Deck 2: Microsoft Certified It Professional (MCITP)
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
Play
Full screen (f)
Deck 2: Microsoft Certified It Professional (MCITP)
1
You want to setup a printer pool on a Windows Server 2008 computer. The printer pool contains four print devices. Which of the following should you do after you open the properties for the printer and select the Enable Printer Pooling option on the Ports tab?
A)Configure the LPT1 port to support four printers.
B)On the Device Settings tab, configure the installable options to support four additional print devices.
C)On the Advanced tab, configure the priority for each print device so that printing is distributed among four print devices.
D)Select or create the ports mapped to four printers.
A)Configure the LPT1 port to support four printers.
B)On the Device Settings tab, configure the installable options to support four additional print devices.
C)On the Advanced tab, configure the priority for each print device so that printing is distributed among four print devices.
D)Select or create the ports mapped to four printers.
Select or create the ports mapped to four printers.
2
Which of the following is a feature of a basic disk?
A)Allows you to configure unlimited volumes.
B)Allows you to allocate space to arrange data.
C)Allows you to combine noncontiguous space in one partition.
D)Allows you to create fault tolerant disks.
A)Allows you to configure unlimited volumes.
B)Allows you to allocate space to arrange data.
C)Allows you to combine noncontiguous space in one partition.
D)Allows you to create fault tolerant disks.
Allows you to allocate space to arrange data.
3
Which of the following specifies the two types of groups in Windows Server 2008?
A)User groups and Distribution groups
B)Security groups and Distribution groups
C)Storage groups and Distribution groups
D)Security groups and Local groups
A)User groups and Distribution groups
B)Security groups and Distribution groups
C)Storage groups and Distribution groups
D)Security groups and Local groups
Security groups and Distribution groups
4
Your network contains a file server named Serv1. Serv1 has a 30 GB data volume that is mirrored. Each physical disk is connected to a separate SCSI controller. A faulty SCSI controller causes one of the hard disks in the mirrored volume to fail. You replace the faulty SCSI controller. Which of the following should you do to restore the data volume to its previous state?
A)Run the diskpart active command on the failed volume.
B)Select a disk in the mirror and reactivate the volume on Serv1.
C)Convert the two physical disks on Serv1 to basic disks and restore the data.
D)Break the mirror on Serv1 and re-create the mirror.
A)Run the diskpart active command on the failed volume.
B)Select a disk in the mirror and reactivate the volume on Serv1.
C)Convert the two physical disks on Serv1 to basic disks and restore the data.
D)Break the mirror on Serv1 and re-create the mirror.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following folders cannot be redirected using the Windows 2008 Folder Redirection and Group policy?
A)My Documents
B)Application Data
C)Favorites
D)Desktop
A)My Documents
B)Application Data
C)Favorites
D)Desktop
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following commands is used to manage disks, partitions, and volumes from the command-line?
A)Convert
B)DiskPart
C)Diskman
D)Mandisk
A)Convert
B)DiskPart
C)Diskman
D)Mandisk
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
Your domain is configured to use only Kerberos authentication for all server connections. A user reports that he receives an "Access denied" error message when he attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user's client computer. Which command should you run from the command prompt on the user's computer?
A)Netsh
B)ksetup
C)ktpass
D)netdiag
A)Netsh
B)ksetup
C)ktpass
D)netdiag
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
You are the network administrator for abc.com. The network consists of a single Active Directory domain called abc.com. All domain controllers run Windows Server 2008. The security policy states that users who enter an invalid password more than twice in one day must be locked out. You need to configure domain account policy settings to enforce this rule. Which of the following is one of the two actions that you should perform?
A)Set the minimum password age to one day.
B)Change the Enforce password history setting to three passwords remembered.
C)Change the Account lockout duration setting to 1440 minutes.
D)Change the Account lockout threshold setting to three invalid logon attempts.
A)Set the minimum password age to one day.
B)Change the Enforce password history setting to three passwords remembered.
