Windows Server 2003 NetWork SubJect

59
TÀI LIỆU ÔN TẬP WINDOW SERVER 2003 1. You have created several GPOs that are linked at various levels within your Active Directory structure…… in Active Directory? Answer: Local, site, domain, OU. 2. Which of the following command-line utilities can be used to automate renaming Active Directory objects? Answer: Dsmove 3. What type of organizational structure is the domain name system? Answer: Hierarchical 4. Which is the only layer of the TCP/IP reference model that does not contain any TCP/IP protocols? Answer: The network interface layer. 5. Which of the following event items is not one of the five default Event viewer event types? Answer: Caution 6. How can you perform a bulk import of users into Active Directory to create many user accounts at one time? Answer: Use the csvde.exe command 7. What would be the FQDN of a workstation named WKS042 located in the…. Domain? Answer: wks042.sales.west.bigcorp.net 8. You have two office locations, each with its own Windows Server 2003 server. The Two locations have been networked with a T-1 connection …. Static route? Answer: route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2 9. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which of the following is an appropriate next step? Answer: Run the ipconfig/release command and then the ipconfig/renew command on every client computer 10. Your corporate network uses variable…. Is 131.39.161.17 with subnet mask of 255.255.248.0 ….? Answer: 131.39.160.0/21 11. You use a Windows XP professional computer on your company’s network….navigate to? Answer: Start, All Programs, Accessories, Communications, Remote Desktop Connection. 1. Which file system has the ability to encrypt files?

Transcript of Windows Server 2003 NetWork SubJect

Page 1: Windows Server 2003 NetWork SubJect

TÀI LIỆU ÔN TẬP WINDOW SERVER 2003

1. You have created several GPOs that are linked at various levels within your Active Directory structure…… in Active Directory?

Answer: Local, site, domain, OU.2. Which of the following command-line utilities can be used to automate renaming Active Directory objects?Answer: Dsmove3. What type of organizational structure is the domain name system?Answer: Hierarchical4. Which is the only layer of the TCP/IP reference model that does not contain any TCP/IP protocols?Answer: The network interface layer.5. Which of the following event items is not one of the five default Event viewer event types?Answer: Caution6. How can you perform a bulk import of users into Active Directory to create many user accounts at one time?Answer: Use the csvde.exe command7. What would be the FQDN of a workstation named WKS042 located in the…. Domain?Answer: wks042.sales.west.bigcorp.net8. You have two office locations, each with its own Windows Server 2003 server. The Two locations have been

networked with a T-1 connection …. Static route? Answer: route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 29. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which of the following is an appropriate next step?Answer: Run the ipconfig/release command and then the ipconfig/renew command on every client computer10. Your corporate network uses variable…. Is 131.39.161.17 with subnet mask of 255.255.248.0 ….?Answer: 131.39.160.0/2111. You use a Windows XP professional computer on your company’s network….navigate to?Answer: Start, All Programs, Accessories, Communications, Remote Desktop Connection.

1. Which file system has the ability to encrypt files?a. NTFSb. FAT16c. FAT32d. UDF

2. Which file system has the ability to compress files?a. UDFb. NTFSc. FAT32d. FAT16

3. You need to create a record in DNS to allow Internet mail to be sent to your domain. What kind of domain record do you need?

a. A CNAME recordb. A PTR recordc. An MX recordd. An A record

4. Which command-line tool can you use to clear the DNS resolver cache on a DNS client?a. ipconfig

Page 2: Windows Server 2003 NetWork SubJect

b. tracertc. netshd. pathping

12. Which of the following is used to install Active Directory and establish a server as a domain controller?

a. Dcpromob. Ntdsutilc. Gpotoold. Gpresult

13. To start in Safe Mode:a. Select Start, Accessories, System Tools, Safe Mode.b. None of the above.c. Press the F7 key during system boot.d. Press the F8 key during system boot.

5. You are configuring security for several new workstations running Windows XP Professional. The computers are members of the Temp OU, and you noticed that users are able to reuse old passwords whenever they are prompted to change them. Which of the following account policies can be used to prevent this behavior?

a. Minimum Password Ageb. Maximum Password Agec. Enforce Password Historyd. Store Passwords Using Reversible Encryption

6. Which tool can you use to determine which ports a server has open?a. NETSHb. Security Configuration And Analysisc. NETSTATd. Security Monitor

7. You need to determine whether the NIC drivers are digitally signed. Where do you find this information?

a. System Informationb. Event Viewerc. Device Managerd. Driver signing options in the System applet

8. You are experiencing a delay when you connect to a remote Web site. Which tool allows you to determine whether particular routers are responsible for the delay?

a. Tracertb. Network Diagnosticsc. PathPingd. Netdiag

Page 3: Windows Server 2003 NetWork SubJect

9. You are reviewing DNS parameters, how long a node in an FQDN can be?a. 63 charactersb. 512 charactersc. 255 charactersd. 43 characters

10. Which of the following are objects in the Active Directory?a. Shared foldersb. Shared printersc. Domainsd. All of these

11. Which of the following Windows Server 2003 TCP/IP configuration parameters specifies the address of a router?

a. IP addressb. Subnet maskc. Preferred DNS serverd. Default gateway

12. What step does a DNS client perform first to resolve a DNS name?a. The client checks its local DNS resolver cache.b. The client queries its primary DNS server.c. The client queries its alternate DNS server.d. The client broadcasts on the local subnet.

14. Which of the following is most likely true if a computer with an IP address of 169.254.0.11?a. The computer has a static IP addressb. No DHCP server is on the networkc. A DHCP server is assigning the computer's IP addressd. The network cable is disconnected

13. Which of the following is a legal NetBIOS computer name?a. host1.microsoft.comb. host10_microsoftc. host1-microsoftd. host1_local

14. How much disk space is actually available for data in RAID level 5 when there are four disks?a. 90%b. 75%c. 50%d. 65%

15. You are troubleshooting a network adapter that does not appear to have an IP address assigned to it. What command could you issue to cause this network adapter to acquire a DHCP lease?a. ipconfig /acquireb. ipconfig /renewc. ipconfig /refresh

Page 4: Windows Server 2003 NetWork SubJect

d. ipconfig /lease16. When a TCP/IP computer can communicate with the local network but not with computers on

other networks, which of the following configuration parameters is probably incorrect?a. Preferred DNS serverb. IP addressc. Subnet maskd. Default gateway

15. Which of the following command-line utilities should you use to extract user property data from the Active Directory?

a. Dsgetb. Dsaddc. Dsmodd. Dsquery

17. Which of the following messages is not exchanged as part of a DHCP lease initialization?a. ACKb. Renewc. Discoverd. Request

18. (Windows Server 2003) What permissions are granted to the Everyone group over the share created by the following code? net share MyShare=C:\MyFiles\MyShare

a. Full Controlb. Readc. Noned. Change

19. You are getting some error messages from the DHCP server. What counter in the Performance Console would display the number of DHCPOFFER messages sent per second by the DHCP server to a client computer?

a. Discovers/Secb. Acks/Secc. DHCPAcks/Secd. Offers/Sec

20. To start in Safe Mode:a. Select Start, Accessories, System Tools, Safe Mode.b. None of the above.c. Press the F7 key during system boot.d. Press the F8 key during system boot.

21. You are configuring the dial-up connection for the portable computer shown in the exhibit. What address should you use as the default gateway for the portable computer's dial-up connection?

Page 5: Windows Server 2003 NetWork SubJect

a. 192.168.111.42b. 192.168.100.1c. 209.29.9.20d. 192.168.100.21

22. You have five Windows XP clients on a network with a Windows Server 2003 server. The server has an always-on Internet connection with an ISP. What service can you install on the server to allow the clients to access the Internet, without requiring you to obtain additional IP addresses from your ISP?

a. DNSb. PPTPc. NATd. DHCP

23. You need to create a second DNS entry for the intranet Web server, so that users can access it using an easy-to-remember name. What type of record do you need to add if you want to create an alias in DNS for the server?

a. An A recordb. A CNAME recordc. An MX recordd. A PTR record

16. When configuring the settings for user accounts, you want to map a drive to the location of the operating system's files. Which of the following environmental variables would be used for this purpose?

Page 6: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

a. %SystemDrive%b. %HomePath%c. %SystemRoot%d. %HomeDrive%

24. a computer named COMP2 on a Windows 2000 network as shown in the exhibit. Your network uses TCP/IP as the only network protocol. You configure COMP2 with an IP address of 192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway of 192.168.2.1 Though you are able to log onto the domain, you are not able to connect to any resources on SERV2. Users need to be able to access this server to access documents and shared printers. What should you do to ensure that COMP2 can connect to network resources?

a. Configure COMP2 to use a TCP/IP address of 192.168.5.16b. Create a computer account on the domain for COMP2c. Configure COMP2 to use a TCP/IP address of 192.168.2.16d. Configure COMP2 to use a Default Gateway of 192.168.10.1

25. Which of the following TCP/IP protocols does not function at the Internet layer?a. TCPb. ARPc. ICMPd. IP

26. If GroupA is granted the Change permission over a file share \\someserver\someshare\, it will definitely have which of the following permissions as well by default?

a. Noneb. Readc. Modifyd. Full Control

17. One important difference between TCP and UDP is thata. TCP contains source and destination addresses and UDP does notb. UDP is connection-oriented and TCP is notc. TCP is connection-oriented and UDP is notd. UDP cannot be routed, but TCP can

Page 7: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

27. Which of the following is a transport-layer protocol?a. UDPb. IGMPc. Ethernetd. DNS

28. You have been asked to simplify the process of configuring TCP/IP on all the client computers. The network consists of 40 computers running Windows 2000 Professional and 60 computers running Windows XP Professional. Installing and configuring what service of Windows Server 2003 will help you accomplish your task?

a. DHCPb. BOOTPc. WINSd. DNS

29. Which of the following command-line tools can you use to delete a user from Active Directory?a. dsrmb. dsaddc. dsqueryd. dsmove

30. What is the functionality of ARP (Address Resolution Protocol) ?a. Resolve machine names to IP addressesb. Resolve IP addresses to MAC addressesc. Resolve IP address to machine namesd. Resolve MAC addresses to IP addresses

31. What is the functionality of RARP (Reverse Address Resolution Protocol) ?a. Resolve IP addresses to MAC addressesb. Resolve IP address to machine namesc. Resolve machine names to IP addressesd. Resolve MAC addresses to IP addresses

32. Which of the following is NOT default hidden share under Windows Server 2003?a. ADMIN$b. PRINTER$c. C$d. IPC$

33. Which protocol provides names and name resolution for workgroups in Windows?a. Kerberosb. NetBIOSc. DNSd. CIFS

2. What are the default share permissions in Windows Server 2003?a. Everyone:Allow Full Control

Page 8: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

b. Users:Allow Full Controlc. Everyone:Allow Readd. Users:Allow Read and Execute

3. You need to back up critical data on your server. However, you do not have enough backup tapes to back up everything on your server. You want to make sure that, in addition to the user data you are backing up, you back up the Registry on your server. What should you select in addition to the data files that you want to back up?

a. System Stateb. My Computerc. C: drived. My Documents

4. What utility do you use to view audit information?a. Audit Log Viewerb. Audit Viewerc. Event Viewerd. Log Viewer

5. Which of the following is not a legal top-level domain name?a. findem.orgb. findem.netc. findem.artd. findem.com

6. When a DNS server converts a computer name to a dotted decimal address, this is callede. Name resolutionf. Name recognitiong. Pipingh. Pinging

7. You are in the process of configuring a counter log to create a baseline log for a new Windows Server 2003 computer that you are placing on the production network. You have configured the counter log to start and stop automatically each day. You now need to configure it so that the resulting log files will be easily identified by the date and time that they were created. Which log numbering style should you use to accomplish this?

a. yyyymmddhhb. yyyymmc. mmddhhmmd. nnnnnn

8. You've installed network monitor and configured a network to monitor. What do you need to do to capture data?

a. Click Capture --> Triggerb. Click Capture --> Startc. Click Capture --> Networksd. Click Capture --> Filter

9. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level Domain?

a. west.bigcorp.net

Page 9: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

b. .netc. wks042d. bigcorp.net

10. How many primary partitions without an extended partition can reside on a basic disk under Windows Server 2003?

a. Fourb. Unlimitedc. Oned. Three

11. You are troubleshooting network connectivity between two computers on a routed IP network. What command can you use to send a continuous flow of ICMP echo request packets to the destination IP address?

a. ping -tb. ping -lc. ping -ad. ping -f

12. You have just completed a default installation of Windows 2003 Server. Where can you look on your computer's hard disk to see the Windows 2003 Server files?

a. WINNT Folderb. WINDOWS2003 Folderc. WINDOWSNT Folderd. WINDOWS Folder

13. Which of the following is not a valid Safe mode option?a. Safe Mode with Command Promptb. Safe Modec. Safe Mode with Base Videod. Safe Mode with Networking

14. You are troubleshooting user complaints of slow Internet access to a partner Web site. You have been told by the partner that they are experiencing high latency on several links leading to their network. What tool can you use to determine exactly which routers and links are dropping packets and what the ping time is for each link?

a. tracertb. nslookupc. pathpingd. ping

15. What tool should you use if you suspect an application is not responding?a. Computer Managementb. Performancec. Task Managerd. System Monitor

16. What tool should you use to configure security templates?a. Security Templates snap-inb. Network Monitorc. Active Directory Users And Computersd. Security Configuration And Analysis snap-in

Page 10: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

17. You've just written a new script and need to ensure that new policy settings are immediately applied when the script has been completed. Which of the following command-line utilities should you use?

a. secedit.exeb. gpresult.exec. gpapply.exed. gpupdate.exe

18. You are currently logged in to the Sales server as an Administrator. You want to add additional security to the D:\Data folder. When you attempt to set permissions, you see the following dialog box that does not display a Security tab. What is the most likely reason for this?

a. The folder has already been encrypted with EFS.b. You need to be logged on as a member of the Server Operators group.c. Your account has been assigned No Access rights through the user account or through group membership.d. The partition is not configured as NTFS.

19. What are the default share permissions in Windows Server 2003?a. Everyone: Allow Full Controlb. Everyone: Allow Readc. Users: Allow Full Controld. Users: Allow Read and Execute

20. Which type of NIC is likely to provide the fastest performance?e. EISAf. ISA

Page 11: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

g. MCAh. PCI

18. What type of zone should you create if you want to create a read-only copy of the master DNS data for the zone?

a. Stubb. Root Hintsc. Primaryd. Secondary

19. Which of the following network/transport layer protocols can you use for Windows file sharing when installed alone?

a. TCP/IP and IPX onlyb. TCP/IP, IPX, and NetBEUIc. TCP/IP onlyd. TCP/IP and NetBEUI only

20. What type of resource record must you configure to enable reverse lookups for host computers?

a. Pointer (PTR) recordsb. Mail Exchanger (MX) recordsc. Name Server (NS) recordsd. Host (A) records

21. You are using Windows Server 2003 as the network operating system in all four of company's locations. You are using a server in corporate headquarters and another in the Boston sales office to establish an ISDN-based demand-dial routing connection. In order to control costs, this has been implemented as an on-demand connection. During operation, however, you notice that the connection is coming up fairly regularly, even during the evening, when you know that there is no communication occurring between the offices. What could be the problem?

a. A default route has been configured on the answering router, and anytime a packet is received, it is forwarded to the destination demand-dial router.

b. This is normal; it is an indication that the demand-dial routing solution is functioning normally.

c. A default route has been configured on the calling router, and anytime a packet is received, it is forwarded to the destination demand-dial router.

d. Legitimate data is being transferred during the connection.

22. You are the WAN administrator for General Telecommunications, a large manufacturer of network equipment. When you started with the company, you had 10 office locations, each with its own Windows Server 2003 servers. These locations were networked using fractional T-1s and Windows Server 2003 servers running RRAS, and they used RIP for routing information. General Telecommunications now has 120 sales offices throughout the United States and Europe, and you have been tasked with networking these locations by using hardware routers. You have been asked to design a solution that will support both the Windows Server 2003

Page 12: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

servers and the hardware routers. The solution must also support failover connections between the original 10 locations.

What routing method should you select?a. EIGRPb. RIP

c. Autostatic updatesd. OSPF

23. You are running in a mixed environment, and you are using a Windows Server 2003 DHCP service to support three network segments. Your client computers consist of Windows 2000 Professional, Windows NT Workstation, and Windows 98 SE workstations.

What do you need to do to ensure that all the client computers can receive DHCP addresses?a. Configure a scope for each network segment. Configure each client computer to receive IP

addresses dynamically. For the Windows NT Workstation client computers, ensure that the DHCP update from Service Pack 6 has been installed.

b. Configure a scope for each network segment. Configure each client computer to receive IP addresses dynamically. Configure the DHCP service for mixed mode.

c. Configure a scope for each network segment. Configure each client computer to receive IP addresses dynamically. Configure the DHCP service for backward compatibility.

d. Configure a scope for each network segment. Configure each client computer to receive IP addresses dynamically.

24. Which OU structure in the Active Directory is likely to result in the most CPU resource use?a. 15 OUs on the same levelb. OUs nested 5 layers deep

c. 5 OUs on the same leveld. OUs nested 15 layers deep

25. You have installed a new file server on the network and formatted it to use NTFS. After formatting is complete,you use EFS to encrypt a folder containing files belonging to users. If a user accesses a file belonging to him in this folder, and then copies it across the network for another user to access, which of the following will occur?

a. The file on the hard disk and the data sent over the network will be decrypted and remain that way.

b. The file on the hard disk and the data sent over the network will remain encrypted.

c. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network.

d. The file on the hard disk will remain encrypted, but data sent over the network will be nencrypted.

26. You are a network administrator for an Active Directory domain with servers running Windows Server 2003. You recently installed a second DHCP server on the local subnet. When testing the server, you notice the DHCPServer service is being shutdown and you can't get the service to stay running.What is the most likely cause of this problem?

a. The DHCP server has not be authorized in Active Directory.

b. The DHCP Server service is improperly installed

c. The active scope has invalid TCP/IP options

d. The DHCP server does not have an active scope

27. You set up a share in the computer lab but neither students nor lab administrators can access it. You checked the share permissions, which are configured properly. Students and

Page 13: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

lab administrators see an "Access is denied" message when they try to access the share. Joe has no problem accessing the share.

What should you do to resolve the p1:5HUI - CENTER FOR INFORMATION TECHNOLOGY

a. Change the share permissions so that everyone has Full Control.

b. Check and modify as necessary the NTFS permissions on the folder being shared.

c. Instruct the users on the proper way to connect to the share

d. Nothing; the users must be mapping to the share improperly

28. You have been asked to implement dynamic IP addressing the company's

newly installed network, which has two subnets in one Active Directory domain with servers running Windows Server 2003. After you install and configure the DHCP server in SubnetA, client computers in SubnetA are able to obtain DHCP leases and the proper TCP/IP configuration. However, client computers on SubnetB are unable to obtain DHCP leases. What is the most likely cause of this problem?

a. The DHCP server is not authorized is SubnetB

b. The DHCP Server service is stoppedc. A DHCP Relay Agent is not installed in

SubnetB.d. The DHCP scope for SubnetB is not

active

29. Your network consists of servers running Windows 2003 Server and workstations running Windows 2000 Professional. You have applied several custom security templates to GPOs linked to the OU, domain, and site levels in Active Directory. In addition to this, there are security settings that have also been applied at the local computer level of all machines that are on the network. Because several policies now affect the computer accounts within the domain, site, and OU,

which of the following will occur when the user logs on to the domain?

a. The security settings at the local computer level will override those of the GPOs.

b. The policy settings will be cumulative and applied in the order of policies at the site level, domain level, and finally OU level.

c. The policy setting at the local computer level will be overwritten by the OU-level GPO, which will be overwritten by the domain-level GPO, which will finally be overwritten by the site-level GPO. For this reason, major security settings must be made at the site-level GPO; all others will be overwritten.

d. Security settings in the GPOs will not be applied to machines running Windows 2000 that have joined the domain.

30. Hannah reports that she's having a tough time connecting to resources on your Windows Server 2003 domain.You ask for more information, and Hannah reveals that she is trying to connect to a server in Washington. Other users can connect to that server, but she cannot. Hannah can ping the IP address of other hosts on her segment, her default gateway, and even the IP address of the server in Washington, but when she uses the server's hostname to enter the name of the server, she cannot connect. What do you suspect is the problem?

Page 14: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

a. Hannah needs to renew her IP address by running the command ipconfig/release and then ipconfig/renew.

b. Hannah has a faulty network adapter card.c. Hannah has a blank or invalid subnet mask.d. Hannah has a blank or invalid DNS server IP address.

31. You need to ensure that your users will be able to resolve hostnames to IP addresses. What type of zones do you need to configure?

a. A reverse lookup zoneb. A forward lookup zone

c. A delegated zoned. A stub zone

32. (DHCP) You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which of the following is an appropriate next step?

a. Delete the old scope.

b. Authorize the DHCP serverc. Run the Ipconfig /release command and

then the Ipconfig /renew command on every client computer.

d. Restart the DHCP Server service

33. All your Windows XP Professional client computers are configured to get DHCP leases from your Windows Server 2003 DHCP server. This morning, one of your client computers no longer had connectivity with the rest of the network. The user claims that she did not change any network settings and has verified that the network cable is properly connected to both the network adapter and the wall jack. What is the most likely reason for the problem that the computer is experiencing?

a. The computer is not a member of the domain and is being refused an IP address.b. The network cable has been damaged and is no longer passing a signal.c. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.d. The TCP/IP stack on the computer is corrupt and needs to be reset.

34. Your Windows Server 2003 DHCP server issues a block of 40 addresses to 120 salespeople on the Sales network. These users are frequently in and out of the office, so no more than 40 users are ever on the network at one time. What do you need to do to ensure that users get addresses when needed?

a. Configure an exclusion for each user.b. Set the DHCP lease duration to 5 days

c. Set the DHCP lease duration to 60 minutes.d. Configure a reservation for each user.

35. A user has the username JohnB. He wants to access a Microsoft Access database called db.mdb that’s located on a DC called syngress.com, in a directory called DB. Using the URL, what will this user enter into a browser to access the database?

a. [email protected]. syngress.com

c. http://syngress.com/DB/db.mdbd. \\syngress.com\DB\db.mdb

Page 15: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

36. A client computer that makes a DNS query to a DNS server for name resolution of a remote host is referred to as what?

a. A recursive queryb. A DNS resolver

c. An iterative queryd. A DNS forwarder

37. Which of the following is NOT default hidden share under Windows Server 2003?e. ADMIN$f. PRINTER$

g. C$h. IPC$

38. You have installed a Windows Server 2003 DNS server, but people are unable to resolve names. You need to test the DNS server. Where should you start in your troubleshooting efforts?

a. From the command prompt of a Windows XP Professional host, run the nslookup utility to check the functionality of the DNS service.

b. From the Windows Server 2003 DNS server, type ping -R and the address of the DNS server. Examine the results to see if the server is working.

c. From the command prompt of a Windows XP Professional host, run the ipconfig utility to check the functionality of the DNS service.

d. From the Windows Server 2003 DNS server, type ping -a and the address of the DNS server. Examine the results to see if the server is working.

39. You install a new FireWire adapter card and the server immediately stops responding. You need the server up on the network as soon as possible. How do you fix this problem?

a. You need to use Last Known Good Configuration.

b. You need to restore the System State.

c. You need to use Safe Mode.d. You need to the ASR utility.

40. The network consists of 6 Windows Server 2003 servers running all network services. You have 200 desktop computers running Windows XP Professional on the LAN, and you have just purchased 30 laptops that need to be able to dial in to the network at night. You configure and install RRAS on one of the Windows Server 2003 servers. This server is a member of the production Active Directory domain operating at the Windows Server 2003 domain functional level. The new laptop users are unable to connect remotely. Which of the following is the most likely problem?

a. You did not enable MS-CHAP as the default authentication protocol.b. The Windows Server 2003 running RRAS has conflicting remote access policies, and the first one

that is applied to the remote users prevents them from accessing the data.c. You did not modify the default dial-in policy, which restricts access unless it is modified.d. Windows Server 2003 RRAS does not support dial-in from a Windows XP system.

41. Which statement is NOT correct?a. An organizational unit can be a member of a group.b. A group can be located within an organizational unit.c. A group can be a member of other groups.d. An organizational unit can be located within another organizational unit.

Page 16: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

42. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level Domain?

e. west.bigcorp.netf. .net

g. wks042h. bigcorp.net

43. The development team of your company has started a new research project. They want to ensure that only the members of their project team are allowed to see the new directories that they create. You created a new OU that contains the user accounts of the development team, the computers they will be using, a shared folder where they are going to place their research documents, and several printers that are to be isolated from the rest of the company. They are concerned about who will have access to the new directories. How will you protect the directories from unauthorized access?

a. Do nothing. Since the directories and files are part of an OU, no one outside the OU can access them.

b. Create a security group that contains the members of the research group. Remove the Everyone group from the ACL. Add the new group to the ACL and grant it the appropriate permissions.

c. Create a GPO that will limit access to the directories. Apply the GPO to the domain.

d. Create a GPO that will limit access to the directories. Apply the GPO to the new OU.

44. Your Active Directory domain has two OUs. The Corp OU is a parent OU to the Technical OU. You have implemented a GPO linked to the Corp OU. You do not want those settings affecting the users in the Technical OU. How can you accomplish this with minimal effort?

a. On the GPO linked to the Corp OU, select Block Policy inheritance.

b. On the GPO linked to the Technical OU, negate any options set in the Corp OU by choosing Disabled for those options.

c. On the GPO linked to the Technical OU, select Block Policy inheritance.

d. On the GPO linked to the Technical OU, select No Override.

45. Which of the following statements are NOT true regarding access permissions?

a. NTFS permissions are available for files stored on NTFS-formatted partitions

b. Share permissions are available for shared folders on FAT32-formatted partitions

c. NTFS permissions are available for files stored on FAT32-formatted partitions

d. Share permissions are available for shared folders on NTFS-formatted partitions

46. A user attempts to access a resource, and entries in the ACL are analyzed to match the SID. The system examines the entire ACL, but no match is found. Which of the following will occur?

a. The account will be disabledb. Each ACE in the ACL will be read until

a match is eventually foundc. The user will be denied accessd. The user will be granted access

Page 17: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

47. In the IP address assignment 10.54.113.0/24, what does the number 24 represent?a. The number of bits in the host identifierb. The number of bits in the combined network and subnet identifiersc. The number of bits in the combined subnet and host identifiersd. The number of bits in the subnet identifier

48. You have been asked to simplify the process of configuring TCP/IP on all the client computers. The network consists of 40 computers running Windows 2000 Professional and 60 computers running Windows XP Professional. Installing and configuring what service of Windows Server 2003 will help you accomplish your task?

e. DHCPf. BOOTP

g. WINSh. DNS

49. You use Network Monitor to capture network traffic, but when you go to view the capture, you realize there is more information available than you need or want to see.

What can you do to make it easier to find the information you're looking for?

a. Create a capture filter.b. Create a display filter.c. Enable OSPF on the network adapter.d. Start Network Monitor from the

command line using the netmon command.

50. When both share permissions and NTFS permissions exist on the same shared folder, how is access control to the shared folder affected for users trying to access the files stored in the shared folder over the network?

a. The most liberal permissions take precedence.

b. NTFS permissions take precedence.c. Share permissions take precedence.

d. The most restrictive permissions take precedence.

51. A user had trouble remembering his password and tried several things. Now, he says his account is telling him he is locked out. You need to restore his ability to log on as quickly as possible with the least amount of administrative effort. How should you accomplish this?

a. You should use the Active Directory Users and Computers MMC snap-in to unlock the user's account.

b. You should use the Active Directory Users and Computers MMC snap-in to change the user's password.

c. You should use the Active Directory Users and Computers MMC snap-in to copy the user's account and create a new unlocked copy.

d. You should use the command-line utility Dsmod to change the user's password.

Page 18: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

52. You install Active Directory and creates an AD-integrated DNS server for your domain. You are concerned about DNS fault tolerance.

What can you do to provide fault tolerance for your AD domain?a. Install a primary DNS serverb. Install a secondary DNS Server

c. Install a caching-only DNS serverd. Install another AD-integrated DNS server

53. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which of the following is an appropriate next step?

a. Restart the DHCP Server serviceb. Run the Ipconfig /release command and then the Ipconfig /renew command on every client

computer.c. Delete the old scoped. Authorize the DHCP server

54. You recently have been having unexplained problems with the Print Spooler service on two of your Windows Server 2003 printer servers. You can find nothing wrong with the Print Spooler service itself, and you have restarted it numerous times, with no effect. What else might you consider examining to determine the cause of the problems for the Print Spooler service?

a. The services that are dependent on the Print Spooler serviceb. The services on which the Print Spooler service is dependentc. The currently installed drivers for the printers attached to the printer serverd. The cables being used to connect the printers to the printer server

55. You have just installed the DHCP service through the Windows Component Wizard. You now need to configure DHCP to support a scope that will be used for streaming multimedia delivery. In the MMC, you right-click the server icon under DHCP. What option should you select to configure the scope?

a. New IP Scopeb. New Scope

c. New Multicast Scoped. New Superscope

56. You’ve configured a DHCP server to use the following range of IP addresses when assigning addresses to clients: 131.107.0.0/19 through 131.107.224.0/19. You set the subnet mask for this range of addresses to 255.255.240.0. Users are complaining that they cannot connect to the network.

What is the most likely cause of this problem?a. The subnet mask is wrong. It should be 255.255.224.0.b. The subnet mask is wrong. It should be 255.224.0.0.c. The range of addresses is illegal.The first address cannot be 131.107.0.0/19.d. The range of addresses is illegal. It should end at 131.107.192.0/19.

57. You are a network administrator. Multiple users have reported that they can access some local resources but not all, and they have no access to resources on the Internet. You try to diagnose the problem and find that the preferred DNS server used by the clients having the problem can

Page 19: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

only resolve names for zones stored on the server. The TCP/IP settings on the DNS server are configured correctly. What is the likely cause of the problem?

a. The DNS server is not getting zone transfers.b. The DNS server's resolver cache is corrupted.c. The DNS server doesn't have any forwarders configured.d. The DNS server has incorrect or corrupt root hints.

58. Which of the following is the major disadvantage of using RIP as the network routing protocol?a. High cost of softwareb. A maximum of only 12 hops

c. Count-to-infinity problemd. Low overhead on the network

59. You have a single DNS server resolving names for your internal domain, and you have an Internet connection. You need to configure DNS on the client computers to resolve Internet addresses.

How will you make this configuration?a. Install a new DNS server to resolve Internet domain names. On each client computer, configure the

DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN connection to resolve to the DNS server.

b. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN connection to resolve to the DNS server.

c. On each client computer, install the Microsoft DNS client. Configure the client computer to resolve to the DNS server. Configure the root hints on the server to point at the Internet root servers.

d. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN connection to resolve to the DNS server. Configure the root hints on the server to point at the Internet root servers.

60. You are responsible for maintaining the company's Windows Server 2003 DHCP server. While doing your daily system checks, you notice that the number of DHCPDISCOVER packets spiked at 9:00 this morning. What could cause the Discovers/Sec counter to spike at 9:00 a.m.?

a. The DHCP service being restartedb. A network problemc. A large number of computers entering the network at approximately the same timed. A rogue DHCP server issuing duplicate addresses

61. You have three office locations, each with its own Windows Server 2003 servers. Each office has a local LAN that is very stable, and the company has no plans to add locations for the next three years. There are plans to network the three locations by using the existing Windows Server 2003 servers and ISDN lines. You have been asked to design a solution that will have the lowest impact on the servers, with no requirements for redundancy or failover. What routing method should you select?

a. OSPFb. Static routes

c. RIPd. Autostatic updates

Page 20: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

62. You are running in a purely Windows Server 2003 environment, and you need to make sure workstations are registered properly in DNS for Active Directory integration.

How should you configure DNS integration?a. Configure the DHCP server to be sure to send dynamic updates.b. Install the Windows Server 2003 DNS client on the workstations.c. Configure the DNS server to accept dynamic updatesd. Configure the appropriate zones to accept dynamic updates

63. Which is NOT folder share permission?a. Full controlb. Execute

c. Changed. Read

64. You are attempting to troubleshoot and correct a network connectivity problem that was reported by users between a server and several workstations. What communication troubleshooting tool should you start with to determine where the problem lies?

a. ipconfigb. ping

c. nslookupd. telnet

65. You are in the process of configuring a counter log to create a baseline log for a new Windows Server 2003 computer that you are placing on the production network. You have configured the counter log to start and stop automatically each day. You now need to configure it so that the resulting log files will be easily identified by the date and time that they were created. Which log numbering style should you use to accomplish this?

e. yyyymmddhhf. yyyymm

g. mmddhhmmh. nnnnnn

66. You are running a purely Windows Server 2003 network using Active Directory and the Windows Server 2003 DHCP service. A user in another department has installed a DHCP server on a Unix server.

How do you prevent your client computers from receiving DHCP addresses from that server?

a. Reconfigure BOOTP on the router.b. Disable the unauthorized server in

Active Directory.c. Go to each client computer and enter

the address of the production DHCP server in the Internet Protocol (TCP/IP) Properties dialog box.

d. Make sure all your domain client computers are running Windows 2000 or higher.

67. (DHCP) You want to configure multiple standard scopes so that they can be easily activated or deactivated. What should you do?

a. Create a multicast scope and add the standard scopes to it.

b. Configure server options instead of scope options.

c. Create a superscope and add the standard scopes to it.

d. Delete all the scopes except one.

Page 21: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

68. You have just completed an analysis of a computer by using the Security Configuration and Analysis snap-in. When you examine the results, you notice several items that have red X icons next to them. What does this type of icon indicate?

a. The item is defined in the analysis database but not on the computer.b. The item is defined in the analysis database and on the computer, and it matches the currently

configured setting.c. The item is defined in the analysis database and on the computer, but it does not match the

currently configured setting.d. The item is not defined in the analysis database and was not examined on the computer

69. You are responsible for maintaining the company's Windows Server 2003 DHCP server. The company recently added a new router and routed a segment to the network. Now that segment must be added to the DHCP server. The address of the router port is 10.10.25.1, and the router is subnetted with a Class C subnet mask. You need to provide 40 addresses, starting at 10.10.25.20. What needs to occur for you to get DHCP working on that segment?

a. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP forwarder for the new segment's router, using the address of the DHCP server. You need to activate the scope.

b. You need to install and configure an additional DHCP server on that segment to provide DHCP services.

c. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through 10.10.25.59. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP forwarder for the new segment's router, using the address of the DHCP server. You need to activate the scope.

d. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through 10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP forwarder for the new segment's router, using the address of the DHCP server. You do not need to activate the scope because that happens automatically when the scope is created.

70. To configure file access auditing for all files in the CorpDocs folder on the file server. In which section of the Group Policy Editor will you find the auditing options?

a. Account Policiesb. Restricted Groups

c. File Systemd. Local Policies

71. DNS servers can be configured to perform name resolution using several types of queries. With which type of query does the server return results only from its records or from its cache?

a. Iterative queryb. Forward query

c. Recursive queryd. Reverse query

72. You would like to be able to verify some entries on one of your Windows Server 2003 DNS servers. How could you verify the entries in the DNS zone?

a. You could use the Properties dialog box of the DNS server in the MMC.

b. You could use Event Viewer.c. You could type nslookup at a command

prompt.d. You could type ipconfig at a command

prompt.

73. (DNS) What is the next step a forwarder takes when it is unable to resolve a query?

Page 22: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

a. The forwarder returns an error to the originating DNS server.b. The forwarder performs a broadcast to determine the root name server to contactc. The forwarder returns an error directly to the client.d. The forwarder uses the root hints Cache.dns file to determine the root name server to contact.

74. Which resource record is used to resolve domain names specified in e-mail addresses to the IP address of the mail server associated with the domain?

a. PTRb. A

c. CNAMEd. MX

75. Which of the following are NOT true regarding names assigned to users, groups, and computers in workgroups under Windows Server 2003?

a. Group names must be unique, but only on a per-machine basis.

b. User names must be unique, but only on a per-machine basis

c. Each computer must have a unique name.

d. User names must be unique throughout the workgroup

76. Your task is to segment the Class B IP address 145.65.0.0 into 20 different subnets. You must allow for the number of networks to increase. The maximum number of hosts per subnet will never surpass 950 hosts. What subnet mask would enable you to segment the network and allow for the required growth?

a. 255.255.240.0b. 255.255.252.0

c. 255.255.0.0d. 255.255.255.252

77. Your company has 75 users running Windows XP Professional that need to be able to access the company's network remotely. You would like to be able to provide redundant remote access servers by using Windows Server 2003 running RRAS to allow users to dial in to the network, but you want to maintain only one set of remote access profiles. How can you accomplish this?

a. Install ISA Server and use it as the central repository for the profiles.

b. Install both servers in Active Directory, and on the Profiles tab of each server's Properties dialog box, select the Store Profiles in Active Directory option. Make sure both servers are in the same domain.

c. Install IAS and use it as the central repository for the profiles.

d. Install both servers in Active Directory, and on the Profiles tab of each server's Properties dialog box, select the Store Profiles in Active Directory option. Configure each server to point at the same domain in the Profile Location field.

Page 23: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

78. The network consists of 1,500 Windows Server 2003 servers spread over 150 OUs that have approximately 10 servers each. You have just finished creating a customized security template that specifies the Account Policies and Audit Policy settings that are required by your organization's corporate policy for specific departments. What is the best way for you to apply this template to only the Sales, Marketing, Production, and Engineering OUs?

a. Script the secedit.exe command to apply the security template to the required computers.b. Import the security template into each required OU by using a GPO.c. Import the security template at the domain level into a GPO.d. Manually apply the security template to each of the computers.

79. You're writing a logon script that will be used to automatically link a remote file share as the home directory for the current logon account. Which option would be best used to create a link for the home file share?

a. Utilize the net start command to create the home file share linkb. Utilize the net share command to create the home file share linkc. Utilize the net use command to create the home file share linkd. Utilize the net send command to create the home file share link

80. Your network includes two Domain Controllers and three member servers that provide file, print, andbackup/restoration services. You want to implement a more secure configuration on all five Windows Server 2003 servers. You have decided to use the secure templates, but is not sure what the current configuration is on each server. What is the best way for you to get these servers configured with the secure templates?

a. You should apply the Default security template from one of her member servers to all five servers and then apply the securews.inf and securedc.inf templates to them.

b. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securedc.inf template to the DCs and the securews.inf template to the member servers.

c. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securews.inf template to the DCs and the securedc.inf template to the member servers.

d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After doing this, you should apply the securews.inf and securedc.inf templates to the servers.

81. In what role should a DNS server be configured if it should maintain a cache of resolve queries but not have zone files?

a. Forwarding-onlyb. Secondary

c. Primaryd. Stub

82. You are trying to determine what settings (in addition to an IP address with your DHCP server) can be assigned to client computers running Windows XP Professional. What settings can be assigned?

a. The IP address of the file serverb. The IP address of the Active Directory domain controllerc. The IP address of the DHCP server

Page 24: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

d. The IP address of the DNS server

83. You've been tasked with using the Dsmod command-line utility for administration. Which of the following object types you can NOT modify using Dsmod?

a. GPOb. Groups

c. User accountsd. Computer accounts

84. After installing and configuring DNS on a Windows Server 2003 server, you set up an Active Directory-integrated zone. Where does the server store the zone information?

a. In the server's cacheb. In the %systemroot%\system32\DNS

directoryc. In the %systemroot%\DNS directoryd. In Active Directory

85. The corporation is running a routed network with a centrally located Windows Server 2003 DHCP server. The server is able to issue addresses to users on the local segment but cannot issue addresses to any of the sites that are across a router. What is the most probable cause of this problem?

a. The DHCP forwarder service is not enabled on the DHCP server.

b. The DHCP forwarder service is not enabled on the routers.

c. The BOOTP forwarder service is not enabled on the DHCP server.

d. The BOOTP forwarder service is not enabled on the routers.

86. Replacing the hubs and routers on an internetwork with switches creates a network that has which of the following?

a. One collision domain and multiple broadcast domains

b. One broadcast domain and multiple collision domains

c. One broadcast domain and one collision domain

d. Several collision domains and several broadcast domains

87. The company has 200 end users running Windows XP Professional that need to be able to access the

company's network remotely. Several months ago you installed a Windows Server 2003 server running RRAS to allow users to dial in to the server for remote access. This server is in the corporate Active Directory tree, and after you configured it, the profiles worked perfectly. Last weekend you added another Windows Server 2003 server with RRAS loaded to provide a failover access device in the event of a server crash. Both servers are in the same native-mode Active Directory domain, and test users are unable to log in to the new RAS server. What is the most likely problem?

a. The Windows Server 2003 RRAS service needs to be authorized in Active Directory.b. You need to add the new Windows Server 2003 server to the Global Remote Access Servers group

in Active Directory.c. You can have only a single Windows Server 2003 server running RRAS in an Active Directory

domain.d. The remote access profiles are not shared and need to be re-created on the new Windows Server

2003 server before anyone can access the server.

Page 25: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

88. The network consists of 3 Windows Server 2003 servers and 50 workstations running Windows XP Professional. In order to improve Internet DNS resolution, you have installed DNS on one of the Windows Server 2003 servers and configured it as a caching-only DNS server. Where does the new DNS server store its zone files?

a. The zone files are stored in Active Directory.b. The zone files are stored in the server's %systemroot%\system32\etc\DNS directory.c. Caching-only servers do not have any zone information.d. The zone files are stored in the server's RAM.

89. You must decide the security settings that will be applied to the MyGuestLogon account (for guest only). Which of the following settings is most appropriate to the solution presented?

a. User cannot change passwordb. Account is disabled

c. User must change password at next logond. Password never expires

90. Which of the following statements about a network’s infrastructure is true?a. A network infrastructure includes both hardware and software products.b. A network infrastructure is a design that does not include specific hardware

or software products.c. A network infrastructure includes software products only.d. A network infrastructure includes hardware products only.

91. You have not modified the default settings for DNS on the DHCP client or server. Which of the following client record or records will be updated in DNS by the DHCP server? (Assume that the clients are running Windows XP.)

a. Neither the PTR nor the A resource recordb. The PTR resource record

c. Both the PTR and A resource recordsd. The A resource record

92. Which of the following statements are NOT true regarding Remote Desktop connections to a Terminal Services host server running Microsoft Windows Server 2003?

a. Application processing occurs on the host systemb. Application processing occurs on the client systemc. Input is directed to the host systemd. Keyboard and mouse input are directed from the client system to the host.

93. The company has a T-1 connection to a local ISP, which is shared by all clients. Clients access the Internet using NAT. Several users have reported that they can't access the Internet. You start diagnosing the problem and find that all users reporting the problem are on the same subnet. Users on other subnets are not experiencing any problems accessing the Internet. Which of the following could be the cause of the problem?

a. The NAT router is malfunctioningb. The users' DNS Server is downc. The users' DHCP server is down.d. The users' default gateway for the subnet is malfunctioning

Page 26: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

94. Your company has 14 locations and is using OSPF as part of its WAN implementation. You are training a new WAN engineer to support the WAN. She asks you for the correct name of the area with an ID of 0.0.0.0. What do you call this area?

a. The ASb. The default route

c. The LSDBd. The OSPF backbone

95. Why must a DHCP client use broadcast transmissions to request an IP address from a DHCP server?

a. Because the DHCP client does not yet have an IP address

b. Because the DHCP client must inform all the other clients on the network of its intention to request an IP address

c. Because the DHCP server can service requests only from computers on the same LAN

d. Because the DHCP server can only receive broadcasts

96. You are attempting to perform an analysis of a computer by using the Security Configuration and Analysis snap-in. You know you need to complete the following steps:

1. Select the security template to be used in the analysis.2. Right-click Security Configuration and Analysis and select Analyze Computer Now.3. Select the log file to be used in the analysis.4. Right-click Security Configuration and Analysis and select Open Database.

5. Right-click Security Configuration and Analysis and select Configure Computer Now. 6. Select the database to be used in the analysis. What is the order in which you should perform these steps?

a. 4, 1, 6, 2, 5, 3b. 2, 1, 3, 4, 6, 5

c. 2, 6, 1, 3, 4, 5d. 4, 6, 1, 3, 2, 5

97. You want to enable the user account for Will Carver.You decide to use the dsmod.exe tool.Which of the following commands will enable the Will Carver account?

a. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled nob. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled yesc. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled nod. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled yes

98. One of your Windows Server 2003 printer servers has been responding oddly lately. The Print Spooler service often seems to get stuck, requiring you to restart either the service or the server. Performing the server restart is a time-consuming task because the server is located across town in another building that your company owns. What's the most efficient way to have this troublesome server restart after the second failure of the Print Spooler service?

a. Configure the service to restart itself after its second failure.b. Write a batch script that monitors this service and have it force a server restart after the service has

failed twice.c. Configure the service to restart the server after its second failure.d. Write a batch script that monitors the service and emails you after the service has failed the first

time so that you can travel to the server and prepare to restart it.

Page 27: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

e.99. You are trying to explain each part of an FQDN. What is the host portion of

sarah.training.urwrite.net?a. netb. sarah

c. trainingd. urwrite

100. You are trying to explain how two computers on the same subnet communicate with each other. Which of the following statements should you use to explain the process that two computers use to communicate with each other on the same IP subnet?

a. The packets will be sent to the MAC address of the destination computer.

b. The packets will be sent to the IP address of the destination computer.

c. The packets will be sent to the IP address of the default gateway for routing to the destination computer's MAC address.

d. The packets will be sent to the MAC address of the default gateway for routing to the destination computer's IP address.

101. Your network consists of 15 Windows Server 2003 computers, 5 of which are domain controllers. The remaining 10 servers are file and print servers for your 750 Windows XP Professional workstation clients. The previous administrator had carefully assigned every computer a static IP address, equally split up among five Class C subnets. Now some users have started moving their computers from one location in the building to another; this trend will be the norm for your company. After moving, the users complain to you that they can no longer access network resources. What is the most likely cause of this problem, and what should you do about it? The senior systems administrator has DHCP servers

available for you to use, should you decide to use them?

a. The statically configured IP addresses are no longer valid on the subnet to which the computers have been moved. You should reconfigure the computers with the correct static IP addresses.

b. The port to which the computers are connecting on the switch may be failing. You should replace the switches where computers cannot connect to network resources.

c. There are not enough client access licenses (CALs) for the Windows Server 2003 computers. You should purchase the required number of CALs.

d. The statically configured IP addresses are no longer valid on the subnet to which the computers have been moved. You should reconfigure the computers so that they are DHCP clients.

102. You are trying to troubleshoot one of your DNS servers. It seems that your computers running Windows XP Professional have not registered dynamically with your DNS server. You would like to force these computers to register with DNS. What should you do?

a. At the command prompt, type ipconfig /renew.

b. At the command prompt, type ipconfig /registerdns.

c. Get the user to reboot the system.d. At the command prompt, type

ipconfig /release.103. You decide that you want to

enforce account lockout to occur after three unsuccessful logon attempts

Page 28: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

across the company. How would you achieve this?

a. Set the Block Policy Inheritance on the group policy.

b. Set group policy in a domain GPO to lock out accounts after three unsuccessful logon attempts

c. Remove the local policies from each PC.

d. Set the local policy on each PC to lock out accounts after three attempts, and set No Override on the local policy.

104. What is one of the major disadvantages of distance-vector routing?

a. It involves high overhead on the network.

b. It suffers from the count-to-infinity problem.

c. It has problems with slow convergence.d. A network that uses it can connect to a

maximum of only 15 hops.

105. The company network consists of 3 Windows Server 2003 servers and 100 Windows XP Professional workstations. The Sales Department spends a lot of time doing Web research at a variety of supplier, customer, and competitor Web sites. You have been asked to provide a solution to speed up name resolution for these users. You configure a cache-only server.

Which of the following will have the largest impact on the response time for DNS requests?a. The processor speedb. The amount of RAM installed

c. The speed and type of the hard drived. The speed of the network adapter card

106. When a client can successfully ping a DNS server, but fails to receive any response to a name resolution query from that server, which of the following might be the cause of the problem?

a. The server’s cache is pollutedb. The server has an incorrect IP addressc. The DNS Server service is not startedd. The server is not the authority for the

requested name

107. Which of the following command-line tools can you use to delete a user from Active Directory?

e. dsrmf. dsadd

g. dsqueryh. dsmove

108. You are designing a new network and plan to use Class C IP addresses. You want to be able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.

Which of the following subnet masks should you use for the network?a. 255.255.255.192b. 255.255.255.240

c. 255.255.255.128d. 255.255.255.224

109. What is the proper way to create and then apply a custom security template to a computer?

a. Create a database in the SECEDIT utility, modify the security settings as necessary in Security

Page 29: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

Configuration And Analysis, and then apply the template to the computer using the Security Templates snap-in.

b. Create a database in Security Configuration And Analysis, modify the security settings as necessary, and then apply the database to the computer.

c. Use the Security Templates snap-in to create a custom template, configure the security settings as necessary, and then

apply the settings using Security Configuration And Analysis.

d. Create a database in Security Configuration And Analysis, modify the security settings as necessary, and then apply the settings using the SECEDIT utility.

110. Which of the following is the FQDN for the host home in the sales domain for the UR write company if the company's domain is urwrite.net?

a. home.sales.netb. home.urwrite.net

c. homed. home.sales.urwrite.net

111. A customer has asked you to install the DHCP service on her Windows Server 2003 computer, get one scope configured, and issue addresses. What minimum steps do you need to take in order to accomplish this?

a. Install the DHCP service from the Windows Components Wizard. After the service is installed, authorize it in Active Directory. Next, create the scope. Finally, configure the DNS integration.

b. Install the DHCP service from the Windows Components Wizard. After the service is installed, create the scope. Create a superscope and add the scope to it. Authorize the server in Active Directory.

c. Install the DHCP service from the Windows Components Wizard. After the service is installed, create the scope. Authorize the server in Active Directory.

d. Install the DHCP service from the Windows Components Wizard. After the service is installed, create the scope and then configure the DNS integration.

112. You're creating a saved query within the Active Directory Users and Computers MMC snap-in. Which of the following query types are NOT directly available for query selection by default?

a. Users, contacts, and groupsb. Printers

c. Exchange recipientsd. Computers

113. What is the correct subnet mask to use on a Class B network with a 10-bit subnet identifier?

a. 255.255.255.192b. 255.255.192.0

c. 255.192.0.0d. 255.192.255.255

114. Which of the following is used to uninstall Active Directory and demote a domain controller?

Page 30: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

a. Gpotoolb. Gpresult

c. Dcpromod. Ntdsutil

115. You have just set up a Windows Server 2003 Active Directory network, and you want to use group policies to control user configuration. You have configured local policies on some of the machines in your domain, and you also want to configure some site and OU policies for more granular control, but you are concerned about policies at different levels “canceling each other out.”

Which of the following types of GPOs will override settings applied at the domain level?a. Siteb. OU

c. Domaind. Local

116. You configure and install RRAS on one of your Windows Server 2003 servers. Your Windows Server 2003 network is running at the Windows Server 2003 domain functional level. Because this is the first time you have configured RRAS, you first modify the default policy. Then, as part of your testing, you configure 12 additional remote access policies. After this, the users complain that they cannot successfully access any information on the network.

What is the most likely source of the problem?a. You need to enable IPSec to ensure that the connections are encrypted.b. You did not modify the default dial-in policy.c. You have some conflicting policies, and the first one that the users apply refuses them access to

the information on the network.d. You did not enable MS-CHAP.

117. The network consists of 16 training rooms with 30 PCs each, running a mix of Windows 2000 Professional and Windows XP Professional, as well as 16 Windows Server 2003 servers, which provide all network services. You are working on a remote access problem, and you want to check the network to see if the policies have been deleted. Where should you look for these policies?

a. Remote access policies are stored in the computer properties in Active Directory.b. Remote access policies are stored in the user properties in Active Directory.c. Remote access policies are stored individually on every RRAS server.d. Remote access policies are stored on the global catalog server in Active Directory.

118. You have created several GPOs that are linked at various levels within your Active Directory structure. You are preparing to run the Resultant Set of Policies (RSoP) tool to examine the net result of the various GPOs that have been applied on the Accounting OU. In what order are Group Policy Objects applied in Active Directory?

a. Domain, OU, local, siteb. OU, local, site, domain

c. Local, site, domain, OUd. Site, domain, OU, local

119. You need to create a new GPO to enable settings for a particular OU. You open Active Directory Users and Computers and select the OU in the

tree. What is the next step in the process of creating a GPO for this OU?

a. From the Actions menu, select Create New GPO.

Page 31: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

b. From the Actions menu, select Group Policy Object Editor.

c. Right-click on the OU and select Properties.

d. Right-click on the OU and select Create New GPO.

120. You have a 50-host network and are running a Windows Server 2003 DHCP server to assign IP addresses. You also have five IP-based printers with static IP addresses. Your assistant administrator has been working on the DHCP server and has made some changes. Now, your users cannot print to one of the printers. What is most likely the problem?

a. The scope from which the printers were receiving their IP addresses has been deleted.

b. The existing scope has been modified so that it overlaps the addresses reserved for the printers.

c. The DHCP service was inadvertently stopped.

d. The existing scope has been modified so that it overlaps the addresses reserved for the printers, and a workstation has been assigned the same address as one of the printers.

121. An application using NetBIOS needs a NetBIOS name resolved. To resolve the NetBIOS name, local cache is checked first. The needed resolution is not already cached, so the LMHOSTS file is checked next. The desired entry is not in the LMHOSTS file. Based on this, what is the next step taken in resolving the NetBIOS name?

a. The DNS server issues a recursive query

b. The DNS server is queried using an NS type record

c. NetBIOS over TCP resolves the name to an IP address

d. The WINS server is queried

122. How the client computer requests and receives an address from the DHCP server?

a. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and sends a request to use that address back to the DHCP server. The client computer uses the address to communicate on the network.

b. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and sends a request to use that address back to the DHCP server. The DHCP server acknowledges the request and grants the client computer a lease to use the address. The client computer responds with an acknowledgement of the lease and uses the address to connect to the network.

c. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and sends a request to use that address back to the DHCP server. The DHCP server acknowledges the request and grants the client computer a lease to use the address. The client computer uses the address to connect to the network.

d. The client computer broadcasts a DHCPDISCOVER message. The DHCP server offers an IP address. The client computer accepts the address and uses it to communicate on the network.

Page 32: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

123. You install and create a primary DNS for a subnet. You are concerned about DNS fault tolerance for the Primary DNS zone. What can you do to provide load balancing and fault tolerance for the primary DNS server?

a. Install an AD-integrated DNS serverb. Install a second NIC card

c. Install a secondary DNS serverd. Install DHCP

124. You need to manage several servers remotely. What is the best tool for you to use?a. The runas commandb. The Remote Desktop connection utility

c. AD Users and Computersd. MMC snap-in tools

125. Which of the following servers does not require a computer with a registered IP address?a. Internet Web serversb. DNS servers used for Internet name resolution

c. Internet e-mail serversd. DNS servers used for Internet domain hosting

126. Your network consists of 20 Windows NT 4.0 servers and 30 Windows Server 2003 servers. Some of the NT 4.0 servers are configured as routers. You have just started to configure some of the Windows Server 2003 servers as routers, but you are having some problems. The new routers cannot communicate with the old routers. You confirm that all the routers are configured to use RIP. What could be the problem?

a. You need to install and configure OSPF.b. RIP does not propagate more than 15 hops.c. You have to change the RIPv2 incoming packet protocol to use only RIPv1.d. You have to change the RIPv2 outgoing packet protocol to use broadcast instead of multicast.

127. What would be the decimal value of 11001100.10101110.00011101.11101010?a. 198.174.29.234b. 204.174.29.234

c. 204.174.29.240d. 204.176.29.234

128. A Windows Server 2003 has startup problems. A message displays stating that at least one service has failed during startup. How do you determine which service failed?

a. You need to use Event Viewer to investigate system events.b. You need to use Device Manager.c. You need to use Event Viewer to investigate application events.d. You need to use the System Information utility.

129. The network consists of 75 locations interconnected with Windows Server 2003 servers running RRAS. Business has been very good, and you have recently added a number of segments to the network in several of the offices. You have noticed lately that you are receiving an increased number of "host unreachable" error messages. You believe that your routing tables are inaccurate. What should you enable in the Windows Server 2003 Routing and Remote Access console to prevent routing loops and count-to-infinity problems?

a. Poison reverseb. Topological database

c. Split horizond. Distance-vector routing

130. You currently have a supernetted network and would like to simplify the management of DHCP. What component should you configure in DHCP?

Page 33: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

a. BOOTP scopeb. Scope

c. Superscoped. Multicast scope

131. You are responsible for maintaining the Windows Server 2003 network for the company, including the Windows Server 2003 DNS servers. You have one remote office that is located across a slow WAN link. What is the best way to set up DNS to resolve internal hostnames?

a. Configure the DNS client computers to autodiscover the closest DNS server.

b. Configure a caching-only server and have all the DNS client computers resolve from that server.

c. Create a delegated zone for the remote office and have all the DNS client computers in that office resolve from that zone.

d. Use a centralized DNS server and configure it for incremental updates.

132. While troubleshooting a Windows XP Professional computer, you discover that it has an IP address of 169.254.176.132, a subnet mask of 255.255.0.0, and no configured default gateway. What is the most likely reason this computer has gotten these IP settings?

a. The TCP/IP stack on the computer is corrupt.b. The DHCP server scope has become corrupt.c. The user of the computer has configured new settings without fully understanding how routed IP

networks function.d. The computer has been unable to contact a DHCP server.

133. You are responsible for 75 Windows XP Professional workstations and 5 Windows Server 2003 member server computers. You have been directed to perform a security analysis on each computer, comparing its settings to those contained in the hisecws.inf template. How can you accomplish the assigned task with the least amount of administrative effort and the smallest number of trips to remote computers?

a. You can create a script that runs Security Configuration and Analysis on each computer and collect the results in a central location for later viewing.

b. You can analyze remote computers from the Security Configuration and Analysis snap-in by targeting it at the desired computer.

c. You can create a script that runs the secedit /analyze command on each computer and collect the results in a central location for later viewing.

d. The only way to perform this analysis is to physically visit each computer and use the Security You are installing Configuration and Analysis snap-in.

134. In what situation would you design your network as a workgroup instead of a domain?a. When you have several hundred clients spread out over multiple geographic regions.b. When the network has multiple servers.c. When you need to use Active Directory.d. When the network is small and has no servers.

Page 34: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

135. You have two office locations, each with its own Windows Server 2003 server. The two locations have been networked with a T-1 connection that runs between the Windows Server 2003 servers, which are running RRAS. You just added a new network in the main location, and you need to add a static route on the far end to provide connectivity to the location; you are not using any dynamic routing protocols. The network address, which you are using as a Class C address, is 10.10.10.0. The correct gateway address is 10.10.10.254. What command do you need to use to add a static route?

a. route /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2b. route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2c. netstat add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2d. ipconfig /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2

136. Identify the underlying network ID for this IP address: 199.214.36.132/25.a. 199.214.36.128/25b. 199.214.36.0/25

c. 199.214.36.0/24d. 199.214.36.128/24

137. You're in the process of evaluating which users should be members of the Power Users group, but first want to make sure that they require the rights that accompany that group assignment. Which of the following rights are NOT granted to the local Power Users group by default?

a. Reset local account passwordsb. Create local file shares

c. Take ownership of local filesd. Log on locally

138. A user with the username of JaneD works in the Sales department. Her account is located in the syngress.com domain. Based on this information, what canonical name would be used to identify this object in Active Directory?

a. /syngress.com/Sales/JaneDb. OU=Salesc. /CN=JaneD /OU=Sales /DC=syngress /DC=comd. CN=JaneD

139. Your computer is configured to use DHCP. When you log on, you notices you can't connect to the network. The computer has no IP address according to ipconfig. Which of the following is most likely true?

a. No DHCP server is on the networkb. The computer is using dynamic IP addressingc. The network cable to the computer is disconnectedd. The computer is using Automatic Private IP Addressing.

140. You are configuring a new Windows Server 2003 server to be a file server for your home office intranet that will be used only by local users. Which of the following will NOT need to have to suitably configure the IP address with a statically assigned address?

a. A valid subnet maskb. A valid WINS server IP address

c. A valid IP address for the serverd. A valid default gateway

Page 35: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

141. You are designing a network for a large branch office and have been assigned the network address 10.10.0.0/18.

What are the maximum number of subnets and the maximum number of hosts on each subnet?a. 512 subnets; 32,766 hostsb. 256 subnets; 65,534 hosts

c. 1024 subnets; 16,382 hostsd. 128 subnets; 131,070 hosts

142. Although you can use the Configure Your Server Wizard to configure a server as domain controller, which program or utility do you use to promote or demote a domain controller?

a. Active Directory Users And Computersb. NTDSUTIL.EXE

c. NETSH DIAGd. DCPROMO.EXE

143. Which of the following are NOT true regarding IP addresses used with NAT?

a. NAT uses public IP addresses when client computers need to access the Internet.

b. A pool of IP addresses is required.c. Public IP addresses are assigned by your

ISP.d. IP address reservations can be defined.

144. You maintain a Windows Server 2003 DHCP server to dynamically assign addresses. You have three superscopes set up, and within each superscope are four scopes. One day, you start experiencing problems with one of the scopes issuing bad addresses. You check the server and suspect that there is a database problem. How can you verify that the database is intact?

a. Open the DHCP console. Select the superscope that contains the scope in

question and then select Action, Reconcile All Scopes.

b. Open the DHCP console. Select the DHCP server that contains the scope in question and then select Action, Reconcile All Scopes.

c. Open the DHCP console. Select the DHCP server that contains the scope in question and then select Action, Reconcile DHCP Database.

d. Open the DHCP console. Select the scope in question and select Action, Reconcile Scope.

145. Your network includes two Domain Controllers and three member servers that provide file, print, and backup/restoration services. You want to implement a more secure configuration on all five Windows Server 2003 servers. You have decided to use the secure templates, but is not sure what the current configuration is on each server.

What is the best way for you to get these servers configured with the secure templates?a. You should apply the Default security template from one of her member servers to all five servers

and then apply the securews.inf and securedc.inf templates to them.

Page 36: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

b. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securedc.inf template to the DCs and the securews.inf template to the member servers.

c. You should apply the Default security template found on each computer to that specific computer. After doing this, you should apply the securews.inf template to the DCs and the securedc.inf template to the member servers.

d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After doing this, you should apply the securews.inf and securedc.inf templates to the servers.

146. You manage the Windows Server 2003 DHCP servers for a Corporation. You are running in a purely Windows Server 2003 environment with all Windows XP Professional clients, and you need to make sure that workstations are registered properly in DNS for Active Directory integration. How should you configure DNS integration?

a. Set DNS integration to enable updates for DNS clients that do not support dynamic updates.b. Set DNS integration to enable DNS keepalives.c. Set DNS integration to automatically update DHCP client information in DNSd. Set DNS integration to discard A and PTR records when a lease is deleted.

147. Which of the following performance counters you could NOT use to determine a possible problem with memory or a memory leak?

a. Processor\%Processor Timeb. Memory\Nonpaged Kbytes

c. Memory\Available Kbytesd. Process(process_name)\Pool Paged Bytes

148. You are installing a new domain controller. You want the domain controller to be in a separate domain that is not part of an existing forest. What type of domain should you install?

a. A parent domainb. A forest root domainc. A domain in a new domain tree in the existing forestd. A child domain

149. You 3.0 mbsigning a new network and plan to use Class C IP addresses. You want to be able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.

Which of the following subnet masks should you use for the network?a. 255.255.255.192b. 255.255.255.128

c. 255.255.255.224d. 255.255.255.240

150. Your network consists of a central site with 60 local users, 120 remote sales representatives who travel 90 percent of the time, and 16 Windows Server 2003 servers providing core network services, including remote access using RRAS. Your sales representatives need the ability to dial in to access resources on the network while traveling. The problem you are having is that the sales organization is split into eight geographic regions covering eight time zones, and the sales representatives from each region are only allowed to make remote connections during specific hours. Each region has a Windows security group that contains all of the sales representatives in that region.

Page 37: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

What do you need to do to ensure that the sales representatives can connect the remote access server, but only during the allowed times for their regions?

a. Create local security policies with the Group Policy Editor.b. Configure multiple RRAS servers with different local policies and get the different groups to dial

in to their respective servers.c. Give all remote users the same policy.d. Create different remote access policies for the different users.

151. You received a call from a user who said that he could not access any network resources. Upon investigation, you have determined that the workstation has an IP address of 169.254.170.145.

What is the most likely reason for the user's inability to connect to any network resources?a. The TCP/IP stack on the computer is corrupt and needs to be reset.b. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.c. The computer is not a member of the domain and is being refused an IP address.d. The network cable has been damaged and is no longer passing a signal.

152. You have installed a new file server on the network and formatted it to use NTFS. After formatting is complete, you use EFS to encrypt a folder containing files belonging to users. If a user accesses a file belonging to him in this folder, and then copies it across the network for another user to access,

which of the following will occur?a. The file on the hard disk will remain encrypted, but data sent over the network will be unencrypted.b. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network.c. The file on the hard disk and the data sent over the network will remain encrypted.d. The file on the hard disk and the data sent over the network will be decrypted and remain that way.

153. YoDL: 0.0 kb UL: 0.0 kbhoot a user's account. Which of the following statements are true regarding user account membership?

a. A user account can be a member of multiple organizational units at the same time.b. A user account can be a member of only a single organizational unit.c. A user account can be a member of only a single domain.d. A user account can be a member of only a single group

154. You're responsible for review of shared resources on several servers within a corporate domain. To accomplish this task, you've decided to use an automated script that will run several times per day to determine what shared resources are being used. Which of the following options would be most useful in meeting this requirement?

a. Utilize the net session command to review the shared resourcesb. Utilize the net file command to review the shared resourcesc. Utilize the net accounts command to review the shared resourcesd. Utilize the net config command to review the shared resources

155. A Windows XP Professional client computer will receive a DHCPACK broadcast message from the DHCP server after which of the following events?

a. When the client computer sends a request to use a lease it was offeredb. When a DHCP server offers it a leasec. When the client computer first requests an IP addressd. Successfully receiving or renewing an IP address from the DHCP server

Page 38: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

156. You have just installed DNS on the network, and configured a primary server and a secondary server.

What must you do to specify the authoritative name servers for the zone?a. Create the NS records for the primary and secondary name server.b. Create the NS record for the secondary name server.c. Create the NS record for the primary name server.d. Nothing, all necessary NS records are created automatically.

157. You maintain a Windows Server 2003 DHCP server to dynamically assign addresses. You have threesuperscopes set up, and within each superscope are four scopes. One day, you start experiencing problems with one of the scopes issuing bad addresses. You check the server and suspect that there is a database problem. How can you verify that the database is intact?

a. Open the DHCP console. Select the superscope that contains the scope in question and then select Action, Reconcile All Scopes.

b. Open the DHCP console. Select the DHCP server that contains the scope in question and then select Action, Reconcile DHCP Database.

c. Open the DHCP console. Select the scope in question and select Action, Reconcile Scope.d. Open the DHCP console. Select the DHCP server that contains the scope in question and then select

Action, Reconcile All Scopes.158. Your Windows XP computer has several shared folders. You are conducting a security audit and

wish to view the permissions on each of the shared folders. How can you quickly view all shared folders on your computer? What should you do?

a. Use Windows Explorer to search for shared folders.b. Use disk management to view the shared folders on each drive.c. Use System information in Computer Management to view shared folders.d. Use Shared Folders in Computer Management to view shared folders.

159. The network con 3.0 mbf 1,500 Windows Server 2003 servers spread over 150 OUs that have approximately 10 servers each. You have just finished creating a customized security template that specifies the Account Policies and Audit Policy settings that are required by your organization's corporate policy for specific departments. What is the best way for you to apply this template to only the Sales, Marketing, Production, and Engineering OUs?

a. Import the security template into each required OU by using a GPO.b. Manually apply the security template to each of the computers.c. Script the secedit.exe command to apply the security template to the required computers.d. Import the security template at the domain level into a GPO.

160. Your network contains 240 computers running Windows 2000 Professional and 225 computers running Windows XP Professional and uses Class C IP addresses. All the computers are located on the same network segment. You has been asked to automate the process of assigning IP addresses. What do you need to do?

a. You need to install DHCP and configure a scopeb. You need to install DHCP and configure a superscopec. You need to install DHCP and configure DNS integrationd. You need to install DHCP and configure BOOTP

161. You have been hired as a network consultant to install DNS in the new corporate headquarters of Zanzibar Sports. The network currently consists of 3,000 computers running Windows XP Professional and 4,000 computers running Windows 2000 Professional. The servers providing DNS for the network are presently located in the largest branch location, but you want to move them into the new corporate

Page 39: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

data center. You also want to ensure that all remote offices and manufacturing sites can perform DNS resolution queries without adding additional traffic on your WAN links. What should you do to ensure that the remote offices and manufacturing sites do not add additional traffic to your WAN links?

a. Configure the DNS servers at the corporate data center with standard secondary zones.b. Create a stub zone at the corporate data center.c. Configure the DNS servers at the corporate data center as Active Directory integrated.d. Configure standard secondary zone DNS servers at all remote offices and manufacturing sites.

162. You are trying to explain DNS and reverse lookup zones to your co-workers. What should you tell your co-workers that reverse lookup zone allows users to resolve?

a. A hostname to an FQDNb. An IP address to a hostname

c. A hostname to an IP addressd. An IP address to a MAC address

163. You have installed a new file server on the network and formatted it to use NTFS. After formatting is complete, you use EFS to encrypt a folder containing files belonging to users. If a user accesses a file belonging to him in this folder, and then copies it across the network for another user to access,

which of the following will occur?a. The file on the hard disk will remain

encrypted, but data sent over the network will be unencrypted.

b. The file on the hard disk and the data sent over the network will be decrypted and remain that way.

c. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network.

d. The file on the hard disk and the data sent over the network will remain encrypted.

164. You just installed and configured a DHCP server. After the installation, the wizard asked you to activate the scope, and you did. Staff from your company are complaining, however, that they are not obtaining IP addresses. What could be the problem?

a. You did not authorize the server.b. You did not activate the server.c. You were not authorized to activate the scope;

only administrators can activate the scope.d. Your scope is misconfigured.

165. You are experiencing a delay when you connect to a remote Web site. Which tool allows you to determine whether particular routers are responsible for the delay?

a. Tracertb. Network Diagnostics

c. PathPingd. Netdiag

166. Your corporate network uses variable length subnetting to make more efficient use of IP addresses. One of the IP addresses for a host is 131.39.161.17 with a subnet mask of 255.255.248.0.What is the proper notation for the network to which this host is connected?

a. 131.39.161.17/21b. 131.36.160.0/20

c. 131.36.161.0/20d. 131.39.160.0/21

167. You have been assigned the task of identifying and correcting a problem with one of the Windows Server 2003DNS servers. Computers running Windows 2000 Professional have not registered dynamically with the DNS server. You would like to force these computers to register with DNS as quickly as possible. What should you do?

On each computer, at the command prompt, type ipconfig /renewdns. On each computer, at the command prompt, type ipconfig /renew. On each computer, at the command prompt, type ipconfig /registerdns. Reboot the system so that the computer is issued a new DHCP address.

Page 40: Windows Server 2003 NetWork SubJect

36

Windows Server 2003 NetWork SubJect

168. You need to create several new file shares on your server. Which of the following options can NOT be used for this purpose in a default installation of Windows Server 2003?

a. Utilize the net share command-line utilityb. Create the file shares within the Windows Explorerc. Create the file shares within the Internet Explorerd. Utilize the Computer Management MMC snap-in

169. Which of the following best describes the function of a subnet mask? A subnet mask enables an IP address to be visible from the Internet. A subnet mask specifies the sizes of the network and host identifiers in an IP address. A subnet mask indicates whether an IP address is registered or unregistered. A subnet mask is a value assigned by the IANA to uniquely identify a specific network on the Internet.