify the Active Directory schema.

  • B. The Csvde command-line utility cannot be used to modify the Active Directory schema.

  • C. The Ldifde command-line utility can be used to modify the Active Directory schema.

  • D. The Ldifde command-line utility cannot be used to modify the Active Directory schema.

  • E. The Csvde command-line utility is used for editing comma-delimited text reports .

Question 16

You're in charge of a disaster recovery solution and have been told to use the ASR tool. What information is stored on the ASR floppy disk?

  • A. System State

  • B. Storage file information

  • C. User-mapped drives

  • D. Registry

  • E. User's profile settings

Question 17

AdepTek operates a Windows Server 2003 Active Directory domain. The domain has 200 Windows 2000 Professional computers, 50 Windows XP Professional computers, 50 Windows 98 (SP1), and two other Windows 2000 Servers. All the Windows 2000 Professional computers have Service Pack 1 (SP1) applied. The Windows XP Professional computers do not have any Service Packs applied; the Windows 2000 Servers have SP2 applied. What computers presently support the Automatic Update client software? (Select two.)

  • A. Windows 2000 Professional (SP1)

  • B. Windows XP Professional

  • C. Windows 2000 Servers (SP2)

  • D. Windows 98 (SP1)

Question 18

You've been assigned the task of setting up Web sites and Web-based applications. Which of the following Microsoft products should you use?

  • A. RRAS

  • B. IIS 6.0

  • C. Terminal Services

  • D. SUS

Question 19

Sara, a local administrator, manages five Windows 2003 DNS servers in two domains for InnoTek. All five DNS servers are Active Directory “integrated DNS servers. Sara needs to check and possibly reconfigure DNS replication. Sara's administrator tells her that Windows 2003 DNS servers have a new replication feature added to the DNS server's Zone Properties dialog box. Which tab does Sara need to click in the Zone Properties dialog box to view and or modify zone replication?

  • A. Start of Authority (SOA)

  • B. General

  • C. Name Servers

  • D. Zone Transfers

Question 20

AdepTek operates a Windows Server 2003 Active Directory Domain. The domain has 200 Windows 2000 Professional computers, 50 Windows XP Professional computers, 50 Windows 98, and two other Windows 2000 Servers. All the Windows 2000 Professional computers have Service Pack 2 (SP2) applied. The Windows XP Professional computers do not have any Service Packs applied, and the Windows 2000 Servers have SP3 applied. The Windows 2000 Servers have a Pentium III 500MHz CPU, 768MB of RAM, 10GB of free hard disk space, and Internet Explorer 5.0 installed. SUS needs to be installed on one of the Windows 2000 Servers. What components are missing or need to be upgraded on the Windows 2000 Servers? (Select three.)

  • A. IIS needs to be installed

  • B. The RAM needs upgrading

  • C. The CPU needs upgrading

  • D. The hard drive needs upgrading

  • E. Internet Explorer needs upgrading

  • F. Service Pack 4 needs to be applied

Question 21

A user account has four types of associated names : the user logon name, the pre “Windows 2000 logon name, the principal logon name, and the LDAP relative distinguished name. Which of the following is an example of the principal logon name of a user account?

  • A. myuser

  • B. MYCORP\myuser

  • C. myuser@mycorp.com

  • D. CN=myuser,CN=Users,DC=mycorp,DC=com

Question 22

Amy has Windows XP Professional on her computer. She accidentally deletes her PowerPoint file and wants to recover it. She right-clicks her shared data folder and chooses Properties, but the Previous Version tab is missing. Why can't Amy recover her PowerPoint file? (Select two.)

  • A. Shadow Copies service is not activated on the Windows Server 2003.

  • B. Amy should right-click the deleted PowerPoint file.

  • C. Amy right-clicked the wrong folder.

  • D. Amy does not have the Shadow Copies for Shared Folders software installed on her computer.

  • E. Amy does not have permission to recover the file.

Question 23

John administers and manages two Windows 2003 DNS servers and a Unix DNS server, which uses an early version of BIND, in one domain for AdepTek. One Windows 2003 DNS server is the primary DNS server; the other is the secondary DNS server. John needs the Unix server to work with the Windows 2003 DNS servers. The Unix DNS server runs a mission-critical application that works only with its early version of BIND. John realizes that the Unix server cannot communicate with the Windows DNS servers until he changes the default security on the two Windows 2003 DNS servers. What is the best security setting for John to select for the Unix DNS server and the Windows 2003 primary and secondary DNS servers to work together?