C)Change the Account lockout duration setting to 1440 minutes.
D)Change the Account lockout threshold setting to three invalid logon attempts.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
You have shared a folder on a Windows XP Professional computer. Jack reports that he is often unable to access this folder. You discover that the problem occurs whenever more than 10 users try to connect to the folder. Which of the following should you do to ensure that this issue is fixed?
A)Decrease the default user quota limit on the Windows XP computer hosting the shared folder.
B)Move the shared folder to one of the computers having Windows Server 2008 as the operating system.
C)Purchase additional client access licenses for the Windows XP computer hosting the shared folder.
D)Upgrade the RAM on the Windows XP computer hosting the shared folder.
A)Decrease the default user quota limit on the Windows XP computer hosting the shared folder.
B)Move the shared folder to one of the computers having Windows Server 2008 as the operating system.
C)Purchase additional client access licenses for the Windows XP computer hosting the shared folder.
D)Upgrade the RAM on the Windows XP computer hosting the shared folder.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
You deploy four new Windows Server 2008 servers and install Terminal Server software on each server. You then install applications on each server. Users will use Terminal Services sessions to access and run the applications hosted on the terminal servers. Which of the following should you do to automatically disconnect the users' connections when the specified session limit it broken?
A)Define all sessions to automatically disconnect when the specified session limit it broken.
B)Limit the number of connections on all six terminal servers to a specific number.
C)Restart the Terminal Server periodically.
D)Install multiple copies of Terminal Server software on a server.
A)Define all sessions to automatically disconnect when the specified session limit it broken.
B)Limit the number of connections on all six terminal servers to a specific number.
C)Restart the Terminal Server periodically.
D)Install multiple copies of Terminal Server software on a server.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
John's organization has an IAS configured to accept multiple authentication methods. During a negotiation, the network access servers attempt to negotiate a connection using the most secure protocol first, i.e. EAP first. Which of the following entities attempt to negotiate the EAP authentication mechanism?
A)Remote access client and the IAS server
B)RAS server and the IAS server
C)RAS server and the remote access client
D)RADIUS client and the remote access client
A)Remote access client and the IAS server
B)RAS server and the IAS server
C)RAS server and the remote access client
D)RADIUS client and the remote access client
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
An employee is receiving an error message when she tries to open a Web page. The error states "Web page requested is not available." You note that https:// appears in the address bar. You confirm that the site is up and running by accessing it from a computer outside your corporate network. Which of the following should you do to fix this problem?
A)Allow traffic on TCP port 443.
B)Allow traffic on TCP port 53.
C)Configure the default IPSec Client (Respond Only) policy on the client computers.
D)The Web server hosting the Web page is down.
A)Allow traffic on TCP port 443.
B)Allow traffic on TCP port 53.
C)Configure the default IPSec Client (Respond Only) policy on the client computers.
D)The Web server hosting the Web page is down.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following tasks cannot be performed from the Driver tab on the Device Properties page?
A)Updating the device driver
B)Rolling back the device driver
C)Verifying if the driver has been digitally signed
D)Specifying the I/O ranges for the hardware device
A)Updating the device driver
B)Rolling back the device driver
C)Verifying if the driver has been digitally signed
D)Specifying the I/O ranges for the hardware device
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
Your company operates a main office and three branch offices. A server named Server 1 is located in one of the branch offices and is a member of a workgroup. It is configured with default operating system settings with the Remote Desktop, Remote Assistance, and Windows Messenger enabled. An employee, John requests your assistance in installing an application on Server 1. You need to view John's desktop during the installation process. Which of the following should you do?
A)From your computer, open a Remote Desktop connection with Server 1.
B)Ask Server 1's administrator to create and send an invitation for Remote Assistance from Server 1.
C)From your computer, offer Remote Assistance to Server 1.
D)Direct John to start Application Sharing from Windows Messenger.
A)From your computer, open a Remote Desktop connection with Server 1.
B)Ask Server 1's administrator to create and send an invitation for Remote Assistance from Server 1.
