Sunteți pe pagina 1din 14

1. What is the GUI tool used to build the UNATTEND.

TXT file included with


the Windows 2003 Resource Kit?
A. SETUPMGR.EXE
B. UNATTEND.EXE
C. PREBUILD.EXE
D. SYSLOAD.SYS
E. SETUP.EXE

Answer: A
2. Which component of the Windows 2003 Executive is responsible for handling
input and output from installed devices?
A. The Device Manager
B. The Cache Manager
C. The I/O Manager
D. The Device Manager
E. none of the above

Answer: C

3. If a network has a Windows 2003 domain controller, what kind of network is


it?
A. WAN
B. High-speed
C. Peer-to-peer
D. Server-based
E. Server-to-server

Answer: D

4. RAID 1 offers what type of fault tolerance?


A. Mirroring
B. Stripping
C. Stripping with parity
D. Hot swap
E. Warm swap

Answer: A

5. Which RAID level is also called mirroring?


A. 0
B. 1
C. 3
D. 5
E. 10

Answer: C
6. What is a set of rules for communication between computers called?
A. NOS
B. protocol
C. standards
D. service
E. NDIS

Answer: B

7. You want to provide search capabilities to the browsers of your Web


site.Which IIS service provides this feature?
A. NNTP
B. Mail Server
C. Index Server
D. Transaction Server

Answer: C

8. You have a domain name host.primary.mycomp.com.Which portion of the


domain name must be registered with InterNIC at the minimum assuming
that your have a DNS Server setup?
A. host.primary.mycomp.com
B. primary.mycomp.com
C. mycomp.com
D. None of the above

Answer: C

9. MMC is an acronym for:


A. Microsoft Management Console
B. Multimedia Management and Control
C. Microsoft Media Console
D. Microsoft Motion Control

Answer: A

10. Which are the IIS services that can use SSL communication?(Choose 3).
A. News
B. Mail
C. WWW
D. FTP

Answer: A, B and C

11. You want to see if any broken links are there in your Web site.Which tool do
you use?
A. NT Explorer
B. Site Server Express
C. User Manager
D. Performance Monitor

Answer: B

12. Files in an EFS partition are-


A. Compressed
B. Archived
C. Encapsulated
D. Encrypted
E. EFS is not a valid file system type

Answer: D

13. Windows clustering provides with of the following benefits?


A. High-availability
B. Network load balancing
C. Component load balancing
D. All of the above
E. None of the above

Answer: D

14. During a RIS installation, after the client system boots, it initiates a-
A. TFTP download
B. DHCP request
C. Telnet Session
D. ROSI protocol
E. All of the above

Answer: B

15. Which network must be present to use RIS?


A. Telnet
B. DHCP
C. BOOTP
D. RAS
E. Any of the above

Answer: B

16. The interface which guides a user through a RIS installation is called?
A. Client Installation Wizard (CIW)
B. Remote Server Wizard (RSW)
C. Remote Client Wizard (RCW)
D. Remote Operating System Installation (ROSI)
E. None of the above

Answer: A

17. The GUI tool used to build the UNATTEND.TXT file included with the
Windows 2000 Resource Kit is?
A. SETUPMGR.EXE
B. UNATTEND.EXE
C. PREBUILD.EXE
D. SYSLOAD.SYS
E. SETUP.EXE

Answer: A

18. Which security model is used in a peer-to-peer network?


A. Access Control Lists (ACLs)
B. Access Control Entries (ACEs)
C. Password-protected Shares
D. Share-level Security
E. User-level Security

Answer: D

19. You are the workgroup administrator for a small office. The office contains
12 Windows 2000 professional computers. Each computer is assigned a
private IP address in the 172.10.X.X range. One computer has a dial-up
connection to the Internet. To enable all users to access the Internet, you
enable ICS (Internet Connection Sharing) on the computer with the dial up
connection. You configure ICS and reboot the computer. You notice that
none of the other users can connect to the ICS computer, and the ICS
computer cannot see the other computers in the network. What could be the
problem?
A. Configure the other computers to use the ICS computer as a proxy.
B. Configure the other computers to receive their IP address automatically.
C. Configure the other computers to use the ICS computer as their default gateway.
D. Enable Internet Connection Sharing on all of the computers.

Answer: B

20. You are setting up a computer for students to use to practice exercises for
their certification exams. You want to configure the computer so that users
can boot into both Windows xp and Windows 2003 Professional. You want to
ensure that students can access all drive resources from either operating
system. What should you do?
A. Create a single FAT32 partition.
B. Create a single NTFS volume.
C. Configure one NTFS volume, and one extended FAT32 partition.
D. Configure a dynamic volume.