  • A. Dynamic Updates

  • B. Non-secure

  • C. Secure and Non-secure

  • D. Secure

Question 24

Susan needs to create a Group Policy to manage Windows Updates on her Windows 2000 Server, but forgot the name of the administrative template used to set up Windows Updates. What administrative template is used to manage Windows Updates?

  • A. inetres .adm

  • B. conf.adm

  • C. wuau.adm

  • D. system.adm

Question 25

Jim needs to migrate an existing GPO to a new forest. Which action in GPMC should he take? (Select three.)

  • A. Backup

  • B. Copy

  • C. Import

  • D. Restore

  • E. Export

  • F. Transfer

Question 26

Chris noticed that there are duplicate names on the network. Which of the following associated names must be unique only within its container? (Select two.)

  • A. User logon name

  • B. Pre “Windows 2000 logon name

  • C. Principal logon name

  • D. LDAP relative distinguished name

  • E. Unified logon name

Question 27

Susan later decides to unapprove a Windows update that was previously deployed to client computers. What actions must she take on the client computers to remove an unapproved update?

  • A. The unapproved update automatically uninstalls itself from client computers.

  • B. The unapproved update needs to be scheduled on the SUS server and later deployed to client computers.

  • C. The unapproved update must be manually removed from client computers.

  • D. The unapproved update automatically installs itself again on the client computers and then automatically removes itself.

Question 28

InnoTek operates a Windows Server 2003 Active Directory domain. The domain has 100 Windows 2000 Professional computers and 50 Windows XP Professional computers. SUS is installed on the Windows Server 2003. Amy, a user using Windows XP Professional, tries to open the SUS Administration Web page using Internet Explorer but receives an error. Why can't Amy open the SUS Administration Web page?

  • A. Amy must be a member of the Domain Admins group.

  • B. Windows XP IIS component needs to be installed.

  • C. Internet Explorer needs upgrading.

  • D. Amy must be a member of the local Administrators group.

Question 29

You've been tasked with explaining the latest technologies in Windows 2003 to upper management. How would you best describe the Resultant Set of Policy?

  • A. A listing of all settings from all GPOs, organized in order of evaluation

  • B. A listing of all settings from a selected GPO, organized by type (computer and user)

  • C. A listing of winning settings from all GPOs, detailing the source of each

  • D. A listing of winning settings from a target GPO, detailing the source of each

Question 30

Susan administers and manages four Windows 2003 DNS servers and a Unix DNS server in one domain containing two subnets for AdepTek. Two Windows 2003 DNS servers are primary DNS servers; two are secondary DNS severs. Primary DNS Server1 has an IP address of 192.168.1.4, and secondary DNS Server1 has an IP address of 192.168.1.8. Primary DNS Server2 has an IP address of 192.168.2.4, and secondary DNS Server2 has an IP address of 192.168.2.8. Susan needs the secondary DNS servers to obtain their zone information from their respective primary DNS servers. She is updating secondary DNS Server2. What IP address should Susan put in the Zone Transfers tab for secondary DNS Server2?

  • A. 192.168.1.4

  • B. 192.168.1.8

  • C. 192.168.2.4

  • D. 192.168.2.8

Question 31

Amy has Windows XP Professional with Service Pack 1 applied on her computer. Shadow Copies for Shared Folders is activated on the Windows Server 2003 and Shadow Copies client is installed on Amy's PC. Amy accidentally overwrites her PowerPoint file and needs to recover it. How does Amy recover her overwritten PowerPoint file?

  • A. Amy should right-click the overwritten PowerPoint file and choose Properties. Then she should select the Previous Version tab and click the Restore button.

  • B. Amy should right-click the overwritten PowerPoint file and choose Properties. Then she should select the Previous Version tab and click the View button.

  • C. Amy should right-click her shared data folder, choose Properties, click the Previous Version tab, and click the View button.

  • D. Amy should right-click the overwritten PowerPoint file and choose Properties. Then she should select the Previous Version tab and click the Copy button.

Question 32

You're the network administrator for SomeCorp and have been tasked with correcting a permissions error that is preventing the Alerter service from starting. Which account's permissions are the most likely source of this conflict?

  • A. IUSR_myserver

  • B. LocalSystem

  • C. LocalService

  • D. NetworkService

Question 33

Max has Windows Server 2003 installed on his computer. When he finishes installing updated drivers for his SCSI controller card, the computer stops responding. Max needs to get back to work. What action enables Max to resume working?

  • A. Max should use Device Manager and disable the SCSI controller device.

  • B. Max should use Device Manager and roll back the SCSI controller device.

  • C. Max should use Device Manager and uninstall the SCSI controller device.

  • D. Max should use obtain updated drivers and reinstall them using Device Manager.

Question 34

AdepTek operates a site containing two Windows Server 2003 Active Directory domains. Each domain has 100 Windows 2000 Professional computers, 125 Windows XP Professional computers, 25 Windows 98 computers, and 2 Windows 2000 Servers. Domain 1 has an OU called Sales. Domain 2 has an OU called Marketing. The Sales OU has an account policy established for creating complex passwords. The Marketing OU has an account policy for creating passwords with a minimum of six characters. Domain 1 has an account password policy for creating passwords with a minimum of eight characters . Which account policies are applied?

  • A. All three account policies are applied.

  • B. The account password policy for creating passwords with a minimum of eight characters is applied.

  • C. The account policy for creating complex passwords is applied.

  • D. The account policy for creating passwords with a minimum of six characters is applied.

Question 35

You're the network administrator responsible for rolling out a security policy intended to return the current settings to their default installation configuration on all domain controllers within a large forest structure. Which default security templates could be used to accomplish this most easily? (Select two.)

  • A. CompatDC

  • B. DC Security

  • C. HisecDC

  • D. SecureDC

  • E. Setup Security

Question 36

Tom administers and manages 11 Windows 2003 DNS servers and two Unix DNS servers in 5 domains and 1 child domain for InnoTech Solutions. All the DNS servers, except the two Unix DNS servers, are Active Directory “integrated DNS servers. Two Active Directory “integrated DNS servers in each domain are configured as primary zones. Tom needs to set up the child domain DNS server. He would like to improve name resolution efficiency and keep delegated zone information current by providing the DNS server in the parent zone with its resource records list of name servers for its child zone. What zone type should Tom select for the child DNS server?

  • A. Active Directory “integrated zone

  • B. Secondary zone

  • C. Primary zone

  • D. Stub zone

Question 37

Tom is a domain administrator and is currently performing a task on a user's computer. He cannot finish the task until he adjusts a configuration setting on his server. He decides to use the Runas command to create a desktop shortcut and connect to his server's Active Directory Users and Computers module. Which Runas command is the correct one for Tom to use?

  • A. Runas /user:ComputerName\administrator cmd

  • B. Runas /user:ComputerName\administrator "mmc%windir%\system32\ compmgmt.msc"

  • C. Runas /user:ComputerName\administrator "mmc%windir%\system32\ dsa.msc"

  • D. Runas /netonly /user:DomainName\UserName "mmc%windir%\ system32\dsa.msc"

Question 38

Susan has Windows Server 2003 installed on her server and tries to install an updated NIC driver but the installation fails. What can Susan do to get her server working normally again?

  • A. Susan should use Device Manager and uninstall the NIC device driver.

  • B. Susan should use Device Manager and disable the NIC device driver.

  • C. Susan should obtain updated NIC drivers and reinstall them, using Device Manager.

  • D. Susan should use Device Manager and roll back the NIC device driver.

Question 39

You're the network administrator tasked with the deployment of a kiosk system that will be used by visitors to the Museum of Fine Arts. In planning your deployment, you must decide the security settings that will be applied to the MyGuestLogon account. Which of the following settings is most appropriate to the solution presented?

  • A. User must change password at next logon

  • B. User cannot change password

  • C. Password never expires

  • D. Account is disabled

Question 40

Tom is the administrator for a network with 100 clients . He has been tasked with updating an application on all client systems. What component should Tom use to manage a software update infrastructure?

  • A. Group Policy

  • B. IIS

  • C. Terminal Services

  • D. SUS

Question 41

InnoTek operates a Windows Server 2003 Active Directory domain. The domain has 100 Windows 2000 Professional computers, 125 Windows XP Professional computers, 25 Windows 98 computers, and 2 Windows 2000 Servers. A GPO is created to audit logon success and failures and applied to the domain object. John, an assistant administrator, wants to view the auditing events. Where does John view the results of the logon success and failures?

  • A. Event Viewer, Security log

  • B. Security Templates Console

  • C. Security Configuration and Analysis Console

  • D. Active Directory Users and Computers Console

Question 42

Which of the following Security Policy MMC snap-ins are available, by default, within the Administrative Tools container of a Microsoft Windows Server 2003 standalone server?

  • A. Domain Controllers Security Policy

  • B. Domain Security Policy

  • C. Local Security Policy

  • D. Security Configuration and Analysis

  • E. Security Templates

Question 43

Tom administers and manages 11 Windows 2003 DNS servers and two Unix DNS servers in 5 domains and 1 child domain for InnoTech Solutions. All the DNS servers except the two Unix DNS servers are Active Directory-integrated DNS servers. Two Active Directory-integrated DNS servers in each domain are configured as primary zones. Tom configures the child domain DNS server for a stub zone. Tom wants to have a power user manage the stub zone DNS server. He wants to give the power user only enough authority to manage the stub zone DNS server. How can Tom best accomplish this?

  • A. Add the power user to the local Administrators group.

  • B. Add the power user to the Domain Admin group.

  • C. Add the power user to the DNS Admin group.

  • D. Delegate control of the child domain to the power user.

Question 44

You've been tasked with the creation of a script that will create a user accounts for Bob Jones on a server named MyServer using the Dsadd command-line utility. Which of the following parameters would be used to specify the UNC path to the location of Bob's logon script?

  • A. - fn

  • B. - hmdir

  • C. - hmdrv

  • D. - ln

  • E. -loscr

Question 45

You have been tasked with setting up an IIS Web site authentication method that provides a single, unified logon, uses encrypted passwords, and provides a high level of security. Which of the following authentication methods should you choose?

  • A. Advanced Digest Authentication

  • B. Digest Authentication

  • C. Integrated Windows Authentication

  • D. .NET Passport Authentication

Question 46

Amy administers and manages three Windows 2003 DNS servers in two domains for InnoTech Solutions. All the DNS servers are Active Directory “integrated DNS servers. Two Active Directory “integrated DNS servers for the domain are configured as primary zones. Amy configures the child domain DNS server for a stub zone. Amy does some research on stub zones and what they contain. She finds out stub zones contain an SOA record, NS records, Glue A records, and the Master server IP address used to update the stub zone. Amy doesn't know what a Glue A record is used for. What type of record is a Glue A record?

  • A. A resource record

  • B. A delegation record used for finding authoritative DNS servers

  • C. A delegation record used for finding nonauthoritative DNS servers

  • D. A delegation record used for finding secondary DNS servers for the delegated zone

Question 47

You've been tasked with the evaluation of what the effective policy settings will be after the addition of a new GPO. Which utilities can you use to perform this evaluation? (Select two.)

  • A. Group Policy Management Console

  • B. Security Configuration and Analysis MMC snap-in

  • C. Security Templates MMC snap-in

  • D. Group Policy Object Editor MMC snap-in

  • E. Ldifde command-line utility

Question 48

AdepTek operates a Windows Server 2003 Active Directory domain. The domain has 1000 Windows 2000 Professional computers, 450 Windows XP Professional computers, 125 Windows 98 computers, and 4 Windows 2000 Servers. A GPO is created to audit logon success and failures and applied to the domain object. Three hours later, Max, an assistant administrator, notices an error message on the Windows Server 2003 domain controller stating that the Security log is full. Why is the Security log full after only 3 hours?

  • A. Because auditing is enabled for logon failures

  • B. Because Max never deleted the Security log events in Event Viewer

  • C. Because auditing is enabled for logon successes and failures

  • D. Because auditing is enabled for logon successes

Question 49

John maintains a Windows Server 2003 and needs to back up the Registry, but cannot find a product to do this. What product does John need to use?

  • A. Regedit

  • B. System State

  • C. Regedt32

  • D. NT32backup

Question 50

Max administers and manages 12 Windows 2003 DNS servers in 6 domains on 3 sites for AdepTek. Each site contains 2 domains. All DNS servers are Active Directory “integrated DNS servers. Two Active Directory “integrated DNS servers for each domain are configured with a forward lookup zone and a reverse lookup zone. AdepTek's 3 sites and 6 domains are interconnected with T1 lines and routers. Max has noticed lately that DNS traffic across the routers is very heavy. Max would like to reduce the DNS traffic across the routers. How can Max accomplish this? (Select two.)

  • A. Enable conditional forwarding for one DNS server in each site

  • B. Create a stub zone for one DNS server in each site

  • C. Create a secondary DNS server in each site

  • D. Create a caching-only DNS server in each site

  • E. Create a primary DNS server in each site

Question 51

You're the network administrator for OldCorp. When configuring the settings for user accounts, you want to map a drive to the location of the operating system's files. Which of the following environmental variables would be used for this purpose?

  • A. %HomeDrive%

  • B. %HomePath%

  • C. %SystemDrive%

  • D. %SystemRoot%

Question 52

Sara manages a Windows 2003 Active Directory domain containing two Windows 2003 domain controllers. One of her domain controllers fails and is taken down for repairs . After repairing the domain controller, Sara powers it up. What type of restore must Sara perform on the domain controller to bring it back online with the network?

  • A. Authoritative restore

  • B. System State restore

  • C. Nonauthoritative restore

  • D. Differential restore

Question 53

Two network administrators disagree about which user groups have permissions to use the Runas command. What user group accounts have permission to use the Runas command? (Select all that apply.)

  • A. Local Administrative accounts

  • B. Local User accounts

  • C. Domain Administrative accounts

  • D. Domain User accounts

  • E. Anonymous

  • F. SELF

  • G. Everyone group

Question 54

InnoTek operates a Windows Server 2003 Active Directory domain. The domain has 200 Windows 2000 Professional computers and 50 Windows XP Professional computers. Sara needs to create a Group Policy Object (GPO) using a security template to audit changing user passwords. What auditing event group is used to change users password security policy?

  • A. Account events

  • B. Account management

  • C. Object access

  • D. Policy change

Question 55

You've just written a new script and need to ensure that new policy settings are immediately applied when the script has been completed. Which of the following command-line utilities should you use?

  • A. secedit.exe

  • B. gpupdate.exe

  • C. gpapply.exe

  • D. gpresult.exe

Question 56

You've been tasked with the creation of a new script that will remove a series of user accounts on a server named MyServer. Which of the following parameters would be used to specify the account to be removed? (Select three.)

  • A. -d

  • B. -s

  • C. -u

  • D. /?

  • E. -z

  • F. -x

Question 57

Susan uses a Windows XP Professional computer on her company's network and wants to use the Remote Desktop Connection utility to connect to her company's server. Susan cannot find the program. Where does Susan need to navigate to?

  • A. Start, All Programs, Administrative Tools, Remote Desktop Connection

  • B. Start, All Programs, Accessories, Remote Desktop Connection

  • C. Start, All Programs, Accessories, Communications, Remote Desktop Connection

  • D. Start, Control Panel, Remote Desktop Connection

Question 58

Susan administers and manages 12 Windows 2003 DNS servers in 6 domains on 3 sites for AdepTek. Each site contains two domains. All the DNS servers are Active Directory “integrated DNS servers. One Active Directory “integrated DNS server for each domain is configured as a forward lookup zone. The other Active Directory “integrated DNS servers for each domain are configured with both forward and reverse lookup zones. AdepTek's 3 sites are interconnected with T1 lines and routers. Susan needs to configure refresh intervals for resource records on a DNS server. How does Susan accomplish this?

  • A. Configure Scavenge Stale Resource Records

  • B. Configure Update Server Data Files

  • C. Launch NSLookup

  • D. Configure Set Aging/Scavenging

Question 59

You're the network administrator for BigCorp.com and have just made a change to the user settings of a GPO applied to user of MyWorkstation1. You want these settings to be applied immediately to close a critical security hole, regardless of whether the current user is logged in. What will be the result of a script that uses the following code?

 gpupdate /target:user /boot 
  • A. The process will meet all the stated requirements.

  • B. The process will meet one of the stated requirements.

  • C. The process will not meet any of the stated requirements.

  • D. The target system will reboot.

  • E. The current user will be logged off.

Question 60

Sara, an administrative assistant, assists in managing a Windows 2003 Active Directory domain. She needs to restore some corrupted accounting data but receives an access denied message. What group membership must Sara have to perform the restore? (Select two.)

  • A. Local Administrator

  • B. System Operator

  • C. Backup Operator

  • D. Power User

  • E. Account Operator




MCSA.MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2 (Exam Cram 70-292)
ISBN: 0789730111
EAN: 2147483647
Year: 2006
Pages: 132

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net