Sie sind auf Seite 1von 40

TÀI LIỆU ÔN TẬP WINDOW SERVER 2003

1. You have created several GPOs that are linked at various levels within your Active Directory structure…… in
Active Directory?
Answer: Local, site, domain, OU.
2. Which of the following command-line utilities can be used to automate renaming Active Directory objects?
Answer: Dsmove
3. What type of organizational structure is the domain name system?
Answer: Hierarchical
4. Which is the only layer of the TCP/IP reference model that does not contain any TCP/IP protocols?
Answer: The network interface layer.
5. Which of the following event items is not one of the five default Event viewer event types?
Answer: Caution
6. How can you perform a bulk import of users into Active Directory to create many user accounts at one time?
Answer: Use the csvde.exe command
7. What would be the FQDN of a workstation named WKS042 located in the…. Domain?
Answer: wks042.sales.west.bigcorp.net
8. You have two office locations, each with its own Windows Server 2003 server. The Two locations have been
networked with a T-1 connection …. Static route?
Answer: route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
9. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which
of the following is an appropriate next step?
Answer: Run the ipconfig/release command and then the ipconfig/renew command on every client computer
10.Your corporate network uses variable…. Is 131.39.161.17 with subnet mask of 255.255.248.0 ….?
Answer: 131.39.160.0/21
11.You use a Windows XP professional computer on your company’s network….navigate to?
Answer: Start, All Programs, Accessories, Communications, Remote Desktop Connection.

1. Which file system has the ability to encrypt files?


a. NTFS
b. FAT16
c. FAT32
d. UDF
2. Which file system has the ability to compress files?
a. UDF
b. NTFS
c. FAT32
d. FAT16
3. You need to create a record in DNS to allow Internet mail to be sent to your domain.
What kind of domain record do you need?
a. A CNAME record
b. A PTR record
c. An MX record
d. An A record

4. Which command-line tool can you use to clear the DNS resolver cache on a DNS client?
a. ipconfig
b. tracert
c. netsh
d. pathping
12. Which of the following is used to install Active Directory and establish a server as a domain
controller?

a. Dcpromo
b. Ntdsutil
c. Gpotool
d. Gpresult

13. To start in Safe Mode:


a. Select Start, Accessories, System Tools, Safe Mode.
b. None of the above.
c. Press the F7 key during system boot.
d. Press the F8 key during system boot.

5. You are configuring security for several new workstations running Windows XP Professional.
The computers are members of the Temp OU, and you noticed that users are able to reuse old
passwords whenever they are prompted to change them. Which of the following account
policies can be used to prevent this behavior?
a. Minimum Password Age
b. Maximum Password Age
c. Enforce Password History
d. Store Passwords Using Reversible Encryption

6. Which tool can you use to determine which ports a server has open?
a. NETSH
b. Security Configuration And Analysis
c. NETSTAT
d. Security Monitor

7. You need to determine whether the NIC drivers are digitally signed. Where do you find this
information?
a. System Information
b. Event Viewer
c. Device Manager
d. Driver signing options in the System applet

8. You are experiencing a delay when you connect to a remote Web site.
Which tool allows you to determine whether particular routers are responsible for the delay?
a. Tracert
b. Network Diagnostics
c. PathPing
d. Netdiag
9. You are reviewing DNS parameters, how long a node in an FQDN can be?
a. 63 characters
b. 512 characters
c. 255 characters
d. 43 characters

10. Which of the following are objects in the Active Directory?


a. Shared folders
b. Shared printers
c. Domains
d. All of these
11. Which of the following Windows Server 2003 TCP/IP configuration parameters specifies the
address of a router?
a. IP address
b. Subnet mask
c. Preferred DNS server
d. Default gateway
12. What step does a DNS client perform first to resolve a DNS name?
a. The client checks its local DNS resolver cache.
b. The client queries its primary DNS server.
c. The client queries its alternate DNS server.
d. The client broadcasts on the local subnet.
14. Which of the following is most likely true if a computer with an IP address of 169.254.0.11?
a. The computer has a static IP address
b. No DHCP server is on the network
c. A DHCP server is assigning the computer's IP address
d. The network cable is disconnected

13. Which of the following is a legal NetBIOS computer name?


a. host1.microsoft.com
b. host10_microsoft
c. host1-microsoft
d. host1_local
14. How much disk space is actually available for data in RAID level 5 when there are four disks?
a. 90%
b. 75%
c. 50%
d. 65%

15. You are troubleshooting a network adapter that does not appear to have an IP address assigned to it.
What command could you issue to cause this network adapter to acquire a DHCP lease?
a. ipconfig /acquire
b. ipconfig /renew
c. ipconfig /refresh
d. ipconfig /lease
16. When a TCP/IP computer can communicate with the local network but not with computers on
other networks, which of the following configuration parameters is probably incorrect?
a. Preferred DNS server
b. IP address
c. Subnet mask
d. Default gateway
15. Which of the following command-line utilities should you use to extract user property data
from the Active Directory?
a. Dsget
b. Dsadd
c. Dsmod
d. Dsquery

17. Which of the following messages is not exchanged as part of a DHCP lease initialization?
a. ACK
b. Renew
c. Discover
d. Request
18. (Windows Server 2003) What permissions are granted to the Everyone group over the share
created by the following code? net share MyShare=C:\MyFiles\MyShare
a. Full Control
b. Read
c. None
d. Change

19. You are getting some error messages from the DHCP server. What counter in the Performance
Console would display the number of DHCPOFFER messages sent per second by the DHCP
server to a client computer?
a. Discovers/Sec
b. Acks/Sec
c. DHCPAcks/Sec
d. Offers/Sec

20. To start in Safe Mode:


a. Select Start, Accessories, System Tools, Safe Mode.
b. None of the above.
c. Press the F7 key during system boot.
d. Press the F8 key during system boot.

21. You are configuring the dial-up connection for the portable computer shown in the exhibit.
What address should you use as the default gateway for the portable computer's dial-up
connection?
a. 192.168.111.42
b. 192.168.100.1
c. 209.29.9.20
d. 192.168.100.21
22. You have five Windows XP clients on a network with a Windows Server 2003 server. The server has an
always-on Internet connection with an ISP. What service can you install on the server to allow the
clients to access the Internet, without requiring you to obtain additional IP addresses from your ISP?
a. DNS
b. PPTP
c. NAT
d. DHCP
23. You need to create a second DNS entry for the intranet Web server, so that users can access it
using an easy-to-remember name. What type of record do you need to add if you want to create an
alias in DNS for the server?

a. An A record
b. A CNAME record
c. An MX record
d. A PTR record

16. When configuring the settings for user accounts, you want to map a drive to the location of the
operating system's files. Which of the following environmental variables would be used for this
purpose?
Windows Server 2003 NetWork SubJect

a. %SystemDrive%
b. %HomePath%
c. %SystemRoot%
d. %HomeDrive%

24. a computer named COMP2 on a Windows 2000 network as shown in the exhibit. Your network
uses TCP/IP as the only network protocol. You configure COMP2 with an IP address of
192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway of 192.168.2.1 Though you
are able to log onto the domain, you are not able to connect to any resources on SERV2. Users
need to be able to access this server to access documents and shared printers. What should you
do to ensure that COMP2 can connect to network resources?

a. Configure COMP2 to use a TCP/IP address of 192.168.5.16


b. Create a computer account on the domain for COMP2
c. Configure COMP2 to use a TCP/IP address of 192.168.2.16
d. Configure COMP2 to use a Default Gateway of 192.168.10.1

25. Which of the following TCP/IP protocols does not function at the Internet layer?
a. TCP
b. ARP
c. ICMP
d. IP
26. If GroupA is granted the Change permission over a file share \\someserver\someshare\, it will definitely
have which of the following permissions as well by default?
a. None
b. Read
c. Modify
d. Full Control
17. One important difference between TCP and UDP is that
a. TCP contains source and destination addresses and UDP does not
b. UDP is connection-oriented and TCP is not
c. TCP is connection-oriented and UDP is not
d. UDP cannot be routed, but TCP can

40
Windows Server 2003 NetWork SubJect

27. Which of the following is a transport-layer protocol?


a. UDP
b. IGMP
c. Ethernet
d. DNS

28. You have been asked to simplify the process of configuring TCP/IP on all the client computers.
The network consists of 40 computers running Windows 2000 Professional and 60 computers
running Windows XP Professional. Installing and configuring what service of Windows Server
2003 will help you accomplish your task?
a. DHCP
b. BOOTP
c. WINS
d. DNS

29. Which of the following command-line tools can you use to delete a user from Active Directory?
a. dsrm
b. dsadd
c. dsquery
d. dsmove
30. What is the functionality of ARP (Address Resolution Protocol) ?
a. Resolve machine names to IP addresses
b. Resolve IP addresses to MAC addresses
c. Resolve IP address to machine names
d. Resolve MAC addresses to IP addresses
31. What is the functionality of RARP (Reverse Address Resolution Protocol) ?
a. Resolve IP addresses to MAC addresses
b. Resolve IP address to machine names
c. Resolve machine names to IP addresses
d. Resolve MAC addresses to IP addresses
32. Which of the following is NOT default hidden share under Windows Server 2003?
a. ADMIN$
b. PRINTER$
c. C$
d. IPC$
33. Which protocol provides names and name resolution for workgroups in Windows?
a. Kerberos
b. NetBIOS
c. DNS
d. CIFS

