Sunteți pe pagina 1din 19

MCSE Sample Questions : Microsoft Windows Server 2003 Environment

Microsoft Windows Server 2003 Environment

1. You are the desktop support specialist for your company. Your company has 20 users and four
computers. The network is shown in the exhibit (See the exhibit below). On Monday, the operating
system on a computer named COMP2 was upgraded from Windows NT 4.0 to Windows 2000
Professional. On Tuesday morning, a user on COMP2 complains that while he is able to log on to the
domain, he is not able to access files on a server named SERV2 or connect to the Internet. You find
that the user on COMP1 is able to connect to SERV2 and the Internet. What would be the most likely
cause of the problem?

A. Incorrect IP address on COMP2.


B. Incorrect default gateway on COMP2.
C. COMP2 does not have a domain computer account.
D. The network does not have a WINS server.

Answer: B

2. You are the workgroup administrator for a small office. The office contains 12 Windows 2000
professional computers. Each computer is assigned a private IP address in the 172.10.X.X range.
One computer has a dial-up connection to the Internet. To enable all users to access the Internet,
you enable ICS (Internet Connection Sharing) on the computer with the dial up connection. You
configure ICS and reboot the computer. You notice that none of the other users can connect to the
ICS computer, and the ICS computer cannot see the other computers in the network. What could be
the problem?
A. Configure the other computers to use the ICS computer as a proxy.
B. Configure the other computers to receive their IP address automatically.
C. Configure the other computers to use the ICS computer as their default gateway.
D. Enable Internet Connection Sharing on all of the computers.

Answer: B

3. You provide technical support for a company with several locations. In a remote sales office, there
are 5 Windows 2000 Professional computers. All computers are connected in a workgroup, as
shown in the exhibit. (See the exhibit below). The manager's computer has a 56K dial up connection
to the Internet. The manager calls and explains that she had enabled ICS (Internet Connection
Sharing) on her computer. Once ICS had been enabled, none of the other users were able to access
a shared folder on the manager's computer. What should you instruct her to do?

A. Configure the dial-up connection to disable shared access.


B. Configure the dial-up connection to disable on-demand dialing.
C. Disable data encryption in the new dial-up connection.
D. Use the ipconfig command to release and renew your network TCP/IP address.

Answer: A

4. You are installing a computer named COMP2 on a Windows 2000 network as shown in the exhibit
(See the exhibit below). Your network uses TCP/IP as the only network protocol. You configure
COMP2 with an IP address of 192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway
of 192.168.2.1 Though you are able to log onto the domain, you are not able to connect to any
resources on SERV2. Users need to be able to access this server to access documents and shared
printers. What should you do to ensure that USER2 can connect to network resources?

A. Configure Client2 to use a Default Gateway of 192.168.10.1


B. Configure Client2 to use a TCP/IP address of 192.168.2.16
C. Configure Client2 to use a TCP/IP address of 192.168.5.16
D. Create a computer account on the domain for USER2

Answer: A

5. You are configuring the dial-up connection for the portable computer shown in the exhibit (See the
exhibit below). What address should you use as the default gateway for the portable computer's dial-
up connection?

A. 192.168.111.42
B. 192.168.100.21
C. 192.168.100.1
D. 209.29.9.20

Answer: C

6. You are setting up a computer for students to use to practice exercises for their certification exams.
You want to configure the computer so that users can boot into both Windows 98 and Windows 2000
Professional. You want to ensure that students can access all drive resources from either operating
system. What should you do?
A. Create a single FAT32 partition.
B. Create a single NTFS volume.
C. Configure one NTFS volume, and one extended FAT32 partition.
D. Configure a dynamic volume.

Answer: A

7. Your Windows 2000 professional computer has a shared laser printer that is used by several other
users in the office. Users are complaining that they are not able to submit print jobs to the shared
printer. Your computer has two hard disks. Drive C is almost out of free space, while drive D has
ample free space. You suspect that the lack of free space on drive C is preventing users from
submitting print jobs. What can you do to allow print jobs to spool on Drive D?
A. From the Print Server Properties dialog box, change the spool folder to a folder on drive D.
B. From the Printer Properties dialog box, change the spool folder to a folder on drive D.
C. Use the Microsoft Redirector to send the print jobs to Drive D.
D. Make drive D a dynamic volume and extend drive C onto drive D.

Answer: A

8. You are the network administrator for a small company. A Windows 2000 server serves as a domain
controller, DNS server and serves file and print functions. Users home folders are located on this
computer so that all user files will be backed up every night with the server backup. Because of
drive space limitations, you have defined disk quotas for the user's home folders. The office
manager, Sandra, informs you that when she tries to save documents to her home folder, she
receives the error: 'Insufficient disk space'. She informs you that she must be able to save her
important files into this folder as soon as possible. Other users are not encountering this problem.
What should you do?
A. Set the compression attribute for Sandra's folder.
B. Grant Sandra Full Control permission to her home folder.
C. Have Sandra save the files to her local hard disk.
D. Increase the Server's disk quota entry.

Answer: D

9. You have a Windows NT 4.0 Workstation computer with an NTFS file system that you use for
software development. As your company upgrades their systems to Windows 2000, you will need to
be able to test applications in both the Windows NT Workstation environment and the Windows 2000
environment. You decide that the easiest course of action would be to install Windows 2000
Professional in a dual boot environment with Windows NT 4.0 Workstation on your computer. What
should you do before installing Windows 2000 Professional?
A. Edit the BOOT.INI file to reflect the new installation of Windows 2000 Professional.
B. Install Service Pack 3 or later for Windows NT Workstation 4.0.
C. Install Service Pack 4 or later for Windows NT Workstation 4.0.
D. Convert the NTFS file system to FAT.

Answer: C

10. Your office is part of a larger Windows 2000 network. Two computers named PUB1 and PUB2 have
identical laser printers shared as LASER1 and LASER2 During a particularly busy day, LASER1 has
run out of toner. You do not have another toner cartridge to service it. Several users have print jobs
waiting to print on PUB1. You need to send all print jobs waiting on PUB1 to the printer on PUB2.
You also want any print jobs that may be sent to PUB1 later in the day to be sent to the printer on
PUB2. What is the best course of action?
A. Change the spool settings for PUB1 to point to the spooler directory on PUB2.
B. Change the share name of LASER1 to LASER2.
C. Configure LASER1 to add a port and set the port to \\PUB2\LASER2.
D. Configure LASER2 to add an input path and set the path to \\PUB1\LASER1.

Answer: C

11. You install an updated device driver for a SCSI adapter on your Windows 2000 Professional
computer. After installation you are prompted to restart your computer. During startup, your
computer appears to lock up. You try to boot in safe mode, but again, your computer appears to lock
up. How can you fix the problem?
A. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console
from the Repair menu. Use the remove command to remove the device driver.
B. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console
from the Repair menu. Use the disable command to disable the device driver.
C. Insert the Emergency Repair Disk. Select Recovery Console from the Repair menu. Use the
disable command to disable the device driver.
D. Press F8 during startup to access the Windows 2000 boot menu Select debug mode from the boot
menu Use the remove command to remove the device driver.

Answer: B

12. The president of your company collects manager's weekly reports in a shared folder on her
Windows 2000 Professional computer called reports. Because the reports contain sensitive
information, she asks you to prevent users from enabling offline access for the network share that
contains the financial report. What should you do?
A. Use Windows Explorer to disable Offline Files.
B. Use Windows Explorer to disable Caching for the reports on the network share.
C. Set the Manager's access level to read-only.
D. Implement a domain policy to block the synchronization of offline files.

Answer: B

13. You install an updated device driver for a SCSI adapter on your Windows 2000 Professional
computer. After installation you are prompted to restart your computer. During startup, your
computer appears to lock up. You try to boot in safe mode, but again, your computer appears to lock
up. How can you fix the problem?
A. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console
from the Repair menu. Use the remove command to remove the device driver.
B. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console
from the Repair menu. Use the disable command to disable the device driver.
C. Insert the Emergency Repair Disk. Select Recovery Console from the Repair menu. Use the
disable command to disable the device driver.
D. Press F8 during startup to access the Windows 2000 boot menu Select debug mode from the boot
menu Use the remove command to remove the device driver.

Answer: B

14. You are the desktop Administrator for a Windows 2000 network. Client computers on your network
receive their TCP/IP configuration from a DHCP server. You have purchased 25 new computers with
PXE compliant network cards. You decide to use RIS to deploy a Windows 2000 image to the 25 new
computers. For the first 17 computers, the installation works fine. For the remaining 8 computers,
the installation fails. What is the likely cause of the problem?
A. Your DHCP server does not have enough available IP addresses for the new computers.
B. There are not enough licenses configured in RIS for the new computers.
C. You have not created enough computer accounts for the new computers.
D. You have reached the maximum number of clients for a Windows 2000 network.

Answer: A

15. You are the desktop administrator for your company. Your network has 130 Windows 2000 client
computers. You need to apply the latest service pack to all 130 computers. To save time, you decide
to use a Windows Installer package to install the service pack on all 130 computers. You create an
installer package, and assign it to the domain. The next day, you check the status of the installation
and find that the service pack has only been installed on the computers in some departments in the
domain, but not others. What can you do to ensure that the service pack is applied to all computers
in the domain?
A. Ensure that all client computers have the latest version of the Windows Installer.
B. Log into each of the client computers using an administrative account to install the service pack.
C. Create a Windows Installer assignment file. Specify each computer in the domain by name.
D. Ensure that all users in the domain have permission to access the share and folder that contains
the service pack installation files.

Answer: D
16. You have 45 computers in your network that you must upgrade from Windows NT 4.0 Workstation to
Windows 2000 Professional. You want to use Setup Manager to create an unattended installation file
to reduce the need for user interaction during the upgrade process. Since you will be installing
Windows 2000 from a CD ROM, how can you use an unattended installation?
A. Install Setup Manager on each Windows NT 4.0 Workstation computers. Start the installation from
within Setup Manager by specifying the unattended text file to use.
B. Rename Unattend.txt to Winnt.sif. Copy this file to the C:\WINNT\SYSTEM32\INSTALL directory.
C. Rename Unattend.txt to Winnt.sif. Keep this file on a floppy disk in the drive during installation.
D. Use setup manager to specify the names of the 45 computers that will be upgraded.

Answer: C

17. You are upgrading several computers in your office from Windows NT 4.0 to Windows 2000. While
running Windows 2000 setup on one computer, you encounter a read error with the CD-ROM, and
are forced to terminate setup. You replace the CD ROM, but find that you are not able to boot the
computer into Windows 2000 or Windows NT. You attempt to boot from the CD ROM, and find that
the computer does not support booting from the CD ROM. What can you do to recover the
installation?
A. Boot the computer from a Windows NT boot disk. Delete the WINNT directory. Rename the
$WINNT.OLD directory to WINNT.
B. Create a Windows NT Boot disk. Copy the real-mode CD-ROM drivers to this disk. Boot with the
floppy disk and run setup again from the CD ROM.
C. On another computer, create a set of Windows 2000 installation disks. Use these disks to restart
the installation on the failed computer.
D. Press F8 while booting the computer. Select 'Rollback to previous version of Windows' from the
recovery options menu.

Answer: C

18. Your network has 25 computers that have been purchased over the course of time. These computers
need to be upgraded from Windows NT 4.0 Workstation or Windows 9x to Windows 2000. These
computers come from a variety of vendors and feature a variety of hardware. You decide that you
want to use Sysprep and a third party disk imaging software to simplify installations. You want to
ensure that Windows 2000 detects the new variety of hardware without generating errors. What
should you do?
A. Remove all devices in Device Manager before running Sysprep.
B. Include the -pnp perameter when you run sysprep.
C. Include the -redetect perameter when you run sysprep.
D. Check the 'Force hardware redetection' checkbox when you run sysprep.

Answer: B

19. You are planning to deploy Windows 2000 Professional on 25 identical new computers in your
company. You decide to use Sysprep and a third party disk imaging software to simplify
installations. You install Windows 2000 on one computer. You then log in using the local
administrator account and install the applications that the users will use and configure the initial
desktop settings. You want to ensure that the users will receive the desktop settings, shortcuts and
start menu that you have configured. What should you do?
A. Run Sysprep. Sysprep will always use the active profile as the default.
B. Specify the administrator profile in the [profiles] section of the sysprep.inf.
C. Log into the computer as Default User. Set up the desktop settings, shortcuts and start menu
settings.
D. Copy the Administrator profile to the Default User profile. Grant permissions to the Everyone group
to use the profile.

Answer: D

20. You are the desktop administrator for your company's network. The network is configured as shown
in the Exhibit (See the exhibit below). You have just received 25 new PXE compliant computers that
need to be installed on the network. You decide to use Remote Installation Service (RIS) to deploy
Windows 2000 on the new computers. Assuming that you have already created a RIS image, and
placed the image on the RIS server, what must you do to ensure that the new computers can receive
a RIS image?

A. Add a WINS to the network.


B. Add a DHCP to the network.
C. Create a set of RIS boot disks.
D. Create computer accounts in the domain for the new computers.

Answer: B

21. You are the desktop administrator for the finance department. A user named Tom transfers from the
sales department to the finance department. You add Tom's user account to the finance group,
which has Full Control access to the FinanceFiles folder. When Tom tries to access the FinanceFiles
folder, he is denied access. What could be the cause of the problem?
A. Tom's account must be given permissions on the share as well.
B. Tom may have a policy restriction which does not allow him to access the FinanceFiles folder.
C. Tom may still be a member of a group that has been explicitly denied access the FinanceFiles
folder.
D. You must add Tom's account directly to the FinanceFiles folder.

Answer: C

22. Your Windows 2000 Professional computer has several shared folders. You are conducting a
security audit and wish to view the permissions on each of the shared folders. How can you quickly
view all shared folders on your computer? on of ShareA. What should you do?
A. User Windows Explorer to search for shared folders.
B. Use System information in Computer Management to view shared folders.
C. Use disk management to view the shared folders on each drive.
D. Use Shared Folders in Computer Management to view shared folders.

Answer: D

23. A manager in your office received a new Windows 2000 Professional laptop computer. You have
been asked to configure offline files for the manager to work on documents at home. You enable
offline files, and have the manager log off of the network. During the logoff process, the expected
synchronization of offline files does not occur. You have the manager log back on to the network.
What can you do to correct the problem?
A. Enable file and print sharing. When the manager logs off, the files will synchronize.
B. Manually synchronize all offline files.
C. On the server, make all files available offline. When the manager logs off, the files will synchronize.
D. Do nothing. Windows 2000 Professional does not tell you when Synchronization happens.

Answer: C

24. You use a Windows 2000 Professional computer to run a third party application to log network
activity in your office. These log files are kept in a folder that has limited access. You schedule a
task to run a clean-up program to purge old log files from the log file folder. When the scheduled
task runs, it terminates without deleting any files. To test the application, you log into the computer,
and run the application. It runs correctly. What can you do to ensure that the application will work as
a scheduled task?
A. Configure the scheduled task to run under your account.
B. Configure the Task Scheduler service account to use a local Administrator account.
C. Give the task scheduler service full control permission for the directory.
D. Configure the Task Scheduler service to start automatically.

Answer: A

25. You are setting up a Windows 2000 professional laptop computer to use offline files. You set up a
shortcut to a folder that is shared on a Windows 2000 Server computer. When you attempt to
configure the shortcut to be available, you do not see the option to make the folder available offline.
What should you do?
A. Establish an offline files link to the folder in Computer Management.
B. Configure the folder on the network share for offline access in Windows Explorer.
C. Connect to the network before trying to make the shortcut available offline.
D. Copy the folder from the network share, and select 'Make Available Offline' in the local folder
properties.

Answer: B

26. You have a Windows 2000 Professional computer that runs several monitoring applications that
occasionally make changes to registry entries. You use Windows Backup to make a nightly backup
of the computer. You want to ensure that the current registry objects are included in the backup.
What should you do?
A. Configure Windows Backup to back up the entire hard drive.
B. Configure Windows Backup to back up the System State data.
C. Select 'Registry Files' under 'Additional Files to back up' in Windows Backup.
D. Configure Windows Backup to backup open files.

Answer: B

27. You have a Windows 2000 Professional computer that is used by several users. You occasionally set
up special accounts for visiting vendors to log into the computer. These accounts have limited
access to the network, and are named guest1, guest2, guest3, etc... You create a script to delete
these accounts periodically from the computer. You want to use Windows scheduler to run this
script on a regular basis. You want to ensure that the script will run regardless of which account is
currently logged on to the computer. What should you do?
A. Schedule the task to run under an Administrative account.
B. Log on as administrator and schedule the task to run as guest1.
C. Give the guest accounts local administrative rights.
D. Grant the guest accounts 'execute' permissions to the script.

Answer: A
28. You are the desktop support specialist for a magazine publishing company. One computer in the
office is used to download images from digital cameras and from the Internet. Many users log in to
this computer each day. A user complains that this computer has stopped responding. You find that
someone has installed drivers for a digital camera. These drivers were not approved for use with
Windows 2000. You want to ensure that only drivers that are approved for use with Windows 2000
are used on this computer. Which settings should you enable in the Deliver Signing Options dialog
box?(Choose all that apply)
A. Ignore
B. Warn
C. Block
D. Apply setting as system default.

Answer: C, D

29. You connect a USB printer to your Windows 2000 Professional computer. You install the device
driver for the printer. During the install process, the computer displays a fatal error. You restart the
computer, and the computer locks up while loading Windows 2000 Professional. You start the
computer in safe mode. What should you do next?
A. Enabling driver signing. Set driver signing to Block installation of unsigned drivers.
B. Remove the printer from the printers applet in control panel.
C. Disable the printer device driver using the disable command.
D. Disable the printer device driver in Computer Management.

Answer: D

30. The president of your company collects manager's weekly reports in a shared folder on her
Windows 2000 Professional computer called reports. Because the reports contain sensitive
information, she asks you to prevent users from enabling offline access for the network share that
contains the financial report. What should you do?
A. Use Windows Explorer to disable Offline Files.
B. Use Windows Explorer to disable Caching for the reports on the network share.
C. Set the Manager's access level to read-only.
D. Implement a domain policy to block the synchronization of offline files.

Answer: B

31. The manager of the finance department has two spreadsheets that contain sensitive information.
She has used Windows 2000 encryption to ensure the security of the files on her local computer.
She would like to make a backup of the files. What should you advise her to do?
A. Copy the files to a network share on an NTFS volume
B. Copy the files to a floppy disk and use the CIPHER command to encrypt them.
C. Place the files in an encrypted folder and copy the folder to a floppy disk.
D. Use her computer to format a floppy disk and copy the files to the disk.

Answer: A

32. You are asked to establish a dial-up connection on a Windows 2000 Professional computer in the
Accounts Payable department to connect a custom application to the vendor's network. You have
limited information about the type of connection. Because of the sensitive nature of the connection
you want to make sure that authentication information is not sent in plain text. Click the exhibit
button to view the Advanced Security Settings dialog box. In the Advanced Security Settings dialog
box, which options should be checked? (Choose all that apply)
A. Unencrypted password (PAP)
B. Shiva Password Authentication Protocol (SPAP)
C. Challenge Handshake Authentication Protocol (CHAP)
D. Microsoft CHAP (MS-CHAP)
E. Microsoft CHAP Version 2 (MS-CHAP v2)
F. For MS-CHAP based protocols, automatically use my Windows logon name and password

Answer: C, D, E

33. You are the desktop administrator for your network. Sam, the manager of the sales department,
complains that someone has been deleting files from his hard disk. He asks you if you can track any
users that delete files from his computer in the future. What should you do? (Choose all that apply)
A. Enable a Group Policy for auditing successful object access events.
B. Enable a Group Policy for auditing unsuccessful object access events.
C. Enable the local Group Policy for auditing successful system events.
D. Enable the local Group Policy for auditing unsuccessful system events.
E. Use Windows 2000 Explorer to enable auditing for Sam's files.
F. Enable auditing in the properties of any share that exists on Sam's computer.

Answer: A, E

34. Your company has an outside sales team. Recently each of the outside sales staff was given a new
Windows 2000 portable computer. The sales team now wants to be able to dial into the network from
client sites. For security purposes, you have been asked to set up connections that use smart cards
for two-factor authentication. The connection is already configured on the server. You need to
configure each laptop to use this connection. What should you do?
A. Set the dial-up connection to use EAP.
B. Set the dial-up connection to use SPAP.
C. Use the software that came with the smart card to create the connection.
D. Issue a client side certificate for each of the portable computers. Configure each connection as a
VPN connection.

Answer: A

35. You have a need to provide a vendor with a Windows 2000 based portable computer with an external
Zip drive. You find an external Zip drive in the supply closet. You attach the drive to the parallel port
of the portable computer, and configure the parallel port as an ECP port. Your port settings are
shown in the exhibit (See the exhibit below). Windows 2000 Professional has detected the change to
the port, but does not detect the attached drive. You need to resolve the problem quickly. What
should you do?(Choose all that apply)

A. Configure the ECP port to use any interrupt assigned to the port.
B. Configure the ECP port to not use the automatic resource setting.
C. Change the LPT Port Number to Unassigned.
D. Configure the ECP port to enable legacy Plug and Play detection.

Answer: D

36. You get a great deal on a refurbished laser printer. The printer is plug and play compliant and
connects to your USB port. The printer is on the current Windows 2000 Hardware Compatibility List
(HCL). You install the printer and run the manufacturers setup program. During the installation, you
receive the error shown in the exhibit (See the exhibit below). What should you do?
A. Change the USB port setting to enable legacy Plug and Play detection.
B. Configure the USB port to Disable Error Detection.
C. Connect the printer as a shared device on a non-Windows 2000 computer.
D. Install the WDM-compliant device drivers using the Add New Hardware wizard.

Answer: D

37. You are the network consultant for a small company. Part of the office network is shown in the
exhibit (See the exhibit below). The network has built up as the company grew. Originally a Windows
NT 4.0 peer-to-peer network running NWLINK protocol, the network has grown into a Windows 2000
domain. Not all computers in the network can access all other computers in the network. Though the
network works now, the general manager has asked you fix the connectivity problem and prepare
the network for Internet connectivity. What should you do?

A. Change all NWLINK computers to the 802.2 frame type.


B. Install TCP/IP on the Windows NT 4.0 Workstations.
C. Change the default network protocol to NWLink IPX/SPX
D. Add the NetBEUI protocol to the binding order on all client computers.

Answer: B

38. You are the desktop administrator for your company. Pat, a manager in the accounting department
asks for your help. Pat needs to copy a spreadsheet to a floppy disk so she can use it at home. On
her hard drive, compressed, the file is less than 1 MB in size. However, when Pat attempts to copy
the file to an empty floppy disk, she receives the error: 'Insufficient Disk Space' What should you
suggest to Pat to do?
A. Use Drivespace.exe to compress the entire floppy disk.
B. Format the Floppy disk on the Windows 2000 computer. Set the compression attribute on the
floppy disk to on.
C. Use another program to compress the bitmap file before copying it to the floppy disk.
D. Copy an empty compressed folder to the floppy disk. Copy the compressed bitmap file to the folder
on the floppy disk.

Answer: C

39. You are the desktop administrator for a graphic arts studio. To support a processor intensive
rendering program, you have purchased a computer with Dual Pentium 4 processors. You install
Windows 2000 Professional on the computer. In Device Manager you notice that the drivers for the
second processor are not installed. How can you enable support for the second processor?
A. Re-install Windows 2000 Professional. Specify the additional driver for the second processor.
B. Remove the current processor from device manager, System devices. Reboot to allow Windows
2000 to detect the second processor.
C. Use Device Manager to add the appropriate hardware abstraction layer (HAL) to the computer to
support the second processor.
D. Boot Windows 2000 Professional into a command prompt only. Use HALBUILD.EXE to rebuild the
hardware abstraction layer (HAL).

Answer: C

40. You are preparing a RIS installation of Windows 2000 Professional on 45 PXE compliant computers.
You install Windows 2000 on a reference computer along with all application and desktop settings.
You use sysprep to shut down the computer, and you create an image of the test computer for
distribution. When you apply the image to the next computer, you notice that a key application has
not been installed. You want to correct the problem with the least amount of effort. What should you
do?
A. Use Setup manager to specify a network installation directory for the application.
B. Install the application and create the RIS image again.
C. Use Sysdiff to take a snapshot of the application installation. Use Windiff to apply the change to the
rest of the computers.
D. Add the application install path to the [apps] section of the unattended.txt file

Answer: B

Microsoft Windows Server 2003 Network Infrastructure (70-291)

MCSE Sample Questions : Microsoft Windows Server 2003 Network Infrastructure


Microsoft Windows Server 2003 Network Infrastructure

1. As a newly recruited network administrator of a company your boss has told you that the network ID
of this network is 192.168.1.1 and subnet mask is 255.255.255.240 and has two subnets, but he
wanted to create a new subnet for IT and Marketing departments. What is the total number of
subnets that can be created from the existing subnet mask?
A. 5
B. 4
C. 14
D. 41

Answer: C

2. What is the maximum number of PPTP and L2TP connections that can be supported on a Windows
2003 Enterprise edition?
A. 1000 and 5000
B. 1000 and 1500
C. 1000 and 1000
D. 5000 and 1000

Answer: C

3. As part of trouble shooting errors in a VPN connection, what logs must be checked?
A. IPSec logging
B. Event viewer
C. VPNSec Log
D. All of above

Answer: a

4. A network has an unauthorized DHCP server. What is the utility to detect this?
A. DHCPUnatho
B. DetectDHCP
C. DHCPLOC
D. There is no way to detect an authorised DHCP server

Answer: C

5. What is the recommended way for making DNS servers aware of other namespaces?
A. STUB Zone
B. Conditional Forwarding
C. Forward lookup
D. Reverse lookup

Answer: B

6. What is the broadcast address of the subnet 192.18.12.128 / 255.255.255.224 and address range
192.18.12.129 through 192.18.12.158?
A. 192.18.12.159
B. 192.18.12.128
C. 192.18.12.158
D. 192.18.12.129

Answer: D

7. Which is the best option for troubleshooting name resolution problems?


A. NSlookup
B. Systems Monitor
C. DNS log in Event Viewer
D. Network Monitor

Answer: A

8. You have installed a Windows Server 2003 DNS server, but because of security reasons, you have to
install this behind a firewall. What port on the firewall must be opened so that users can access the
server?
A. IP and UDP port 42
B. UDP and TCP port 53
C. TCP 53 but not UDP
D. PPTP and UDP 21

Answer: B

9. In an IPSec tunnel what types of traffic can be secured?


A. Multicast
B. Unicast
C. Kerberos
D. Resourse Reservation Protocol(RSVP)

Answer: B
10. An administrator has to choose between compatibility at the same time security is the top most
priority for implementing a Virtual Private Network?
A. PPPoE
B. LT2P
C. PPTP
D. PPP

Answer: B

MCSE Sample Questions : Windows Server 2003 Active Directory Infrastructure


Windows Server 2003 Active Directory Infrastructure

1. As the network administrator you have been requested to create a site link to join two sites together
for replication. First you click Start, point to Programs, point to Administrative Tools, and then click
to open Active Directory Sites and Services. What is the next step in creating this site link?
A. Click two or more sites to connect and click OK
B. Right-click on Licensing Site Setting and then click on properties.
C. Open Inter-Site Transport folder and then right-click IP or SMTP folder
D. Enter a name for the site link bridge.
E. In the New Object Link dialog box click New Site Link Bridge.

Answer: C

2. In any Active Directory forest there are five Operations Masters roles that must be assigned to one
or more domain controllers. Which of the following answers correctly depicts these roles?
A. Infrastructure Master, PDC Emulator, Relative ID master, SYSVOL, Root Domain
B. Schema Master, Domain Naming Master, Infrastructure Master, PDC Emulator, Relative ID master.
C. Root Master, Domain Name Master, Infrastructure Master, PDC Emulator, Relative ID master.
D. Trust Master, Root Master, Infrastructure Master, PDC Emulator, Relative ID master.

Answer: B

3. A hierarchical structure made up of multiple domains that trust each other is called a(n) _______?
A. Forest
B. Schema
C. Site
D. Organizational Unit
E. Tree

Answer: E

4. You have been told that you need to track down the source of a breach in network security. As a
network technician for your company's Windows 2000 network you quickly pull up Event Viewer and
examine the security logs on the Domain Controllers. However upon viewing the security log you
notice there are key and lock icon symbols you do not understand. What could these mean?
A. The key icon represents that this event is locked with a normal password while the lock icon
represents that this event is locked with an encryption.
B. The key icon represents that the event is a key alert record while the lock icon indicates that this
event can only be unlocked by its owner.
C. The key icon represents that the event occurred successfully while the lock icon represents event
occurred unsuccessfully.
D. The key icon represents that this event contains errors, warnings, or vital information while the lock
icon represents that this event is normal and within guidelines.

Answer: C

5. As a network administrator you have been requested to move a printer from your company's
Marketing OU to your company's Research OU. After the move you test the printer and find that the
local administrator assigned to the Marketing OU still has access and can remove print jobs from it.
What can you do to change this?
A. Remove the permissions for the local administrator from the printer.
B. Remove printer permissions from the local administrator.
C. Remove the Everyone group from the printer.
D. Delete the printer object.

Answer: A

6. You recently been promoted to Network Administrator for DLM Shipping. When you took over this
position the first thing you notice is this Windows 2000 environment using DNS naming convention,
root domain is DIM.COM, with numerous child domains. User accounts are stored in the child
domains. However your supervisor informs you that root domain is misspelled and should be
DLM.COM. He explains this is causing tremendous problems with the users and customers. He
wants you to rename the domain. What will happen if you rename this root domain server?
A. When you rename the root domain server you will only have to rebuild the user accounts since the
root domain holds the authentication (SAM) database.
B. When you rename the root domain server you will simply rename the child domain also.
C. When you rename the root domain server you will lose the entire network orphaning the child
domains.
D. When you rename the root domain server you will not need to do anything else since domain
names are inherited the child domains will acquire the new domain name.

Answer: C

7. Windows 2000 Active Directory contains both logical and physical components. Which of the
following are physical components of Active Directory?
A. Trees
B. Organizational Units
C. Sites
D. Domains
E. Domain Controllers

Answer: C, E

8. You are the network administrator for a company that has a Windows 2000 single domain with three
sites containing two domain controllers in each. The company only has two IP site links:
Atlanta_Detroit and Dallas_Detroit. You are contemplating on adding another domain controller
within each site to handle all replication for each site. How should you configure this domain
Controller?
A. Configure the new domain controller to be an IP preferred bridgehead server.
B. Configure the new domain controller to be a site link.
C. Configure the new domain controller to be a subnet.
D. Configure the new domain controller to be a replication master.

Answer: A

9. You are requested to perform a transfer of the role of relative ID master for a domain within your
company. Where would you begin this transfer?
A. Open the Active Directory Schema snap-in
B. Open the Active Directory Sites and Services console
C. Open the Active Directory Domains and Trusts console
D. Open the Active Directory Users and Computers console

Answer: D

10. You have just assisted your company in migrating to Windows 2000 Active Directory. In addition you
have installed an intranet server with Web hosting services for each department within your
company. One department, the legal department, actually hosts both a web services and ftp services
on its intranet server. You need to identify the legal department's intranet server as the host for both
ftp and web server within the DNS server's resource records. Which type of resource record should
you create to identify this server?
A. Alias (CNAME)
B. Mail Exchange (MX)
C. Pointer (PTR)
D. Service (SVR)
E. Name Server (NS)
F. Start of Authority (SOA)

Answer: D

11. As the network administrator you have just been informed that one of your authorized Power Users
has deleted several local user accounts. You explain to this mortified employee that he needs to
perform an authoritatively restore on the select portion of Active Directory data deleted. What must
be done before he can use NTDSUTIL utility to authoritatively restore the data?
A. Republish the SYSVOL
B. Bring down all domain controllers at the site and reboot
C. Perform a Primary restore
D. Synchronize Active Directory Services
E. Nonauthoritatively restore the System State data
F. Revoke and reissue orphaned certificates

Answer: E

12. Your company uses Windows 2000 IIS server and log files you have enabled a reverse lookup zone.
This will assist in running troubleshooting tools. Because your company is experiencing trouble
with a DNS server you decide to use NSLOOKUP to confirm that zone delegation was successful. At
the command prompt on your DNS server, you type NSLOOKUP 10.0.0.25 command. What do you
expect to see next?
A. Hostname
B. Server zone
C. DNS log file
D. DNS queries

Answer: A

13. You have been requested to create a group Policy (GPO) linked to a domain. The GPO will be applied
to all users in the domain. What is the first step in creating a GPO?
A. Open the DispatchPolicy GPO console
B. Open Active Directory Users and Computers
C. Add the Group Policy snap-in to the MMC console
D. Open Active Directory Sites and Services

Answer: B

14. You have been asked to troubleshoot a problem with your DNS servers that appears to not be
making zone transfers between primary and secondary DNS servers. You begin to solve this
problem by opening the DNS console tree, right click the name server, then click Properties. On the
Logging tab, select the debug options and click OK. Which of the following are solutions for transfer
problems between primary and secondary zones?

(Choose all that apply).

A. Make sure the serial numbers for the zones involved in the transfer are not the same on each
server.
B. Make sure a site-link server is properly configures between each zone.
C. Delete the secondary DNS server from the primary and reboot.
D. Eliminate the possibility of network connectivity between the two hosts. Use the PING command to
ping each DNS host by its IP address from its remote counterpart.
E. Verify that the primary and secondary DNS servers involved in the transfer are both started and
that the zone is not paused.

Answer: A, E

15. As the network administrator you have been asked to move a domain controller from one site to
another existing site using Windows 2000 Active Directory. To accomplish this you begin by getting
into the Active Directory Sites and Services console. Then you select the domain controller that you
want to move. What do you do next?
A. Right-click the domain controller, select Cut, navigate to the new site and Paste it there.
B. Click Move on the Action menu, select the site to which you want to move the domain controller in
the Move Server dialog box and click OK.
C. Drag the domain controller to the new site and drop it there.
D. Right-click the domain controller, select Advanced, select the site to which you want to move the
domain controller in the Move Server dialog box, and click OK.

Answer: B

16. As a network technician you have been requested to restore a mistakenly deleted organizational Unit
from the Active Directory. You first perform a nonauthoritative restore of the System State data.
After which you next chose to use the NTDSUTIL utility to authoritatively restore the organizational
unit (OU) that has been mistakenly deleted. The deleted OU is named "prepexams1" and was located
in the knowledgeoasis.com domain. At the command prompt you type the utility command 'ntdsutil'
and enter, then the type of restore command 'authoritative restore' and enter. Which of the following
commands should you enter next to restore this OU?
A. Ntdsutil OU=prepexams1,DC=knowledgeoasis,DC=com
B. Restore subtree OU=prepexams1,DC=knowledgeoasis,DC=com
C. Restore database OU=prepexams1,DC=knowledgeoasis,DC=com
D. Authoritative restore OU=prepexams1,DC=knowledgeoasis,DC=com

Answer: B

17. You need to create a reverse lookup zone to enable reverse lookup queries. To create a reverse
lookup zone you will need to open DNS console and expand the DNS server. What should you do
next?
A. Right-click the DNS server and click Properties.
B. Right-click the Reverse Lookup Zone folder and click Advanced.
C. Right-click the DNS server and select New Domain.
D. Right-click the Reverse Lookup Zone folder and click New Zone.

Answer: D

18. As network administrator you have been asked to create an Active Directory structure to allow local
administrators at your company's branch offices to control users and local resources. The local
administrators should control only resources in branch offices. What should you do to accomplish
this request?
A. Create a child OU for each branch office, place users and resources in it, and delegate control of
each OU to local administrators at each office.
B. Create a schema that contains formal definition of administrative duties and structure over users
and resources in each branch.
C. Create an implicit trust object thast grants specific authority to the local administrator over their
branch domain.
D. Create an explicit one-way nontransitive trust between domains that allow the branch
administrators to controller their users and resources.

Answer: A
19. You are the backup operator of a Windows 2000 domain. The domain has 2 domain controllers and
one certificate server at the central office and 1 domain controller at a branch office. You have been
requested to add the domain controller in the remote branch office to your regular once a week
backup at the central office. You schedule the backup job to include the system state data from both
locations. What will be backed up from the branch office?
A. SYSVOL
B. Registry
C. Certificate database
D. COM+ Class Registration database
E. System boot files
F. None of the above

Answer: F

20. You are an Account Operator responsible for maintaining Windows 2000 Active Directory and the
network directory infrastructure. You have been using Windows 2000 Group Policy objects to assign
.msi packages to a group of Windows 2000 Professional workstations based on their membership in
an organizational unit. Recently you added several new users to the OUs receiving the .msi
packages. All seems to performing properly until you are contacted by one of the new users. This
user states that an error message: The feature you are trying to install cannot be found in the source
directory. What is the solution(s) to this problem?

(Choose all that apply)

A. You must ensure that the user has sufficient permissions for the SDP and the application.
B. Make sure the network is operating correctly.
C. You must ensure that the user has Apply Group Policy permission for the GPO.
D. You must ensure that the user has READ permission for the GPO.

Answer: A, B, C, D

S-ar putea să vă placă și