Answer: A

21. Your Windows 2003 professional computer has a shared laser printer that is
used by several other users in the office. Users are complaining that they are
not able to submit print jobs to the shared printer. Your computer has two
hard disks. Drive C is almost out of free space, while drive D has ample free
space. You suspect that the lack of free space on drive C is preventing users
from submitting print jobs. What can you do to allow print jobs to spool on
Drive D?
A. From the Print Server Properties dialog box, change the spool folder to a folder on
drive D.
B. From the Printer Properties dialog box, change the spool folder to a folder on
drive D.
C. Use the Microsoft Redirector to send the print jobs to Drive D.
D. Make drive D a dynamic volume and extend drive C onto drive D.

Answer: A

22. As a newly recruited network administrator of a company your boss has told
you that the network ID of this network is 192.168.1.1 and subnet mask is
255.255.255.240 and has two subnets, but he wanted to create a new subnet
for IT and Marketing departments. What is the total number of subnets that
can be created from the existing subnet mask?
A. 5
B. 4
C. 14
D. 41

Answer: C

23. As part of trouble shooting errors in a VPN connection, what logs must be
checked?
A. IPSec logging
B. Event viewer
C. VPNSec Log
D. All of above

Answer: a

24. A network has an unauthorized DHCP server. What is the utility to detect
this?
A. DHCPUnatho
B. DetectDHCP
C. DHCPLOC
D. There is no way to detect an authorised DHCP server

Answer: C

25. What is the recommended way for making DNS servers aware of other
namespaces?
A. STUB Zone
B. Conditional Forwarding
C. Forward lookup
D. Reverse lookup

Answer: B

26. Which is the best option for troubleshooting name resolution problems?
A. NSlookup
B. Systems Monitor
C. DNS log in Event Viewer
D. Network Monitor

Answer: A

27. In an IPSec tunnel what types of traffic can be secured?


A. Multicast
B. Unicast
C. Kerberos
D. Resourse Reservation Protocol(RSVP)

Answer: B

28. As the network administrator you have been requested to create a site link to
join two sites together for replication. First you click Start, point to
Programs, point to Administrative Tools, and then click to open Active
Directory Sites and Services. What is the next step in creating this site link?
A. Click two or more sites to connect and click OK
B. Right-click on Licensing Site Setting and then click on properties.
C. Open Inter-Site Transport folder and then right-click IP or SMTP folder
D. Enter a name for the site link bridge.
E. In the New Object Link dialog box click New Site Link Bridge.

Answer: C
29. In any Active Directory forest there are five Operations Masters roles that
must be assigned to one or more domain controllers. Which of the following
answers correctly depicts these roles?
A. Infrastructure Master, PDC Emulator, Relative ID master, SYSVOL, Root
Domain
B. Schema Master, Domain Naming Master, Infrastructure Master, PDC Emulator,
Relative ID master.
C. Root Master, Domain Name Master, Infrastructure Master, PDC Emulator,
Relative ID master.
D. Trust Master, Root Master, Infrastructure Master, PDC Emulator, Relative ID
master.

Answer: B

30. A hierarchical structure made up of multiple domains that trust each other is
called a(n) _______?
A. Forest
B. Schema
C. Site
D. Organizational Unit
E. Tree

Answer: E

31. You have been told that you need to track down the source of a breach in
network security. As a network technician for your company's Windows
2000 network you quickly pull up Event Viewer and examine the security
logs on the Domain Controllers. However upon viewing the security log you
notice there are key and lock icon symbols you do not understand. What
could these mean?
A. The key icon represents that this event is locked with a normal password while the
lock icon represents that this event is locked with an encryption.
B. The key icon represents that the event is a key alert record while the lock icon
indicates that this event can only be unlocked by its owner.
C. The key icon represents that the event occurred successfully while the lock icon
represents event occurred unsuccessfully.
D. The key icon represents that this event contains errors, warnings, or vital
information while the lock icon represents that this event is normal and within
guidelines.

Answer: C

32. As a network administrator you have been requested to move a printer from
your company's Marketing OU to your company's Research OU. After the
move you test the printer and find that the local administrator assigned to
the Marketing OU still has access and can remove print jobs from it. What
can you do to change this?
A. Remove the permissions for the local administrator from the printer.
B. Remove printer permissions from the local administrator.
C. Remove the Everyone group from the printer.
D. Delete the printer object.

Answer: A

33. You recently been promoted to Network Administrator for DLM Shipping.
When you took over this position the first thing you notice is this Windows
2000 environment using DNS naming convention, root domain is DIM.COM,
with numerous child domains. User accounts are stored in the child domains.
However your supervisor informs you that root domain is misspelled and
should be DLM.COM. He explains this is causing tremendous problems with
the users and customers. He wants you to rename the domain. What will
happen if you rename this root domain server?
A. When you rename the root domain server you will only have to rebuild the user
accounts since the root domain holds the authentication (SAM) database.
B. When you rename the root domain server you will simply rename the child
domain also.
C. When you rename the root domain server you will lose the entire network
orphaning the child domains.
D. When you rename the root domain server you will not need to do anything else
since domain names are inherited the child domains will acquire the new domain
name.

Answer: C

34. Windows 2000 Active Directory contains both logical and physical
components. Which of the following are physical components of Active
Directory?
A. Trees
B. Organizational Units
C. Sites
D. Domains
E. Domain Controllers

Answer: C, E

35. You are the network administrator for a company that has a Windows 2000
single domain with three sites containing two domain controllers in each. The
company only has two IP site links: Atlanta_Detroit and Dallas_Detroit. You
are contemplating on adding another domain controller within each site to
handle all replication for each site. How should you configure this domain
Controller?
A. Configure the new domain controller to be an IP preferred bridgehead server.
B. Configure the new domain controller to be a site link.
C. Configure the new domain controller to be a subnet.
D. Configure the new domain controller to be a replication master.

Answer: A

36. You are requested to perform a transfer of the role of relative ID master for
a domain within your company. Where would you begin this transfer?
A. Open the Active Directory Schema snap-in
B. Open the Active Directory Sites and Services console
C. Open the Active Directory Domains and Trusts console
D. Open the Active Directory Users and Computers console

Answer: D

37. You have just assisted your company in migrating to Windows 2000 Active
Directory. In addition you have installed an intranet server with Web hosting
services for each department within your company. One department, the
legal department, actually hosts both a web services and ftp services on its
intranet server. You need to identify the legal department's intranet server as
the host for both ftp and web server within the DNS server's resource
records. Which type of resource record should you create to identify this
server?
A. Alias (CNAME)
B. Mail Exchange (MX)
C. Pointer (PTR)
D. Service (SVR)
E. Name Server (NS)
F. Start of Authority (SOA)

Answer: D

38. As the network administrator you have just been informed that one of your
authorized Power Users has deleted several local user accounts. You explain
to this mortified employee that he needs to perform an authoritatively
restore on the select portion of Active Directory data deleted. What must be
done before he can use NTDSUTIL utility to authoritatively restore the data?
A. Republish the SYSVOL
B. Bring down all domain controllers at the site and reboot
C. Perform a Primary restore
D. Synchronize Active Directory Services
E. Nonauthoritatively restore the System State data
F. Revoke and reissue orphaned certificates

Answer: E
39. Your company uses Windows 2000 IIS server and log files you have enabled
a reverse lookup zone. This will assist in running troubleshooting tools.
Because your company is experiencing trouble with a DNS server you decide
to use NSLOOKUP to confirm that zone delegation was successful. At the
command prompt on your DNS server, you type NSLOOKUP 10.0.0.25
command. What do you expect to see next?
A. Hostname
B. Server zone
C. DNS log file
D. DNS queries

Answer: A

40. You have been requested to create a group Policy (GPO) linked to a domain.
The GPO will be applied to all users in the domain. What is the first step in
creating a GPO?
A. Open the DispatchPolicy GPO console
B. Open Active Directory Users and Computers
C. Add the Group Policy snap-in to the MMC console
D. Open Active Directory Sites and Services

Answer: B

41. You have been asked to troubleshoot a problem with your DNS servers that
appears to not be making zone transfers between primary and secondary
DNS servers. You begin to solve this problem by opening the DNS console
tree, right click the name server, then click Properties. On the Logging tab,
select the debug options and click OK. Which of the following are solutions
for transfer problems between primary and secondary zones?
(Choose all that apply).

A. Make sure the serial numbers for the zones involved in the transfer are not the
same on each server.
B. Make sure a site-link server is properly configures between each zone.
C. Delete the secondary DNS server from the primary and reboot.
D. Eliminate the possibility of network connectivity between the two hosts. Use the
PING command to ping each DNS host by its IP address from its remote
counterpart.
E. Verify that the primary and secondary DNS servers involved in the transfer are
both started and that the zone is not paused.

Answer: A, E

42. As the network administrator you have been asked to move a domain
controller from one site to another existing site using Windows 2000 Active
Directory. To accomplish this you begin by getting into the Active Directory
Sites and Services console. Then you select the domain controller that you
want to move. What do you do next?
A. Right-click the domain controller, select Cut, navigate to the new site and Paste it
there.
B. Click Move on the Action menu, select the site to which you want to move the
domain controller in the Move Server dialog box and click OK.
C. Drag the domain controller to the new site and drop it there.
D. Right-click the domain controller, select Advanced, select the site to which you
want to move the domain controller in the Move Server dialog box, and click OK.

Answer: B

43. As a network technician you have been requested to restore a mistakenly


deleted organizational Unit from the Active Directory. You first perform a
nonauthoritative restore of the System State data. After which you next chose
to use the NTDSUTIL utility to authoritatively restore the organizational
unit (OU) that has been mistakenly deleted. The deleted OU is named
"prepexams1" and was located in the knowledgeoasis.com domain. At the
command prompt you type the utility command 'ntdsutil' and enter, then the
type of restore command 'authoritative restore' and enter. Which of the
following commands should you enter next to restore this OU?
A. Ntdsutil OU=prepexams1,DC=knowledgeoasis,DC=com
B. Restore subtree OU=prepexams1,DC=knowledgeoasis,DC=com
C. Restore database OU=prepexams1,DC=knowledgeoasis,DC=com
D. Authoritative restore OU=prepexams1,DC=knowledgeoasis,DC=com

Answer: B

44. You need to create a reverse lookup zone to enable reverse lookup queries.
To create a reverse lookup zone you will need to open DNS console and
expand the DNS server. What should you do next?
A. Right-click the DNS server and click Properties.
B. Right-click the Reverse Lookup Zone folder and click Advanced.
C. Right-click the DNS server and select New Domain.
D. Right-click the Reverse Lookup Zone folder and click New Zone.

Answer: D

45. As network administrator you have been asked to create an Active Directory
structure to allow local administrators at your company's branch offices to
control users and local resources. The local administrators should control
only resources in branch offices. What should you do to accomplish this
request?
A. Create a child OU for each branch office, place users and resources in it, and
delegate control of each OU to local administrators at each office.
B. Create a schema that contains formal definition of administrative duties and
structure over users and resources in each branch.
C. Create an implicit trust object thast grants specific authority to the local
administrator over their branch domain.
D. Create an explicit one-way nontransitive trust between domains that allow the
branch administrators to controller their users and resources.

Answer: A

46. You are the backup operator of a Windows 2000 domain. The domain has 2
domain controllers and one certificate server at the central office and 1
domain controller at a branch office. You have been requested to add the
domain controller in the remote branch office to your regular once a week
backup at the central office. You schedule the backup job to include the
system state data from both locations. What will be backed up from the
branch office?
A. SYSVOL
B. Registry
C. Certificate database
D. COM+ Class Registration database
E. System boot files
F. None of the above

Answer: F

47. You are an Account Operator responsible for maintaining Windows 2000
Active Directory and the network directory infrastructure. You have been
using Windows 2000 Group Policy objects to assign .msi packages to a group
of Windows 2000 Professional workstations based on their membership in an
organizational unit. Recently you added several new users to the OUs
receiving the .msi packages. All seems to performing properly until you are
contacted by one of the new users. This user states that an error message:
The feature you are trying to install cannot be found in the source directory.
What is the solution(s) to this problem?
(Choose all that apply)

A. You must ensure that the user has sufficient permissions for the SDP and the
application.
B. Make sure the network is operating correctly.
C. You must ensure that the user has Apply Group Policy permission for the GPO.
D. You must ensure that the user has READ permission for the GPO.

Answer: A, B, C, D

48. Don is a system administrator for a renowned travel agency.The agency is


planning to upgrade its computer systems to Windows XP Professional.Most
of the computers are networked but some computers do not have CD-ROM
drives.How can Don upgrade the computer systems without CD-ROM drives
to Windows XP Professional?
A. can attach a portable tape backup unit to each computer and install the operating
system from it.
B. can use the windows installer program to push out the operating system.
C. can perfom the installation over a network share.
D. can not install windows XP Professional unless he installs a CD-ROM drive in the
computer systems that do not have them.

Answer: C

49. You are the administrator at a large company.The company policy is that all
data is stored on file servers using shared folders, never locally.Many users
have a notebook which they often take out of the office.All these users are a
member of the Power Users group on their Windows XP client.You want to
prevent all these users from making some of the shared folders available
offline.What should you do?
A. In the Advanced properties for Offline Files, select the Never allow my computer
to go offline check box on each of the client computers.
B. Disable the option Allow Caching of files in this shared folder in the Caching
settings of each appropriate shared folder on the file servers.
C. On the Offline Files tab of Folder Options disable the option Enable Offline Files
on each file server.
D. On the Offline Files tab of Folder Options disable the option Enable Offline Files
on each client computer.

Answer: B

50. You have upgraded 10 laptops to Windows XP Professional.All users


complain they experience problems when putting the computer in standby
mode.You investigate and discover that the client computers' BIOS version
does not support ACPI.What should you do to solve their problems?
(Choose 2)

A. Perform a complete re-install of Windows XP


B. Disable Power Management
C. Update the BIOS
D. Perform an in-place upgrade of Windows XP

Answer: C, D

S-ar putea să vă placă și