2. What are the default share permissions in Windows Server 2003?


a. Everyone:Allow Full Control

40
Windows Server 2003 NetWork SubJect

b. Users:Allow Full Control


c. Everyone:Allow Read
d. Users:Allow Read and Execute
3. You need to back up critical data on your server. However, you do not have enough backup
tapes to back up everything on your server. You want to make sure that, in addition to the user
data you are backing up, you back up the Registry on your server. What should you select in
addition to the data files that you want to back up?
a. System State
b. My Computer
c. C: drive
d. My Documents
4. What utility do you use to view audit information?
a. Audit Log Viewer
b. Audit Viewer
c. Event Viewer
d. Log Viewer
5. Which of the following is not a legal top-level domain name?
a. findem.org
b. findem.net
c. findem.art
d. findem.com
6. When a DNS server converts a computer name to a dotted decimal address, this is called
e. Name resolution
f. Name recognition
g. Piping
h. Pinging
7. You are in the process of configuring a counter log to create a baseline log for a new Windows
Server 2003 computer that you are placing on the production network. You have configured the
counter log to start and stop automatically each day. You now need to configure it so that the
resulting log files will be easily identified by the date and time that they were created. Which
log numbering style should you use to accomplish this?
a. yyyymmddhh
b. yyyymm
c. mmddhhmm
d. nnnnnn

8. You've installed network monitor and configured a network to monitor. What do you need to do
to capture data?
a. Click Capture --> Trigger
b. Click Capture --> Start
c. Click Capture --> Networks
d. Click Capture --> Filter
9. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level
Domain?
a. west.bigcorp.net

40
Windows Server 2003 NetWork SubJect

b. .net
c. wks042
d. bigcorp.net
10. How many primary partitions without an extended partition can reside on a basic disk under
Windows Server 2003?
a. Four
b. Unlimited
c. One
d. Three
11. You are troubleshooting network connectivity between two computers on a routed IP network.
What command can you use to send a continuous flow of ICMP echo request packets to the
destination IP address?
a. ping -t
b. ping -l
c. ping -a
d. ping -f
12. You have just completed a default installation of Windows 2003 Server.
Where can you look on your computer's hard disk to see the Windows 2003 Server files?
a. WINNT Folder
b. WINDOWS2003 Folder
c. WINDOWSNT Folder
d. WINDOWS Folder
13. Which of the following is not a valid Safe mode option?
a. Safe Mode with Command Prompt
b. Safe Mode
c. Safe Mode with Base Video
d. Safe Mode with Networking
14. You are troubleshooting user complaints of slow Internet access to a partner Web site. You
have been told by the partner that they are experiencing high latency on several links leading to
their network. What tool can you use to determine exactly which routers and links are dropping
packets and what the ping time is for each link?
a. tracert
b. nslookup
c. pathping
d. ping
15. What tool should you use if you suspect an application is not responding?
a. Computer Management
b. Performance
c. Task Manager
d. System Monitor
16. What tool should you use to configure security templates?
a. Security Templates snap-in
b. Network Monitor
c. Active Directory Users And Computers
d. Security Configuration And Analysis snap-in

40
Windows Server 2003 NetWork SubJect

17. You've just written a new script and need to ensure that new policy settings are immediately
applied when the script has been completed. Which of the following command-line utilities
should you use?
a. secedit.exe
b. gpresult.exe
c. gpapply.exe
d. gpupdate.exe

18. You are currently logged in to the Sales server as an Administrator. You want to add additional
security to the D:\Data folder. When you attempt to set permissions, you see the following
dialog box that does not display a Security tab. What is the most likely reason for this?

a. The folder has already been encrypted with EFS.


b. You need to be logged on as a member of the Server Operators group.
c. Your account has been assigned No Access rights through the user account or through group
membership.
d. The partition is not configured as NTFS.
19. What are the default share permissions in Windows Server 2003?
a. Everyone: Allow Full Control
b. Everyone: Allow Read
c. Users: Allow Full Control
d. Users: Allow Read and Execute
20. Which type of NIC is likely to provide the fastest performance?
e. EISA

40
Windows Server 2003 NetWork SubJect

f. ISA
g. MCA
h. PCI
18. What type of zone should you create if you want to create a read-only copy of the master DNS
data for the zone?
a. Stub
b. Root Hints
c. Primary
d. Secondary

19. Which of the following network/transport layer protocols can you use for Windows file sharing
when installed alone?
a. TCP/IP and IPX only
b. TCP/IP, IPX, and NetBEUI
c. TCP/IP only
d. TCP/IP and NetBEUI only

20. What type of resource record must you configure to enable reverse lookups for host
computers?
a. Pointer (PTR) records
b. Mail Exchanger (MX) records
c. Name Server (NS) records
d. Host (A) records

21. You are using Windows Server 2003 as the network operating system in all four of company's
locations. You are using a server in corporate headquarters and another in the Boston sales
office to establish an ISDN-based demand-dial routing connection. In order to control costs, this
has been implemented as an on-demand connection. During operation, however, you notice that
the connection is coming up fairly regularly, even during the evening, when you know that
there is no communication occurring between the offices. What could be the problem?
a. A default route has been configured on the answering router, and anytime a packet is received,
it is
forwarded to the destination demand-dial router.
b. This is normal; it is an indication that the demand-dial routing solution is functioning
normally.
c. A default route has been configured on the calling router, and anytime a packet is received, it
is forwarded to the destination demand-dial router.
d. Legitimate data is being transferred during the connection.

22. You are the WAN administrator for General Telecommunications, a large manufacturer of
network equipment. When you started with the company, you had 10 office locations, each with
its own Windows Server 2003 servers. These locations were networked using fractional T-1s
and Windows Server 2003 servers running RRAS, and they used RIP for routing information.
General Telecommunications now has 120 sales offices throughout the United States and
Europe, and you have been tasked with networking these locations by using hardware routers.
You have been asked to design a solution that will support both the Windows Server 2003

40
Windows Server 2003 NetWork SubJect

servers and the hardware routers. The solution must also support failover connections between
the original 10 locations.
What routing method should you select?
a. EIGRP c. Autostatic updates
b. RIP d. OSPF

23. You are running in a mixed environment, and you are using a Windows Server 2003 DHCP
service to support three network segments. Your client computers consist of Windows 2000
Professional, Windows NT Workstation, and Windows 98 SE workstations.
What do you need to do to ensure that all the client computers can receive DHCP addresses?
a. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. For the Windows NT Workstation client computers, ensure that the DHCP
update from Service Pack 6 has been installed.
b. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. Configure the DHCP service for mixed mode.
c. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. Configure the DHCP service for backward compatibility.
d. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically.

24. Which OU structure in the Active Directory is likely to result in the most CPU resource use?
a. 15 OUs on the same level c. 5 OUs on the same level
b. OUs nested 5 layers deep d. OUs nested 15 layers deep
25. You have installed a new file server on 26. You are a network administrator for an
the network and formatted it to use Active Directory domain with servers
NTFS. After formatting is complete,you running Windows Server 2003. You
use EFS to encrypt a folder containing recently installed a second DHCP server
files belonging to users. If a user on the local subnet. When testing the
accesses a file belonging to him in this server, you notice the DHCPServer
folder, and then copies it across the service is being shutdown and you can't
network for another user to access, get the service to stay running.What is
which of the following will occur? the most likely cause of this problem?
a. The file on the hard disk and the a. The DHCP server has not be authorized
data sent over the network will be in Active Directory.
decrypted and remain that way. b. The DHCP Server service is improperly
b. The file on the hard disk and the installed
data sent over the network will remain c. The active scope has invalid TCP/IP
encrypted. options
c. The file on the hard disk will be d. The DHCP server does not have an
decrypted, so EFS can send it encrypted active scope
over the network.
d. The file on the hard disk will 27. You set up a share in the computer lab
remain encrypted, but data sent over the but neither students nor lab
network will be nencrypted. administrators can access it. You
checked the share permissions, which
are configured properly. Students and

40
Windows Server 2003 NetWork SubJect

lab administrators see an "Access is newly installed network, which has two
denied" message when they try to access subnets in one Active Directory domain
the share. Joe has no problem accessing with servers running Windows Server
the share. 2003. After you install and configure the
What should you do to resolve the p1:5HUI - DHCP server in SubnetA, client
CENTER FOR INFORMATION computers in SubnetA are able to
TECHNOLOGY obtain DHCP leases and the proper
a. Change the share permissions so that TCP/IP configuration. However, client
everyone has Full Control. computers on SubnetB are unable to
b. Check and modify as necessary the obtain DHCP leases. What is the most
NTFS permissions on the folder being likely cause of this problem?
shared. a. The DHCP server is not authorized is
c. Instruct the users on the proper way to SubnetB
connect to the share b. The DHCP Server service is stopped
d. Nothing; the users must be mapping to c. A DHCP Relay Agent is not installed in
the share improperly SubnetB.
d. The DHCP scope for SubnetB is not
28. You have been asked to implement active
dynamic IP addressing the company's
b. The policy settings will be cumulative
and applied in the order of policies at
29. Your network consists of servers the site level, domain level, and finally
running Windows 2003 Server and OU level.
workstations running Windows 2000 c. The policy setting at the local computer
Professional. You have applied several level will be overwritten by the OU-
custom security templates to GPOs level GPO, which will be overwritten
linked to the OU, domain, and site levels by the domain-level GPO, which will
in Active Directory. In addition to this, finally be overwritten by the site-level
there are security settings that have also GPO. For this reason, major security
been applied at the local computer level settings must be made at the site-level
of all machines that are on the network. GPO; all others will be overwritten.
Because several policies now affect the d. Security settings in the GPOs will not
computer accounts within the domain, be applied to machines running
site, and OU, Windows 2000 that have joined the
which of the following will occur when the domain.
user logs on to the domain?
a. The security settings at the local
computer level will override those of
the GPOs.

30. Hannah reports that she's having a tough time connecting to resources on your Windows
Server 2003 domain.You ask for more information, and Hannah reveals that she is trying to
connect to a server in Washington. Other users can connect to that server, but she cannot.
Hannah can ping the IP address of other hosts on her segment, her default gateway, and even
the IP address of the server in Washington, but when she uses the server's hostname to enter
the name of the server, she cannot connect. What do you suspect is the problem?

40
Windows Server 2003 NetWork SubJect

a. Hannah needs to renew her IP address by running the command ipconfig/release and then
ipconfig/renew.
b. Hannah has a faulty network adapter card.
c. Hannah has a blank or invalid subnet mask.
d. Hannah has a blank or invalid DNS server IP address.

31. You need to ensure that your users will be able to resolve hostnames to IP addresses.
What type of zones do you need to configure?
a. A reverse lookup zone c. A delegated zone
b. A forward lookup zone d. A stub zone
b. Authorize the DHCP server
32. (DHCP) You want to migrate a subnet c. Run the Ipconfig /release command and
to a new scope. You create a new scope then the Ipconfig /renew command on
and then deactivate the old scope. every client computer.
Which of the following is an appropriate d. Restart the DHCP Server service
next step?
a. Delete the old scope.
33. All your Windows XP Professional client computers are configured to get DHCP leases from
your Windows Server 2003 DHCP server. This morning, one of your client computers no longer
had connectivity with the rest of the network. The user claims that she did not change any
network settings and has verified that the network cable is properly connected to both the
network adapter and the wall jack. What is the most likely reason for the problem that the
computer is experiencing?
a. The computer is not a member of the domain and is being refused an IP address.
b. The network cable has been damaged and is no longer passing a signal.
c. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.
d. The TCP/IP stack on the computer is corrupt and needs to be reset.

34. Your Windows Server 2003 DHCP server issues a block of 40 addresses to 120 salespeople on
the Sales network. These users are frequently in and out of the office, so no more than 40 users
are ever on the network at one time. What do you need to do to ensure that users get addresses
when needed?
a. Configure an exclusion for each user. c. Set the DHCP lease duration to 60
b. Set the DHCP lease duration to 5 days minutes.
d. Configure a reservation for each user.

35. A user has the username JohnB. He wants to access a Microsoft Access database called db.mdb
that’s located on a DC called syngress.com, in a directory called DB. Using the URL, what will
this user enter into a browser to access the database?
a. JohnB@syngress.com c. http://syngress.com/DB/db.mdb
b. syngress.com d. \\syngress.com\DB\db.mdb

40
Windows Server 2003 NetWork SubJect

36. A client computer that makes a DNS query to a DNS server for name resolution of a remote
host is referred to as what?
a. A recursive query c. An iterative query
b. A DNS resolver d. A DNS forwarder

37. Which of the following is NOT default hidden share under Windows Server 2003?
e. ADMIN$ g. C$
f. PRINTER$ h. IPC$

38. You have installed a Windows Server 2003 DNS server, but people are unable to resolve names.
You need to test the DNS server. Where should you start in your troubleshooting efforts?
a. From the command prompt of a Windows XP Professional host, run the nslookup utility to
check the functionality of the DNS service.
b. From the Windows Server 2003 DNS server, type ping -R and the address of the DNS server.
Examine the results to see if the server is working.
c. From the command prompt of a Windows XP Professional host, run the ipconfig utility to
check the functionality of the DNS service.
d. From the Windows Server 2003 DNS server, type ping -a and the address of the DNS server.
Examine the results to see if the server is working.

39. You install a new FireWire adapter card and the server immediately stops responding. You
need the server up on the network as soon as possible. How do you fix this problem?
a. You need to use Last Known Good Configuration. c. You need to use Safe Mode.
b. You need to restore the System State. d. You need to the ASR utility.

40. The network consists of 6 Windows Server 2003 servers running all network services. You have
200 desktop computers running Windows XP Professional on the LAN, and you have just
purchased 30 laptops that need to be able to dial in to the network at night. You configure and
install RRAS on one of the Windows Server 2003 servers. This server is a member of the
production Active Directory domain operating at the Windows Server 2003 domain functional
level. The new laptop users are unable to connect remotely. Which of the following is the most
likely problem?
a. You did not enable MS-CHAP as the default authentication protocol.
b. The Windows Server 2003 running RRAS has conflicting remote access policies, and the first
one that is applied to the remote users prevents them from accessing the data.
c. You did not modify the default dial-in policy, which restricts access unless it is modified.
d. Windows Server 2003 RRAS does not support dial-in from a Windows XP system.
41. Which statement is NOT correct?
a. An organizational unit can be a member of a group.
b. A group can be located within an organizational unit.
c. A group can be a member of other groups.
d. An organizational unit can be located within another organizational unit.

40
Windows Server 2003 NetWork SubJect

42. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level
Domain?
e. west.bigcorp.net g. wks042
f. .net h. bigcorp.net
a. On the GPO linked to the Corp OU,
select Block Policy inheritance.
43. The development team of your company b. On the GPO linked to the Technical
has started a new research project. OU, negate any options set in the Corp
They want to ensure that only the OU by choosing Disabled for those
members of their project team are options.
allowed to see the new directories that c. On the GPO linked to the Technical
they create. You created a new OU that OU, select Block Policy inheritance.
contains the user accounts of the d. On the GPO linked to the Technical
development team, the computers they OU, select No Override.
will be using, a shared folder where they
are going to place their research
documents, and several printers that 45. Which of the following statements are
are to be isolated from the rest of the NOT true regarding access
company. They are concerned about permissions?
who will have access to the new a. NTFS permissions are available for
directories. How will you protect the files stored on NTFS-formatted
directories from unauthorized access? partitions
a. Do nothing. Since the directories and b. Share permissions are available for
files are part of an OU, no one outside shared folders on FAT32-formatted
the OU can access them. partitions
b. Create a security group that contains the c. NTFS permissions are available for
members of the research group. files stored on FAT32-formatted
Remove the Everyone group from the partitions
ACL. Add the new group to the ACL d. Share permissions are available for
and grant it the appropriate permissions. shared folders on NTFS-formatted
c. Create a GPO that will limit access to partitions
the directories. Apply the GPO to the
domain. 46. A user attempts to access a resource,
d. Create a GPO that will limit access to and entries in the ACL are analyzed to
the directories. Apply the GPO to the match the SID. The system examines the
new OU. entire ACL, but no match is found.
Which of the following will occur?
44. Your Active Directory domain has two a. The account will be disabled
OUs. The Corp OU is a parent OU to b. Each ACE in the ACL will be read until
the Technical OU. You have a match is eventually found
implemented a GPO linked to the Corp c. The user will be denied access
OU. You do not want those settings d. The user will be granted access
affecting the users in the Technical OU.
How can you accomplish this with
minimal effort?

40
Windows Server 2003 NetWork SubJect

47. In the IP address assignment 10.54.113.0/24, what does the number 24 represent?
a. The number of bits in the host identifier
b. The number of bits in the combined network and subnet identifiers
c. The number of bits in the combined subnet and host identifiers
d. The number of bits in the subnet identifier

48. You have been asked to simplify the process of configuring TCP/IP on all the client computers.
The network consists of 40 computers running Windows 2000 Professional and 60 computers
running Windows XP Professional. Installing and configuring what service of Windows Server
2003 will help you accomplish your task?
e. DHCP g. WINS
f. BOOTP h. DNS

d. The most restrictive permissions take


49. You use Network Monitor to capture precedence.
network traffic, but when you go to
view the capture, you realize there is 51. A user had trouble remembering his
more information available than you password and tried several things. Now,
need or want to see. he says his account is telling him he is
What can you do to make it easier to find the locked out. You need to restore his
information you're looking for? ability to log on as quickly as possible
a. Create a capture filter. with the least amount of administrative
b. Create a display filter. effort. How should you accomplish this?
c. Enable OSPF on the network adapter. a. You should use the Active
d. Start Network Monitor from the Directory Users and Computers MMC
command line using the netmon snap-in to unlock the user's account.
command. b. You should use the Active
Directory Users and Computers MMC
50. When both share permissions and snap-in to change the user's password.
NTFS permissions exist on the same
shared folder, how is access control to c. You should use the Active
the shared folder affected for users Directory Users and Computers MMC
trying to access the files stored in the snap-in to copy the user's account and
shared folder over the network? create a new unlocked copy.
a. The most liberal permissions take d. You should use the command-line
precedence. utility Dsmod to change the user's
b. NTFS permissions take precedence. password.
c. Share permissions take precedence.

40
Windows Server 2003 NetWork SubJect

52. You install Active Directory and creates an AD-integrated DNS server for your domain. You
are concerned about DNS fault tolerance.
What can you do to provide fault tolerance for your AD domain?
a. Install a primary DNS server c. Install a caching-only DNS server
b. Install a secondary DNS Server d. Install another AD-integrated DNS server

53. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the
old scope. Which of the following is an appropriate next step?
a. Restart the DHCP Server service
b. Run the Ipconfig /release command and then the Ipconfig /renew command on every client
computer.
c. Delete the old scope
d. Authorize the DHCP server

54. You recently have been having unexplained problems with the Print Spooler service on two of
your Windows Server 2003 printer servers. You can find nothing wrong with the Print Spooler
service itself, and you have restarted it numerous times, with no effect. What else might you
consider examining to determine the cause of the problems for the Print Spooler service?
a. The services that are dependent on the Print Spooler service
b. The services on which the Print Spooler service is dependent
c. The currently installed drivers for the printers attached to the printer server
d. The cables being used to connect the printers to the printer server

55. You have just installed the DHCP service through the Windows Component Wizard. You now
need to configure DHCP to support a scope that will be used for streaming multimedia delivery.
In the MMC, you right-click the server icon under DHCP. What option should you select to
configure the scope?
a. New IP Scope c. New Multicast Scope
b. New Scope d. New Superscope

56. You’ve configured a DHCP server to use the following range of IP addresses when assigning
addresses to clients: 131.107.0.0/19 through 131.107.224.0/19. You set the subnet mask for this
range of addresses to 255.255.240.0. Users are complaining that they cannot connect to the
network.
What is the most likely cause of this problem?
a. The subnet mask is wrong. It should be 255.255.224.0.
b. The subnet mask is wrong. It should be 255.224.0.0.
c. The range of addresses is illegal.The first address cannot be 131.107.0.0/19.
d. The range of addresses is illegal. It should end at 131.107.192.0/19.

57. You are a network administrator. Multiple users have reported that they can access some local
resources but not all, and they have no access to resources on the Internet. You try to diagnose
the problem and find that the preferred DNS server used by the clients having the problem can

40
Windows Server 2003 NetWork SubJect

only resolve names for zones stored on the server. The TCP/IP settings on the DNS server are
configured correctly. What is the likely cause of the problem?
a. The DNS server is not getting zone transfers.
b. The DNS server's resolver cache is corrupted.
c. The DNS server doesn't have any forwarders configured.
d. The DNS server has incorrect or corrupt root hints.

58. Which of the following is the major disadvantage of using RIP as the network routing protocol?
a. High cost of software c. Count-to-infinity problem
b. A maximum of only 12 hops d. Low overhead on the network

59. You have a single DNS server resolving names for your internal domain, and you have an
Internet connection. You need to configure DNS on the client computers to resolve Internet
addresses.
How will you make this configuration?
a. Install a new DNS server to resolve Internet domain names. On each client computer,
configure the DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN
connection to resolve to the DNS server.
b. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP)
Properties dialog box of the LAN connection to resolve to the DNS server.
c. On each client computer, install the Microsoft DNS client. Configure the client computer to
resolve to the DNS server. Configure the root hints on the server to point at the Internet root
servers.
d. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP)
Properties dialog box of the LAN connection to resolve to the DNS server. Configure the root hints
on the server to point at the Internet root servers.

60. You are responsible for maintaining the company's Windows Server 2003 DHCP server. While
doing your daily system checks, you notice that the number of DHCPDISCOVER packets
spiked at 9:00 this morning. What could cause the Discovers/Sec counter to spike at 9:00 a.m.?
a. The DHCP service being restarted
b. A network problem
c. A large number of computers entering the network at approximately the same time
d. A rogue DHCP server issuing duplicate addresses

61. You have three office locations, each with its own Windows Server 2003 servers. Each office has
a local LAN that is very stable, and the company has no plans to add locations for the next
three years. There are plans to network the three locations by using the existing Windows
Server 2003 servers and ISDN lines. You have been asked to design a solution that will have the
lowest impact on the servers, with no requirements for redundancy or failover. What routing
method should you select?
a. OSPF c. RIP
b. Static routes d. Autostatic updates

40
Windows Server 2003 NetWork SubJect

62. You are running in a purely Windows Server 2003 environment, and you need to make sure
workstations are registered properly in DNS for Active Directory integration.
How should you configure DNS integration?
a. Configure the DHCP server to be sure to send dynamic updates.
b. Install the Windows Server 2003 DNS client on the workstations.
c. Configure the DNS server to accept dynamic updates
d. Configure the appropriate zones to accept dynamic updates

63. Which is NOT folder share permission?


a. Full control c. Change
b. Execute d. Read

64. You are attempting to troubleshoot and correct a network connectivity problem that was
reported by users between a server and several workstations. What communication
troubleshooting tool should you start with to determine where the problem lies?
a. ipconfig c. nslookup
b. ping d. telnet

65. You are in the process of configuring a counter log to create a baseline log for a new Windows
Server 2003 computer that you are placing on the production network. You have configured the
counter log to start and stop automatically each day. You now need to configure it so that the
resulting log files will be easily identified by the date and time that they were created. Which
log numbering style should you use to accomplish this?
e. yyyymmddhh g. mmddhhmm
f. yyyymm h. nnnnnn
d. Make sure all your domain client
66. You are running a purely Windows computers are running Windows 2000
Server 2003 network using Active or higher.
Directory and the Windows Server 2003
DHCP service. A user in another 67. (DHCP) You want to configure multiple
department has installed a DHCP standard scopes so that they can be
server on a Unix server. easily activated or deactivated. What
How do you prevent your client computers should you do?
from receiving DHCP addresses from that a. Create a multicast scope and add the
server? standard scopes to it.
a. Reconfigure BOOTP on the router. b. Configure server options instead of
b. Disable the unauthorized server in scope options.
Active Directory. c. Create a superscope and add the
c. Go to each client computer and standard scopes to it.
enter the address of the production d. Delete all the scopes except one.
DHCP server in the Internet Protocol
(TCP/IP) Properties dialog box.

40
Windows Server 2003 NetWork SubJect

68. You have just completed an analysis of a computer by using the Security Configuration and
Analysis snap-in. When you examine the results, you notice several items that have red X icons
next to them. What does this type of icon indicate?
a. The item is defined in the analysis database but not on the computer.
b. The item is defined in the analysis database and on the computer, and it matches the currently
configured setting.
c. The item is defined in the analysis database and on the computer, but it does not match the
currently configured setting.
d. The item is not defined in the analysis database and was not examined on the computer
69. You are responsible for maintaining the company's Windows Server 2003 DHCP server. The
company recently added a new router and routed a segment to the network. Now that segment
must be added to the DHCP server. The address of the router port is 10.10.25.1, and the router
is subnetted with a Class C subnet mask. You need to provide 40 addresses, starting at
10.10.25.20. What needs to occur for you to get DHCP working on that segment?
a. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20
through10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the
BOOTP forwarder for the new segment's router, using the address of the DHCP server. You need
to activate the scope.
b. You need to install and configure an additional DHCP server on that segment to provide DHCP
services.
c. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through
10.10.25.59. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP
forwarder for the new segment's router, using the address of the DHCP server. You need to
activate the scope.
d. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through
10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP
forwarder for the new segment's router, using the address of the DHCP server. You do not need to
activate the scope because that happens automatically when the scope is created.

70. To configure file access auditing for all files in the CorpDocs folder on the file server. In which
section of the Group Policy Editor will you find the auditing options?
a. Account Policies c. File System
b. Restricted Groups d. Local Policies

71. DNS servers can be configured to perform name resolution using several types of queries. With
which type of query does the server return results only from its records or from its cache?
a. Iterative query c. Recursive query
b. Forward query d. Reverse query
b. You could use Event Viewer.
72. You would like to be able to verify some c. You could type nslookup at a command
entries on one of your Windows Server prompt.
2003 DNS servers. How could you verify d. You could type ipconfig at a command
the entries in the DNS zone? prompt.
a. You could use the Properties dialog box
of the DNS server in the MMC.
73. (DNS) What is the next step a forwarder takes when it is unable to resolve a query?

40
Windows Server 2003 NetWork SubJect

a. The forwarder returns an error to the originating DNS server.


b. The forwarder performs a broadcast to determine the root name server to contact
c. The forwarder returns an error directly to the client.
d. The forwarder uses the root hints Cache.dns file to determine the root name server to contact.

74. Which resource record is used to resolve domain names specified in e-mail addresses to the IP
address of the mail server associated with the domain?
a. PTR c. CNAME
b. A d. MX

b. User names must be unique, but only on


75. Which of the following are NOT true a per-machine basis
regarding names assigned to users, c. Each computer must have a unique
groups, and computers in workgroups name.
under Windows Server 2003? d. User names must be unique throughout
a. Group names must be unique, but only the workgroup
on a per-machine basis.

76. Your task is to segment the Class B IP address 145.65.0.0 into 20 different subnets. You must
allow for the number of networks to increase. The maximum number of hosts per subnet will
never surpass 950 hosts. What subnet mask would enable you to segment the network and allow
for the required growth?
a. 255.255.240.0 c. 255.255.0.0
b. 255.255.252.0 d. 255.255.255.252

b. Install both servers in Active


Directory, and on the Profiles tab of
77. Your company has 75 users running each server's Properties dialog box,
Windows XP Professional that need to select the Store Profiles in Active
be able to access the company's network Directory option. Make sure both
remotely. You would like to be able to servers are in the same domain.
provide redundant remote access c. Install IAS and use it as the central
servers by using Windows Server 2003 repository for the profiles.
running RRAS to allow users to dial in d. Install both servers in Active
to the network, but you want to Directory, and on the Profiles tab of
maintain only one set of remote access each server's Properties dialog box,
profiles. How can you accomplish this? select the Store Profiles in Active
a. Install ISA Server and use it as the Directory option. Configure each server
central repository for the profiles. to point at the same domain in the
Profile Location field.

78. The network consists of 1,500 Windows Server 2003 servers spread over 150 OUs that have
approximately 10 servers each. You have just finished creating a customized security template

40
Windows Server 2003 NetWork SubJect

that specifies the Account Policies and Audit Policy settings that are required by your
organization's corporate policy for specific departments. What is the best way for you to apply
this template to only the Sales, Marketing, Production, and Engineering OUs?
a. Script the secedit.exe command to apply the security template to the required computers.
b. Import the security template into each required OU by using a GPO.
c. Import the security template at the domain level into a GPO.
d. Manually apply the security template to each of the computers.

79. You're writing a logon script that will be used to automatically link a remote file share as the
home directory for the current logon account. Which option would be best used to create a link
for the home file share?
a. Utilize the net start command to create the home file share link
b. Utilize the net share command to create the home file share link
c. Utilize the net use command to create the home file share link
d. Utilize the net send command to create the home file share link

80. Your network includes two Domain Controllers and three member servers that provide file,
print, andbackup/restoration services. You want to implement a more secure configuration on
all five Windows Server 2003 servers. You have decided to use the secure templates, but is not
sure what the current configuration is on each server. What is the best way for you to get these
servers configured with the secure templates?
a. You should apply the Default security template from one of her member servers to all five
servers and then apply the securews.inf and securedc.inf templates to them.
b. You should apply the Default security template found on each computer to that specific
computer. After doing this, you should apply the securedc.inf template to the DCs and the
securews.inf template to the member servers.
c. You should apply the Default security template found on each computer to that specific
computer. After doing this, you should apply the securews.inf template to the DCs and the
securedc.inf template to the member servers.
d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After
doing this, you should apply the securews.inf and securedc.inf templates to the servers.

81. In what role should a DNS server be configured if it should maintain a cache of resolve queries
but not have zone files?
a. Forwarding-only c. Primary
b. Secondary d. Stub

82. You are trying to determine what settings (in addition to an IP address with your DHCP
server) can be assigned to client computers running Windows XP Professional. What settings
can be assigned?
a. The IP address of the file server
b. The IP address of the Active Directory domain controller
c. The IP address of the DHCP server
d. The IP address of the DNS server

40
Windows Server 2003 NetWork SubJect

83. You've been tasked with using the Dsmod command-line utility for administration. Which of
the following object types you can NOT modify using Dsmod?
a. GPO c. User accounts
b. Groups d. Computer accounts

84. After installing and configuring DNS on b. The DHCP forwarder service is not
a Windows Server 2003 server, you set enabled on the routers.
up an Active Directory-integrated zone. c. The BOOTP forwarder service is not
Where does the server store the zone enabled on the DHCP server.
information? d. The BOOTP forwarder service is not
a. In the server's cache enabled on the routers.
b. In the %systemroot%\system32\DNS
directory 86. Replacing the hubs and routers on an
c. In the %systemroot%\DNS directory internetwork with switches creates a
d. In Active Directory network that has which of the
following?
85. The corporation is running a routed a. One collision domain and multiple
network with a centrally located broadcast domains
Windows Server 2003 DHCP server. b. One broadcast domain and multiple
The server is able to issue addresses to collision domains
users on the local segment but cannot c. One broadcast domain and one collision
issue addresses to any of the sites that domain
are across a router. What is the most d. Several collision domains and several
probable cause of this problem? broadcast domains
a. The DHCP forwarder service is not
enabled on the DHCP server.

87. The company has 200 end users running Windows XP Professional that need to be able to
access the
company's network remotely. Several months ago you installed a Windows Server 2003 server
running RRAS to allow users to dial in to the server for remote access. This server is in the
corporate Active Directory tree, and after you configured it, the profiles worked perfectly. Last
weekend you added another Windows Server 2003 server with RRAS loaded to provide a failover
access device in the event of a server crash. Both servers are in the same native-mode Active
Directory domain, and test users are unable to log in to the new RAS server.
What is the most likely problem?
a. The Windows Server 2003 RRAS service needs to be authorized in Active Directory.
b. You need to add the new Windows Server 2003 server to the Global Remote Access Servers
group in Active Directory.
c. You can have only a single Windows Server 2003 server running RRAS in an Active Directory
domain.
d. The remote access profiles are not shared and need to be re-created on the new Windows
Server 2003 server before anyone can access the server.

88. The network consists of 3 Windows Server 2003 servers and 50 workstations running Windows
XP Professional. In order to improve Internet DNS resolution, you have installed DNS on one of

40
Windows Server 2003 NetWork SubJect

the Windows Server 2003 servers and configured it as a caching-only DNS server. Where does
the new DNS server store its zone files?
a. The zone files are stored in Active Directory.
b. The zone files are stored in the server's %systemroot%\system32\etc\DNS directory.
c. Caching-only servers do not have any zone information.
d. The zone files are stored in the server's RAM.

89. You must decide the security settings that will be applied to the MyGuestLogon account (for
guest only). Which of the following settings is most appropriate to the solution presented?
a. User cannot change password c. User must change password at next logon
b. Account is disabled d. Password never expires

90. Which of the following statements about a network’s infrastructure is true?


a. A network infrastructure includes both hardware and software products.
b. A network infrastructure is a design that does not include specific hardware
or software products.
c. A network infrastructure includes software products only.
d. A network infrastructure includes hardware products only.

91. You have not modified the default settings for DNS on the DHCP client or server. Which of the
following client record or records will be updated in DNS by the DHCP server? (Assume that
the clients are running Windows XP.)
a. Neither the PTR nor the A resource record c. Both the PTR and A resource records
b. The PTR resource record d. The A resource record

92. Which of the following statements are NOT true regarding Remote Desktop connections to a
Terminal Services host server running Microsoft Windows Server 2003?
a. Application processing occurs on the host system
b. Application processing occurs on the client system
c. Input is directed to the host system
d. Keyboard and mouse input are directed from the client system to the host.

93. The company has a T-1 connection to a local ISP, which is shared by all clients. Clients access
the Internet using NAT. Several users have reported that they can't access the Internet. You
start diagnosing the problem and find that all users reporting the problem are on the same
subnet. Users on other subnets are not experiencing any problems accessing the Internet.
Which of the following could be the cause of the problem?
a. The NAT router is malfunctioning
b. The users' DNS Server is down
c. The users' DHCP server is down.
d. The users' default gateway for the subnet is malfunctioning

94. Your company has 14 locations and is using OSPF as part of its WAN implementation. You are
training a new WAN engineer to support the WAN. She asks you for the correct name of the
area with an ID of 0.0.0.0. What do you call this area?

40
Windows Server 2003 NetWork SubJect

a. The AS c. The LSDB


b. The default route d. The OSPF backbone
b. Because the DHCP client must inform
95. Why must a DHCP client use broadcast all the other clients on the network of
transmissions to request an IP address its intention to request an IP address
from a DHCP server? c. Because the DHCP server can service
a. Because the DHCP client does not yet requests only from computers on the
have an IP address same LAN
d. Because the DHCP server can only
receive broadcasts

96. You are attempting to perform an analysis of a computer by using the Security Configuration
and Analysis snap-in. You know you need to complete the following steps:
1. Select the security template to be used in the analysis.
2. Right-click Security Configuration and Analysis and select Analyze Computer Now.
3. Select the log file to be used in the analysis.
4. Right-click Security Configuration and Analysis and select Open Database.
5. Right-click Security Configuration and Analysis and select Configure Computer Now.
6. Select the database to be used in the analysis.
What is the order in which you should perform these steps?
a. 4, 1, 6, 2, 5, 3 c. 2, 6, 1, 3, 4, 5
b. 2, 1, 3, 4, 6, 5 d. 4, 6, 1, 3, 2, 5

97. You want to enable the user account for Will Carver.You decide to use the dsmod.exe tool.
Which of the following commands will enable the Will Carver account?
a. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled no
b. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled yes
c. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled no
d. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled yes

98. One of your Windows Server 2003 printer servers has been responding oddly lately. The Print
Spooler service often seems to get stuck, requiring you to restart either the service or the server.
Performing the server restart is a time-consuming task because the server is located across
town in another building that your company owns. What's the most efficient way to have this
troublesome server restart after the second failure of the Print Spooler service?
a. Configure the service to restart itself after its second failure.
b. Write a batch script that monitors this service and have it force a server restart after the service
has failed twice.
c. Configure the service to restart the server after its second failure.
d. Write a batch script that monitors the service and emails you after the service has failed the
first time so that you can travel to the server and prepare to restart it.
e.
99. You are trying to explain each part of an FQDN. What is the host portion of
sarah.training.urwrite.net?

40
Windows Server 2003 NetWork SubJect

a. net c. training
b. sarah d. urwrite
subnet to which the computers have
100. You are trying to explain how two been moved. You should reconfigure
computers on the same subnet the computers with the correct static IP
communicate with each other. Which of addresses.
the following statements should you use b. The port to which the computers are
to explain the process that two computers connecting on the switch may be
use to communicate with each other on failing. You should replace the switches
the same IP subnet? where computers cannot connect to
a. The packets will be sent to the MAC network resources.
address of the destination computer. c. There are not enough client access
b. The packets will be sent to the IP licenses (CALs) for the Windows
address of the destination computer. Server 2003 computers. You should
c. The packets will be sent to the IP purchase the required number of CALs.
address of the default gateway for d. The statically configured IP
routing to the destination computer's addresses are no longer valid on the
MAC address. subnet to which the computers have
d. The packets will be sent to the MAC been moved. You should reconfigure
address of the default gateway for the computers so that they are DHCP
routing to the destination computer's IP clients.
address.

101. Your network consists of 15 102. You are trying to troubleshoot


Windows Server 2003 computers, 5 of one of your DNS servers. It seems that
which are domain controllers. The your computers running Windows XP
remaining 10 servers are file and print Professional have not registered
servers for your 750 Windows XP dynamically with your DNS server. You
Professional workstation clients. The would like to force these computers to
previous administrator had carefully register with DNS. What should you do?
assigned every computer a static IP a. At the command prompt, type
address, equally split up among five ipconfig /renew.
Class C subnets. Now some users have b. At the command prompt, type
started moving their computers from ipconfig /registerdns.
one location in the building to another; c. Get the user to reboot the system.
this trend will be the norm for your d. At the command prompt, type
company. After moving, the users ipconfig /release.
complain to you that they can no longer 103. You decide that you want to
access network resources. What is the enforce account lockout to occur after
most likely cause of this problem, and three unsuccessful logon attempts
what should you do about it? The senior across the company. How would you
systems administrator has DHCP servers achieve this?
available for you to use, should you a. Set the Block Policy Inheritance on
decide to use them? the group policy.
a. The statically configured IP
addresses are no longer valid on the

40
Windows Server 2003 NetWork SubJect

b. Set group policy in a domain GPO 104. What is one of the major
to lock out accounts after three disadvantages of distance-vector
unsuccessful logon attempts routing?
c. Remove the local policies from a. It involves high overhead on the
each PC. network.
d. Set the local policy on each PC to b. It suffers from the count-to-infinity
lock out accounts after three attempts, problem.
and set No Override on the local c. It has problems with slow convergence.
policy. d. A network that uses it can connect to a
maximum of only 15 hops.

105. The company network consists of 3 Windows Server 2003 servers and 100 Windows XP
Professional workstations. The Sales Department spends a lot of time doing Web research at a
variety of supplier, customer, and competitor Web sites. You have been asked to provide a
solution to speed up name resolution for these users. You configure a cache-only server.
Which of the following will have the largest impact on the response time for DNS requests?
a. The processor speed d. The speed of the network adapter
b. The amount of RAM installed card
c. The speed and type of the hard
drive

106. When a client can successfully ping a DNS server, but fails to receive any response to a
name resolution query from that server, which of the following might be the cause of the
problem?
a. The server’s cache is polluted
b. The server has an incorrect IP address
c. The DNS Server service is not started
d. The server is not the authority for the
requested name

107. Which of the following command-line tools can you use to delete a user from Active
Directory?
e. dsrm g. dsquery
f. dsadd h. dsmove

108. You are designing a new network and plan to use Class C IP addresses. You want to be
able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.
Which of the following subnet masks should you use for the network?
a. 255.255.255.192 c. 255.255.255.128
b. 255.255.255.240 d. 255.255.255.224
109. What is the proper way to create
and then apply a custom security
template to a computer?

40
Windows Server 2003 NetWork SubJect

a. Create a database in the SECEDIT c. Use the Security Templates snap-in


utility, modify the security settings as to create a custom template, configure
necessary in Security the security settings as necessary, and
Configuration And Analysis, and then then apply the settings using Security
apply the template to the computer Configuration And Analysis.
using the Security Templates snap-in. d. Create a database in Security
b. Create a database in Security Configuration And Analysis, modify
Configuration And Analysis, modify the security settings as necessary, and
the security settings as necessary, and then apply the settings using the
then apply the database to the SECEDIT utility.
computer.

110. Which of the following is the FQDN for the host home in the sales domain for the UR
write company if the company's domain is urwrite.net?
a. home.sales.net c. home
b. home.urwrite.net d. home.sales.urwrite.net

111. A customer has asked you to install the DHCP service on her Windows Server 2003
computer, get one scope configured, and issue addresses. What minimum steps do you need to
take in order to accomplish this?
a. Install the DHCP service from the Windows Components Wizard. After the service is installed,
authorize it in Active Directory. Next, create the scope. Finally, configure the DNS integration.
b. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope. Create a superscope and add the scope to it. Authorize the server in Active
Directory.
c. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope. Authorize the server in Active Directory.
d. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope and then configure the DNS integration.

112. You're creating a saved query within the Active Directory Users and Computers MMC
snap-in. Which of the following query types are NOT directly available for query selection by
default?
a. Users, contacts, and groups c. Exchange recipients
b. Printers d. Computers

113. What is the correct subnet mask to use on a Class B network with a 10-bit subnet
identifier?
a. 255.255.255.192 c. 255.192.0.0
b. 255.255.192.0 d. 255.192.255.255

114. Which of the following is used to uninstall Active Directory and demote a domain
controller?
a. Gpotool b. Gpresult

40
Windows Server 2003 NetWork SubJect

c. Dcpromo d. Ntdsutil

115. You have just set up a Windows Server 2003 Active Directory network, and you want to
use group policies to control user configuration. You have configured local policies on some of
the machines in your domain, and you also want to configure some site and OU policies for
more granular control, but you are concerned about policies at different levels “canceling each
other out.”
Which of the following types of GPOs will override settings applied at the domain level?
a. Site c. Domain
b. OU d. Local

116. You configure and install RRAS on one of your Windows Server 2003 servers. Your
Windows Server 2003 network is running at the Windows Server 2003 domain functional level.
Because this is the first time you have configured RRAS, you first modify the default policy.
Then, as part of your testing, you configure 12 additional remote access policies. After this, the
users complain that they cannot successfully access any information on the network.
What is the most likely source of the problem?
a. You need to enable IPSec to ensure that the connections are encrypted.
b. You did not modify the default dial-in policy.
c. You have some conflicting policies, and the first one that the users apply refuses them access to
the information on the network.
d. You did not enable MS-CHAP.

117. The network consists of 16 training rooms with 30 PCs each, running a mix of Windows
2000 Professional and Windows XP Professional, as well as 16 Windows Server 2003 servers,
which provide all network services. You are working on a remote access problem, and you want
to check the network to see if the policies have been deleted. Where should you look for these
policies?
a. Remote access policies are stored in the computer properties in Active Directory.
b. Remote access policies are stored in the user properties in Active Directory.
c. Remote access policies are stored individually on every RRAS server.
d. Remote access policies are stored on the global catalog server in Active Directory.

118. You have created several GPOs that are linked at various levels within your Active
Directory structure. You are preparing to run the Resultant Set of Policies (RSoP) tool to
examine the net result of the various GPOs that have been applied on the Accounting OU. In
what order are Group Policy Objects applied in Active Directory?
a. Domain, OU, local, site c. Local, site, domain, OU
b. OU, local, site, domain d. Site, domain, OU, local

119. You need to create a new GPO to tree. What is the next step in the process
enable settings for a particular OU. You of creating a GPO for this OU?
open Active Directory Users and a. From the Actions menu, select Create
Computers and select the OU in the New GPO.

40
Windows Server 2003 NetWork SubJect

b. From the Actions menu, select Group d. Right-click on the OU and select Create
Policy Object Editor. New GPO.
c. Right-click on the OU and select
Properties.
120. You have a 50-host network and 122. How the client computer requests
are running a Windows Server 2003 and receives an address from the DHCP
DHCP server to assign IP addresses. server?
You also have five IP-based printers a. The client computer broadcasts a
with static IP addresses. Your assistant DHCPDISCOVER message. The
administrator has been working on the DHCP server offers an IP address. The
DHCP server and has made some client computer accepts the address and
changes. Now, your users cannot print sends a request to use that address back
to one of the printers. What is most to the DHCP server. The client
likely the problem? computer uses the address to
a. The scope from which the printers communicate on the network.
were receiving their IP addresses has b. The client computer broadcasts a
been deleted. DHCPDISCOVER message. The
b. The existing scope has been DHCP server offers an IP address. The
modified so that it overlaps the client computer accepts the address and
addresses reserved for the printers. sends a request to use that address back
c. The DHCP service was to the DHCP server. The DHCP server
inadvertently stopped. acknowledges the request and grants
d. The existing scope has been the client computer a lease to use the
modified so that it overlaps the address. The client computer responds
addresses reserved for the printers, and with an acknowledgement of the lease
a workstation has been assigned the and uses the address to connect to the
same address as one of the printers. network.
c. The client computer broadcasts a
121. An application using NetBIOS DHCPDISCOVER message. The
needs a NetBIOS name resolved. To DHCP server offers an IP address. The
resolve the NetBIOS name, local cache client computer accepts the address and
is checked first. The needed resolution is sends a request to use that address back
not already cached, so the LMHOSTS to the DHCP server. The DHCP server
file is checked next. The desired entry is acknowledges the request and grants
not in the LMHOSTS file. Based on the client computer a lease to use the
this, what is the next step taken in address. The client computer uses the
resolving the NetBIOS name? address to connect to the network.
a. The DNS server issues a recursive d. The client computer broadcasts a
query DHCPDISCOVER message. The
b. The DNS server is queried using an NS DHCP server offers an IP address. The
type record client computer accepts the address and
c. NetBIOS over TCP resolves the name uses it to communicate on the network.
to an IP address
d. The WINS server is queried

40
Windows Server 2003 NetWork SubJect

123. You install and create a primary DNS for a subnet. You are concerned about DNS fault
tolerance for the Primary DNS zone. What can you do to provide load balancing and fault
tolerance for the primary DNS server?
a. Install an AD-integrated DNS server c. Install a secondary DNS server
b. Install a second NIC card d. Install DHCP

124. You need to manage several servers remotely. What is the best tool for you to use?
a. The runas command c. AD Users and Computers
b. The Remote Desktop connection utility d. MMC snap-in tools

125. Which of the following servers does not require a computer with a registered IP address?
a. Internet Web servers c. Internet e-mail servers
b. DNS servers used for Internet name resolution d. DNS servers used for Internet domain hosting

126. Your network consists of 20 Windows NT 4.0 servers and 30 Windows Server 2003
servers. Some of the NT 4.0 servers are configured as routers. You have just started to
configure some of the Windows Server 2003 servers as routers, but you are having some
problems. The new routers cannot communicate with the old routers. You confirm that all the
routers are configured to use RIP. What could be the problem?
a. You need to install and configure OSPF.
b. RIP does not propagate more than 15 hops.
c. You have to change the RIPv2 incoming packet protocol to use only RIPv1.
d. You have to change the RIPv2 outgoing packet protocol to use broadcast instead of multicast.

127. What would be the decimal value of 11001100.10101110.00011101.11101010?


a. 198.174.29.234 c. 204.174.29.240
b. 204.174.29.234 d. 204.176.29.234
128. A Windows Server 2003 has startup problems. A message displays stating that at least
one service has failed during startup. How do you determine which service failed?
a. You need to use Event Viewer to investigate system events.
b. You need to use Device Manager.
c. You need to use Event Viewer to investigate application events.
d. You need to use the System Information utility.

129. The network consists of 75 locations interconnected with Windows Server 2003 servers
running RRAS. Business has been very good, and you have recently added a number of
segments to the network in several of the offices. You have noticed lately that you are receiving
an increased number of "host unreachable" error messages. You believe that your routing
tables are inaccurate. What should you enable in the Windows Server 2003 Routing and
Remote Access console to prevent routing loops and count-to-infinity problems?
a. Poison reverse c. Split horizon
b. Topological database d. Distance-vector routing

130. You currently have a supernetted network and would like to simplify the management of
DHCP. What component should you configure in DHCP?

40
Windows Server 2003 NetWork SubJect

a. BOOTP scope c. Superscope


b. Scope d. Multicast scope
b. Configure a caching-only server and have
131. You are responsible for maintaining all the DNS client computers resolve from
the Windows Server 2003 network for the that server.
company, including the Windows Server c. Create a delegated zone for the remote
2003 DNS servers. You have one remote office and have all the DNS client
office that is located across a slow WAN computers in that office resolve from that
link. What is the best way to set up DNS to zone.
resolve internal hostnames? d. Use a centralized DNS server and
a. Configure the DNS client computers to configure it for incremental updates.
autodiscover the closest DNS server.

132. While troubleshooting a Windows XP Professional computer, you discover that it has an
IP address of 169.254.176.132, a subnet mask of 255.255.0.0, and no configured default gateway.
What is the most likely reason this computer has gotten these IP settings?
a. The TCP/IP stack on the computer is corrupt.
b. The DHCP server scope has become corrupt.
c. The user of the computer has configured new settings without fully understanding how routed IP
networks function.
d. The computer has been unable to contact a DHCP server.

133. You are responsible for 75 Windows XP Professional workstations and 5 Windows
Server 2003 member server computers. You have been directed to perform a security analysis
on each computer, comparing its settings to those contained in the hisecws.inf template. How
can you accomplish the assigned task with the least amount of administrative effort and the
smallest number of trips to remote computers?
a. You can create a script that runs Security Configuration and Analysis on each computer and collect
the results in a central location for later viewing.
b. You can analyze remote computers from the Security Configuration and Analysis snap-in by
targeting it at the desired computer.
c. You can create a script that runs the secedit /analyze command on each computer and collect the
results in a central location for later viewing.
d. The only way to perform this analysis is to physically visit each computer and use the Security
You are installing Configuration and Analysis snap-in.

134. In what situation would you design your network as a workgroup instead of a domain?
a. When you have several hundred clients spread out over multiple geographic regions.
b. When the network has multiple servers.
c. When you need to use Active Directory.
d. When the network is small and has no servers.

40
Windows Server 2003 NetWork SubJect

135. You have two office locations, each with its own Windows Server 2003 server. The two
locations have been networked with a T-1 connection that runs between the Windows Server
2003 servers, which are running RRAS. You just added a new network in the main location,
and you need to add a static route on the far end to provide connectivity to the location; you are
not using any dynamic routing protocols. The network address, which you are using as a Class
C address, is 10.10.10.0. The correct gateway address is 10.10.10.254. What command do you
need to use to add a static route?
a. route /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
b. route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
c. netstat add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
d. ipconfig /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2

136. Identify the underlying network ID for this IP address: 199.214.36.132/25.


a. 199.214.36.128/25 c. 199.214.36.0/24
b. 199.214.36.0/25 d. 199.214.36.128/24

137. You're in the process of evaluating which users should be members of the Power Users
group, but first want to make sure that they require the rights that accompany that group
assignment. Which of the following rights are NOT granted to the local Power Users group by
default?
a. Reset local account passwords c. Take ownership of local files
b. Create local file shares d. Log on locally

138. A user with the username of JaneD works in the Sales department. Her account is located
in the syngress.com domain. Based on this information, what canonical name would be used to
identify this object in Active Directory?
a. /syngress.com/Sales/JaneD
b. OU=Sales
c. /CN=JaneD /OU=Sales /DC=syngress /DC=com
d. CN=JaneD

139. Your computer is configured to use DHCP. When you log on, you notices you can't
connect to the network. The computer has no IP address according to ipconfig. Which of the
following is most likely true?
a. No DHCP server is on the network
b. The computer is using dynamic IP addressing
c. The network cable to the computer is disconnected
d. The computer is using Automatic Private IP Addressing.

140. You are configuring a new Windows Server 2003 server to be a file server for your home
office intranet that will be used only by local users. Which of the following will NOT need to
have to suitably configure the IP address with a statically assigned address?
a. A valid subnet mask c. A valid IP address for the server
b. A valid WINS server IP address d. A valid default gateway

40
Windows Server 2003 NetWork SubJect

141. You are designing a network for a large branch office and have been assigned the
network address 10.10.0.0/18.
What are the maximum number of subnets and the maximum number of hosts on each subnet?
a. 512 subnets; 32,766 hosts c. 1024 subnets; 16,382 hosts
b. 256 subnets; 65,534 hosts d. 128 subnets; 131,070 hosts

142. Although you can use the Configure Your Server Wizard to configure a server as domain
controller, which program or utility do you use to promote or demote a domain controller?
a. Active Directory Users And Computers c. NETSH DIAG
b. NTDSUTIL.EXE d. DCPROMO.EXE

b. A pool of IP addresses is required.


143. Which of the following are NOT c. Public IP addresses are assigned by your
true regarding IP addresses used with ISP.
NAT? d. IP address reservations can be defined.
a. NAT uses public IP addresses when client
computers need to access the Internet.
question and then select Action, Reconcile
144. You maintain a Windows Server All Scopes.
2003 DHCP server to dynamically assign b. Open the DHCP console. Select the DHCP
addresses. You have three superscopes set server that contains the scope in question
up, and within each superscope are four and then select Action, Reconcile All
scopes. One day, you start experiencing Scopes.
problems with one of the scopes issuing c. Open the DHCP console. Select the DHCP
bad addresses. You check the server and server that contains the scope in question
suspect that there is a database problem. and then select Action, Reconcile DHCP
How can you verify that the database is Database.
intact? d. Open the DHCP console. Select the scope
a. Open the DHCP console. Select the in question and select Action, Reconcile
superscope that contains the scope in Scope.

145. Your network includes two Domain Controllers and three member servers that provide
file, print, and backup/restoration services. You want to implement a more secure configuration
on all five Windows Server 2003 servers. You have decided to use the secure templates, but is
not sure what the current configuration is on each server.
What is the best way for you to get these servers configured with the secure templates?
a. You should apply the Default security template from one of her member servers to all five servers
and then apply the securews.inf and securedc.inf templates to them.

40
Windows Server 2003 NetWork SubJect

b. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securedc.inf template to the DCs and the securews.inf
template to the member servers.
c. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securews.inf template to the DCs and the securedc.inf
template to the member servers.
d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After
doing this, you should apply the securews.inf and securedc.inf templates to the servers.

146. You manage the Windows Server 2003 DHCP servers for a Corporation. You are
running in a purely Windows Server 2003 environment with all Windows XP Professional
clients, and you need to make sure that workstations are registered properly in DNS for Active
Directory integration. How should you configure DNS integration?
a. Set DNS integration to enable updates for DNS clients that do not support dynamic updates.
b. Set DNS integration to enable DNS keepalives.
c. Set DNS integration to automatically update DHCP client information in DNS
d. Set DNS integration to discard A and PTR records when a lease is deleted.

147. Which of the following performance counters you could NOT use to determine a possible problem
with memory or a memory leak?
a. Processor\%Processor Time c. Memory\Available Kbytes
b. Memory\Nonpaged Kbytes d. Process(process_name)\Pool Paged Bytes

148. You are installing a new domain controller. You want the domain controller to be in a
separate domain that is not part of an existing forest. What type of domain should you install?
a. A parent domain
b. A forest root domain
c. A domain in a new domain tree in the existing forest
d. A child domain

149. You 3.0 mbsigning a new network and plan to use Class C IP addresses. You want to be
able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.
Which of the following subnet masks should you use for the network?
a. 255.255.255.192 c. 255.255.255.224
b. 255.255.255.128 d. 255.255.255.240
150. Your network consists of a central site with 60 local users, 120 remote sales
representatives who travel 90 percent of the time, and 16 Windows Server 2003 servers
providing core network services, including remote access using RRAS. Your sales
representatives need the ability to dial in to access resources on the network while traveling.
The problem you are having is that the sales organization is split into eight geographic regions
covering eight time zones, and the sales representatives from each region are only allowed to
make remote connections during specific hours. Each region has a Windows security group that
contains all of the sales representatives in that region.
What do you need to do to ensure that the sales representatives can connect the remote access server,
but only during the allowed times for their regions?

40
Windows Server 2003 NetWork SubJect

a. Create local security policies with the Group Policy Editor.


b. Configure multiple RRAS servers with different local policies and get the different groups to dial
in to their respective servers.
c. Give all remote users the same policy.
d. Create different remote access policies for the different users.

151. You received a call from a user who said that he could not access any network resources. Upon
investigation, you have determined that the workstation has an IP address of 169.254.170.145.
What is the most likely reason for the user's inability to connect to any network resources?
a. The TCP/IP stack on the computer is corrupt and needs to be reset.
b. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.
c. The computer is not a member of the domain and is being refused an IP address.
d. The network cable has been damaged and is no longer passing a signal.

152. You have installed a new file server on the network and formatted it to use NTFS. After
formatting is complete, you use EFS to encrypt a folder containing files belonging to users. If a user
accesses a file belonging to him in this folder, and then copies it across the network for another user to
access,
which of the following will occur?
a. The file on the hard disk will remain encrypted, but data sent over the network will be unencrypted.
b. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network.
c. The file on the hard disk and the data sent over the network will remain encrypted.
d. The file on the hard disk and the data sent over the network will be decrypted and remain that way.

153. YoDL: 0.0 kb UL: 0.0 kbhoot a user's account. Which of the following statements are true
regarding user account membership?
a. A user account can be a member of multiple organizational units at the same time.
b. A user account can be a member of only a single organizational unit.
c. A user account can be a member of only a single domain.
d. A user account can be a member of only a single group

154. You're responsible for review of shared resources on several servers within a corporate domain.
To accomplish this task, you've decided to use an automated script that will run several times per day to
determine what shared resources are being used. Which of the following options would be most useful in
meeting this requirement?
a. Utilize the net session command to review the shared resources
b. Utilize the net file command to review the shared resources
c. Utilize the net accounts command to review the shared resources
d. Utilize the net config command to review the shared resources

155. A Windows XP Professional client computer will receive a DHCPACK broadcast message from
the DHCP server after which of the following events?
a. When the client computer sends a request to use a lease it was offered
b. When a DHCP server offers it a lease
c. When the client computer first requests an IP address
d. Successfully receiving or renewing an IP address from the DHCP server

156. You have just installed DNS on the network, and configured a primary server and a secondary
server.
What must you do to specify the authoritative name servers for the zone?

40
Windows Server 2003 NetWork SubJect

a. Create the NS records for the primary and secondary name server.
b. Create the NS record for the secondary name server.
c. Create the NS record for the primary name server.
d. Nothing, all necessary NS records are created automatically.

157. You maintain a Windows Server 2003 DHCP server to dynamically assign addresses. You have
threesuperscopes set up, and within each superscope are four scopes. One day, you start experiencing
problems with one of the scopes issuing bad addresses. You check the server and suspect that there is a
database problem. How can you verify that the database is intact?
a. Open the DHCP console. Select the superscope that contains the scope in question and then select Action,
Reconcile All Scopes.
b. Open the DHCP console. Select the DHCP server that contains the scope in question and then select
Action, Reconcile DHCP Database.
c. Open the DHCP console. Select the scope in question and select Action, Reconcile Scope.
d. Open the DHCP console. Select the DHCP server that contains the scope in question and then select
Action, Reconcile All Scopes.
158. Your Windows XP computer has several shared folders. You are conducting a security audit and
wish to view the permissions on each of the shared folders. How can you quickly view all shared folders
on your computer? What should you do?
a. Use Windows Explorer to search for shared folders.
b. Use disk management to view the shared folders on each drive.
c. Use System information in Computer Management to view shared folders.
d. Use Shared Folders in Computer Management to view shared folders.

159. The network con 3.0 mbf 1,500 Windows Server 2003 servers spread over 150 OUs that have
approximately 10 servers each. You have just finished creating a customized security template that
specifies the Account Policies and Audit Policy settings that are required by your organization's
corporate policy for specific departments. What is the best way for you to apply this template to only the
Sales, Marketing, Production, and Engineering OUs?
a. Import the security template into each required OU by using a GPO.
b. Manually apply the security template to each of the computers.
c. Script the secedit.exe command to apply the security template to the required computers.
d. Import the security template at the domain level into a GPO.

160. Your network contains 240 computers running Windows 2000 Professional and 225 computers
running Windows XP Professional and uses Class C IP addresses. All the computers are located on the
same network segment. You has been asked to automate the process of assigning IP addresses. What do
you need to do?
a. You need to install DHCP and configure a scope
b. You need to install DHCP and configure a superscope
c. You need to install DHCP and configure DNS integration
d. You need to install DHCP and configure BOOTP

161. You have been hired as a network consultant to install DNS in the new corporate headquarters of
Zanzibar Sports. The network currently consists of 3,000 computers running Windows XP Professional
and 4,000 computers running Windows 2000 Professional. The servers providing DNS for the network
are presently located in the largest branch location, but you want to move them into the new corporate
data center. You also want to ensure that all remote offices and manufacturing sites can perform DNS
resolution queries without adding additional traffic on your WAN links. What should you do to ensure
that the remote offices and manufacturing sites do not add additional traffic to your WAN links?
a. Configure the DNS servers at the corporate data center with standard secondary zones.

40
Windows Server 2003 NetWork SubJect

b. Create a stub zone at the corporate data center.


c. Configure the DNS servers at the corporate data center as Active Directory integrated.
d. Configure standard secondary zone DNS servers at all remote offices and manufacturing sites.

162. You are trying to explain DNS and reverse lookup zones to your co-workers. What should you tell
your co-workers that reverse lookup zone allows users to resolve?
a. A hostname to an FQDN c. A hostname to an IP address
b. An IP address to a hostname d. An IP address to a MAC address
d. The file on the hard disk and the data sent
163. You have installed a new file server on over the network will remain encrypted.
the network and formatted it to use NTFS.
After formatting is complete, you use EFS to
encrypt a folder containing files belonging to 164. You just installed and configured a
users. If a user accesses a file belonging to him DHCP server. After the installation, the wizard
in this folder, and then copies it across the asked you to activate the scope, and you did. Staff
network for another user to access, from your company are complaining, however, that
which of the following will occur? they are not obtaining IP addresses. What could be
a. The file on the hard disk will remain the problem?
encrypted, but data sent over the network will a. You did not authorize the server.
be unencrypted. b. You did not activate the server.
b. The file on the hard disk and the data sent c. You were not authorized to activate the scope;
over the network will be decrypted and remain only administrators can activate the scope.
that way. d. Your scope is misconfigured.
c. The file on the hard disk will be
decrypted, so EFS can send it encrypted over
the network.

165. You are experiencing a delay when you connect to a remote Web site. Which tool allows you to
determine whether particular routers are responsible for the delay?
a. Tracert c. PathPing
b. Network Diagnostics d. Netdiag

166. Your corporate network uses variable length subnetting to make more efficient use of IP
addresses. One of the IP addresses for a host is 131.39.161.17 with a subnet mask of 255.255.248.0.What
is the proper notation for the network to which this host is connected?
a. 131.39.161.17/21 c. 131.36.161.0/20
b. 131.36.160.0/20 d. 131.39.160.0/21
On each computer, at the command
167. You have been assigned the task of prompt, type ipconfig /renewdns.
identifying and correcting a problem with one On each computer, at the command
of the Windows Server 2003DNS servers. prompt, type ipconfig /renew.
Computers running Windows 2000 On each computer, at the command
Professional have not registered dynamically prompt, type ipconfig /registerdns.
with the DNS server. You would like to force Reboot the system so that the computer is
these computers to register with DNS as issued a new DHCP address.
quickly as possible. What should you do?

40
Windows Server 2003 NetWork SubJect

168. You need to create several new file shares on your server. Which of the following options can
NOT be used for this purpose in a default installation of Windows Server 2003?
a. Utilize the net share command-line utility
b. Create the file shares within the Windows Explorer
c. Create the file shares within the Internet Explorer
d. Utilize the Computer Management MMC snap-in

169. Which of the following best describes the function of a subnet mask?
A subnet mask enables an IP address to be visible from the Internet.
A subnet mask specifies the sizes of the network and host identifiers in an IP address.
A subnet mask indicates whether an IP address is registered or unregistered.
A subnet mask is a value assigned by the IANA to uniquely identify a specific
network on the Internet.

40

Das könnte Ihnen auch gefallen