Deck 1: Windows 70-291

Full screen (f)
exit full mode
Question
Which of the following is the most likely cause for a computer to have an IP address of 169.254.110.14?

A)The address has been configured manually.
B)The subnet mask of the address is 255.255.0.0.
C)There is no DHCP server issue on the network
D)A static address is assigned to the computer.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of these authentication protocols support encryption of connection data?

A)PAP
B)EAP-MD5-CHAP
C)MS-CHAP v2
D)SPAP
Question
What is the maximum number of characters that can be used for a user password if the authentication protocol used is MS-CHAP v1?

A)24 characters
B)14 characters
C)8 characters
D)10 characters
Question
David is experiencing a delay when he tries to connect to a remote Web site. Which of the following tools can he use to determine the specific router that is responsible for this delay?

A)Netdiag
B)Ipconfig
C)PathPing
D)Tracert
Question
A Windows Server 2003 computer is configured as a print server for a print device with a built-in network interface. Users of the print device report that they cannot print to it.
Chad, the network administrator, confirms that the IP address and drivers being used are correct and suspects that there is a problem with the MAC to IP address resolution on the print server. Which command should Chad run on the print server to find out which MAC address the print jobs are being sent to?

A)netcap.exe
B)netstat.exe
C)netsh.exe
D)net session
Question
All computers on your network use the 10.10.0.0/16 address scheme. Tom, your manager, instructs you to place the 15 servers into a separate subnet that uses the 192.168.10 public addressing scheme. You must plan for a maximum of 25 servers in the future and need to configure a new subnet mask.
The subnet mask must allow a sufficient number of IP addresses for the existing servers and future growth. However, you want to conserve addresses as much as possible. Which subnet mask should you use?

A)255.255.255.248
B)255.255.255.240
C)255.255.255.224
D)255.255.255.252
Question
A server is configured as a DHCP server with a single scope. You connect the network cable on Client 1 and attempt to connect to a network server, but the connection fails. You open a command prompt on Client 1 and attempt to renew Client 1's IP address.
An error message states "An error occurred while renewing interface Local Area Connection: unable to contact your DHCP server. Request has timed out". What should you do to ensure that Client 1 receives an IP address configuration from the DHCP server?

A)Configure Client 1 with a static IP address.
B)Restart Client 1.
C)Restart the DHCP service on the DHCP server.
D)Add additional IP addresses to the scope on the DHCP server.
Question
Globe1 is a Windows Server 2003 computer and a critical file server configured with a DHCP client reservation. The DHCP server fails, and users report that they cannot access resources on Globe1. Which should you do to configure Globe1 so that it is available even if it is unable to obtain or renew a lease from the DHCP server?

A)Configure the DHCP scope in the 169.254.0.1 - 169.254.255.254 range.
B)On the Alternate Configuration tab of the Internet Protocol (TCP/IP) properties, configure IP setings.
C)Configure a static IP address.
D)On the DHCP server, configure the DHCP 001 Resource Location Servers reservation option for Globe1.
Question
The mnc.com network has a DNS server configured to resolve queries for external internet resources, and it also hosts the mnc.com internal zone for Active Directory. Employees report that they are directed to the wrong Web site when browsing the Internet. What should you do to minimize the occurrence of unexpected results when users browse the Internet in the future?

A)Enable the Secure cache against pollution setting in the advanced properties of the server.
B)Enable Fail on load if bad zone data setting in the advanced properties of the server.
C)Enable the Disable recursion setting in the advanced properties of the server.
D)Enable the Enable automatic scavenging of stale resource records setting in the advanced properties of the server and set it to 7 days.
Question
John is the administrator of a network that contains a Windows Server 2003 computer named Globe 1 that has the DNS and WINS services installed. 400 Windows 2000 Professional computers connect to Globe 1 to access file and print resources.
Administrators report that network traffic has increased and that response times for requests for network resources on Globe 1 have increased. What should John do to confirm that Globe 1 is receiving requests for resources through NetBIOS broadcasts?

A)Run the tracert command on Globe 1.
B)Use Network Monitor to capture traffic between Globe 1 and Globe 2.
C)Monitor Event Viewer for Net Logon error or warning events.
D)Use Network Monitor to capture traffic between Globe 1 and all client computers.
Question
A Windows Server 2003 computer named Globe 1 has a third party application installed on it called S1. This server fails periodically. As a fix, you configure the recovery options for S1 to meet two requirements:
If S1 runs successfully for a day or more, the service is immediately restarted upon failure; and if S1 does not run successfully for another day after this failure, the entire server is immediately restarted. Which should you do?

A)Configure the Restart service after value for S1 to 1,440 minutes.
B)Configure the Reset fail count after value for S1 to 1 day.
C)Configure the response to the first failure to restart S1.
D)Configure the response to the first failure to restart Globe 1.
Question
Some computers on a network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. You discover that this traffic always uses a certain source TCP port number. You need to identify which computers are infected.
Your solution should include detecting and identifying traffic that is sent by the worm and sending a notification to a network administrator that the infected computer needs to be repaired. Which of the following should you do?

A)Configure a WMI event trigger.
B)Configure a Network Monitor capture filter.
C)Configure a System Monitor Alert.
D)Configure a Network Monitor trigger.
Question
Your domain abc.com contains Windows Server 2003 computers and Windows XP computers. You configure a server named abc 1 to be a file server. You need to capture file-transfer network traffic that is being sent to and from abc 1. You install network Monitor tools from a Windows Server 2003 product CD-ROM on a server named abc 2, which is on the same network segment as abc 1.
You run Network Monitor on abc 2. However, Network Monitor captures only network traffic that is sent to and from abc 2. What should Chad do to capture all network traffic that is sent to and from abc 1?

A)Re-install Network Monitor application on abc 2 and run Network Monitor to capture network traffic.
B)Open Network Monitor on abc 2 and create a capture filter to enable the capture of all protocols running on abc 1.
C)Open Network Monitor on abc 2 and increase the capture buffer from 1 MB to 20 MB.
D)Install Network Monitor application from the Microsoft SMS Server on abc 1 and run Network Monitor to capture network traffic.
Question
You are working as an administrator on xyz.com. A Server S5 is configured as a dial-up router and has two network adapters. One network adapter connects to the Ethernet LAN, and the other connects to a broadband networking device.
You need to verify that the current network bandwidth of the broadband connection is sufficient for the future expansion of the New York office.
Using System Monitor, which of the following should you do to measure the current utilization of the broadband network connection?

A)Monitor the Server\\Packets/sec counter on the Server Object.
B)Monitor the Bytes Total/sec counter on the Server Object.
C)Monitor the Bytes Total/sec counter on the Network Interface Object.
D)Monitor the Current Bandwidth counter on the Network Interface Object.
Question
Chad is the administrator of an Active Directory domain. Users report that they experience intermittent delays when they log on to the domain, Globe1. The replication attempts between Globe1 and other domain controllers are occasionally delayed. Chad needs to verify the cause of the intermittent connection delays to Globe1. What should Chad do first to track these delays over a period of one day?

A)Run the netdiag / verbose command to perform a network diagnostic test on Globe1.
B)Create a System Monitor counter to track the queue lengths on the network adapter on Globe1.
C)Use Network Monitor to view the network traffic packet contents between Globe1 and all other computers.
D)Run the replmon command to view the Active Directory replication status on Globe1.
Question
Chad is the network administrator for Globe.com. The network contains a Windows Server 2003 Web server named WS1 connected to the Internet using a dedicated link. Chad runs a System Monitor log on WS1, which monitors the Bytes Total/sec counter on the Network Interface object.
The size of the System Monitor log is becoming too large for the available disk space, with sample rate set at 15 seconds and logs archived once a day. What should Chad do to reconfigure the System Monitor log settings to reduce the amount of data that is captured?

A)Retain the current counter, but set the sample rate to 60 seconds.
B)Retain the current counter, but set the sample rate to 5 seconds.
C)Change the counter to Total Bytes, and set the sample rate to 15 seconds.
D)Change the counter to Current Bandwidth, and set the sample rate to 60 seconds.
Question
Chad configures a server named Globe2 as a Network Address Translation (NAT) server. Globe2 has a single network adapter and a modem. It connects to the Internet through a demand-dial connection.
Users report that when they attempt to connect to Internet Web sites, they intermittently receive the error message that states, "Page not found, but can connect after a few minutes." What should Chad do to configure Globe2 to allow users to always connect to Internet Web sites?

A)Configure the demand-dial interface as the private interface.
B)Set the dial-out hours on the demand-dial connection to any day and any time.
C)Set a demand-dial filter. Configure the filter for Only allow the following traffic. Specify a new filter outbound port 80.
D)Set the demand-dial connection to Persistent.
Question
Your network has a domain controller configured as a certification authority. The network has a Web server that runs IIS 6.0 and hosts a secure intranet site. The server also hosts other sites that do not require HTTPS. You configure a server certificate on the IIS server using a certificate from your internal CA.
Some users report that they cannot connect to the secure intranet site by using HTTPS. You confirm that all users can connect to the non-secure sites hosted on the Web server using HTTP. What should you do to view the failed HTTPS requests?

A)Review the security log in Event Viewer on the Web server.
B)Review the log fields created by IIS on the Web server.
C)Review the security log in Event Viewer on the CA.
D)Review the contents of the Failed Requests folder on the CA.
Question
Which resource record is used to resolve domain names specified in e-mail addresses to the IP address of the mail server associated with the domain?

A)PTR
B)AX
C)CNAME
D)MX
Question
David is switching on the computers on his network for the first time after a power outage. A DNS client submits a recursive query to a local DNS server to resolve an Internet name. The server for this Internet name is not authoritative. Which of the following occurs first in this case?

A)The DNS server contacts root servers configured in the cache.dns file.
B)The DNS client resolves the name from its cache.
C)The DNS server resolves the name from its cache.
D)The DNS server forwards the recursive query to an upstream DNS server.
Question
Your colleague has set the default TTL value for your company's primary DNS zone to 15 minutes. Which of the following is most likely to occur as a result of this change?

A)Resource records cached on the primary DNS server will expire after 15 minutes.
B)Secondary servers will initiate a zone transfer every 15 minutes.
C)DNS hosts will re-register their records once every 15 minutes.
D)DNS clients will have to query the server more frequently to resolve names for which the server is authoritative.
Question
Which of the following commands is used at the Nslookup prompt to view all the contents of the zone abc.com?

A)ls -t abc.com
B)ls -d abc.com
C)ls -a abc.com
D)ls -any abc.com
Question
An application named Inventory.exe is installed on all Windows XP client computers in the domain with the startup type of the service set to Automatic. In the Default Domain Policy Group Policy object the security administrator has configured a software restriction policy that is applied to all computers in the domain.
The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. What should you do to ensure that Inventory.exe cannot be started by a worm, while still allowing the application to run as a service?

A)In the computer settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
B)In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
C)In the computer settings section of the Default Domain Policy GPO, modify the existing software restriction policy hash rule for the Inventory.exe application so that the hash rule has a security level of Disallowed.
D)Configure a software restriction policy that contains a hash rule for the Inventory.exe application in the user settings section of the Default Domain Policy GPO. Configure the hash rule with a security level of Disallowed.
Question
You configure a server named S4 as the DNS server for the domain. After using the new ISP, users report that they cannot access Internet Web sites using their fully qualified domain names. You manually configure a test computer to use the DNS server address of the new ISP.
The test computer can successfully access Internet Web sites using their FQDNs. What should you do to ensure that network users can access Internet Web sites by using their FQDNs while ensuring that user access to internal resources is not disrupted?

A)Configure S4 to use the default root hints.
B)Create a root zone on S4.
C)Configure a forwarder on S4 to the new ISP's DNS server.
D)Configure all computers on your network to use the new ISP's DNS server.
Question
A server named Server 1 functions as a DHCP and DNS server. All client computers are configured to use Server 1 for name resolution, and all DNS zones on Server 1 are enabled for DNS dynamic updates. A server named Server 25 contains antivirus server software.
It must be able to contact client computers using fully qualified domain names to propagate virus definition updates. You need to ensure that Server 25 can resolve FQDNs for all client computers on the network. Which of the following options should you modify on Server 1?

A)Dynamically update DNS A and PTR records only if requested by the DHCP clients check box.
B)Always dynamically update DNS A and PTR records check box.
C)Dynamically update DNS A and PTR records for DHCP clients that do not request dynamic updates (for example, clients running Windows NT 4.0) check box.
D)Discard A and PTR records when lease is deleted check box.
Question
On your network, the Domain Admins group is also a member of the Administrators local group on server S1. Someone makes an unauthorized change to the HKEY _LOCAL_MACHINE\SYSTEM key in the registry on S1, which causes the computer to fail. You fix the problem and plan to log all attempts to access the HKEY_LOCAL_MACHINE \SYSTEM key in the registry on S1. What should you do to enable auditing in the local security policy on S1?

A)Enable auditing in the local security policy on S1.Select the Audit object access (success and failure) option in the audit policy.
B)Enable auditing in the local security policy on S1. Select the Audit system events (success and failure) option in the audit policy.
C)Enable auditing in the local security policy on S1. Select the Audit privilege use (success and failure) option in the audit policy.
D)Configure the SACL on the HKEY _LOCAL_MACHINE\SYSTEM key in the registry. Specify auditing of the Full Control permission for everyone.
Question
John wants to analyze the Main Mode IPSec statistics on a member server running Windows Server 2003. The server is accessed frequently by a number of clients. Which of the following should he do to export statistical information for future analysis?

A)Use the IP Security monitor snap-in to export the data to a text file.
B)Type netsh ipsec dynamic show stats type=ike>File- Name.txt at the command line.
C)Type netsh ipsec dynamic show stats type=ike at the command line.
D)Type netsh ipsec dynamic show stats type=ipsec>File- Name.txt at the command line.
Question
Which of these System Monitor counters can help to detect an insufficient bandwidth problem?

A)Network Interface: Current Bandwidth
B)Network Interface: Output Queue length
C)Network Interface: Packets/sec
D)Network Interface: Bytes Total/sec
Question
You need to modify the configuration of a service from Safe Mode With Command Prompt to repair a system that will not start normally. Which of the following command-line utilities enables you to do this?

A)Ping.exe
B)Netsh.exe
C)Netdiag.exe
D)Sc.exe
Question
Using System Monitor and Network Monitor, Chad sees that server S1 is exhibiting connectivity problems. Chad notices that S1 has approximately 4 MB of available memory and average CPU utilization is running at 88 percent.
When Chad investigates the Network Monitor capture, he notices that some network packets sent to S1 during the capture have not been captured. What should Chad do to ensure that the impact of monitoring on S1 is reduced and that all packets sent to the computer are captured?

A)Run Network Monitor in the dedicated capture mode.
B)From a command prompt, run the diskperf command.
C)Configure a Network Monitor capture filter.
D)Increase the buffer size in Network Monitor.
Question
Globe is an Internet service provider that hosts Web sites for many companies. Each Globe DNS server hosts multiple DNS zones for customers. Several Globe administrators are allowed to add DNS zones. What should be done to produce a monthly report that will list all the zones that are hosted on each DNS server?

A)Use the dnslint utility to query each DNS server.
B)Use the nslookup utility to query each DNS server.
C)Use the dnscmd utility to query each DNS server.
D)Use the adsiedit utility to query Active Directory for a list of DNS zones.
Question
Chad is the network administrator for a network that consists of a single Active Directory domain named Globe.com. A Windows Server 2003 computer named S1 is the only DNS server in the domain. It hosts no other zones. Users report that connecting to computers within the Globe.com domain is slow. What should Chad do to check if DNS client traffic on S1 is causing this problem?

A)Use System Monitor to create a log of the Network Interface counter Total bytes/sec.
B)Use System Monitor to create a log of the DNS counters Dynamic updates/see and Total queries/sec.
C)Enable debug logging on S1. Configure the log to capture Notification events.
D)Enable debug logging on S1. Configure the log to capture Update events.
Question
David installs Windows Software Update Services on a computer named S1. The WSUS installation requirements include: Use the least amount of disk space on S1 and testing updates before deployment. David clears the Automatically Approve Updates for Installation checkbox.
Which of the following should David do to complete the installation meeting all the requirements?

A)Remove the Critical Updates option from Updates Classifications.
B)Change the Revisions to Updates setting so that new versions of previously approved updates are not automatically approved.
C)Change the Revisions to Updates setting to automatically approve all updates.
D)Change the Advanced Synchronization Options dialog box so that updates are not stored locally.
Question
You are a network administrator for a network that consists of a single Active Directory domain. The domain contains 40 Windows Server 2003 computers, 1,000 Windows XP Professional computers, and 2,000 Windows 2000 Professional computers.
Windows Server Update Services is installed on a server named S1. The necessary Group Policy object is configured. If you need to confirm that all computers in the domain have received all approved updates from S1, what should you do?

A)Install and configure Urlscan.exe.
B)At the command prompt, type gpresult /scope COMPUTER.
C)Open the WSUS console. Run the Synchronization Results report.
D)Open the WSUS console. Run the Status of Computers report.
Question
All computers in the London office are configured to use S10 as their preferred DNS server. The Texas branch office has a server named S11 which hosts a primary zone named payroll.Globe.com. The refresh interval of the payroll.Globe.com zone is set to 24 hours. In the Texas office, a firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all computers from the London office network, except S10, from performing DNS lookups against S11.
As a business requirement no delay should occur between the time that a new record is created in the payroll.Globe.com zone and the time that the record can be resolved from any computers in the London office. All computers in the London office must be able to resolve names in the payroll.Globe.com namespace.
Which of the following should be done to configure DNS on S10 to meet the requirements?

A)Setup a stub zone named payroll.Globe.com.
B)Setup conditional forwarding to S11 for the payroll.Globe.com namespace.
C)In the Globe.com zone, set up a delegation to the payroll.Globe.com zone on S11.
D)Setup a secondary zone named payroll.Globe.com that has S11 as master.
Question
You need to update five high-visibility servers with critical updates by using Windows Server Update Services (WSUS). After approving the updates, what should you do to ensure that the updates are applied within an hour?

A)Type the gpupdate /force command at the command prompt on the WSUS server.
B)Type the wuauclt /detectnow command at the command prompt on each of the five servers.
C)Type the gpupdate /force command at the command prompt on each of the five servers.
D)Type the wuauclt /detectnow command at the command prompt on the WSUS server.
Question
David needs to implement a new software update infrastructure. No security patches, critical updates, or service packs have ever been installed on any of the client computers on the network. He installs Windows Server Update Services on a Windows Server 2003 computer named S5.
He synchronizes and approves all of the current security patches, critical updates, and service packs. He also needs to ensure that all client computers receive all Microsoft security patches, critical updates, and service packs. Which of the following should he do?

A)Install the Automatic Updates client on all client computers.
B)Open the WSUS console. Select the option to automatically approve WSUS updates.
C)Modify the Microsoft Update settings of the Default Domain Controller organizational unit (OU) Group Policy object (GPO) to point client computers to http://S5.
D)Modify the Microsoft Update settings of the Default Domain Policy Group Policy Object (GPO) to point client computers to http://S5.
Question
Chad installs and configures Windows Server Update Services on a server named S1. All client computer accounts are in the Clients OU. Chad creates a Group Policy object named WSUS. Currently all client computers obtain their Windows security updates from a Microsoft Update. Chad wants to configure all client computers to obtain Windows security updates from S1. What should Chad do to accomplish this task with the least amount of administrative effort?

A)Link the WSUS GPO to the domain. Configure the GPO to point to S1 for automatic updates.
B)Link the WSUS GPO to the Clients OU. Specify Clients as the target computer group in WSUS.
C)Link the WSUS GPO to the domain. Specify Clients as the target computer group in WSUS
D)Link the WSUS GPO to the Clients OU. Configure the GPO to point to S1 for automatic updates.
Question
Each sales representative in your company has a portable computer running on Windows XP Professional. You have configured a server named Main 2 with a LAN connection and a dial-up connection to the Internet. All sales representatives are connected to the LAN, but they cannot connect to the Internet. You view the IP configuration on their laptop and see a result as shown in the figure. Which of the following should you do to fix this problem?

A)Install the Connection Manager Administration Kit (CMAK) on Main 2.
B)Install the DHCP service on Main 2. Create a scope for subnet 169 .254.0.0/16.
C)Modify the Internet Explorer properties on the sales representatives' computers to specify 169.254.0.1 as the proxy server.
D)Configure Internet Connection Sharing on Main 2.
Question
David installs a new client-server application on S1, which is not a member of the single Active Directory domain. S1 has the static IP address 192.168.4.65. He installs the client software on two Windows XP Professional domain computers. The client software must be able to resolve to S1 using the fully qualified domain name, Globe.com.
S2 is the DNS server and has the IP address 192.168.4.16. When David pings 192.168.4.65, he receives valid replies. When he attempts to run the client software on the two test computers, the software cannot locate S1 and terminates. Which of the following should David do to fix the problem?

A)Enter a host (A) record for S1 on S2. This record displays S1's IP address as 192.168.4.65. In the Computer Name Changes dialog box in System Properties on S1, enter Globe.com as the primary DNS suffix of the computer and restart S1.
B)Type S1.Globe.com 192.168.4.65 #pre in the following line in the Hosts file on each of the two test computers.
C)Create an organizational unit named ApplicationServersOU, and create a computer account named S1 in ApplicationServersOU. Set the Primary DNS Suffix Group Policy setting on an ApplicationServersOU Group Policy Object to Globe.com and restart S1.
D)Run the ipconfig /registerdns command, from the command prompt on S1.
Question
Chad is the network administrator for Globe.com, which has an Active Directory-integrated DNS zone replicated to all domain controllers. DNS service is installed only on the domain controllers. The network management department requires all hosts in the payroll division to be registered in the DNS namespace, Payroll.Globe.com, which currently does not exist.
Chad needs to add support for the Payroll.Globe.com namespace to all the existing DNS servers. What should Chad do to find a solution that will not require reconfiguration if DNS servers are added to the domain in the future?

A)Create a delegation named payroll in the Globe.com zone.
B)Create a sub-domain named payroll in the Globe.com zone.
C)Create a stub zone for Payroll.Globe.com.
D)Create a primary zone for Payroll.Globe.com that is not Active Directory-integrated.
Question
David is the network administrator for a company with a Windows Server 2003 server and Windows XP clients. A new low-priority update is released and synchronized with the Windows Server Update Services server on the network. David approves the update without testing.
After the update is applied to client computers, engineering users report that they can no longer run a network-designer application. What should David do to remove the update from all client computers?

A)Clear the Automatically approved new versions of previously approved updates option on the WSUS server. Resynchronize the server with the Windows Update server.
B)Clear the update for approval on the WSUS server. Resynchronize the server with the Windows Update servers.
C)Clear the Automatically approved new versions of previously approved updates option on the WSUS server. Delete the Systemroot \$NtUninstallQ318138$ directory on each client computer.
D)Clear the update for approval on the WSUS server and run the spuninst command from the Systemroot\ $NtUninstallQ318138$\spuninst directory on each client computer.
Question
Which of the following specifies the folder that stores all parsers for Network Monitor?

A)WINDOWS\System32\Netmon \Parsers
B)WINDOWS\System32\Parsers
C)WINDOWS\System32\Netmon
D)WINDOWS\System32\Netmon\ Parser
Question
Which of the following is the session-layer interface used to connect a Client for Microsoft Networks to a TCP/IP protocol?

A)IP
B)NetBT
C)NetBIOS
D)Internet Explorer
Question
During the name resolution process, which step does the resolver perform first to resolve a DNS name?

A)Read from the Hosts file.
B)Broadcast the local subnet.
C)Check the local cache.
D)Query the local DNS server.
Question
Which of these tabs on the DNS server Properties dialog box should you visit to test the basic DNS functionality?

A)Advanced
B)Monitoring
C)Security
D)Forwarders
Question
Server FS1 contains confidential data that is only available to users in the Payroll department. Chad wants all computers in the Payroll department to connect to FS1 using an IPSec policy. He assigns the Server (Request Security) IPSec policy to FS1.
Using Network Monitor, Chad notices that some computers in the Payroll department connect to FS1 without IPSec policy. What should Chad do to configure FS1 to ensure that all computers connect to it by using the IPSec policy?

A)Restart the IPSec Services service.
B)Assign the Secure Server (Require Security) IPSec policy.
C)Assign the Client (Respond Only) IPSec policy.
D)Unassign the Server (Request Security) IPSec policy.
Question
David installs Software Update Services on a network server named S1. When David attempts to synchronize S1 with the Windows Update servers, he receives an error message. David suspects that the proxy server requires authentication.
He opens Internet Explorer and verifies that he can communicate with an external Web site by using the proxy server. What should David do to ensure that S1 can communicate with the Windows Update servers?

A)Configure authentication to the proxy server in the SUS options.
B)Restart the IIS administration tool.
C)Configure the Internet Explorer settings to bypass the proxy server.
D)Install the Microsoft Firewall Client.
Question
Your domain contains a single DNS server named S1 with the Root hints enabled on S1. Internet access for the company is provided by a NAT server named S2. S2 is connected to the Internet by means of a permanent connection to the company's ISP.
Users report that they can no longer connect to xyz.com, but they can connect to internal resources and to other Internet Web sites. You can successfully access xyz.com from a computer outside the corporate network. What should you do to fix this problem?

A)On all affected users' computers, run the ipconfig/flushdns command.
B)Create a root zone on S1.
C)Disable Routing and Remote Access on S2.
D)Configure all affected users' computers to use the ISP's DNS server.
Question
Your domain is configured to use only Kerberos authentication for all server connections. A user reports that he receives an "Access denied" error message when he attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user's client computer. Which command should you run from the command prompt on the user's computer?

A)Netsh
B)ksetup
C)ktpass
D)netdiag
Question
David installs Software Update Services on a computer named S3. He creates a Group Policy object that configures all client computers to receive software updates from S3. Later, David runs MBSA on all client computers to check if all updates are applied. David discovers that all the Windows 2000 Professional client computers received updates, but Windows XP Professional client computers did not.
David verifies that the GPO setting was applied on all Windows XP Professional computers. What should David do to ensure that the Windows XP Professional client computers receive their updates from S3?

A)Migrate all users of the Windows XP Professional client computers to the Administrators local group.
B)Restart Automatic Updates on all Windows XP Professional client computers.
C)Delete the NoAutoUpdate value under HKEY_LOCAL_MACHINE \SOFTWARE\Policies \Microsoft\ Windows \ WindowsUpdate\AU on all Windows XP Professional client computers.
D)Install Service Pack 1 (SP1) on all Windows XP Professional client computers.
Question
Chad works on a network that has a Web server which runs IIS 6.0 and hosts a secure intranet site. This network consists of a single Active Directory domain with all servers running Windows Server 2003. All users on the network are required to connect to the intranet site by authentication along with HTTPS.
The company management decides to install a web application that must connect to the Web site by using HTTP. What should Chad do to collect information about the users who are connecting to the Web site by using HTTPS?

A)Check the application log on the Web server.
B)Use Network Monitor to capture network traffic on the Web server.
C)Configure a performance log to capture all Web service counters. Review the performance log data.
D)Review the log files created by IIS on the Web server.
Question
In Chad's company, all portable computers used by the telecommuting employees must receive software updates from the Windows Update servers daily. Chad notices that updates from the Windows Update servers were not applied on a portable computer named C4. What should Chad do to ensure that software updates are applied to C4 daily at 10 a.m.?

A)Set the computer clock to 10 a.m. and click the Automatically download the updates and install them on the schedule that I specify check box.
B)Click the Automatically download the updates and install them on the schedule that I specify check box and type Configure it to work every day at 10 a.m.
C)Set the computer clock to 10 a.m. and click the Download the updates automatically and notify me when they are ready to be installed check box.
D)Set the computer clock to 10 a.m. and click the Notify me before downloading any updates and notify me again before installing them on my computer check box.
Question
Your network consists of a single Active Directory forest that contains two domains named europe.globe.com and america.globe.com. All company computers are registered in either the europe.globe.com DNS zone or the america.globe.com DNS zone. All DNS servers contain copies of all zones. The client computers always connect to other computers by specifying only the name of the target computer. A fully qualified domain name is not required.
You need to configure the client computers to ensure that all computer names can be resolved by using DNS without the domain name being specified. The configuration of the client computers must be automated so that they do not need to be manually reconfigured if an additional domain is added to the forest. What should you do?

A)Configure the Append these DNS suffixes option in the DNS client configuration of each client computer.
B)Configure the Default Domain Policy Group Policy Object in each domain and enable the DNS Suffix Search List policy setting in the GPO.
C)Configure the 015 DNS Domain Name option on all DHCP scopes.
D)Configure the Default Domain Policy Group Policy object in each domain. Enable the Primary DNS Suffix policy setting in the GPO.
Question
David is a network administrator in an organization. The organization's DHCP server has crashed and cannot be brought back online. The last backup is four days old. How can he preserve the current address space without restarting all user computers?

A)Deploy a new DHCP server with the same address scope and increase the new lease duration to 15 days.
B)Deploy a new DHCP server with the same address scope and raise conflict detection attempts to 3.
C)Restore the previous DHCP database from a backup.
D)Run the Ipconfig /renew command on all computers.
Question
Chad has not modified the default settings for DNS on the DHCP client or the server. On a client running Windows XP Professional, which of the following client records will be updated in DNS by the DHCP server?

A)A
B)MX
C)PTR
D)AX
Question
How long do logged events last in the DHCP server logs by default?

A)One day
B)One month
C)15 days
D)One week
Question
Which of these messages is not exchanged as part of a DHCP lease initialization?

A)Request
B)Renew
C)ACK
D)Discover
Question
By default, after how much time does a DHCP client attempt to renew its IP address lease?

A)24 hours
B)1 week
C)4 days
D)8 days
Question
Which of the following best describes PID?

A)PID is a unique value for a running process in the system.
B)PID is a counter used for Network Monitoring.
C)PID is the packet identifier attached to every packet on the network.
D)PID is a DHCP pool identifier used to assign IP addresses to DHCP clients.
Question
Chad is the administrator of a Windows Server 2003 computer named Globe1. Globe1 is an FTP server located in Globe's internal network. Administrators report an increased amount of FTP traffic to Globe1. Chad needs to configure Globe1 to achieve these goals: Identify the MAC address of a computer using FTP transfers from Globe1, find out the FTP commands executed, and ensure that operation of Globe1 isn't disrupted. What should Chad do?

A)Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.
B)Use a Network Monitor filter to capture IP traffic from any computer to Globe1.
C)Run the arp command on Globe1 to identify the source of the FTP requests.
D)Run the finger command on Globe1 to identify the source of the FTP requests.
Question
Chad's company has offices in Florida, New Jersey, and Maryland. Each office is configured as a separate IP subnet. DNS is the only name resolution method used on the network. Chad needs to implement a software update infrastructure on the network. He installs Software SUS on a computer named S5 in the Florida office with all default settings. He has no plans to install additional SUS servers. What should Chad do to ensure that client computers can successfully connect to the SUS server?

A)Configure the Internet browser home page on all client computers to point to http://windowsupdate. microsoft.com.
B)In the SUS Administrator, configure the Server Name property to be the server's FQDN.
C)Open IIS Manager and enable HTTP over SSL.
D)Enable communication over port 13S between all client computers and the SUS server.
Question
Chad configures several GPOs to enforce the use of IPSec for certain types of communication between specified computers. A server named Globe5 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Globe5 are encrypted by using IPSec. However, when Chad monitors network traffic, he notices that Telnet connections are not being encrypted. Which tool/interface should Chad use to view all of the IPSec settings that are applied to Globe5 by GPOs?

A)The IP Security Policy Management console
B)The Resultant Set of Policy console
C)netdiag
D)MBSA
Question
You are the network administrator for the network that consists of a single Active Directory forest with 14 domains. All servers run Windows Server 2003. Only the DNS servers in the abc.com domain have access to the Internet to resolve Internet DNS names. What should you do to configure each DNS server so that unresolved queries are resolved by DNS servers in the abc.com domain?

A)Replace the root hints with the addresses of the DNS servers in the abc.com domain.
B)Create a stub zone named abc.com that contains a copy of the IIHT.com zone.
C)Configure the default forwarding entry to forward data to DNS servers in the abc.com domain.
D)Configure a conditional forwarding entry for abc.com that forwards data to DNS servers in the abc.com domain.
Question
You are an administrator of an Active Directory domain named xyz.com. You configure a server named Server 2 as xyz.com's DHCP server. All client computers are configured as DHCP clients. Users report that they cannot connect to network resources. You investigate and discover that the client computers are not receiving their TCP/IP configurations from Server 2. What should you do to fix this issue?

A)Run the net stop dhcpserver command.
B)Authorize Server 2 using the DHCP console.
C)Run the net start dhcpserver command.
D)Restart the DHCP service using the DHCP console.
Question
You network that has 20 Windows Server 2003 computers. All client computers receive their TCP/IP settings from a DHCP server named Server 1. The network is experiencing rapid growth in the past few months. Users report that the network is going slow. When you run Network Monitor, you notice a significant increase in broadcast traffic on the network. Which of the following should you do to increase network performance?

A)Change option 046 to 0x1, B-node.
B)Remove option 044 from the DHCP Server Options.
C)Change option 046 to 0x2, P-node.
D)Create a new scope for the network.
Question
Your network has a server named RRAS1 that runs the Routing and Remote Access service. Users connect to RRAS1 by using VPNs through the Internet. RRAS1 is configured to support VPN connections by using both PPTP and L2TP. You enable all portable computers to use L2TP to connect to RRAS1.
However, some users also access RRAS1 using their home computers, which must be enabled for L2TP. Which of the following should you do to view the users who are connecting to the server by using PPTP?

A)Configure auditing in the local security policy on RRAS1 to log all logon events.
B)Configure an audit policy on the Domain Controllers organizational unit (OU). Audit all successful logons to the network.
C)Use the Routing and Remote Access console to review the remote access clients list.
D)Use the Routing and Remote Access console to review the properties for each active PPTP port.
Question
A user reports that her computer cannot connect to a remote VPN server. You suspect that her client computer did not receive a recent hotfix. What should you do to verify which hotfixes are installed on her computer?

A)Run the update.exe command from a command prompt.
B)View the History-synch.xml file.
C)View the History-approve.xml file.
D)Run the wmic qfe command from a command prompt.
Question
Which of the following is the default value of the refresh interval for a DNS record?

A)7 days
B)3 days
C)10 days
D)24 hours
Question
Which of the following is an instance when zones do NOT need to be delegated?

A)You need to delegate management of a DNS domain to a branch or department within your organization.
B)You need to distribute the load of maintaining one large DNS database among multiple name servers to improve name resolution performance and fault tolerance.
C)You need hosts and host names to be structured according to branch or departmental affiliation within your organization.
D)You want forwarding to take precedence over delegation.
Question
Which term refers to an administrative grouping of scopes that is used to support multiple logical subnets on a single network segment when using DHCP?

A)Multiscope
B)Logiscope
C)Superscope
D)DHCP scope
Question
Which of the following is the location where the default DHCP database manual backup is stored?

A)\WINDOWS\System32\Dhcp \Backup
B)\WINDOWS\System32\Backup
C)\WINDOWS\System32\ manualDhcp\Backup
D)\WINDOWS\System32\ Dhcpdatabase\Backup
Question
What is the maximum number of simultaneous VPN connections that Windows Server 2003 can handle?

A)1000
B)500
C)256
D)2024
Question
The Performance Logs And Alerts service is set up to send a message to C4 to notify an operator when the network use on C3 is too high. However, C4 does not receive the message sent from C3. Which of the following should you do to enable messages to be sent by C3 and received by C4?

A)Start the Alerter service on both C3 and C4.
B)Start the Alerter service on C3 and start the Messenger service on C4.
C)Start the Alerter service on C4 and start the Messenger service on C3.
D)Start the Messenger service on both C3 and C4.
Question
David is a network administrator in an organization. The organization has leased the Class C address of 200.16.16.0. He subnets using a 255.255.255.224 subnet mask using 2 Cisco routers. How many IP addresses are available to be allocated to computers?

A)29
B)62
C)30
D)20
Question
You DHCP server works fine except that events 1014 and 1016 appear regularly on the System event log. Which of the following tools/utilities should you use to diagnose these events?

A)Netsh
B)Jetpack
C)Netdiag
D)Microsoft Network Monitor
Question
You administer an Active Directory domain in which all servers are Microsoft Windows Server 2003, and all the clients are Microsoft Windows XP Professional. You have configured DHCP to update DNS only if the DHCP client requests. You find that the clients' A resource records are not updated in DNS when they obtain new DHCP leases. Which of the following is the most likely cause of this problem?

A)DNS is not integrated with the Active Directory.
B)DHCP server is not authorized in Active Directory.
C)The DHCP server's computer account is not a member of the DNSUpdateProxy global security group.
D)Clients are not configured to update their own host A resource records.
Question
Chad notices that there are frequent failures of Active Directory transactions in the event logs of the domain controllers. These are caused by DNS lookup failures against the Globe.com zone. Chad discovers that the data in one of the DNS zones on DC3 is out of date. What should Chad do to find out why the DNS data on DC3 is out of date?

A)Use Event Viewer to examine the DNS Server log for zone transfer errors.
B)Enable debug logging and examine the log file for transfer packets.
C)Use System Monitor to monitor the DNS\Zone Transfer Failure counter.
D)Use the Replmon utility to look for Active Directory replication errors.
Question
When performing performance baselining on Server 1, you notice that a large number of concurrently connected users at any given moment. This is causing performance problems on Server 1. You want to run Network Monitor on this server and capture all packets sent to Server 1.
But packet headers need to be captured in order to reduce the size of the captured data. If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets. Which of the following should you do to configure Network Monitor?

A)Configure the Network Monitor display filters.
B)Configure the Network Monitor capture filters.
C)Decrease the Network Monitor buffer size setting.
D)Increase the Network Monitor buffer size setting.
Question
Two of the servers on your network contain highly confidential documents. The company's written security policy states that all network connections with these servers must be encrypted by using an IPSec policy. You place these servers in an organizational unit named SecuServ.
You configure a Group Policy object that requires encryption for all connections and assigns the GPO to the SecuServ OU. What should you do to verify that users are connecting to the two servers using encrypted connections?

A)Use the IP Security Monitor console.
B)Run the net view command.
C)Run the gpresult command.
D)Use the IPSec Policy Management console.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/112
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Windows 70-291
1
Which of the following is the most likely cause for a computer to have an IP address of 169.254.110.14?

A)The address has been configured manually.
B)The subnet mask of the address is 255.255.0.0.
C)There is no DHCP server issue on the network
D)A static address is assigned to the computer.
There is no DHCP server issue on the network
2
Which of these authentication protocols support encryption of connection data?

A)PAP
B)EAP-MD5-CHAP
C)MS-CHAP v2
D)SPAP
MS-CHAP v2
3
What is the maximum number of characters that can be used for a user password if the authentication protocol used is MS-CHAP v1?

A)24 characters
B)14 characters
C)8 characters
D)10 characters
14 characters
4
David is experiencing a delay when he tries to connect to a remote Web site. Which of the following tools can he use to determine the specific router that is responsible for this delay?

A)Netdiag
B)Ipconfig
C)PathPing
D)Tracert
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
5
A Windows Server 2003 computer is configured as a print server for a print device with a built-in network interface. Users of the print device report that they cannot print to it.
Chad, the network administrator, confirms that the IP address and drivers being used are correct and suspects that there is a problem with the MAC to IP address resolution on the print server. Which command should Chad run on the print server to find out which MAC address the print jobs are being sent to?

A)netcap.exe
B)netstat.exe
C)netsh.exe
D)net session
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
6
All computers on your network use the 10.10.0.0/16 address scheme. Tom, your manager, instructs you to place the 15 servers into a separate subnet that uses the 192.168.10 public addressing scheme. You must plan for a maximum of 25 servers in the future and need to configure a new subnet mask.
The subnet mask must allow a sufficient number of IP addresses for the existing servers and future growth. However, you want to conserve addresses as much as possible. Which subnet mask should you use?

A)255.255.255.248
B)255.255.255.240
C)255.255.255.224
D)255.255.255.252
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
7
A server is configured as a DHCP server with a single scope. You connect the network cable on Client 1 and attempt to connect to a network server, but the connection fails. You open a command prompt on Client 1 and attempt to renew Client 1's IP address.
An error message states "An error occurred while renewing interface Local Area Connection: unable to contact your DHCP server. Request has timed out". What should you do to ensure that Client 1 receives an IP address configuration from the DHCP server?

A)Configure Client 1 with a static IP address.
B)Restart Client 1.
C)Restart the DHCP service on the DHCP server.
D)Add additional IP addresses to the scope on the DHCP server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
8
Globe1 is a Windows Server 2003 computer and a critical file server configured with a DHCP client reservation. The DHCP server fails, and users report that they cannot access resources on Globe1. Which should you do to configure Globe1 so that it is available even if it is unable to obtain or renew a lease from the DHCP server?

A)Configure the DHCP scope in the 169.254.0.1 - 169.254.255.254 range.
B)On the Alternate Configuration tab of the Internet Protocol (TCP/IP) properties, configure IP setings.
C)Configure a static IP address.
D)On the DHCP server, configure the DHCP 001 Resource Location Servers reservation option for Globe1.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
9
The mnc.com network has a DNS server configured to resolve queries for external internet resources, and it also hosts the mnc.com internal zone for Active Directory. Employees report that they are directed to the wrong Web site when browsing the Internet. What should you do to minimize the occurrence of unexpected results when users browse the Internet in the future?

A)Enable the Secure cache against pollution setting in the advanced properties of the server.
B)Enable Fail on load if bad zone data setting in the advanced properties of the server.
C)Enable the Disable recursion setting in the advanced properties of the server.
D)Enable the Enable automatic scavenging of stale resource records setting in the advanced properties of the server and set it to 7 days.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
10
John is the administrator of a network that contains a Windows Server 2003 computer named Globe 1 that has the DNS and WINS services installed. 400 Windows 2000 Professional computers connect to Globe 1 to access file and print resources.
Administrators report that network traffic has increased and that response times for requests for network resources on Globe 1 have increased. What should John do to confirm that Globe 1 is receiving requests for resources through NetBIOS broadcasts?

A)Run the tracert command on Globe 1.
B)Use Network Monitor to capture traffic between Globe 1 and Globe 2.
C)Monitor Event Viewer for Net Logon error or warning events.
D)Use Network Monitor to capture traffic between Globe 1 and all client computers.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
11
A Windows Server 2003 computer named Globe 1 has a third party application installed on it called S1. This server fails periodically. As a fix, you configure the recovery options for S1 to meet two requirements:
If S1 runs successfully for a day or more, the service is immediately restarted upon failure; and if S1 does not run successfully for another day after this failure, the entire server is immediately restarted. Which should you do?

A)Configure the Restart service after value for S1 to 1,440 minutes.
B)Configure the Reset fail count after value for S1 to 1 day.
C)Configure the response to the first failure to restart S1.
D)Configure the response to the first failure to restart Globe 1.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
12
Some computers on a network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. You discover that this traffic always uses a certain source TCP port number. You need to identify which computers are infected.
Your solution should include detecting and identifying traffic that is sent by the worm and sending a notification to a network administrator that the infected computer needs to be repaired. Which of the following should you do?

A)Configure a WMI event trigger.
B)Configure a Network Monitor capture filter.
C)Configure a System Monitor Alert.
D)Configure a Network Monitor trigger.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
13
Your domain abc.com contains Windows Server 2003 computers and Windows XP computers. You configure a server named abc 1 to be a file server. You need to capture file-transfer network traffic that is being sent to and from abc 1. You install network Monitor tools from a Windows Server 2003 product CD-ROM on a server named abc 2, which is on the same network segment as abc 1.
You run Network Monitor on abc 2. However, Network Monitor captures only network traffic that is sent to and from abc 2. What should Chad do to capture all network traffic that is sent to and from abc 1?

A)Re-install Network Monitor application on abc 2 and run Network Monitor to capture network traffic.
B)Open Network Monitor on abc 2 and create a capture filter to enable the capture of all protocols running on abc 1.
C)Open Network Monitor on abc 2 and increase the capture buffer from 1 MB to 20 MB.
D)Install Network Monitor application from the Microsoft SMS Server on abc 1 and run Network Monitor to capture network traffic.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
14
You are working as an administrator on xyz.com. A Server S5 is configured as a dial-up router and has two network adapters. One network adapter connects to the Ethernet LAN, and the other connects to a broadband networking device.
You need to verify that the current network bandwidth of the broadband connection is sufficient for the future expansion of the New York office.
Using System Monitor, which of the following should you do to measure the current utilization of the broadband network connection?

A)Monitor the Server\\Packets/sec counter on the Server Object.
B)Monitor the Bytes Total/sec counter on the Server Object.
C)Monitor the Bytes Total/sec counter on the Network Interface Object.
D)Monitor the Current Bandwidth counter on the Network Interface Object.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
15
Chad is the administrator of an Active Directory domain. Users report that they experience intermittent delays when they log on to the domain, Globe1. The replication attempts between Globe1 and other domain controllers are occasionally delayed. Chad needs to verify the cause of the intermittent connection delays to Globe1. What should Chad do first to track these delays over a period of one day?

A)Run the netdiag / verbose command to perform a network diagnostic test on Globe1.
B)Create a System Monitor counter to track the queue lengths on the network adapter on Globe1.
C)Use Network Monitor to view the network traffic packet contents between Globe1 and all other computers.
D)Run the replmon command to view the Active Directory replication status on Globe1.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
16
Chad is the network administrator for Globe.com. The network contains a Windows Server 2003 Web server named WS1 connected to the Internet using a dedicated link. Chad runs a System Monitor log on WS1, which monitors the Bytes Total/sec counter on the Network Interface object.
The size of the System Monitor log is becoming too large for the available disk space, with sample rate set at 15 seconds and logs archived once a day. What should Chad do to reconfigure the System Monitor log settings to reduce the amount of data that is captured?

A)Retain the current counter, but set the sample rate to 60 seconds.
B)Retain the current counter, but set the sample rate to 5 seconds.
C)Change the counter to Total Bytes, and set the sample rate to 15 seconds.
D)Change the counter to Current Bandwidth, and set the sample rate to 60 seconds.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
17
Chad configures a server named Globe2 as a Network Address Translation (NAT) server. Globe2 has a single network adapter and a modem. It connects to the Internet through a demand-dial connection.
Users report that when they attempt to connect to Internet Web sites, they intermittently receive the error message that states, "Page not found, but can connect after a few minutes." What should Chad do to configure Globe2 to allow users to always connect to Internet Web sites?

A)Configure the demand-dial interface as the private interface.
B)Set the dial-out hours on the demand-dial connection to any day and any time.
C)Set a demand-dial filter. Configure the filter for Only allow the following traffic. Specify a new filter outbound port 80.
D)Set the demand-dial connection to Persistent.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
18
Your network has a domain controller configured as a certification authority. The network has a Web server that runs IIS 6.0 and hosts a secure intranet site. The server also hosts other sites that do not require HTTPS. You configure a server certificate on the IIS server using a certificate from your internal CA.
Some users report that they cannot connect to the secure intranet site by using HTTPS. You confirm that all users can connect to the non-secure sites hosted on the Web server using HTTP. What should you do to view the failed HTTPS requests?

A)Review the security log in Event Viewer on the Web server.
B)Review the log fields created by IIS on the Web server.
C)Review the security log in Event Viewer on the CA.
D)Review the contents of the Failed Requests folder on the CA.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
19
Which resource record is used to resolve domain names specified in e-mail addresses to the IP address of the mail server associated with the domain?

A)PTR
B)AX
C)CNAME
D)MX
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
20
David is switching on the computers on his network for the first time after a power outage. A DNS client submits a recursive query to a local DNS server to resolve an Internet name. The server for this Internet name is not authoritative. Which of the following occurs first in this case?

A)The DNS server contacts root servers configured in the cache.dns file.
B)The DNS client resolves the name from its cache.
C)The DNS server resolves the name from its cache.
D)The DNS server forwards the recursive query to an upstream DNS server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
21
Your colleague has set the default TTL value for your company's primary DNS zone to 15 minutes. Which of the following is most likely to occur as a result of this change?

A)Resource records cached on the primary DNS server will expire after 15 minutes.
B)Secondary servers will initiate a zone transfer every 15 minutes.
C)DNS hosts will re-register their records once every 15 minutes.
D)DNS clients will have to query the server more frequently to resolve names for which the server is authoritative.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following commands is used at the Nslookup prompt to view all the contents of the zone abc.com?

A)ls -t abc.com
B)ls -d abc.com
C)ls -a abc.com
D)ls -any abc.com
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
23
An application named Inventory.exe is installed on all Windows XP client computers in the domain with the startup type of the service set to Automatic. In the Default Domain Policy Group Policy object the security administrator has configured a software restriction policy that is applied to all computers in the domain.
The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. What should you do to ensure that Inventory.exe cannot be started by a worm, while still allowing the application to run as a service?

A)In the computer settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
B)In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
C)In the computer settings section of the Default Domain Policy GPO, modify the existing software restriction policy hash rule for the Inventory.exe application so that the hash rule has a security level of Disallowed.
D)Configure a software restriction policy that contains a hash rule for the Inventory.exe application in the user settings section of the Default Domain Policy GPO. Configure the hash rule with a security level of Disallowed.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
24
You configure a server named S4 as the DNS server for the domain. After using the new ISP, users report that they cannot access Internet Web sites using their fully qualified domain names. You manually configure a test computer to use the DNS server address of the new ISP.
The test computer can successfully access Internet Web sites using their FQDNs. What should you do to ensure that network users can access Internet Web sites by using their FQDNs while ensuring that user access to internal resources is not disrupted?

A)Configure S4 to use the default root hints.
B)Create a root zone on S4.
C)Configure a forwarder on S4 to the new ISP's DNS server.
D)Configure all computers on your network to use the new ISP's DNS server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
25
A server named Server 1 functions as a DHCP and DNS server. All client computers are configured to use Server 1 for name resolution, and all DNS zones on Server 1 are enabled for DNS dynamic updates. A server named Server 25 contains antivirus server software.
It must be able to contact client computers using fully qualified domain names to propagate virus definition updates. You need to ensure that Server 25 can resolve FQDNs for all client computers on the network. Which of the following options should you modify on Server 1?

A)Dynamically update DNS A and PTR records only if requested by the DHCP clients check box.
B)Always dynamically update DNS A and PTR records check box.
C)Dynamically update DNS A and PTR records for DHCP clients that do not request dynamic updates (for example, clients running Windows NT 4.0) check box.
D)Discard A and PTR records when lease is deleted check box.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
26
On your network, the Domain Admins group is also a member of the Administrators local group on server S1. Someone makes an unauthorized change to the HKEY _LOCAL_MACHINE\SYSTEM key in the registry on S1, which causes the computer to fail. You fix the problem and plan to log all attempts to access the HKEY_LOCAL_MACHINE \SYSTEM key in the registry on S1. What should you do to enable auditing in the local security policy on S1?

A)Enable auditing in the local security policy on S1.Select the Audit object access (success and failure) option in the audit policy.
B)Enable auditing in the local security policy on S1. Select the Audit system events (success and failure) option in the audit policy.
C)Enable auditing in the local security policy on S1. Select the Audit privilege use (success and failure) option in the audit policy.
D)Configure the SACL on the HKEY _LOCAL_MACHINE\SYSTEM key in the registry. Specify auditing of the Full Control permission for everyone.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
27
John wants to analyze the Main Mode IPSec statistics on a member server running Windows Server 2003. The server is accessed frequently by a number of clients. Which of the following should he do to export statistical information for future analysis?

A)Use the IP Security monitor snap-in to export the data to a text file.
B)Type netsh ipsec dynamic show stats type=ike>File- Name.txt at the command line.
C)Type netsh ipsec dynamic show stats type=ike at the command line.
D)Type netsh ipsec dynamic show stats type=ipsec>File- Name.txt at the command line.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
28
Which of these System Monitor counters can help to detect an insufficient bandwidth problem?

A)Network Interface: Current Bandwidth
B)Network Interface: Output Queue length
C)Network Interface: Packets/sec
D)Network Interface: Bytes Total/sec
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
29
You need to modify the configuration of a service from Safe Mode With Command Prompt to repair a system that will not start normally. Which of the following command-line utilities enables you to do this?

A)Ping.exe
B)Netsh.exe
C)Netdiag.exe
D)Sc.exe
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
30
Using System Monitor and Network Monitor, Chad sees that server S1 is exhibiting connectivity problems. Chad notices that S1 has approximately 4 MB of available memory and average CPU utilization is running at 88 percent.
When Chad investigates the Network Monitor capture, he notices that some network packets sent to S1 during the capture have not been captured. What should Chad do to ensure that the impact of monitoring on S1 is reduced and that all packets sent to the computer are captured?

A)Run Network Monitor in the dedicated capture mode.
B)From a command prompt, run the diskperf command.
C)Configure a Network Monitor capture filter.
D)Increase the buffer size in Network Monitor.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
31
Globe is an Internet service provider that hosts Web sites for many companies. Each Globe DNS server hosts multiple DNS zones for customers. Several Globe administrators are allowed to add DNS zones. What should be done to produce a monthly report that will list all the zones that are hosted on each DNS server?

A)Use the dnslint utility to query each DNS server.
B)Use the nslookup utility to query each DNS server.
C)Use the dnscmd utility to query each DNS server.
D)Use the adsiedit utility to query Active Directory for a list of DNS zones.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
32
Chad is the network administrator for a network that consists of a single Active Directory domain named Globe.com. A Windows Server 2003 computer named S1 is the only DNS server in the domain. It hosts no other zones. Users report that connecting to computers within the Globe.com domain is slow. What should Chad do to check if DNS client traffic on S1 is causing this problem?

A)Use System Monitor to create a log of the Network Interface counter Total bytes/sec.
B)Use System Monitor to create a log of the DNS counters Dynamic updates/see and Total queries/sec.
C)Enable debug logging on S1. Configure the log to capture Notification events.
D)Enable debug logging on S1. Configure the log to capture Update events.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
33
David installs Windows Software Update Services on a computer named S1. The WSUS installation requirements include: Use the least amount of disk space on S1 and testing updates before deployment. David clears the Automatically Approve Updates for Installation checkbox.
Which of the following should David do to complete the installation meeting all the requirements?

A)Remove the Critical Updates option from Updates Classifications.
B)Change the Revisions to Updates setting so that new versions of previously approved updates are not automatically approved.
C)Change the Revisions to Updates setting to automatically approve all updates.
D)Change the Advanced Synchronization Options dialog box so that updates are not stored locally.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
34
You are a network administrator for a network that consists of a single Active Directory domain. The domain contains 40 Windows Server 2003 computers, 1,000 Windows XP Professional computers, and 2,000 Windows 2000 Professional computers.
Windows Server Update Services is installed on a server named S1. The necessary Group Policy object is configured. If you need to confirm that all computers in the domain have received all approved updates from S1, what should you do?

A)Install and configure Urlscan.exe.
B)At the command prompt, type gpresult /scope COMPUTER.
C)Open the WSUS console. Run the Synchronization Results report.
D)Open the WSUS console. Run the Status of Computers report.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
35
All computers in the London office are configured to use S10 as their preferred DNS server. The Texas branch office has a server named S11 which hosts a primary zone named payroll.Globe.com. The refresh interval of the payroll.Globe.com zone is set to 24 hours. In the Texas office, a firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all computers from the London office network, except S10, from performing DNS lookups against S11.
As a business requirement no delay should occur between the time that a new record is created in the payroll.Globe.com zone and the time that the record can be resolved from any computers in the London office. All computers in the London office must be able to resolve names in the payroll.Globe.com namespace.
Which of the following should be done to configure DNS on S10 to meet the requirements?

A)Setup a stub zone named payroll.Globe.com.
B)Setup conditional forwarding to S11 for the payroll.Globe.com namespace.
C)In the Globe.com zone, set up a delegation to the payroll.Globe.com zone on S11.
D)Setup a secondary zone named payroll.Globe.com that has S11 as master.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
36
You need to update five high-visibility servers with critical updates by using Windows Server Update Services (WSUS). After approving the updates, what should you do to ensure that the updates are applied within an hour?

A)Type the gpupdate /force command at the command prompt on the WSUS server.
B)Type the wuauclt /detectnow command at the command prompt on each of the five servers.
C)Type the gpupdate /force command at the command prompt on each of the five servers.
D)Type the wuauclt /detectnow command at the command prompt on the WSUS server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
37
David needs to implement a new software update infrastructure. No security patches, critical updates, or service packs have ever been installed on any of the client computers on the network. He installs Windows Server Update Services on a Windows Server 2003 computer named S5.
He synchronizes and approves all of the current security patches, critical updates, and service packs. He also needs to ensure that all client computers receive all Microsoft security patches, critical updates, and service packs. Which of the following should he do?

A)Install the Automatic Updates client on all client computers.
B)Open the WSUS console. Select the option to automatically approve WSUS updates.
C)Modify the Microsoft Update settings of the Default Domain Controller organizational unit (OU) Group Policy object (GPO) to point client computers to http://S5.
D)Modify the Microsoft Update settings of the Default Domain Policy Group Policy Object (GPO) to point client computers to http://S5.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
38
Chad installs and configures Windows Server Update Services on a server named S1. All client computer accounts are in the Clients OU. Chad creates a Group Policy object named WSUS. Currently all client computers obtain their Windows security updates from a Microsoft Update. Chad wants to configure all client computers to obtain Windows security updates from S1. What should Chad do to accomplish this task with the least amount of administrative effort?

A)Link the WSUS GPO to the domain. Configure the GPO to point to S1 for automatic updates.
B)Link the WSUS GPO to the Clients OU. Specify Clients as the target computer group in WSUS.
C)Link the WSUS GPO to the domain. Specify Clients as the target computer group in WSUS
D)Link the WSUS GPO to the Clients OU. Configure the GPO to point to S1 for automatic updates.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
39
Each sales representative in your company has a portable computer running on Windows XP Professional. You have configured a server named Main 2 with a LAN connection and a dial-up connection to the Internet. All sales representatives are connected to the LAN, but they cannot connect to the Internet. You view the IP configuration on their laptop and see a result as shown in the figure. Which of the following should you do to fix this problem?

A)Install the Connection Manager Administration Kit (CMAK) on Main 2.
B)Install the DHCP service on Main 2. Create a scope for subnet 169 .254.0.0/16.
C)Modify the Internet Explorer properties on the sales representatives' computers to specify 169.254.0.1 as the proxy server.
D)Configure Internet Connection Sharing on Main 2.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
40
David installs a new client-server application on S1, which is not a member of the single Active Directory domain. S1 has the static IP address 192.168.4.65. He installs the client software on two Windows XP Professional domain computers. The client software must be able to resolve to S1 using the fully qualified domain name, Globe.com.
S2 is the DNS server and has the IP address 192.168.4.16. When David pings 192.168.4.65, he receives valid replies. When he attempts to run the client software on the two test computers, the software cannot locate S1 and terminates. Which of the following should David do to fix the problem?

A)Enter a host (A) record for S1 on S2. This record displays S1's IP address as 192.168.4.65. In the Computer Name Changes dialog box in System Properties on S1, enter Globe.com as the primary DNS suffix of the computer and restart S1.
B)Type S1.Globe.com 192.168.4.65 #pre in the following line in the Hosts file on each of the two test computers.
C)Create an organizational unit named ApplicationServersOU, and create a computer account named S1 in ApplicationServersOU. Set the Primary DNS Suffix Group Policy setting on an ApplicationServersOU Group Policy Object to Globe.com and restart S1.
D)Run the ipconfig /registerdns command, from the command prompt on S1.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
41
Chad is the network administrator for Globe.com, which has an Active Directory-integrated DNS zone replicated to all domain controllers. DNS service is installed only on the domain controllers. The network management department requires all hosts in the payroll division to be registered in the DNS namespace, Payroll.Globe.com, which currently does not exist.
Chad needs to add support for the Payroll.Globe.com namespace to all the existing DNS servers. What should Chad do to find a solution that will not require reconfiguration if DNS servers are added to the domain in the future?

A)Create a delegation named payroll in the Globe.com zone.
B)Create a sub-domain named payroll in the Globe.com zone.
C)Create a stub zone for Payroll.Globe.com.
D)Create a primary zone for Payroll.Globe.com that is not Active Directory-integrated.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
42
David is the network administrator for a company with a Windows Server 2003 server and Windows XP clients. A new low-priority update is released and synchronized with the Windows Server Update Services server on the network. David approves the update without testing.
After the update is applied to client computers, engineering users report that they can no longer run a network-designer application. What should David do to remove the update from all client computers?

A)Clear the Automatically approved new versions of previously approved updates option on the WSUS server. Resynchronize the server with the Windows Update server.
B)Clear the update for approval on the WSUS server. Resynchronize the server with the Windows Update servers.
C)Clear the Automatically approved new versions of previously approved updates option on the WSUS server. Delete the Systemroot \$NtUninstallQ318138$ directory on each client computer.
D)Clear the update for approval on the WSUS server and run the spuninst command from the Systemroot\ $NtUninstallQ318138$\spuninst directory on each client computer.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following specifies the folder that stores all parsers for Network Monitor?

A)WINDOWS\System32\Netmon \Parsers
B)WINDOWS\System32\Parsers
C)WINDOWS\System32\Netmon
D)WINDOWS\System32\Netmon\ Parser
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is the session-layer interface used to connect a Client for Microsoft Networks to a TCP/IP protocol?

A)IP
B)NetBT
C)NetBIOS
D)Internet Explorer
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
45
During the name resolution process, which step does the resolver perform first to resolve a DNS name?

A)Read from the Hosts file.
B)Broadcast the local subnet.
C)Check the local cache.
D)Query the local DNS server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
46
Which of these tabs on the DNS server Properties dialog box should you visit to test the basic DNS functionality?

A)Advanced
B)Monitoring
C)Security
D)Forwarders
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
47
Server FS1 contains confidential data that is only available to users in the Payroll department. Chad wants all computers in the Payroll department to connect to FS1 using an IPSec policy. He assigns the Server (Request Security) IPSec policy to FS1.
Using Network Monitor, Chad notices that some computers in the Payroll department connect to FS1 without IPSec policy. What should Chad do to configure FS1 to ensure that all computers connect to it by using the IPSec policy?

A)Restart the IPSec Services service.
B)Assign the Secure Server (Require Security) IPSec policy.
C)Assign the Client (Respond Only) IPSec policy.
D)Unassign the Server (Request Security) IPSec policy.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
48
David installs Software Update Services on a network server named S1. When David attempts to synchronize S1 with the Windows Update servers, he receives an error message. David suspects that the proxy server requires authentication.
He opens Internet Explorer and verifies that he can communicate with an external Web site by using the proxy server. What should David do to ensure that S1 can communicate with the Windows Update servers?

A)Configure authentication to the proxy server in the SUS options.
B)Restart the IIS administration tool.
C)Configure the Internet Explorer settings to bypass the proxy server.
D)Install the Microsoft Firewall Client.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
49
Your domain contains a single DNS server named S1 with the Root hints enabled on S1. Internet access for the company is provided by a NAT server named S2. S2 is connected to the Internet by means of a permanent connection to the company's ISP.
Users report that they can no longer connect to xyz.com, but they can connect to internal resources and to other Internet Web sites. You can successfully access xyz.com from a computer outside the corporate network. What should you do to fix this problem?

A)On all affected users' computers, run the ipconfig/flushdns command.
B)Create a root zone on S1.
C)Disable Routing and Remote Access on S2.
D)Configure all affected users' computers to use the ISP's DNS server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
50
Your domain is configured to use only Kerberos authentication for all server connections. A user reports that he receives an "Access denied" error message when he attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user's client computer. Which command should you run from the command prompt on the user's computer?

A)Netsh
B)ksetup
C)ktpass
D)netdiag
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
51
David installs Software Update Services on a computer named S3. He creates a Group Policy object that configures all client computers to receive software updates from S3. Later, David runs MBSA on all client computers to check if all updates are applied. David discovers that all the Windows 2000 Professional client computers received updates, but Windows XP Professional client computers did not.
David verifies that the GPO setting was applied on all Windows XP Professional computers. What should David do to ensure that the Windows XP Professional client computers receive their updates from S3?

A)Migrate all users of the Windows XP Professional client computers to the Administrators local group.
B)Restart Automatic Updates on all Windows XP Professional client computers.
C)Delete the NoAutoUpdate value under HKEY_LOCAL_MACHINE \SOFTWARE\Policies \Microsoft\ Windows \ WindowsUpdate\AU on all Windows XP Professional client computers.
D)Install Service Pack 1 (SP1) on all Windows XP Professional client computers.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
52
Chad works on a network that has a Web server which runs IIS 6.0 and hosts a secure intranet site. This network consists of a single Active Directory domain with all servers running Windows Server 2003. All users on the network are required to connect to the intranet site by authentication along with HTTPS.
The company management decides to install a web application that must connect to the Web site by using HTTP. What should Chad do to collect information about the users who are connecting to the Web site by using HTTPS?

A)Check the application log on the Web server.
B)Use Network Monitor to capture network traffic on the Web server.
C)Configure a performance log to capture all Web service counters. Review the performance log data.
D)Review the log files created by IIS on the Web server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
53
In Chad's company, all portable computers used by the telecommuting employees must receive software updates from the Windows Update servers daily. Chad notices that updates from the Windows Update servers were not applied on a portable computer named C4. What should Chad do to ensure that software updates are applied to C4 daily at 10 a.m.?

A)Set the computer clock to 10 a.m. and click the Automatically download the updates and install them on the schedule that I specify check box.
B)Click the Automatically download the updates and install them on the schedule that I specify check box and type Configure it to work every day at 10 a.m.
C)Set the computer clock to 10 a.m. and click the Download the updates automatically and notify me when they are ready to be installed check box.
D)Set the computer clock to 10 a.m. and click the Notify me before downloading any updates and notify me again before installing them on my computer check box.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
54
Your network consists of a single Active Directory forest that contains two domains named europe.globe.com and america.globe.com. All company computers are registered in either the europe.globe.com DNS zone or the america.globe.com DNS zone. All DNS servers contain copies of all zones. The client computers always connect to other computers by specifying only the name of the target computer. A fully qualified domain name is not required.
You need to configure the client computers to ensure that all computer names can be resolved by using DNS without the domain name being specified. The configuration of the client computers must be automated so that they do not need to be manually reconfigured if an additional domain is added to the forest. What should you do?

A)Configure the Append these DNS suffixes option in the DNS client configuration of each client computer.
B)Configure the Default Domain Policy Group Policy Object in each domain and enable the DNS Suffix Search List policy setting in the GPO.
C)Configure the 015 DNS Domain Name option on all DHCP scopes.
D)Configure the Default Domain Policy Group Policy object in each domain. Enable the Primary DNS Suffix policy setting in the GPO.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
55
David is a network administrator in an organization. The organization's DHCP server has crashed and cannot be brought back online. The last backup is four days old. How can he preserve the current address space without restarting all user computers?

A)Deploy a new DHCP server with the same address scope and increase the new lease duration to 15 days.
B)Deploy a new DHCP server with the same address scope and raise conflict detection attempts to 3.
C)Restore the previous DHCP database from a backup.
D)Run the Ipconfig /renew command on all computers.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
56
Chad has not modified the default settings for DNS on the DHCP client or the server. On a client running Windows XP Professional, which of the following client records will be updated in DNS by the DHCP server?

A)A
B)MX
C)PTR
D)AX
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
57
How long do logged events last in the DHCP server logs by default?

A)One day
B)One month
C)15 days
D)One week
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
58
Which of these messages is not exchanged as part of a DHCP lease initialization?

A)Request
B)Renew
C)ACK
D)Discover
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
59
By default, after how much time does a DHCP client attempt to renew its IP address lease?

A)24 hours
B)1 week
C)4 days
D)8 days
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following best describes PID?

A)PID is a unique value for a running process in the system.
B)PID is a counter used for Network Monitoring.
C)PID is the packet identifier attached to every packet on the network.
D)PID is a DHCP pool identifier used to assign IP addresses to DHCP clients.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
61
Chad is the administrator of a Windows Server 2003 computer named Globe1. Globe1 is an FTP server located in Globe's internal network. Administrators report an increased amount of FTP traffic to Globe1. Chad needs to configure Globe1 to achieve these goals: Identify the MAC address of a computer using FTP transfers from Globe1, find out the FTP commands executed, and ensure that operation of Globe1 isn't disrupted. What should Chad do?

A)Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.
B)Use a Network Monitor filter to capture IP traffic from any computer to Globe1.
C)Run the arp command on Globe1 to identify the source of the FTP requests.
D)Run the finger command on Globe1 to identify the source of the FTP requests.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
62
Chad's company has offices in Florida, New Jersey, and Maryland. Each office is configured as a separate IP subnet. DNS is the only name resolution method used on the network. Chad needs to implement a software update infrastructure on the network. He installs Software SUS on a computer named S5 in the Florida office with all default settings. He has no plans to install additional SUS servers. What should Chad do to ensure that client computers can successfully connect to the SUS server?

A)Configure the Internet browser home page on all client computers to point to http://windowsupdate. microsoft.com.
B)In the SUS Administrator, configure the Server Name property to be the server's FQDN.
C)Open IIS Manager and enable HTTP over SSL.
D)Enable communication over port 13S between all client computers and the SUS server.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
63
Chad configures several GPOs to enforce the use of IPSec for certain types of communication between specified computers. A server named Globe5 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Globe5 are encrypted by using IPSec. However, when Chad monitors network traffic, he notices that Telnet connections are not being encrypted. Which tool/interface should Chad use to view all of the IPSec settings that are applied to Globe5 by GPOs?

A)The IP Security Policy Management console
B)The Resultant Set of Policy console
C)netdiag
D)MBSA
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
64
You are the network administrator for the network that consists of a single Active Directory forest with 14 domains. All servers run Windows Server 2003. Only the DNS servers in the abc.com domain have access to the Internet to resolve Internet DNS names. What should you do to configure each DNS server so that unresolved queries are resolved by DNS servers in the abc.com domain?

A)Replace the root hints with the addresses of the DNS servers in the abc.com domain.
B)Create a stub zone named abc.com that contains a copy of the IIHT.com zone.
C)Configure the default forwarding entry to forward data to DNS servers in the abc.com domain.
D)Configure a conditional forwarding entry for abc.com that forwards data to DNS servers in the abc.com domain.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
65
You are an administrator of an Active Directory domain named xyz.com. You configure a server named Server 2 as xyz.com's DHCP server. All client computers are configured as DHCP clients. Users report that they cannot connect to network resources. You investigate and discover that the client computers are not receiving their TCP/IP configurations from Server 2. What should you do to fix this issue?

A)Run the net stop dhcpserver command.
B)Authorize Server 2 using the DHCP console.
C)Run the net start dhcpserver command.
D)Restart the DHCP service using the DHCP console.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
66
You network that has 20 Windows Server 2003 computers. All client computers receive their TCP/IP settings from a DHCP server named Server 1. The network is experiencing rapid growth in the past few months. Users report that the network is going slow. When you run Network Monitor, you notice a significant increase in broadcast traffic on the network. Which of the following should you do to increase network performance?

A)Change option 046 to 0x1, B-node.
B)Remove option 044 from the DHCP Server Options.
C)Change option 046 to 0x2, P-node.
D)Create a new scope for the network.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
67
Your network has a server named RRAS1 that runs the Routing and Remote Access service. Users connect to RRAS1 by using VPNs through the Internet. RRAS1 is configured to support VPN connections by using both PPTP and L2TP. You enable all portable computers to use L2TP to connect to RRAS1.
However, some users also access RRAS1 using their home computers, which must be enabled for L2TP. Which of the following should you do to view the users who are connecting to the server by using PPTP?

A)Configure auditing in the local security policy on RRAS1 to log all logon events.
B)Configure an audit policy on the Domain Controllers organizational unit (OU). Audit all successful logons to the network.
C)Use the Routing and Remote Access console to review the remote access clients list.
D)Use the Routing and Remote Access console to review the properties for each active PPTP port.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
68
A user reports that her computer cannot connect to a remote VPN server. You suspect that her client computer did not receive a recent hotfix. What should you do to verify which hotfixes are installed on her computer?

A)Run the update.exe command from a command prompt.
B)View the History-synch.xml file.
C)View the History-approve.xml file.
D)Run the wmic qfe command from a command prompt.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is the default value of the refresh interval for a DNS record?

A)7 days
B)3 days
C)10 days
D)24 hours
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is an instance when zones do NOT need to be delegated?

A)You need to delegate management of a DNS domain to a branch or department within your organization.
B)You need to distribute the load of maintaining one large DNS database among multiple name servers to improve name resolution performance and fault tolerance.
C)You need hosts and host names to be structured according to branch or departmental affiliation within your organization.
D)You want forwarding to take precedence over delegation.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
71
Which term refers to an administrative grouping of scopes that is used to support multiple logical subnets on a single network segment when using DHCP?

A)Multiscope
B)Logiscope
C)Superscope
D)DHCP scope
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is the location where the default DHCP database manual backup is stored?

A)\WINDOWS\System32\Dhcp \Backup
B)\WINDOWS\System32\Backup
C)\WINDOWS\System32\ manualDhcp\Backup
D)\WINDOWS\System32\ Dhcpdatabase\Backup
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
73
What is the maximum number of simultaneous VPN connections that Windows Server 2003 can handle?

A)1000
B)500
C)256
D)2024
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
74
The Performance Logs And Alerts service is set up to send a message to C4 to notify an operator when the network use on C3 is too high. However, C4 does not receive the message sent from C3. Which of the following should you do to enable messages to be sent by C3 and received by C4?

A)Start the Alerter service on both C3 and C4.
B)Start the Alerter service on C3 and start the Messenger service on C4.
C)Start the Alerter service on C4 and start the Messenger service on C3.
D)Start the Messenger service on both C3 and C4.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
75
David is a network administrator in an organization. The organization has leased the Class C address of 200.16.16.0. He subnets using a 255.255.255.224 subnet mask using 2 Cisco routers. How many IP addresses are available to be allocated to computers?

A)29
B)62
C)30
D)20
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
76
You DHCP server works fine except that events 1014 and 1016 appear regularly on the System event log. Which of the following tools/utilities should you use to diagnose these events?

A)Netsh
B)Jetpack
C)Netdiag
D)Microsoft Network Monitor
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
77
You administer an Active Directory domain in which all servers are Microsoft Windows Server 2003, and all the clients are Microsoft Windows XP Professional. You have configured DHCP to update DNS only if the DHCP client requests. You find that the clients' A resource records are not updated in DNS when they obtain new DHCP leases. Which of the following is the most likely cause of this problem?

A)DNS is not integrated with the Active Directory.
B)DHCP server is not authorized in Active Directory.
C)The DHCP server's computer account is not a member of the DNSUpdateProxy global security group.
D)Clients are not configured to update their own host A resource records.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
78
Chad notices that there are frequent failures of Active Directory transactions in the event logs of the domain controllers. These are caused by DNS lookup failures against the Globe.com zone. Chad discovers that the data in one of the DNS zones on DC3 is out of date. What should Chad do to find out why the DNS data on DC3 is out of date?

A)Use Event Viewer to examine the DNS Server log for zone transfer errors.
B)Enable debug logging and examine the log file for transfer packets.
C)Use System Monitor to monitor the DNS\Zone Transfer Failure counter.
D)Use the Replmon utility to look for Active Directory replication errors.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
79
When performing performance baselining on Server 1, you notice that a large number of concurrently connected users at any given moment. This is causing performance problems on Server 1. You want to run Network Monitor on this server and capture all packets sent to Server 1.
But packet headers need to be captured in order to reduce the size of the captured data. If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets. Which of the following should you do to configure Network Monitor?

A)Configure the Network Monitor display filters.
B)Configure the Network Monitor capture filters.
C)Decrease the Network Monitor buffer size setting.
D)Increase the Network Monitor buffer size setting.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
80
Two of the servers on your network contain highly confidential documents. The company's written security policy states that all network connections with these servers must be encrypted by using an IPSec policy. You place these servers in an organizational unit named SecuServ.
You configure a Group Policy object that requires encryption for all connections and assigns the GPO to the SecuServ OU. What should you do to verify that users are connecting to the two servers using encrypted connections?

A)Use the IP Security Monitor console.
B)Run the net view command.
C)Run the gpresult command.
D)Use the IPSec Policy Management console.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 112 flashcards in this deck.