C)From your computer, offer Remote Assistance to Server 1.
D)Direct John to start Application Sharing from Windows Messenger.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following are the minimum NTFS permissions required to allow users to open documents and run programs stored in a shared folder?
A)Full Control
B)Modify
C)Read & Execute
D)Write
A)Full Control
B)Modify
C)Read & Execute
D)Write
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
A server named SR06 runs an application named App1, which uses a large amount of network bandwidth per client connection. SR06 has only one network adapter installed and you suspect that the network connection on SR06 is running out of available network capacity. Which of the following would allow you to view the total network bandwidth that is being used on SR06?
A)Use System Monitor to configure the Network Interface object and then run the netstat command.
B)Use Network Monitor to configure a capture filter for the local area connection and then run the netstat command.
C)Use System Monitor to configure the Network Interface object and then monitor the Networking tab in Task Manager.
D)Use Network Monitor to configure a capture filter for the local area connection and then monitor the Networking tab in Task Manager.
A)Use System Monitor to configure the Network Interface object and then run the netstat command.
B)Use Network Monitor to configure a capture filter for the local area connection and then run the netstat command.
C)Use System Monitor to configure the Network Interface object and then monitor the Networking tab in Task Manager.
D)Use Network Monitor to configure a capture filter for the local area connection and then monitor the Networking tab in Task Manager.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following statements regarding Share permissions is not true?
A)Share permissions are not included in a backup or restore of a data volume.
B)Share permissions are lost if you move or rename the folder that is shared.
C)Share permissions do not replicate through file replication service.
D)Auditing can be configured based on share permissions.
A)Share permissions are not included in a backup or restore of a data volume.
B)Share permissions are lost if you move or rename the folder that is shared.
C)Share permissions do not replicate through file replication service.
D)Auditing can be configured based on share permissions.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
You need to modify the configuration of a service from Safe Mode With Command Prompt to repair a system that will not start normally. Which of the following command-line utilities enables you to do this?
A)Ping.exe
B)Netsh.exe
C)Netdiag.exe
D)Sc.exe
A)Ping.exe
B)Netsh.exe
C)Netdiag.exe
D)Sc.exe
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
A user from the Engineering department complains that he cannot log on by using his client computer. As a replacement, you provide him with another computer, but he is not able to login. Which of the following should you do to ensure that the emplyee is able to login to his account?
A)Click the Log On To button and select All computers from the Properties page for his user account.
B)Add the user to the Domain Users group from the Properties page for his user account.
C)Select Enable Account from the Properties page for his user account.
D)Select the Research group and add the Enable-Allow to Authenticate permission from the Properties page for his user account.
A)Click the Log On To button and select All computers from the Properties page for his user account.
B)Add the user to the Domain Users group from the Properties page for his user account.
C)Select Enable Account from the Properties page for his user account.
D)Select the Research group and add the Enable-Allow to Authenticate permission from the Properties page for his user account.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
You are assisting an employee who cannot remember his password. He states that he changed his password when he left office yesterday. This morning when he came back, he could not login to the domain. Which of the following should you do?
A)Add the user's account to his OU in the Active Directory Users and Computers snap-in.
B)Check the Account is locked out check box and select the User must change password at next logon check box in the user account properties of user's account.
C)Use the Active Directory Users and Computers snap-in to reset the user's password and give him the new password.
D)Use Computer Management to reset the password for the local Administrator account and give him the new password.
A)Add the user's account to his OU in the Active Directory Users and Computers snap-in.
B)Check the Account is locked out check box and select the User must change password at next logon check box in the user account properties of user's account.
C)Use the Active Directory Users and Computers snap-in to reset the user's password and give him the new password.
D)Use Computer Management to reset the password for the local Administrator account and give him the new password.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
Chad is the administrator of a Windows Server 2008 computer named Globe1. Globe1 is an FTP server located in Globe's internal network. Administrators report an increased amount of FTP traffic to Globe1. Chad needs to configure Globe1 to achieve these goals: Identify the MAC address of a computer using FTP transfers from Globe1, find out the FTP commands executed, and ensure that operation of Globe1 isn't disrupted. What should Chad do?
A)Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.
B)Use a Network Monitor filter to capture IP traffic from any computer to Globe1.
C)Run the arp command on Globe1 to identify the source of the FTP requests.
D)Run the finger command on Globe1 to identify the source of the FTP requests.
A)Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.
B)Use a Network Monitor filter to capture IP traffic from any computer to Globe1.
C)Run the arp command on Globe1 to identify the source of the FTP requests.
D)Run the finger command on Globe1 to identify the source of the FTP requests.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
An employee is receiving an error message when she tries to open a Web page. The error states "Web page requested is not available." You note that https:// appears in the address bar. You confirm that the site is up and running by accessing it from a computer outside your corporate network. Which of the following should you do to fix this problem?
A)Allow traffic on TCP port 443.
B)Allow traffic on TCP port 53.
C)Configure the default IPSec Client (Respond Only) policy on the client computers.
D)The Web server hosting the Web page is down.
A)Allow traffic on TCP port 443.
B)Allow traffic on TCP port 53.
C)Configure the default IPSec Client (Respond Only) policy on the client computers.
D)The Web server hosting the Web page is down.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
You are an administrator of an Active Directory domain named xyz.com. You configure a server named Server 2 as xyz.com's DHCP server. All client computers are configured as DHCP clients. Users report that they cannot connect to network resources. You investigate and discover that the client computers are not receiving their TCP/IP configurations from Server 2. What should you do to fix this issue?
A)Run the net stop dhcpserver command.
B)Authorize Server 2 using the DHCP console.
C)Run the net start dhcpserver command.
D)Restart the DHCP service using the DHCP console.
A)Run the net stop dhcpserver command.
B)Authorize Server 2 using the DHCP console.
C)Run the net start dhcpserver command.
D)Restart the DHCP service using the DHCP console.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
All computers on your network use the 10.10.0.0/16 address scheme. Tom, your manager, instructs you to place the 15 servers into a separate subnet that uses the 192.168.10 public addressing scheme. You must plan for a maximum of 25 servers in the future and need to configure a new subnet mask.
The subnet mask must allow a sufficient number of IP addresses for the existing servers and future growth. However, you want to conserve addresses as much as possible. Which subnet mask should you use?
A)255.255.255.248
B)255.255.255.240
C)255.255.255.224
D)255.255.255.252
The subnet mask must allow a sufficient number of IP addresses for the existing servers and future growth. However, you want to conserve addresses as much as possible. Which subnet mask should you use?
A)255.255.255.248
B)255.255.255.240
C)255.255.255.224
D)255.255.255.252
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
Your network includes a shared folder named IMPFol. You want to hide this folder from general view when a user is trying to access shared folders on this computer. Which of the following should you do?
A)Modify the share permissions to remove the All-Read permission on IMPFol from the Users group.
B)Change the share name to IMPFol $.
C)Change the share name to IMPFol #.
D)Modify the NTFS permissions to remove the Allow-Read permissions on IMPFol from the Users group.
A)Modify the share permissions to remove the All-Read permission on IMPFol from the Users group.
B)Change the share name to IMPFol $.
C)Change the share name to IMPFol #.
D)Modify the NTFS permissions to remove the Allow-Read permissions on IMPFol from the Users group.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
David is a network administrator in an organization. The organization's DHCP server has crashed and cannot be brought back online. The last backup is four days old. How can he preserve the current address space without restarting all user computers?
A)Deploy a new DHCP server with the same address scope and increase the new lease duration to 15 days.
B)Deploy a new DHCP server with the same address scope and raise conflict detection attempts to 3.
C)Restore the previous DHCP database from a backup.
D)Run the Ipconfig /renew command on all computers.
A)Deploy a new DHCP server with the same address scope and increase the new lease duration to 15 days.
B)Deploy a new DHCP server with the same address scope and raise conflict detection attempts to 3.
C)Restore the previous DHCP database from a backup.
D)Run the Ipconfig /renew command on all computers.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
Globe1 is a Windows Server 2008 computer and a critical file server configured with a DHCP client reservation. The DHCP server fails, and users report that they cannot access resources on Globe1. Which should you do to configure Globe1 so that it is available even if it is unable to obtain or renew a lease from the DHCP server?
A)Configure the DHCP scope in the 169.254.0.1 - 169.254.255.254 range.
B)On the Alternate Configuration tab of the Internet Protocol (TCP/IP) properties, configure IP setings.
C)Configure a static IP address.
D)On the DHCP server, configure the DHCP 001 Resource Location Servers reservation option for Globe1.
A)Configure the DHCP scope in the 169.254.0.1 - 169.254.255.254 range.
B)On the Alternate Configuration tab of the Internet Protocol (TCP/IP) properties, configure IP setings.
C)Configure a static IP address.
D)On the DHCP server, configure the DHCP 001 Resource Location Servers reservation option for Globe1.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
A server is configured to have a single 250-GB drive, which contains the operating system files. This drive also contains a shared folder where six network users store their graphic files. You want to prevent each network user from using more than 10GB of space in the shared folder. Which of the following should you do?
A)Create a quota entry for Everyone account. Set the quota limit to 10 GB.
B)Enable disk quotas on the volume and set the default disk quota limit to 10 GB. Select the Deny disk space to users exceeding quota limit check box.
C)Enable disk quotas on the volume and set the default disk quota limit to 10 GB. Select the Deny disk space to users exceeding 5 GB check box.
D)Upgrade the disk to a dynamic disk.
A)Create a quota entry for Everyone account. Set the quota limit to 10 GB.
B)Enable disk quotas on the volume and set the default disk quota limit to 10 GB. Select the Deny disk space to users exceeding quota limit check box.
C)Enable disk quotas on the volume and set the default disk quota limit to 10 GB. Select the Deny disk space to users exceeding 5 GB check box.
D)Upgrade the disk to a dynamic disk.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
The Performance Logs And Alerts service is set up to send a message to C4 to notify an operator when the network use on C3 is too high. However, C4 does not receive the message sent from C3. Which of the following should you do to enable messages to be sent by C3 and received by C4?
A)Start the Alerter service on both C3 and C4.
B)Start the Alerter service on C3 and start the Messenger service on C4.
C)Start the Alerter service on C4 and start the Messenger service on C3.
D)Start the Messenger service on both C3 and C4.
A)Start the Alerter service on both C3 and C4.
B)Start the Alerter service on C3 and start the Messenger service on C4.
C)Start the Alerter service on C4 and start the Messenger service on C3.
D)Start the Messenger service on both C3 and C4.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
What is the maximum number of simultaneous VPN connections that Windows Server 2008 Standard Edition can handle?
A)250
B)500
C)1000
D)Unlimited
A)250
B)500
C)1000
D)Unlimited
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
You DHCP server works fine except that events 1014 and 1016 appear regularly on the System event log. Which of the following tools/utilities should you use to diagnose these events?
A)Netsh
B)Jetpack
C)Netdiag
D)Microsoft Network Monitor
A)Netsh
B)Jetpack
C)Netdiag
D)Microsoft Network Monitor
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
A user reports that her computer cannot connect to a remote VPN server. You suspect that her client computer did not receive a recent hotfix. What should you do to verify which hotfixes are installed on her computer?
A)Run the update.exe command from a command prompt.
B)View the History-synch.xml file.
C)View the History-approve.xml file.
D)Run the wmic qfe command from a command prompt.
A)Run the update.exe command from a command prompt.
B)View the History-synch.xml file.
C)View the History-approve.xml file.
D)Run the wmic qfe command from a command prompt.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
You administer an Active Directory domain in which all servers are Microsoft Windows Server 2008, and all the clients are Microsoft Windows XP Professional. You have configured DHCP to update DNS only if the DHCP client requests. You find that the clients' A resource records are not updated in DNS when they obtain new DHCP leases. Which of the following is the most likely cause of this problem?
A)DNS is not integrated with the Active Directory.
B)DHCP server is not authorized in Active Directory.
C)The DHCP server's computer account is not a member of the DNSUpdateProxy global security group.
D)Clients are not configured to update their own host A resource records.
A)DNS is not integrated with the Active Directory.
B)DHCP server is not authorized in Active Directory.
C)The DHCP server's computer account is not a member of the DNSUpdateProxy global security group.
D)Clients are not configured to update their own host A resource records.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
Your network has a print server running Windows 2008. A single printer is installed on this print server. Users in the Sales department are unable to print from this printer. You examine the print queue and find a list of documents waiting to be printed. Your attempt to delete the documents from the queue is unsuccessful. What should you do to enable the Sales department users to print their documents?
A)Install a new print device and reconfigure the printer to send print jobs to the new print device.
B)Install a second instance of the printer and configure the print queue to hold mismatched documents. Redirect the original printer to the new printer.
C)Install a second instance of the printer and delete the original printer. Instruct users to resubmit their print jobs.
D)Stop and restart the Print Spooler service on the print server and ask users to resubmit their print jobs.
A)Install a new print device and reconfigure the printer to send print jobs to the new print device.
B)Install a second instance of the printer and configure the print queue to hold mismatched documents. Redirect the original printer to the new printer.
C)Install a second instance of the printer and delete the original printer. Instruct users to resubmit their print jobs.
D)Stop and restart the Print Spooler service on the print server and ask users to resubmit their print jobs.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
Chad decides to move the DHCP service from Server 1 to Server2. After installing DHCP on Server2, Chad creates a new scope in DHCP and activates it. Users report that they cannot log on to the network. Chad notices that the client computers are not receiving an IP address configuration from the DHCP server.
He opens Event Viewer on Server2 and views an event that states "The DHCP service failed to see a directory server for authorization." What should Chad do to fix this issue?
A)Authorize the DHCP service on Server2 in Active Directory.
B)Restart the DHCP service on Server2.
C)Uninstall the DHCP service on Server 1.
D)Install DNS on Server2. Configure a secondary zone on Server2 for the Active Directory domain DNS zone.
He opens Event Viewer on Server2 and views an event that states "The DHCP service failed to see a directory server for authorization." What should Chad do to fix this issue?
A)Authorize the DHCP service on Server2 in Active Directory.
B)Restart the DHCP service on Server2.
C)Uninstall the DHCP service on Server 1.
D)Install DNS on Server2. Configure a secondary zone on Server2 for the Active Directory domain DNS zone.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
David installs Software Update Services on a network server named S1. When David attempts to synchronize S1 with the Windows Update servers, he receives an error message. David suspects that the proxy server requires authentication.
He opens Internet Explorer and verifies that he can communicate with an external Web site by using the proxy server. What should David do to ensure that S1 can communicate with the Windows Update servers?
A)Configure authentication to the proxy server in the SUS options.
B)Restart the IIS administration tool.
C)Configure the Internet Explorer settings to bypass the proxy server.
D)Install the Microsoft Firewall Client.
He opens Internet Explorer and verifies that he can communicate with an external Web site by using the proxy server. What should David do to ensure that S1 can communicate with the Windows Update servers?
A)Configure authentication to the proxy server in the SUS options.
B)Restart the IIS administration tool.
C)Configure the Internet Explorer settings to bypass the proxy server.
D)Install the Microsoft Firewall Client.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following tools should you use to seize the role of any operations master?
A)netdom utility
B)ntdsutil utility
C)Active Directory Users and Computers tool
D)Active Directory Domains and Trusts tool
A)netdom utility
B)ntdsutil utility
C)Active Directory Users and Computers tool
D)Active Directory Domains and Trusts tool
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
Some computers on a network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. You discover that this traffic always uses a certain source TCP port number. You need to identify which computers are infected.
Your solution should include detecting and identifying traffic that is sent by the worm and sending a notification to a network administrator that the infected computer needs to be repaired. Which of the following should you do?
A)Configure a WMI event trigger.
B)Configure a Network Monitor capture filter.
C)Configure a System Monitor Alert.
D)Configure a Network Monitor trigger.
Your solution should include detecting and identifying traffic that is sent by the worm and sending a notification to a network administrator that the infected computer needs to be repaired. Which of the following should you do?
A)Configure a WMI event trigger.
B)Configure a Network Monitor capture filter.
C)Configure a System Monitor Alert.
D)Configure a Network Monitor trigger.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
You need to update five high-visibility servers with critical updates by using Windows Server Update Services (WSUS). After approving the updates, what should you do to ensure that the updates are applied within an hour?
A)Type the gpupdate /force command at the command prompt on the WSUS server.
B)Type the wuauclt /detectnow command at the command prompt on each of the five servers.
C)Type the gpupdate /force command at the command prompt on each of the five servers.
D)Type the wuauclt /detectnow command at the command prompt on the WSUS server.
A)Type the gpupdate /force command at the command prompt on the WSUS server.
B)Type the wuauclt /detectnow command at the command prompt on each of the five servers.
C)Type the gpupdate /force command at the command prompt on each of the five servers.
D)Type the wuauclt /detectnow command at the command prompt on the WSUS server.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
David is experiencing a delay when he tries to connect to a remote Web site. Which of the following tools can he use to determine the specific router that is responsible for this delay?
A)Netdiag
B)Ipconfig
C)PathPing
D)Tracert
A)Netdiag
B)Ipconfig
C)PathPing
D)Tracert
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
Which resource record is used to resolve domain names specified in e-mail addresses to the IP address of the mail server associated with the domain?
A)PTR
B)AX
C)CNAME
D)MX
A)PTR
B)AX
C)CNAME
D)MX
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following phases of software deployment is associated with creating and modifying Group Policy Objects?
A)Preparation
B)Distribution
C)Targeting
D)Installation
A)Preparation
B)Distribution
C)Targeting
D)Installation
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
All computers in the London office are configured to use S10 as their preferred DNS server. The Texas branch office has a server named S11 which hosts a primary zone named payroll.Globe.com. The refresh interval of the payroll.Globe.com zone is set to 24 hours. In the Texas office, a firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all computers from the London office network, except S10, from performing DNS lookups against S11.
As a business requirement no delay should occur between the time that a new record is created in the payroll.Globe.com zone and the time that the record can be resolved from any computers in the London office. All computers in the London office must be able to resolve names in the payroll.Globe.com namespace.
Which of the following should be done to configure DNS on S10 to meet the requirements?
A)Setup a stub zone named payroll.Globe.com.
B)Setup conditional forwarding to S11 for the payroll.Globe.com namespace.
C)In the Globe.com zone, set up a delegation to the payroll.Globe.com zone on S11.
D)Setup a secondary zone named payroll.Globe.com that has S11 as master.
As a business requirement no delay should occur between the time that a new record is created in the payroll.Globe.com zone and the time that the record can be resolved from any computers in the London office. All computers in the London office must be able to resolve names in the payroll.Globe.com namespace.
Which of the following should be done to configure DNS on S10 to meet the requirements?
A)Setup a stub zone named payroll.Globe.com.
B)Setup conditional forwarding to S11 for the payroll.Globe.com namespace.
C)In the Globe.com zone, set up a delegation to the payroll.Globe.com zone on S11.
D)Setup a secondary zone named payroll.Globe.com that has S11 as master.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following groups should you be a member of in order to be able to create or modify an application directory partition?
A)Domain users
B)Enterprise Admins
C)Server operators
D)Schema Admins
A)Domain users
B)Enterprise Admins
C)Server operators
D)Schema Admins
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck