Deck 3: Microsoft Windows 70-680 and 70-290
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/115
Play
Full screen (f)
Deck 3: Microsoft Windows 70-680 and 70-290
1
Which of the following files does a command Cipher.exe /r:recoveryagent create?
A)Recoveryagent.cdr and Recoveryagent.per
B)Recoveryagent.cer and Recoveryagent.pix
C)Recoveryagent.cer and Recoveryagent.pfx
D)Recoveryagent.cmr and Recoveryagent.pfx
A)Recoveryagent.cdr and Recoveryagent.per
B)Recoveryagent.cer and Recoveryagent.pix
C)Recoveryagent.cer and Recoveryagent.pfx
D)Recoveryagent.cmr and Recoveryagent.pfx
Recoveryagent.cer and Recoveryagent.pfx
2
Identify the application that is not a part is not part of Windows 7, but can be downloaded from the Microsoft Web site to indicate which handles and DLLs processes have opened or loaded?
A)Process Explorer
B)Resource Monitor
C)Event Viewer
D)Task Manager
A)Process Explorer
B)Resource Monitor
C)Event Viewer
D)Task Manager
Process Explorer
3
Which of the following is the tool that is displayed in the image?
A)Trace Capture, Processing, and Command-Line Analysis
B)Performance Analyzer
C)Visual Trace Analysis
D)On/Off Transition Trace Capture
A)Trace Capture, Processing, and Command-Line Analysis
B)Performance Analyzer
C)Visual Trace Analysis
D)On/Off Transition Trace Capture
Performance Analyzer
4
The functional level of the domain is Windows 2000 native and the network servers run either the Windows 2000 Server or the Windows Server 2003. All Accounting department users are members of an existing global distribution group named Acc-1. You create a new network share for the accounting users to enable the members of Acc-1 to access the file share. What of the following should you do?
A)Raise the functional level of the domain to Windows Server 2003.
B)Change the group scope of Acc-1 to universal.
C)Change the group type of Acc-1 to security.
D)Raise the functional level of the forest to Windows Server 2003.
A)Raise the functional level of the domain to Windows Server 2003.
B)Change the group scope of Acc-1 to universal.
C)Change the group type of Acc-1 to security.
D)Raise the functional level of the forest to Windows Server 2003.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
5
A network is spread across France, Italy, and Denmark. All network servers on the network run Window Server 2003 and each location has three print servers. You need to monitor usage of print queues on all network print servers. All monitored data must be stored in a central location and archived for two years to enable data comparison. What should you do?
A)Create a trace log and use a Circular Trace File log file type.
B)Create a counter log and use a Binary Circular File log file type.
C)Create a trace log and use Sequential Trace File log file type.
D)Create a counter log and use a SQL Database log file type.
A)Create a trace log and use a Circular Trace File log file type.
B)Create a counter log and use a Binary Circular File log file type.
C)Create a trace log and use Sequential Trace File log file type.
D)Create a counter log and use a SQL Database log file type.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
6
Chad is the network administrator for an organization. The desktop environment for all client computers needs to be standardized. Which of the following should Chad do?
A)Specify the profile's local path in the user properties in Computer Management.
B)Specify the profile's network path in the user properties in Active Directory Users and computers.
C)Specify the profile's network path in the user properties in Computer Management.
D)Rename Ntuser.dat to Ntuser.man in the local profile directory.
A)Specify the profile's local path in the user properties in Computer Management.
B)Specify the profile's network path in the user properties in Active Directory Users and computers.
C)Specify the profile's network path in the user properties in Computer Management.
D)Rename Ntuser.dat to Ntuser.man in the local profile directory.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
7
You need to ensure that a current copy of the registry from every server on the network is automatically backed up daily on magnetic tape. Which of the following should you do?
A)Create a new backup job that runs every day on the backup server. Configure the job to back up drive C:\ on every network server.
B)Configure a new backup job that runs every day on each network server. Configure the job to back up each server's System State data in a file on drive D:\.
C)Select Options and then select the Exclusions tab on the backup server. Remove all exclusions for files of the Registry Writer application type.
D)Start Registry Editor on each network server. On the File menu, select Export and Specify All as the export range. Export this registry to drive D:\.
A)Create a new backup job that runs every day on the backup server. Configure the job to back up drive C:\ on every network server.
B)Configure a new backup job that runs every day on each network server. Configure the job to back up each server's System State data in a file on drive D:\.
C)Select Options and then select the Exclusions tab on the backup server. Remove all exclusions for files of the Registry Writer application type.
D)Start Registry Editor on each network server. On the File menu, select Export and Specify All as the export range. Export this registry to drive D:\.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
8
You delegate the permissions to create, delete, and manage groups to an IT administrator. When he tries to log on to the domain controller, he receives the error message shown in the image. Which of the following should you do to enable him to manage groups in the domain?
A)Modify the default security policy for the domain and refresh this policy using Secedit.exe.
B)Modify the default security policy for the domain and refresh the policy using Gpupdate.exe.
C)Modify the default security policy for the Domain Controllers OU and refresh the policy using Secedit.exe.
D)Modify the default security policy for the Domain Controllers OU and refresh the policy using Gpupdate.exe.
A)Modify the default security policy for the domain and refresh this policy using Secedit.exe.
B)Modify the default security policy for the domain and refresh the policy using Gpupdate.exe.
C)Modify the default security policy for the Domain Controllers OU and refresh the policy using Secedit.exe.
D)Modify the default security policy for the Domain Controllers OU and refresh the policy using Gpupdate.exe.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
9
You monitor a server having a RAID-5 volume. It reveals a failed disk in the set. This server is used to host shared folders on the network. You shut down the server and replace the failed disk. Which of the following should you to ensure that the RAID-5 volume is redundant?
A)Import the foreign disk. Select the failed region and then select the Repair Volume option.
B)Initialize the new disk. Select the failed region and then select the Reactive Disk option.
C)Initialize the new disk. Select the failed region and then select the Repair Volume option.
D)Import the foreign disk. Select the failed region and then select the Reactive Disk option.
A)Import the foreign disk. Select the failed region and then select the Repair Volume option.
B)Initialize the new disk. Select the failed region and then select the Reactive Disk option.
C)Initialize the new disk. Select the failed region and then select the Repair Volume option.
D)Import the foreign disk. Select the failed region and then select the Reactive Disk option.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
10
You have shared a folder on a Windows XP Professional computer. Jack reports that he is often unable to access this folder. You discover that the problem occurs whenever more than 10 users try to connect to the folder. Which of the following should you do to ensure that this issue is fixed?
A)Decrease the default user quota limit on the Windows XP computer hosting the shared folder.
B)Move the shared folder to one of the computers having Windows Server 2003 as the operating system.
C)Purchase additional client access licenses for the Windows XP computer hosting the shared folder.
D)Upgrade the RAM on the Windows XP computer hosting the shared folder.
A)Decrease the default user quota limit on the Windows XP computer hosting the shared folder.
B)Move the shared folder to one of the computers having Windows Server 2003 as the operating system.
C)Purchase additional client access licenses for the Windows XP computer hosting the shared folder.
D)Upgrade the RAM on the Windows XP computer hosting the shared folder.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
11
Your network includes a shared folder named IMPFol. You want to hide this folder from general view when a user is trying to access shared folders on this computer. Which of the following should you do?
A)Modify the share permissions to remove the All-Read permission on IMPFol from the Users group.
B)Change the share name to IMPFol $.
C)Change the share name to IMPFol #.
D)Modify the NTFS permissions to remove the Allow-Read permissions on IMPFol from the Users group.
A)Modify the share permissions to remove the All-Read permission on IMPFol from the Users group.
B)Change the share name to IMPFol $.
C)Change the share name to IMPFol #.
D)Modify the NTFS permissions to remove the Allow-Read permissions on IMPFol from the Users group.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
12
A user reports that she cannot access a remote computer using a Remote Desktop connection. When you verify her network hardware in the Device Manager, you obtain the information shown in the image. Which of the following should you do to fix this problem?
A)Change the IRQ setting of the network adapter.
B)Change the IP address of the network adapter.
C)Reinstall Remote Desktop software package.
D)Enable the network adapter.
A)Change the IRQ setting of the network adapter.
B)Change the IP address of the network adapter.
C)Reinstall Remote Desktop software package.
D)Enable the network adapter.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
13
You are a network administrator responsible for defining the backup and restore procedures for all servers using a Backup utility. To enhance security, certificates are deployed and Smart cards are used to log on to the domain. A domain controller named DC4 is configured as the certificate server. You need to create a backup plan for D4. The backup must include only the minimum amount of data needed to restore Active Directory and the certificate server. Which action or actions should you perform?
A)Back up the System State data.
B)Back up C:\windows\ntds.
C)Back up C:\windows\sysvol.
D)Back up C:\windows\ system32\certsrv.
A)Back up the System State data.
B)Back up C:\windows\ntds.
C)Back up C:\windows\sysvol.
D)Back up C:\windows\ system32\certsrv.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
14
Your company operates a main office and three branch offices. A server named Server 1 is located in one of the branch offices and is a member of a workgroup. It is configured with default operating system settings with the Remote Desktop, Remote Assistance, and Windows Messenger enabled. An employee, John requests your assistance in installing an application on Server 1. You need to view John's desktop during the installation process. Which of the following should you do?
A)From your computer, open a Remote Desktop connection with Server 1.
B)Ask Server 1's administrator to create and send an invitation for Remote Assistance from Server 1.
C)From your computer, offer Remote Assistance to Server 1.
D)Direct John to start Application Sharing from Windows Messenger.
A)From your computer, open a Remote Desktop connection with Server 1.
B)Ask Server 1's administrator to create and send an invitation for Remote Assistance from Server 1.
C)From your computer, offer Remote Assistance to Server 1.
D)Direct John to start Application Sharing from Windows Messenger.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is a valid licensing mode in a Windows Server 2003 operating system?
A)Per User
B)Per Server
C)Per Seat
D)Per Device
A)Per User
B)Per Server
C)Per Seat
D)Per Device
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
16
The user accounts for employees in the Sales department are located in Sales OU. The Sales OU also contains a Global Security group named SalesUsers. All Sales employees are members of SalesUsers. John, working in the Sales department, reports that he cannot log in to the domain and receives the error message shown in the image. Which of the following should you do to ensure that he can login to his domain?
A)Use Active Directory Users and Computers to add John's user account to the Domain Users group.
B)Use Active Directory Users and Computers to add John's user account to the Guests group.
C)Use the dsmod user command line tool to enable John's user account.
D)Use the net accounts command line tool to enable John's user account.
A)Use Active Directory Users and Computers to add John's user account to the Domain Users group.
B)Use Active Directory Users and Computers to add John's user account to the Guests group.
C)Use the dsmod user command line tool to enable John's user account.
D)Use the net accounts command line tool to enable John's user account.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
17
You want to set an account policy that locks a user's account after four consecutive failed logon attempts. Which of the following should you do?
A)Set the Account lockout duration value to 3.
B)Set the Account lockout threshold value to 0.
C)Set the Account lockout threshold value to 4.
D)Set the Reset account lockout counter after value to 4.
A)Set the Account lockout duration value to 3.
B)Set the Account lockout threshold value to 0.
C)Set the Account lockout threshold value to 4.
D)Set the Reset account lockout counter after value to 4.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
18
A server is configured to have a single 25-GB drive, which contains the operating system files. This drive also contains a shared folder where six network users store their graphic files. You want to prevent each network user from using more than 2GB of space in the shared folder. Which of the following should you do?
A)Create a quota entry for Everyone account. Set the quota limit to 2 GB.
B)Enable disk quotas on the volume and set the default disk quota limit to 2 GB. Select the Deny disk space to users exceeding quota limit check box.
C)Enable disk quotas on the volume and set the default disk quota limit to 2 GB. Select the Deny disk space to users exceeding 5 GB check box.
D)Upgrade the disk to a dynamic disk.
A)Create a quota entry for Everyone account. Set the quota limit to 2 GB.
B)Enable disk quotas on the volume and set the default disk quota limit to 2 GB. Select the Deny disk space to users exceeding quota limit check box.
C)Enable disk quotas on the volume and set the default disk quota limit to 2 GB. Select the Deny disk space to users exceeding 5 GB check box.
D)Upgrade the disk to a dynamic disk.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
19
You need to track all user accounts that have not been used for over a month. Which of the following tools should you use?
A)DSADD
B)DSMOD
C)DSRM
D)DSQUERY
A)DSADD
B)DSMOD
C)DSRM
D)DSQUERY
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
20
One of your application servers stops responding. After the help desk technicians fix the server, it runs normally. You want to gather and store data to diagnose the problem if it occurs again. Which of the following should you do?
A)Open Event Viewer and review the security logs on the server.
B)Open Task Manager and gather memory usage statistics.
C)Create a System Monitor log and gather data periodically.
D)Open Device Manager and restart all devices.
A)Open Event Viewer and review the security logs on the server.
B)Open Task Manager and gather memory usage statistics.
C)Create a System Monitor log and gather data periodically.
D)Open Device Manager and restart all devices.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
21
A server named Serv1 has a print device directly connected to the parallel port. The print device is shared by all users. Your manager reports that his documents are often printed after documents submitted by other users. You need to ensure that his documents take precedence over documents submitted for printing by other users. Which of the following should you do?
A)Assign the Allow-Take Ownership permission to your manager and restart the Print Spooler service on Serv1.
B)Create a new printer Serv1 and configure it to print to the print device. Modify the priority of the new printer and configure your manager's computer to print to the new printer.
C)Make your manager's user account, the owner of the printer, and restart the Print Spooler service on Serv1.
D)Create a new printer on Serv1 and configure it to print to the print device. In the Advanced tab of the new printer properties, select the Print directly to the printer option. Configure your manager's computer to print to the new printer.
A)Assign the Allow-Take Ownership permission to your manager and restart the Print Spooler service on Serv1.
B)Create a new printer Serv1 and configure it to print to the print device. Modify the priority of the new printer and configure your manager's computer to print to the new printer.
C)Make your manager's user account, the owner of the printer, and restart the Print Spooler service on Serv1.
D)Create a new printer on Serv1 and configure it to print to the print device. In the Advanced tab of the new printer properties, select the Print directly to the printer option. Configure your manager's computer to print to the new printer.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
22
You need to use the Backup utility to back up all data on a file server three times per day. Files that are currently opened by applications must not be backed up. Which of the following should you do?
A)Run a differential backup.
B)Run an incremental backup.
C)Run a full backup.
D)Disable volume shadow copies.
A)Run a differential backup.
B)Run an incremental backup.
C)Run a full backup.
D)Disable volume shadow copies.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
23
You are managing a server named Server3 that has IIS installed on it. It hosts a public Web site. You need to configure Server3 to allow remote administration of all Web sites. You must also be able to view the system and application event logs remotely using a Web browser only. Which of the following should you do?
A)Enable Remote Desktop on Server3.
B)Install the Remote Administration Windows component.
C)Configure the startup type of the Telnet service to Automatic and start the Telnet service.
D)Install the Remote Desktop Web Connection Windows component.
A)Enable Remote Desktop on Server3.
B)Install the Remote Administration Windows component.
C)Configure the startup type of the Telnet service to Automatic and start the Telnet service.
D)Install the Remote Desktop Web Connection Windows component.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following locations does not allow you to change the domain membership of a Windows Server 2003 computer?
A)My Computer's Properties
B)Control Panel's System applet
C)Active Directory Users and Computers snap-in
D)The Users applet in Control Panel
A)My Computer's Properties
B)Control Panel's System applet
C)Active Directory Users and Computers snap-in
D)The Users applet in Control Panel
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
25
You install and configure SUS on a server named Server4. All client computers must download security updates from Server4. You need to prepare the client computers so they can connect to Server4 to download Windows security updates. Which of the following should you do?
A)Create a logon script that connects to the Windows Update Catalog Web site and downloads security updates to the client computes.
B)Install the automatic Updates client on all client computers and configure the client computers to use Automatic Updates to connect to Server4.
C)Create a new GPO and link it to the OU. Configure the GPO to create a software package that assigns security updates from Server4 to the client computers.
D)Add http:// Server4 as the value for WUStatusServer registry entries on all client computers.
A)Create a logon script that connects to the Windows Update Catalog Web site and downloads security updates to the client computes.
B)Install the automatic Updates client on all client computers and configure the client computers to use Automatic Updates to connect to Server4.
C)Create a new GPO and link it to the OU. Configure the GPO to create a software package that assigns security updates from Server4 to the client computers.
D)Add http:// Server4 as the value for WUStatusServer registry entries on all client computers.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
26
Some important documents are placed in a folder named Design. An employee from the Engineering team needs access to these. He should be able to read and modify all except one document in the folder. He should only be able to read this document. The employee is a member of the Domain Users group and the Engineering group. Which of the following should you do?
A)Set the hidden and system attributes on for the specific document that he should not be able to modify.
B)Disable permissions inheritance for the specific document that he should not be able to modify.
C)Assign him the Deny-Write NTFS permission for the specific document that he should not be able to modify.
D)Assign him the Allow-Read permission for the specific document that he should not be able to modify.
A)Set the hidden and system attributes on for the specific document that he should not be able to modify.
B)Disable permissions inheritance for the specific document that he should not be able to modify.
C)Assign him the Deny-Write NTFS permission for the specific document that he should not be able to modify.
D)Assign him the Allow-Read permission for the specific document that he should not be able to modify.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
27
You deploy four new Windows Server 2003 servers and install Terminal Server software on each server. You then install applications on each server. Users will use Terminal Services sessions to access and run the applications hosted on the terminal servers. Which of the following should you do to automatically disconnect the users' connections when the specified session limit it broken?
A)Define all sessions to automatically disconnect when the specified session limit it broken.
B)Limit the number of connections on all six terminal servers to a specific number.
C)Restart the Terminal Server periodically.
D)Install multiple copies of Terminal Server software on a server.
A)Define all sessions to automatically disconnect when the specified session limit it broken.
B)Limit the number of connections on all six terminal servers to a specific number.
C)Restart the Terminal Server periodically.
D)Install multiple copies of Terminal Server software on a server.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
28
Server 1 is a file server that hosts a shared folder named DesignDocs. An employee working in the Engineering department complains that when he attempts to create or add a file to the DesignDocs folder, he gets an error message. The Engineering group is assigned Read as a Share Permission and Modify as the NTFS Permission. Which of the following should you do to configure appropriate permissions for the DesignDocs folder so that all Engineering users can add their files to it?
A)Assign the Allow - Change share permission to the Engineering group.
B)Assign the Allow - Change share permission to the user's account.
C)Assign the Allow - Write NTFS permission to the Engineering group.
D)Assign the Allow - Full Control share permission to the Engineering group.
A)Assign the Allow - Change share permission to the Engineering group.
B)Assign the Allow - Change share permission to the user's account.
C)Assign the Allow - Write NTFS permission to the Engineering group.
D)Assign the Allow - Full Control share permission to the Engineering group.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
29
A user from the Engineering department complains that he cannot log on by using his client computer. As a replacement, you provide him with another computer, but he is not able to login. Which of the following should you do to ensure that the emplyee is able to login to his account?
A)Click the Log On To button and select All computers from the Properties page for his user account.
B)Add the user to the Domain Users group from the Properties page for his user account.
C)Select Enable Account from the Properties page for his user account.
D)Select the Research group and add the Enable-Allow to Authenticate permission from the Properties page for his user account.
A)Click the Log On To button and select All computers from the Properties page for his user account.
B)Add the user to the Domain Users group from the Properties page for his user account.
C)Select Enable Account from the Properties page for his user account.
D)Select the Research group and add the Enable-Allow to Authenticate permission from the Properties page for his user account.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following LDIFDE commands should you use to change the function of LDIFDE from export to import?
A)-t
B)-i
C)-f
D)-s
A)-t
B)-i
C)-f
D)-s
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following tools can be used to identify the site license server a site?
A)Active Directory Domains And Trusts
B)The Licensing tool in Control Panel
C)DNS
D)Active Directory Sites And Services
A)Active Directory Domains And Trusts
B)The Licensing tool in Control Panel
C)DNS
D)Active Directory Sites And Services
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
32
You are working as a network administrator in a company. Your company has hired 10 temporary employees. Their accounts are set to expire in three months. After the two month period, of the 10 employees, the manager plans to retain one of them. This employee is not able to login now. Which of the following should you do to enable the user to login to the domain?
A)Change his Account Expiration option to Never.
B)Reset his password.
C)Run the DSMOD command for the user and specify the -DISABLED NO parameter.
D)Recreate his user account.
A)Change his Account Expiration option to Never.
B)Reset his password.
C)Run the DSMOD command for the user and specify the -DISABLED NO parameter.
D)Recreate his user account.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
33
Your company had three departments named Marketing, Finance, and Research. You create an OU structure for the your domain based on the departments. You now need to move the user accounts to the appropriate OU. Which of the following should you do to automate the task?
A)Run the dsmod command with the parameters based on the Department attribute and the OU.
B)Run the dsget command with the parameters based on the Department attribute and the OU.
C)Run the dsquery command with the parameters based on the Department attribute and the OU.
D)Run the dsrm command with the parameters based on the Department attribute and the OU.
A)Run the dsmod command with the parameters based on the Department attribute and the OU.
B)Run the dsget command with the parameters based on the Department attribute and the OU.
C)Run the dsquery command with the parameters based on the Department attribute and the OU.
D)Run the dsrm command with the parameters based on the Department attribute and the OU.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
34
You create a user account for an IT employee and delegate permissions to create, delete, and manage groups to his account in Active Directory Users and Computers snap-in. The IT employee needs to manage groups in three departments. He is to use a domain controller named DOM1 for this task. However, he complains that he cannot log on to DOM1. Which of the following should you do to ensure that he can manage groups from DOM1?
A)Modify the default security policy for the domain and refresh the policy using Secedit.exe.
B)Modify the default security policy for the domain and refresh the policy by using Gpupdate.exe.
C)Modify the default security policy for the DOM1 OU and refresh the policy by using Gpupdate.exe.
D)Modify the default security policy for the DOM1 OU and refresh the policy by using Secedit.exe.
A)Modify the default security policy for the domain and refresh the policy using Secedit.exe.
B)Modify the default security policy for the domain and refresh the policy by using Gpupdate.exe.
C)Modify the default security policy for the DOM1 OU and refresh the policy by using Gpupdate.exe.
D)Modify the default security policy for the DOM1 OU and refresh the policy by using Secedit.exe.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
35
One morning an employee complains that he cannot logon to the domain because his user account is locked out. You unlock his account in Active Directory Users and the Computers snap-in. The next day he is complaining that his account is locked out again. You suspect that an attacker is attempting to crack the his password. Which of the following should you do to verify this?
A)Search for security events in the event log of a domain controller where the user is located.
B)Search for security events in the event log of the domain controller where the attacker may be located.
C)Search for security events in the event log of all domain controllers in all sites.
D)Search for security events in the event log on the user's computer.
A)Search for security events in the event log of a domain controller where the user is located.
B)Search for security events in the event log of the domain controller where the attacker may be located.
C)Search for security events in the event log of all domain controllers in all sites.
D)Search for security events in the event log on the user's computer.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
36
You install a new third-party network application on a domain controller named DOM2. You create a service account named NetworkApp1 for the network application and configure the network application to use the new account.
You notice a dictionary attack against the NetworkApp1 account. You take immidiate security mitigation steps and prevent the attack. You restart DOM2, but the network application does not respond. Which of the following should you do to start the Network application?
A)Assign the NetworkApp1 account the right to log on locally in Active Directory Users and Computers snap-in.
B)Reset the password for the NetworkApp1 account in Active Directory Users and Computers snap-in.
C)Unlock the NetworkApp1 account in Active Directory Users and Computers snap-in.
D)Restart the NetworkApp1 service on DOM2.
You notice a dictionary attack against the NetworkApp1 account. You take immidiate security mitigation steps and prevent the attack. You restart DOM2, but the network application does not respond. Which of the following should you do to start the Network application?
A)Assign the NetworkApp1 account the right to log on locally in Active Directory Users and Computers snap-in.
B)Reset the password for the NetworkApp1 account in Active Directory Users and Computers snap-in.
C)Unlock the NetworkApp1 account in Active Directory Users and Computers snap-in.
D)Restart the NetworkApp1 service on DOM2.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
37
The Sales manager complains that someone is trying to gain unauthorized access to files on the client computers in the Sales department located in the Sales OU. You are to identify the user account that tried to gain this unauthorized access. Which of the following should you do?
A)Configure auditing of the Everyone group for the files and folders you suspect are being accessed and enable an audit policy for the Sales department OU.
B)Configure auditing in the Default Domain Controller Policy.
C)Configure auditing for every client computer in the Sales department OU.
D)Configure auditing of the Sales group for the files and folders you suspect are being accessed.
A)Configure auditing of the Everyone group for the files and folders you suspect are being accessed and enable an audit policy for the Sales department OU.
B)Configure auditing in the Default Domain Controller Policy.
C)Configure auditing for every client computer in the Sales department OU.
D)Configure auditing of the Sales group for the files and folders you suspect are being accessed.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following commands are used to move an object from one container to another?
A)dsmove
B)dsadd
C)dsget
D)dsquery
A)dsmove
B)dsadd
C)dsget
D)dsquery
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
39
You work as a network administrator for abc.com. All domain controllers on the abc.com network run Windows Server 2003 and all client computers run Windows XP Professional. Your colleague installs Windows XP Professional on a new computer for a new employee who has joined a week ago.
When the employee tries to log on to the domain from his computer, he is unsuccessful. The logon dialog box does not allow him to view and select the domain name. Which of the following should you do to allow the employee to login?
A)Add the employee's account to the Enterprise Admins group.
B)Enable the employee's computer account.
C)Add the employee's user account to the Server Operators group.
D)Configure his computer as a member of the domain.
When the employee tries to log on to the domain from his computer, he is unsuccessful. The logon dialog box does not allow him to view and select the domain name. Which of the following should you do to allow the employee to login?
A)Add the employee's account to the Enterprise Admins group.
B)Enable the employee's computer account.
C)Add the employee's user account to the Server Operators group.
D)Configure his computer as a member of the domain.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following folder locations on a local system stores the user profiles?
A)\Documents and Settings \%Username%
B)%Systemdrive%\ Username%
C)%Systemdrive%\Documents and Settings\ %Username%
D)%Systemdrive%\Use Profile\ %Username%
A)\Documents and Settings \%Username%
B)%Systemdrive%\ Username%
C)%Systemdrive%\Documents and Settings\ %Username%
D)%Systemdrive%\Use Profile\ %Username%
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following statement is true regarding a folder's Effective permissions?
A)Allow permissions to take precedence over Deny permissions.
B)Inherited permissions to take precedence over Explicit permissions.
C)Allow permissions are cumulative.
D)Folder permissions override File permissions.
A)Allow permissions to take precedence over Deny permissions.
B)Inherited permissions to take precedence over Explicit permissions.
C)Allow permissions are cumulative.
D)Folder permissions override File permissions.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
42
You need to import some crucial data from your company partner's domain to your domain. You receive a comma delimited file that contains the names of all users who will work at your company location. Which command should you use to import the accounts to your domain?
A)ldifde
B)ntdsutil
C)dsadd user
D)csvde
A)ldifde
B)ntdsutil
C)dsadd user
D)csvde
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
43
You have to create several new user accounts for your domain from the command line. Which of the following should you do?
A)Run dsm at the command prompt.
B)Run dsadd at the command prompt.
C)Run dsmove at the command prompt.
D)Run dscreate at the command prompt.
A)Run dsm at the command prompt.
B)Run dsadd at the command prompt.
C)Run dsmove at the command prompt.
D)Run dscreate at the command prompt.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
44
Your company is hiring a team of development engineers. The team will work in two shifts of 12 hours each. Each shift will have 10 engineers working. Each engineer will use three devices to develop and test the software, which authenticates against a Windows Server 2003 computer. What is the minimum number of CALs required?
A)6
B)18
C)20
D)30
A)6
B)18
C)20
D)30
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
45
You are setting up printing on a Windows Server 2003 computer. You attach and configure a logical printer. You submit documents for printing, but the documents do not print completely. Sometimes the print comes out garbled. Which of the following is the most likely cause of the problem?
A)Disk space available for spooling is insufficient.
B)Printer is not configured on the correct port.
C)Device settings for the printer are using incorrect font substitution.
D)Printer is configured with an incorrect printer driver.
A)Disk space available for spooling is insufficient.
B)Printer is not configured on the correct port.
C)Device settings for the printer are using incorrect font substitution.
D)Printer is configured with an incorrect printer driver.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
46
You want to prevent users from sending print jobs to a logical printer that serves a faulty physical printer serving that device. Which of the following should you do?
A)Remove the printer from the Active Directory
B)Do not share the printer
C)Change the printer port
D)Rename the share name of the printer
A)Remove the printer from the Active Directory
B)Do not share the printer
C)Change the printer port
D)Rename the share name of the printer
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following statements regarding Share permissions is not true?
A)Share permissions are not included in a backup or restore of a data volume.
B)Share permissions are lost if you move or rename the folder that is shared.
C)Share permissions do not replicate through file replication service.
D)Auditing can be configured based on share permissions.
A)Share permissions are not included in a backup or restore of a data volume.
B)Share permissions are lost if you move or rename the folder that is shared.
C)Share permissions do not replicate through file replication service.
D)Auditing can be configured based on share permissions.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is not a valid criterion for a security log filter to identify specific file and folder access events?
A)The date of the event
B)The user that generated the event
C)The type of object access that generated the event
D)Success or failure audit
A)The date of the event
B)The user that generated the event
C)The type of object access that generated the event
D)Success or failure audit
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following locations is not allowed to be used for backup in a Windows Server 2003 system?
A)Local tape drive
B)Local hard drive
C)Shared folder on a remote server
D)Tape drive on a remote server
A)Local tape drive
B)Local hard drive
C)Shared folder on a remote server
D)Tape drive on a remote server
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
50
You want to setup a printer pool on a Windows Server 2003 computer. The printer pool contains four print devices. Which of the following should you do after you open the properties for the printer and select the Enable Printer Pooling option on the Ports tab?
A)Configure the LPT1 port to support four printers.
B)On the Device Settings tab, configure the installable options to support four additional print devices.
C)On the Advanced tab, configure the priority for each print device so that printing is distributed among four print devices.
D)Select or create the ports mapped to four printers.
A)Configure the LPT1 port to support four printers.
B)On the Device Settings tab, configure the installable options to support four additional print devices.
C)On the Advanced tab, configure the priority for each print device so that printing is distributed among four print devices.
D)Select or create the ports mapped to four printers.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
51
You installed a new display driver. You are prompted to restart the computer for the changes to take effect. Once you have logged on after the restart, the computer screen goes blank. Which of the following utility combinations should you use to recover from the erratic display driver?
A)Last Known Good Configuration and Safe mode
B)Driver Rollback and Last Known Good Configuration
C)Safe mode and Recovery Console
D)Safe mode and Driver Rollback
A)Last Known Good Configuration and Safe mode
B)Driver Rollback and Last Known Good Configuration
C)Safe mode and Recovery Console
D)Safe mode and Driver Rollback
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following allows you to track the use of disk space on a per-user basis and deny users from using any extra disk space in a volume?
A)Disabling Disk Quotas
B)Enabling Disk Quotas
C)Enabling Disk Quotas with disk quota limit
D)Enabling Disk Quotas with disk quota warning level
A)Disabling Disk Quotas
B)Enabling Disk Quotas
C)Enabling Disk Quotas with disk quota limit
D)Enabling Disk Quotas with disk quota warning level
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
53
You are an administrator who wants to logon to a non-administrator account and run applications in the administrative mode. Which of the following logon options should you use?
A)Domain logon
B)Smart Card logon
C)Secondary logon
D)Local logon
A)Domain logon
B)Smart Card logon
C)Secondary logon
D)Local logon
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
54
You want to scan all the system files on your computer for viruses and integrity issues. Which of the following commands should you use?
A)Sigverif
B)Sfc/scannow
C)Diskpart
D)Diskscan
A)Sigverif
B)Sfc/scannow
C)Diskpart
D)Diskscan
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
55
You want to perform multiple backups of only those files that are modified since the last normal backup. You also want to ensure that the backed-up files use the minimum amount of media. Which of the following backup schemes should you use?
A)Normal backup
B)Differential backup
C)Full backup
D)Incremental backup
A)Normal backup
B)Differential backup
C)Full backup
D)Incremental backup
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
56
Your have placed 15 computers in various locations throughout the building. An employee must be able to allow access to company information when he is away from his desktop computer. You want to ensure that any changes made by an employee at one of these shared computers to the desktop settings are automatically applied to any of the other shared computers. Which of the following should you do?
A)Configure a mandatory profile and assign it to each user in the domain.
B)Configure a roaming profile and assign it to each user in the domain.
C)Configure a mandatory profile and assign it to each shared computer.
D)Configure a roaming profile and assign it to each shared computer.
A)Configure a mandatory profile and assign it to each user in the domain.
B)Configure a roaming profile and assign it to each user in the domain.
C)Configure a mandatory profile and assign it to each shared computer.
D)Configure a roaming profile and assign it to each shared computer.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
57
You want to centrally manage all employees' desktops in your company. You want to prohibit changes to desktop settings by the users. Which of the following should you do?
A)Configure the permissions on the profile folder's Security property window to deny write permission.
B)Modify the file name of Ntuser.dat in the profile folder to Ntuser.man.
C)Configure the permissions on the profile folder's Sharing property window to allow only read permission.
D)Modify the attributes of the profile folder to specify the Read Only attribute.
A)Configure the permissions on the profile folder's Security property window to deny write permission.
B)Modify the file name of Ntuser.dat in the profile folder to Ntuser.man.
C)Configure the permissions on the profile folder's Sharing property window to allow only read permission.
D)Modify the attributes of the profile folder to specify the Read Only attribute.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
58
John reports that he cannot log on to the network from a laptop running on Windows 98. However, he can log on from a desktop computer that is running Windows XP. The Windows 98 computer does not have the Active Directory Client installed. Which of the following could be the most likely cause of the issue?
A)John's computer account in the domain needs to be reset.
B)John's account needs to be configured to allow logon to all workstations.
C)John's home directory is corrupted.
D)John's password is longer than 14 characters.
A)John's computer account in the domain needs to be reset.
B)John's account needs to be configured to allow logon to all workstations.
C)John's home directory is corrupted.
D)John's password is longer than 14 characters.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following does a Device Manager Status code of 10 signify?
A)This device is not configured correctly.
B)The device cannot start.
C)The driver for this device might be corrupted.
D)This device cannot find enough free resources that it can use.
A)This device is not configured correctly.
B)The device cannot start.
C)The driver for this device might be corrupted.
D)This device cannot find enough free resources that it can use.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following provides the ability to recover from the failure of a single hard drive?
A)Primary partition
B)Extended partition
C)RAID-5 volume
D)Spanned volume
A)Primary partition
B)Extended partition
C)RAID-5 volume
D)Spanned volume
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
61
What is the maximum number of disks that can be a part of the RAID-5 volume?
A)32
B)24
C)12
D)100
A)32
B)24
C)12
D)100
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following specifies the required amount of free disk space on a volume in order to use a complete defragmentation?
A)5 percent
B)10 percent
C)15 percent
D)25 percent
A)5 percent
B)10 percent
C)15 percent
D)25 percent
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
63
Your company is planning to setup a new office for the Engineering department. All Engineering department users will dial in to the main office network from the new office.
You need to ensure that all new Engineering department users have appropriate group memberships. The users must be able to connect to the main office network using remote access permissions. You have created a template account named Engineering for new Engineering department users. Which of the following should you do next?
A)Modify the schema for the group attribute by selecting the Index this attribute in the Active Directory check box.
B)Manually add the Allow Access remote access permission to each new user accounts that you create.
C)Manually add the group membership information to each new user account that you create.
D)Add the Allow Access remote access permission to the Engineering account.
You need to ensure that all new Engineering department users have appropriate group memberships. The users must be able to connect to the main office network using remote access permissions. You have created a template account named Engineering for new Engineering department users. Which of the following should you do next?
A)Modify the schema for the group attribute by selecting the Index this attribute in the Active Directory check box.
B)Manually add the Allow Access remote access permission to each new user accounts that you create.
C)Manually add the group membership information to each new user account that you create.
D)Add the Allow Access remote access permission to the Engineering account.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
64
Someone from inside the company is trying to hack into one of the servers that holds mission critical data. You assign a junior network assistant named John to look at to the problem. John reports that he does not have the required permissions to access security logs on the server. Which of the following should you do to give John the minimum level of authority that he would require to view the security logs on the server?
A)Specify John's user account on the Properties sheet.
B)Assign the Allow Full Control permissions to John.
C)Join John's domain user account to the Power Users group on the server.
D)Add John's domain user account to the local administrators group on the server.
A)Specify John's user account on the Properties sheet.
B)Assign the Allow Full Control permissions to John.
C)Join John's domain user account to the Power Users group on the server.
D)Add John's domain user account to the local administrators group on the server.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
65
You are assisting an employee who cannot remember his password. He states that he changed his password when he left office yesterday. This morning when he came back, he could not login to the domain. Which of the following should you do?
A)Add the user's account to his OU in the Active Directory Users and Computers snap-in.
B)Check the Account is locked out check box and select the User must change password at next logon check box in the user account properties of user's account.
C)Use the Active Directory Users and Computers snap-in to reset the user's password and give him the new password.
D)Use Computer Management to reset the password for the local Administrator account and give him the new password.
A)Add the user's account to his OU in the Active Directory Users and Computers snap-in.
B)Check the Account is locked out check box and select the User must change password at next logon check box in the user account properties of user's account.
C)Use the Active Directory Users and Computers snap-in to reset the user's password and give him the new password.
D)Use Computer Management to reset the password for the local Administrator account and give him the new password.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
66
Chad is the network administrator for his company. He performs a full backup of the network every Monday. He performs incremental backups on Tuesday, Wednesday, Thursday, and Friday. Backups are always performed at 1:00 a.m. n Friday afternoon, a user accidentally deletes a file. What should Chad do to restore the file?
A)Open each backup log, beginning with Monday, and move forward through the week. In each log, search for a backup of the file and restore the first available backup.
B)Open each backup log, beginning with Friday, and move backward through the week. In each log, search for a backup of the file and restore the first available backup.
C)Open each backup log, beginning with Tuesday, and move forward through the week. In each log, search for a backup of the file and restore the available first backup that you find.
D)Restore the first available backup.
A)Open each backup log, beginning with Monday, and move forward through the week. In each log, search for a backup of the file and restore the first available backup.
B)Open each backup log, beginning with Friday, and move backward through the week. In each log, search for a backup of the file and restore the first available backup.
C)Open each backup log, beginning with Tuesday, and move forward through the week. In each log, search for a backup of the file and restore the available first backup that you find.
D)Restore the first available backup.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
67
You work as the network administrator for a network consisting of a single Active Directory domain. You use a non-administrative user account to log on to a client computer. You need to change the password for a domain user account named John. When you attempt to change John's password in Active Directory Users and Computers, you receive an "Access is denied" error message. Which of the following should you do to change John's password without using your Administrator credentials to log on to the domain?
A)Add your non-administrative domain user account to the local Administrators group.
B)Use the run as command to run Active Directory Users and Computers with domain administrative credentials.
C)At the command prompt, run the net user John/add/passwordreq:yes command.
D)At the command prompt, run the net accounts/uniquepw:/domain command.
A)Add your non-administrative domain user account to the local Administrators group.
B)Use the run as command to run Active Directory Users and Computers with domain administrative credentials.
C)At the command prompt, run the net user John/add/passwordreq:yes command.
D)At the command prompt, run the net accounts/uniquepw:/domain command.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
68
Your network contains six database servers, each running a database application named App1. The new employees who have joined the company require access to App1. You need to add these users to App1. Which of the following should you do to ensure that the new users are added to the server with the most disk space?
A)Review the application logs on each of the six database servers by using Event Viewer.
B)Generate a histogram view of the Logical Disk object on all six database servers by using System Monitor.
C)Record the Physical Disk object on all six database servers by using Performance Logs and Alerts.
D)Review the performance data on each of the six database servers by using Task Manager.
A)Review the application logs on each of the six database servers by using Event Viewer.
B)Generate a histogram view of the Logical Disk object on all six database servers by using System Monitor.
C)Record the Physical Disk object on all six database servers by using Performance Logs and Alerts.
D)Review the performance data on each of the six database servers by using Task Manager.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
69
You administer a file server named Serv1. One morning you discover that you cannot access network resources after logging on to Serv1. You installed a new service pack and an updated network adapter driver on Serv1 a few hours ago. You performed a complete backup of Serv1, including the System State data, before you installed the service pack and updated the driver. Which of the following should you do first to restore network communications?
A)Use the Backup and Restore Wizard on Serv1 to restore the backup from the previous night.
B)Use Roll Back Driver to uninstall the updated driver for the network adapter and revert back to the previous driver.
C)Restart Serv1 and select Last Known Good Configuration option from the boot menu.
D)Locate and delete the registry settings for the network adapter driver in the Registry Editor on Serv1.
A)Use the Backup and Restore Wizard on Serv1 to restore the backup from the previous night.
B)Use Roll Back Driver to uninstall the updated driver for the network adapter and revert back to the previous driver.
C)Restart Serv1 and select Last Known Good Configuration option from the boot menu.
D)Locate and delete the registry settings for the network adapter driver in the Registry Editor on Serv1.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
70
Your network contains a file server named Server5. You add a new hard drive to the server since it is running low on disk space. You must configure a partition on the new hard disk. When you attempt to open Disk Management to partition the hard disk, you receive an error message that states "Unable to connect to Logical Disk Manager service." Which of the following should you do to enable Disk Manager?
A)Create more free space on the boot partition by deleting unnecessary files and folders on it.
B)Enable and start the Logical Disk Manager Administrative service on Server5.
C)Enable the disk performance counters on Server5.
D)Install the Windows 2003 Administration Tools Pack on Server5.
A)Create more free space on the boot partition by deleting unnecessary files and folders on it.
B)Enable and start the Logical Disk Manager Administrative service on Server5.
C)Enable the disk performance counters on Server5.
D)Install the Windows 2003 Administration Tools Pack on Server5.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
71
All users in the Sales department are members of a global distribution group named Sales_GD. You create a new folder named Salesdata on a file server named Serv10. You need to provide the Sales department users access to the Salesdata folder on Serv10. Which of the following should you do?
A)Reconfigure the Sales_GD group as a universal group.
B)Reconfigure the Sales_GD group as a domain local group.
C)Reconfigure the Sales_GD group as a security group.
D)Raise the functional level of the domain to Windows Server 2003.
A)Reconfigure the Sales_GD group as a universal group.
B)Reconfigure the Sales_GD group as a domain local group.
C)Reconfigure the Sales_GD group as a security group.
D)Raise the functional level of the domain to Windows Server 2003.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
72
Your company issues a new security policy that does not allow any user to be logged on to the domain beyond the business hours. Users who remain logged on after business hours must be automatically disconnected from the domain. Which of the following should you do to implement the security policy immediately?
A)Configure the Default Domain Policy GPO to increase scheduling priority for all domain users.
B)Configure the Default Domain Policy GPO to force domain users to log off when their logon hours expire.
C)Create a new domain user account and configure the account properties to restrict logon hours to business hours.
D)Modify the DACL on the Default Domain Policy GPO to assign the Allow - Read permission to the Users group.
A)Configure the Default Domain Policy GPO to increase scheduling priority for all domain users.
B)Configure the Default Domain Policy GPO to force domain users to log off when their logon hours expire.
C)Create a new domain user account and configure the account properties to restrict logon hours to business hours.
D)Modify the DACL on the Default Domain Policy GPO to assign the Allow - Read permission to the Users group.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
73
Your company configures a new security policy that requires that the user account of any user who enters an invalid password more than twice in one day must be locked out. You need to configure the domain account policy settings to enforce this new security policy. Which of the following should you do?
A)Set the minimum password age to one day and change the Enforce password history setting to three passwords remembered.
B)Set the maximum password age to one day and change the Account lockout duration setting to 1440 minutes.
C)Change the Enforce password history setting to three passwords remembered and change the Account lockout duration setting to 1440 minutes.
D)Change the Account lockout threshold setting to three invalid logon attempts and change the Reset account lockout counter after setting to 1440 minutes.
A)Set the minimum password age to one day and change the Enforce password history setting to three passwords remembered.
B)Set the maximum password age to one day and change the Account lockout duration setting to 1440 minutes.
C)Change the Enforce password history setting to three passwords remembered and change the Account lockout duration setting to 1440 minutes.
D)Change the Account lockout threshold setting to three invalid logon attempts and change the Reset account lockout counter after setting to 1440 minutes.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
74
Your network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is open to the Internet. You are currently in the process of deploying some Web servers that will be located in the perimeter network. The servers will host only publicly-available Web pages. Which of the following should you do to reduce the possibility of users gaining unauthorized access to the servers?
A)Disable the IIS Admin Service on the Web servers.
B)Grant the Secure Server (Require Security) IPSec Policy to the Web servers.
C)Enable the Server Message Block (SMB) signing on the Web servers.
D)Disable File and Printer Sharing on the Web servers.
A)Disable the IIS Admin Service on the Web servers.
B)Grant the Secure Server (Require Security) IPSec Policy to the Web servers.
C)Enable the Server Message Block (SMB) signing on the Web servers.
D)Disable File and Printer Sharing on the Web servers.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
75
A server named SR24 hosts shared folders for the Sales department. Shared files on SR24 are frequently accessed and updated throughout the business day. An employee from the Sales department complains that the server responds extremely slowly when he attempts to open a shared document. The Performance console indicates that the processor is operating at 100 percent of capacity. Which of the following should you do to gather additional data to diagnose the cause of the problem?
A)Create a counter log to track processor usage in the Performance console.
B)Open and review the application log for the System Monitor events in Event Viewer.
C)Create an alert that will be triggered when processor usage exceeds 90 % for a period of more than five minutes in System Monitor.
D)Review the Processes tab to check the percentage of processor capacity used by each application in Task Manager.
A)Create a counter log to track processor usage in the Performance console.
B)Open and review the application log for the System Monitor events in Event Viewer.
C)Create an alert that will be triggered when processor usage exceeds 90 % for a period of more than five minutes in System Monitor.
D)Review the Processes tab to check the percentage of processor capacity used by each application in Task Manager.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
76
A server named SR06 runs an application named App1, which uses a large amount of network bandwidth per client connection. SR06 has only one network adapter installed and you suspect that the network connection on SR06 is running out of available network capacity. Which of the following would allow you to view the total network bandwidth that is being used on SR06?
A)Use System Monitor to configure the Network Interface object and then run the netstat command.
B)Use Network Monitor to configure a capture filter for the local area connection and then run the netstat command.
C)Use System Monitor to configure the Network Interface object and then monitor the Networking tab in Task Manager.
D)Use Network Monitor to configure a capture filter for the local area connection and then monitor the Networking tab in Task Manager.
A)Use System Monitor to configure the Network Interface object and then run the netstat command.
B)Use Network Monitor to configure a capture filter for the local area connection and then run the netstat command.
C)Use System Monitor to configure the Network Interface object and then monitor the Networking tab in Task Manager.
D)Use Network Monitor to configure a capture filter for the local area connection and then monitor the Networking tab in Task Manager.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following tools allows you to use the output from a netstat command to identify the unauthorized application?
A)Performance console
B)Task manager
C)System monitor
D)Network Monitor
A)Performance console
B)Task manager
C)System monitor
D)Network Monitor
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
78
A Windows Server 2003 computer named Globe 1 has a third party application installed on it called S1. This server fails periodically. As a fix, you configure the recovery options for S1 to meet two requirements:
If S1 runs successfully for a day or more, the service is immediately restarted upon failure; and if S1 does not run successfully for another day after this failure, the entire server is immediately restarted. Which should you do?
A)Configure the Restart service after value for S1 to 1,440 minutes.
B)Configure the Reset fail count after value for S1 to 1 day.
C)Configure the response to the first failure to restart S1.
D)Configure the response to the first failure to restart Globe 1.
If S1 runs successfully for a day or more, the service is immediately restarted upon failure; and if S1 does not run successfully for another day after this failure, the entire server is immediately restarted. Which should you do?
A)Configure the Restart service after value for S1 to 1,440 minutes.
B)Configure the Reset fail count after value for S1 to 1 day.
C)Configure the response to the first failure to restart S1.
D)Configure the response to the first failure to restart Globe 1.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
79
You are working as an administrator on xyz.com. A Server S5 is configured as a dial-up router and has two network adapters. One network adapter connects to the Ethernet LAN, and the other connects to a broadband networking device.
You need to verify that the current network bandwidth of the broadband connection is sufficient for the future expansion of the New York office. Using System Monitor, which of the following should you do to measure the current utilization of the broadband network connection?
A)Monitor the Server\\Packets/sec counter on the Server Object.
B)Monitor the Bytes Total/sec counter on the Server Object.
C)Monitor the Bytes Total/sec counter on the Network Interface Object.
D)Monitor the Current Bandwidth counter on the Network Interface Object.
You need to verify that the current network bandwidth of the broadband connection is sufficient for the future expansion of the New York office. Using System Monitor, which of the following should you do to measure the current utilization of the broadband network connection?
A)Monitor the Server\\Packets/sec counter on the Server Object.
B)Monitor the Bytes Total/sec counter on the Server Object.
C)Monitor the Bytes Total/sec counter on the Network Interface Object.
D)Monitor the Current Bandwidth counter on the Network Interface Object.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
80
Which of these System Monitor counters can help to detect an insufficient bandwidth problem?
A)Network Interface: Current Bandwidth
B)Network Interface: Output Queue length
C)Network Interface: Packets/sec
D)Network Interface: Bytes Total/sec
A)Network Interface: Current Bandwidth
B)Network Interface: Output Queue length
C)Network Interface: Packets/sec
D)Network Interface: Bytes Total/sec
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck