Beruflich Dokumente
Kultur Dokumente
1. You have created several GPOs that are linked at various levels within your Active Directory structure…… in
Active Directory?
Answer: Local, site, domain, OU.
2. Which of the following command-line utilities can be used to automate renaming Active Directory objects?
Answer: Dsmove
3. What type of organizational structure is the domain name system?
Answer: Hierarchical
4. Which is the only layer of the TCP/IP reference model that does not contain any TCP/IP protocols?
Answer: The network interface layer.
5. Which of the following event items is not one of the five default Event viewer event types?
Answer: Caution
6. How can you perform a bulk import of users into Active Directory to create many user accounts at one time?
Answer: Use the csvde.exe command
7. What would be the FQDN of a workstation named WKS042 located in the…. Domain?
Answer: wks042.sales.west.bigcorp.net
8. You have two office locations, each with its own Windows Server 2003 server. The Two locations have been
networked with a T-1 connection …. Static route?
Answer: route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
9. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which
of the following is an appropriate next step?
Answer: Run the ipconfig/release command and then the ipconfig/renew command on every client computer
10.Your corporate network uses variable…. Is 131.39.161.17 with subnet mask of 255.255.248.0 ….?
Answer: 131.39.160.0/21
11.You use a Windows XP professional computer on your company’s network….navigate to?
Answer: Start, All Programs, Accessories, Communications, Remote Desktop Connection.
4. Which command-line tool can you use to clear the DNS resolver cache on a DNS client?
a. ipconfig
b. tracert
c. netsh
d. pathping
12. Which of the following is used to install Active Directory and establish a server as a domain
controller?
a. Dcpromo
b. Ntdsutil
c. Gpotool
d. Gpresult
5. You are configuring security for several new workstations running Windows XP Professional.
The computers are members of the Temp OU, and you noticed that users are able to reuse old
passwords whenever they are prompted to change them. Which of the following account
policies can be used to prevent this behavior?
a. Minimum Password Age
b. Maximum Password Age
c. Enforce Password History
d. Store Passwords Using Reversible Encryption
6. Which tool can you use to determine which ports a server has open?
a. NETSH
b. Security Configuration And Analysis
c. NETSTAT
d. Security Monitor
7. You need to determine whether the NIC drivers are digitally signed. Where do you find this
information?
a. System Information
b. Event Viewer
c. Device Manager
d. Driver signing options in the System applet
8. You are experiencing a delay when you connect to a remote Web site.
Which tool allows you to determine whether particular routers are responsible for the delay?
a. Tracert
b. Network Diagnostics
c. PathPing
d. Netdiag
9. You are reviewing DNS parameters, how long a node in an FQDN can be?
a. 63 characters
b. 512 characters
c. 255 characters
d. 43 characters
15. You are troubleshooting a network adapter that does not appear to have an IP address assigned to it.
What command could you issue to cause this network adapter to acquire a DHCP lease?
a. ipconfig /acquire
b. ipconfig /renew
c. ipconfig /refresh
d. ipconfig /lease
16. When a TCP/IP computer can communicate with the local network but not with computers on
other networks, which of the following configuration parameters is probably incorrect?
a. Preferred DNS server
b. IP address
c. Subnet mask
d. Default gateway
15. Which of the following command-line utilities should you use to extract user property data
from the Active Directory?
a. Dsget
b. Dsadd
c. Dsmod
d. Dsquery
17. Which of the following messages is not exchanged as part of a DHCP lease initialization?
a. ACK
b. Renew
c. Discover
d. Request
18. (Windows Server 2003) What permissions are granted to the Everyone group over the share
created by the following code? net share MyShare=C:\MyFiles\MyShare
a. Full Control
b. Read
c. None
d. Change
19. You are getting some error messages from the DHCP server. What counter in the Performance
Console would display the number of DHCPOFFER messages sent per second by the DHCP
server to a client computer?
a. Discovers/Sec
b. Acks/Sec
c. DHCPAcks/Sec
d. Offers/Sec
21. You are configuring the dial-up connection for the portable computer shown in the exhibit.
What address should you use as the default gateway for the portable computer's dial-up
connection?
a. 192.168.111.42
b. 192.168.100.1
c. 209.29.9.20
d. 192.168.100.21
22. You have five Windows XP clients on a network with a Windows Server 2003 server. The server has an
always-on Internet connection with an ISP. What service can you install on the server to allow the
clients to access the Internet, without requiring you to obtain additional IP addresses from your ISP?
a. DNS
b. PPTP
c. NAT
d. DHCP
23. You need to create a second DNS entry for the intranet Web server, so that users can access it
using an easy-to-remember name. What type of record do you need to add if you want to create an
alias in DNS for the server?
a. An A record
b. A CNAME record
c. An MX record
d. A PTR record
16. When configuring the settings for user accounts, you want to map a drive to the location of the
operating system's files. Which of the following environmental variables would be used for this
purpose?
Windows Server 2003 NetWork SubJect
a. %SystemDrive%
b. %HomePath%
c. %SystemRoot%
d. %HomeDrive%
24. a computer named COMP2 on a Windows 2000 network as shown in the exhibit. Your network
uses TCP/IP as the only network protocol. You configure COMP2 with an IP address of
192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway of 192.168.2.1 Though you
are able to log onto the domain, you are not able to connect to any resources on SERV2. Users
need to be able to access this server to access documents and shared printers. What should you
do to ensure that COMP2 can connect to network resources?
25. Which of the following TCP/IP protocols does not function at the Internet layer?
a. TCP
b. ARP
c. ICMP
d. IP
26. If GroupA is granted the Change permission over a file share \\someserver\someshare\, it will definitely
have which of the following permissions as well by default?
a. None
b. Read
c. Modify
d. Full Control
17. One important difference between TCP and UDP is that
a. TCP contains source and destination addresses and UDP does not
b. UDP is connection-oriented and TCP is not
c. TCP is connection-oriented and UDP is not
d. UDP cannot be routed, but TCP can
40
Windows Server 2003 NetWork SubJect
28. You have been asked to simplify the process of configuring TCP/IP on all the client computers.
The network consists of 40 computers running Windows 2000 Professional and 60 computers
running Windows XP Professional. Installing and configuring what service of Windows Server
2003 will help you accomplish your task?
a. DHCP
b. BOOTP
c. WINS
d. DNS
29. Which of the following command-line tools can you use to delete a user from Active Directory?
a. dsrm
b. dsadd
c. dsquery
d. dsmove
30. What is the functionality of ARP (Address Resolution Protocol) ?
a. Resolve machine names to IP addresses
b. Resolve IP addresses to MAC addresses
c. Resolve IP address to machine names
d. Resolve MAC addresses to IP addresses
31. What is the functionality of RARP (Reverse Address Resolution Protocol) ?
a. Resolve IP addresses to MAC addresses
b. Resolve IP address to machine names
c. Resolve machine names to IP addresses
d. Resolve MAC addresses to IP addresses
32. Which of the following is NOT default hidden share under Windows Server 2003?
a. ADMIN$
b. PRINTER$
c. C$
d. IPC$
33. Which protocol provides names and name resolution for workgroups in Windows?
a. Kerberos
b. NetBIOS
c. DNS
d. CIFS
40
Windows Server 2003 NetWork SubJect
8. You've installed network monitor and configured a network to monitor. What do you need to do
to capture data?
a. Click Capture --> Trigger
b. Click Capture --> Start
c. Click Capture --> Networks
d. Click Capture --> Filter
9. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level
Domain?
a. west.bigcorp.net
40
Windows Server 2003 NetWork SubJect
b. .net
c. wks042
d. bigcorp.net
10. How many primary partitions without an extended partition can reside on a basic disk under
Windows Server 2003?
a. Four
b. Unlimited
c. One
d. Three
11. You are troubleshooting network connectivity between two computers on a routed IP network.
What command can you use to send a continuous flow of ICMP echo request packets to the
destination IP address?
a. ping -t
b. ping -l
c. ping -a
d. ping -f
12. You have just completed a default installation of Windows 2003 Server.
Where can you look on your computer's hard disk to see the Windows 2003 Server files?
a. WINNT Folder
b. WINDOWS2003 Folder
c. WINDOWSNT Folder
d. WINDOWS Folder
13. Which of the following is not a valid Safe mode option?
a. Safe Mode with Command Prompt
b. Safe Mode
c. Safe Mode with Base Video
d. Safe Mode with Networking
14. You are troubleshooting user complaints of slow Internet access to a partner Web site. You
have been told by the partner that they are experiencing high latency on several links leading to
their network. What tool can you use to determine exactly which routers and links are dropping
packets and what the ping time is for each link?
a. tracert
b. nslookup
c. pathping
d. ping
15. What tool should you use if you suspect an application is not responding?
a. Computer Management
b. Performance
c. Task Manager
d. System Monitor
16. What tool should you use to configure security templates?
a. Security Templates snap-in
b. Network Monitor
c. Active Directory Users And Computers
d. Security Configuration And Analysis snap-in
40
Windows Server 2003 NetWork SubJect
17. You've just written a new script and need to ensure that new policy settings are immediately
applied when the script has been completed. Which of the following command-line utilities
should you use?
a. secedit.exe
b. gpresult.exe
c. gpapply.exe
d. gpupdate.exe
18. You are currently logged in to the Sales server as an Administrator. You want to add additional
security to the D:\Data folder. When you attempt to set permissions, you see the following
dialog box that does not display a Security tab. What is the most likely reason for this?
40
Windows Server 2003 NetWork SubJect
f. ISA
g. MCA
h. PCI
18. What type of zone should you create if you want to create a read-only copy of the master DNS
data for the zone?
a. Stub
b. Root Hints
c. Primary
d. Secondary
19. Which of the following network/transport layer protocols can you use for Windows file sharing
when installed alone?
a. TCP/IP and IPX only
b. TCP/IP, IPX, and NetBEUI
c. TCP/IP only
d. TCP/IP and NetBEUI only
20. What type of resource record must you configure to enable reverse lookups for host
computers?
a. Pointer (PTR) records
b. Mail Exchanger (MX) records
c. Name Server (NS) records
d. Host (A) records
21. You are using Windows Server 2003 as the network operating system in all four of company's
locations. You are using a server in corporate headquarters and another in the Boston sales
office to establish an ISDN-based demand-dial routing connection. In order to control costs, this
has been implemented as an on-demand connection. During operation, however, you notice that
the connection is coming up fairly regularly, even during the evening, when you know that
there is no communication occurring between the offices. What could be the problem?
a. A default route has been configured on the answering router, and anytime a packet is received,
it is
forwarded to the destination demand-dial router.
b. This is normal; it is an indication that the demand-dial routing solution is functioning
normally.
c. A default route has been configured on the calling router, and anytime a packet is received, it
is forwarded to the destination demand-dial router.
d. Legitimate data is being transferred during the connection.
22. You are the WAN administrator for General Telecommunications, a large manufacturer of
network equipment. When you started with the company, you had 10 office locations, each with
its own Windows Server 2003 servers. These locations were networked using fractional T-1s
and Windows Server 2003 servers running RRAS, and they used RIP for routing information.
General Telecommunications now has 120 sales offices throughout the United States and
Europe, and you have been tasked with networking these locations by using hardware routers.
You have been asked to design a solution that will support both the Windows Server 2003
40
Windows Server 2003 NetWork SubJect
servers and the hardware routers. The solution must also support failover connections between
the original 10 locations.
What routing method should you select?
a. EIGRP c. Autostatic updates
b. RIP d. OSPF
23. You are running in a mixed environment, and you are using a Windows Server 2003 DHCP
service to support three network segments. Your client computers consist of Windows 2000
Professional, Windows NT Workstation, and Windows 98 SE workstations.
What do you need to do to ensure that all the client computers can receive DHCP addresses?
a. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. For the Windows NT Workstation client computers, ensure that the DHCP
update from Service Pack 6 has been installed.
b. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. Configure the DHCP service for mixed mode.
c. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. Configure the DHCP service for backward compatibility.
d. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically.
24. Which OU structure in the Active Directory is likely to result in the most CPU resource use?
a. 15 OUs on the same level c. 5 OUs on the same level
b. OUs nested 5 layers deep d. OUs nested 15 layers deep
25. You have installed a new file server on 26. You are a network administrator for an
the network and formatted it to use Active Directory domain with servers
NTFS. After formatting is complete,you running Windows Server 2003. You
use EFS to encrypt a folder containing recently installed a second DHCP server
files belonging to users. If a user on the local subnet. When testing the
accesses a file belonging to him in this server, you notice the DHCPServer
folder, and then copies it across the service is being shutdown and you can't
network for another user to access, get the service to stay running.What is
which of the following will occur? the most likely cause of this problem?
a. The file on the hard disk and the a. The DHCP server has not be authorized
data sent over the network will be in Active Directory.
decrypted and remain that way. b. The DHCP Server service is improperly
b. The file on the hard disk and the installed
data sent over the network will remain c. The active scope has invalid TCP/IP
encrypted. options
c. The file on the hard disk will be d. The DHCP server does not have an
decrypted, so EFS can send it encrypted active scope
over the network.
d. The file on the hard disk will 27. You set up a share in the computer lab
remain encrypted, but data sent over the but neither students nor lab
network will be nencrypted. administrators can access it. You
checked the share permissions, which
are configured properly. Students and
40
Windows Server 2003 NetWork SubJect
lab administrators see an "Access is newly installed network, which has two
denied" message when they try to access subnets in one Active Directory domain
the share. Joe has no problem accessing with servers running Windows Server
the share. 2003. After you install and configure the
What should you do to resolve the p1:5HUI - DHCP server in SubnetA, client
CENTER FOR INFORMATION computers in SubnetA are able to
TECHNOLOGY obtain DHCP leases and the proper
a. Change the share permissions so that TCP/IP configuration. However, client
everyone has Full Control. computers on SubnetB are unable to
b. Check and modify as necessary the obtain DHCP leases. What is the most
NTFS permissions on the folder being likely cause of this problem?
shared. a. The DHCP server is not authorized is
c. Instruct the users on the proper way to SubnetB
connect to the share b. The DHCP Server service is stopped
d. Nothing; the users must be mapping to c. A DHCP Relay Agent is not installed in
the share improperly SubnetB.
d. The DHCP scope for SubnetB is not
28. You have been asked to implement active
dynamic IP addressing the company's
b. The policy settings will be cumulative
and applied in the order of policies at
29. Your network consists of servers the site level, domain level, and finally
running Windows 2003 Server and OU level.
workstations running Windows 2000 c. The policy setting at the local computer
Professional. You have applied several level will be overwritten by the OU-
custom security templates to GPOs level GPO, which will be overwritten
linked to the OU, domain, and site levels by the domain-level GPO, which will
in Active Directory. In addition to this, finally be overwritten by the site-level
there are security settings that have also GPO. For this reason, major security
been applied at the local computer level settings must be made at the site-level
of all machines that are on the network. GPO; all others will be overwritten.
Because several policies now affect the d. Security settings in the GPOs will not
computer accounts within the domain, be applied to machines running
site, and OU, Windows 2000 that have joined the
which of the following will occur when the domain.
user logs on to the domain?
a. The security settings at the local
computer level will override those of
the GPOs.
30. Hannah reports that she's having a tough time connecting to resources on your Windows
Server 2003 domain.You ask for more information, and Hannah reveals that she is trying to
connect to a server in Washington. Other users can connect to that server, but she cannot.
Hannah can ping the IP address of other hosts on her segment, her default gateway, and even
the IP address of the server in Washington, but when she uses the server's hostname to enter
the name of the server, she cannot connect. What do you suspect is the problem?
40
Windows Server 2003 NetWork SubJect
a. Hannah needs to renew her IP address by running the command ipconfig/release and then
ipconfig/renew.
b. Hannah has a faulty network adapter card.
c. Hannah has a blank or invalid subnet mask.
d. Hannah has a blank or invalid DNS server IP address.
31. You need to ensure that your users will be able to resolve hostnames to IP addresses.
What type of zones do you need to configure?
a. A reverse lookup zone c. A delegated zone
b. A forward lookup zone d. A stub zone
b. Authorize the DHCP server
32. (DHCP) You want to migrate a subnet c. Run the Ipconfig /release command and
to a new scope. You create a new scope then the Ipconfig /renew command on
and then deactivate the old scope. every client computer.
Which of the following is an appropriate d. Restart the DHCP Server service
next step?
a. Delete the old scope.
33. All your Windows XP Professional client computers are configured to get DHCP leases from
your Windows Server 2003 DHCP server. This morning, one of your client computers no longer
had connectivity with the rest of the network. The user claims that she did not change any
network settings and has verified that the network cable is properly connected to both the
network adapter and the wall jack. What is the most likely reason for the problem that the
computer is experiencing?
a. The computer is not a member of the domain and is being refused an IP address.
b. The network cable has been damaged and is no longer passing a signal.
c. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.
d. The TCP/IP stack on the computer is corrupt and needs to be reset.
34. Your Windows Server 2003 DHCP server issues a block of 40 addresses to 120 salespeople on
the Sales network. These users are frequently in and out of the office, so no more than 40 users
are ever on the network at one time. What do you need to do to ensure that users get addresses
when needed?
a. Configure an exclusion for each user. c. Set the DHCP lease duration to 60
b. Set the DHCP lease duration to 5 days minutes.
d. Configure a reservation for each user.
35. A user has the username JohnB. He wants to access a Microsoft Access database called db.mdb
that’s located on a DC called syngress.com, in a directory called DB. Using the URL, what will
this user enter into a browser to access the database?
a. JohnB@syngress.com c. http://syngress.com/DB/db.mdb
b. syngress.com d. \\syngress.com\DB\db.mdb
40
Windows Server 2003 NetWork SubJect
36. A client computer that makes a DNS query to a DNS server for name resolution of a remote
host is referred to as what?
a. A recursive query c. An iterative query
b. A DNS resolver d. A DNS forwarder
37. Which of the following is NOT default hidden share under Windows Server 2003?
e. ADMIN$ g. C$
f. PRINTER$ h. IPC$
38. You have installed a Windows Server 2003 DNS server, but people are unable to resolve names.
You need to test the DNS server. Where should you start in your troubleshooting efforts?
a. From the command prompt of a Windows XP Professional host, run the nslookup utility to
check the functionality of the DNS service.
b. From the Windows Server 2003 DNS server, type ping -R and the address of the DNS server.
Examine the results to see if the server is working.
c. From the command prompt of a Windows XP Professional host, run the ipconfig utility to
check the functionality of the DNS service.
d. From the Windows Server 2003 DNS server, type ping -a and the address of the DNS server.
Examine the results to see if the server is working.
39. You install a new FireWire adapter card and the server immediately stops responding. You
need the server up on the network as soon as possible. How do you fix this problem?
a. You need to use Last Known Good Configuration. c. You need to use Safe Mode.
b. You need to restore the System State. d. You need to the ASR utility.
40. The network consists of 6 Windows Server 2003 servers running all network services. You have
200 desktop computers running Windows XP Professional on the LAN, and you have just
purchased 30 laptops that need to be able to dial in to the network at night. You configure and
install RRAS on one of the Windows Server 2003 servers. This server is a member of the
production Active Directory domain operating at the Windows Server 2003 domain functional
level. The new laptop users are unable to connect remotely. Which of the following is the most
likely problem?
a. You did not enable MS-CHAP as the default authentication protocol.
b. The Windows Server 2003 running RRAS has conflicting remote access policies, and the first
one that is applied to the remote users prevents them from accessing the data.
c. You did not modify the default dial-in policy, which restricts access unless it is modified.
d. Windows Server 2003 RRAS does not support dial-in from a Windows XP system.
41. Which statement is NOT correct?
a. An organizational unit can be a member of a group.
b. A group can be located within an organizational unit.
c. A group can be a member of other groups.
d. An organizational unit can be located within another organizational unit.
40
Windows Server 2003 NetWork SubJect
42. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level
Domain?
e. west.bigcorp.net g. wks042
f. .net h. bigcorp.net
a. On the GPO linked to the Corp OU,
select Block Policy inheritance.
43. The development team of your company b. On the GPO linked to the Technical
has started a new research project. OU, negate any options set in the Corp
They want to ensure that only the OU by choosing Disabled for those
members of their project team are options.
allowed to see the new directories that c. On the GPO linked to the Technical
they create. You created a new OU that OU, select Block Policy inheritance.
contains the user accounts of the d. On the GPO linked to the Technical
development team, the computers they OU, select No Override.
will be using, a shared folder where they
are going to place their research
documents, and several printers that 45. Which of the following statements are
are to be isolated from the rest of the NOT true regarding access
company. They are concerned about permissions?
who will have access to the new a. NTFS permissions are available for
directories. How will you protect the files stored on NTFS-formatted
directories from unauthorized access? partitions
a. Do nothing. Since the directories and b. Share permissions are available for
files are part of an OU, no one outside shared folders on FAT32-formatted
the OU can access them. partitions
b. Create a security group that contains the c. NTFS permissions are available for
members of the research group. files stored on FAT32-formatted
Remove the Everyone group from the partitions
ACL. Add the new group to the ACL d. Share permissions are available for
and grant it the appropriate permissions. shared folders on NTFS-formatted
c. Create a GPO that will limit access to partitions
the directories. Apply the GPO to the
domain. 46. A user attempts to access a resource,
d. Create a GPO that will limit access to and entries in the ACL are analyzed to
the directories. Apply the GPO to the match the SID. The system examines the
new OU. entire ACL, but no match is found.
Which of the following will occur?
44. Your Active Directory domain has two a. The account will be disabled
OUs. The Corp OU is a parent OU to b. Each ACE in the ACL will be read until
the Technical OU. You have a match is eventually found
implemented a GPO linked to the Corp c. The user will be denied access
OU. You do not want those settings d. The user will be granted access
affecting the users in the Technical OU.
How can you accomplish this with
minimal effort?
40
Windows Server 2003 NetWork SubJect
47. In the IP address assignment 10.54.113.0/24, what does the number 24 represent?
a. The number of bits in the host identifier
b. The number of bits in the combined network and subnet identifiers
c. The number of bits in the combined subnet and host identifiers
d. The number of bits in the subnet identifier
48. You have been asked to simplify the process of configuring TCP/IP on all the client computers.
The network consists of 40 computers running Windows 2000 Professional and 60 computers
running Windows XP Professional. Installing and configuring what service of Windows Server
2003 will help you accomplish your task?
e. DHCP g. WINS
f. BOOTP h. DNS
40
Windows Server 2003 NetWork SubJect
52. You install Active Directory and creates an AD-integrated DNS server for your domain. You
are concerned about DNS fault tolerance.
What can you do to provide fault tolerance for your AD domain?
a. Install a primary DNS server c. Install a caching-only DNS server
b. Install a secondary DNS Server d. Install another AD-integrated DNS server
53. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the
old scope. Which of the following is an appropriate next step?
a. Restart the DHCP Server service
b. Run the Ipconfig /release command and then the Ipconfig /renew command on every client
computer.
c. Delete the old scope
d. Authorize the DHCP server
54. You recently have been having unexplained problems with the Print Spooler service on two of
your Windows Server 2003 printer servers. You can find nothing wrong with the Print Spooler
service itself, and you have restarted it numerous times, with no effect. What else might you
consider examining to determine the cause of the problems for the Print Spooler service?
a. The services that are dependent on the Print Spooler service
b. The services on which the Print Spooler service is dependent
c. The currently installed drivers for the printers attached to the printer server
d. The cables being used to connect the printers to the printer server
55. You have just installed the DHCP service through the Windows Component Wizard. You now
need to configure DHCP to support a scope that will be used for streaming multimedia delivery.
In the MMC, you right-click the server icon under DHCP. What option should you select to
configure the scope?
a. New IP Scope c. New Multicast Scope
b. New Scope d. New Superscope
56. You’ve configured a DHCP server to use the following range of IP addresses when assigning
addresses to clients: 131.107.0.0/19 through 131.107.224.0/19. You set the subnet mask for this
range of addresses to 255.255.240.0. Users are complaining that they cannot connect to the
network.
What is the most likely cause of this problem?
a. The subnet mask is wrong. It should be 255.255.224.0.
b. The subnet mask is wrong. It should be 255.224.0.0.
c. The range of addresses is illegal.The first address cannot be 131.107.0.0/19.
d. The range of addresses is illegal. It should end at 131.107.192.0/19.
57. You are a network administrator. Multiple users have reported that they can access some local
resources but not all, and they have no access to resources on the Internet. You try to diagnose
the problem and find that the preferred DNS server used by the clients having the problem can
40
Windows Server 2003 NetWork SubJect
only resolve names for zones stored on the server. The TCP/IP settings on the DNS server are
configured correctly. What is the likely cause of the problem?
a. The DNS server is not getting zone transfers.
b. The DNS server's resolver cache is corrupted.
c. The DNS server doesn't have any forwarders configured.
d. The DNS server has incorrect or corrupt root hints.
58. Which of the following is the major disadvantage of using RIP as the network routing protocol?
a. High cost of software c. Count-to-infinity problem
b. A maximum of only 12 hops d. Low overhead on the network
59. You have a single DNS server resolving names for your internal domain, and you have an
Internet connection. You need to configure DNS on the client computers to resolve Internet
addresses.
How will you make this configuration?
a. Install a new DNS server to resolve Internet domain names. On each client computer,
configure the DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN
connection to resolve to the DNS server.
b. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP)
Properties dialog box of the LAN connection to resolve to the DNS server.
c. On each client computer, install the Microsoft DNS client. Configure the client computer to
resolve to the DNS server. Configure the root hints on the server to point at the Internet root
servers.
d. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP)
Properties dialog box of the LAN connection to resolve to the DNS server. Configure the root hints
on the server to point at the Internet root servers.
60. You are responsible for maintaining the company's Windows Server 2003 DHCP server. While
doing your daily system checks, you notice that the number of DHCPDISCOVER packets
spiked at 9:00 this morning. What could cause the Discovers/Sec counter to spike at 9:00 a.m.?
a. The DHCP service being restarted
b. A network problem
c. A large number of computers entering the network at approximately the same time
d. A rogue DHCP server issuing duplicate addresses
61. You have three office locations, each with its own Windows Server 2003 servers. Each office has
a local LAN that is very stable, and the company has no plans to add locations for the next
three years. There are plans to network the three locations by using the existing Windows
Server 2003 servers and ISDN lines. You have been asked to design a solution that will have the
lowest impact on the servers, with no requirements for redundancy or failover. What routing
method should you select?
a. OSPF c. RIP
b. Static routes d. Autostatic updates
40
Windows Server 2003 NetWork SubJect
62. You are running in a purely Windows Server 2003 environment, and you need to make sure
workstations are registered properly in DNS for Active Directory integration.
How should you configure DNS integration?
a. Configure the DHCP server to be sure to send dynamic updates.
b. Install the Windows Server 2003 DNS client on the workstations.
c. Configure the DNS server to accept dynamic updates
d. Configure the appropriate zones to accept dynamic updates
64. You are attempting to troubleshoot and correct a network connectivity problem that was
reported by users between a server and several workstations. What communication
troubleshooting tool should you start with to determine where the problem lies?
a. ipconfig c. nslookup
b. ping d. telnet
65. You are in the process of configuring a counter log to create a baseline log for a new Windows
Server 2003 computer that you are placing on the production network. You have configured the
counter log to start and stop automatically each day. You now need to configure it so that the
resulting log files will be easily identified by the date and time that they were created. Which
log numbering style should you use to accomplish this?
e. yyyymmddhh g. mmddhhmm
f. yyyymm h. nnnnnn
d. Make sure all your domain client
66. You are running a purely Windows computers are running Windows 2000
Server 2003 network using Active or higher.
Directory and the Windows Server 2003
DHCP service. A user in another 67. (DHCP) You want to configure multiple
department has installed a DHCP standard scopes so that they can be
server on a Unix server. easily activated or deactivated. What
How do you prevent your client computers should you do?
from receiving DHCP addresses from that a. Create a multicast scope and add the
server? standard scopes to it.
a. Reconfigure BOOTP on the router. b. Configure server options instead of
b. Disable the unauthorized server in scope options.
Active Directory. c. Create a superscope and add the
c. Go to each client computer and standard scopes to it.
enter the address of the production d. Delete all the scopes except one.
DHCP server in the Internet Protocol
(TCP/IP) Properties dialog box.
40
Windows Server 2003 NetWork SubJect
68. You have just completed an analysis of a computer by using the Security Configuration and
Analysis snap-in. When you examine the results, you notice several items that have red X icons
next to them. What does this type of icon indicate?
a. The item is defined in the analysis database but not on the computer.
b. The item is defined in the analysis database and on the computer, and it matches the currently
configured setting.
c. The item is defined in the analysis database and on the computer, but it does not match the
currently configured setting.
d. The item is not defined in the analysis database and was not examined on the computer
69. You are responsible for maintaining the company's Windows Server 2003 DHCP server. The
company recently added a new router and routed a segment to the network. Now that segment
must be added to the DHCP server. The address of the router port is 10.10.25.1, and the router
is subnetted with a Class C subnet mask. You need to provide 40 addresses, starting at
10.10.25.20. What needs to occur for you to get DHCP working on that segment?
a. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20
through10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the
BOOTP forwarder for the new segment's router, using the address of the DHCP server. You need
to activate the scope.
b. You need to install and configure an additional DHCP server on that segment to provide DHCP
services.
c. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through
10.10.25.59. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP
forwarder for the new segment's router, using the address of the DHCP server. You need to
activate the scope.
d. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through
10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP
forwarder for the new segment's router, using the address of the DHCP server. You do not need to
activate the scope because that happens automatically when the scope is created.
70. To configure file access auditing for all files in the CorpDocs folder on the file server. In which
section of the Group Policy Editor will you find the auditing options?
a. Account Policies c. File System
b. Restricted Groups d. Local Policies
71. DNS servers can be configured to perform name resolution using several types of queries. With
which type of query does the server return results only from its records or from its cache?
a. Iterative query c. Recursive query
b. Forward query d. Reverse query
b. You could use Event Viewer.
72. You would like to be able to verify some c. You could type nslookup at a command
entries on one of your Windows Server prompt.
2003 DNS servers. How could you verify d. You could type ipconfig at a command
the entries in the DNS zone? prompt.
a. You could use the Properties dialog box
of the DNS server in the MMC.
73. (DNS) What is the next step a forwarder takes when it is unable to resolve a query?
40
Windows Server 2003 NetWork SubJect
74. Which resource record is used to resolve domain names specified in e-mail addresses to the IP
address of the mail server associated with the domain?
a. PTR c. CNAME
b. A d. MX
76. Your task is to segment the Class B IP address 145.65.0.0 into 20 different subnets. You must
allow for the number of networks to increase. The maximum number of hosts per subnet will
never surpass 950 hosts. What subnet mask would enable you to segment the network and allow
for the required growth?
a. 255.255.240.0 c. 255.255.0.0
b. 255.255.252.0 d. 255.255.255.252
78. The network consists of 1,500 Windows Server 2003 servers spread over 150 OUs that have
approximately 10 servers each. You have just finished creating a customized security template
40
Windows Server 2003 NetWork SubJect
that specifies the Account Policies and Audit Policy settings that are required by your
organization's corporate policy for specific departments. What is the best way for you to apply
this template to only the Sales, Marketing, Production, and Engineering OUs?
a. Script the secedit.exe command to apply the security template to the required computers.
b. Import the security template into each required OU by using a GPO.
c. Import the security template at the domain level into a GPO.
d. Manually apply the security template to each of the computers.
79. You're writing a logon script that will be used to automatically link a remote file share as the
home directory for the current logon account. Which option would be best used to create a link
for the home file share?
a. Utilize the net start command to create the home file share link
b. Utilize the net share command to create the home file share link
c. Utilize the net use command to create the home file share link
d. Utilize the net send command to create the home file share link
80. Your network includes two Domain Controllers and three member servers that provide file,
print, andbackup/restoration services. You want to implement a more secure configuration on
all five Windows Server 2003 servers. You have decided to use the secure templates, but is not
sure what the current configuration is on each server. What is the best way for you to get these
servers configured with the secure templates?
a. You should apply the Default security template from one of her member servers to all five
servers and then apply the securews.inf and securedc.inf templates to them.
b. You should apply the Default security template found on each computer to that specific
computer. After doing this, you should apply the securedc.inf template to the DCs and the
securews.inf template to the member servers.
c. You should apply the Default security template found on each computer to that specific
computer. After doing this, you should apply the securews.inf template to the DCs and the
securedc.inf template to the member servers.
d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After
doing this, you should apply the securews.inf and securedc.inf templates to the servers.
81. In what role should a DNS server be configured if it should maintain a cache of resolve queries
but not have zone files?
a. Forwarding-only c. Primary
b. Secondary d. Stub
82. You are trying to determine what settings (in addition to an IP address with your DHCP
server) can be assigned to client computers running Windows XP Professional. What settings
can be assigned?
a. The IP address of the file server
b. The IP address of the Active Directory domain controller
c. The IP address of the DHCP server
d. The IP address of the DNS server
40
Windows Server 2003 NetWork SubJect
83. You've been tasked with using the Dsmod command-line utility for administration. Which of
the following object types you can NOT modify using Dsmod?
a. GPO c. User accounts
b. Groups d. Computer accounts
84. After installing and configuring DNS on b. The DHCP forwarder service is not
a Windows Server 2003 server, you set enabled on the routers.
up an Active Directory-integrated zone. c. The BOOTP forwarder service is not
Where does the server store the zone enabled on the DHCP server.
information? d. The BOOTP forwarder service is not
a. In the server's cache enabled on the routers.
b. In the %systemroot%\system32\DNS
directory 86. Replacing the hubs and routers on an
c. In the %systemroot%\DNS directory internetwork with switches creates a
d. In Active Directory network that has which of the
following?
85. The corporation is running a routed a. One collision domain and multiple
network with a centrally located broadcast domains
Windows Server 2003 DHCP server. b. One broadcast domain and multiple
The server is able to issue addresses to collision domains
users on the local segment but cannot c. One broadcast domain and one collision
issue addresses to any of the sites that domain
are across a router. What is the most d. Several collision domains and several
probable cause of this problem? broadcast domains
a. The DHCP forwarder service is not
enabled on the DHCP server.
87. The company has 200 end users running Windows XP Professional that need to be able to
access the
company's network remotely. Several months ago you installed a Windows Server 2003 server
running RRAS to allow users to dial in to the server for remote access. This server is in the
corporate Active Directory tree, and after you configured it, the profiles worked perfectly. Last
weekend you added another Windows Server 2003 server with RRAS loaded to provide a failover
access device in the event of a server crash. Both servers are in the same native-mode Active
Directory domain, and test users are unable to log in to the new RAS server.
What is the most likely problem?
a. The Windows Server 2003 RRAS service needs to be authorized in Active Directory.
b. You need to add the new Windows Server 2003 server to the Global Remote Access Servers
group in Active Directory.
c. You can have only a single Windows Server 2003 server running RRAS in an Active Directory
domain.
d. The remote access profiles are not shared and need to be re-created on the new Windows
Server 2003 server before anyone can access the server.
88. The network consists of 3 Windows Server 2003 servers and 50 workstations running Windows
XP Professional. In order to improve Internet DNS resolution, you have installed DNS on one of
40
Windows Server 2003 NetWork SubJect
the Windows Server 2003 servers and configured it as a caching-only DNS server. Where does
the new DNS server store its zone files?
a. The zone files are stored in Active Directory.
b. The zone files are stored in the server's %systemroot%\system32\etc\DNS directory.
c. Caching-only servers do not have any zone information.
d. The zone files are stored in the server's RAM.
89. You must decide the security settings that will be applied to the MyGuestLogon account (for
guest only). Which of the following settings is most appropriate to the solution presented?
a. User cannot change password c. User must change password at next logon
b. Account is disabled d. Password never expires
91. You have not modified the default settings for DNS on the DHCP client or server. Which of the
following client record or records will be updated in DNS by the DHCP server? (Assume that
the clients are running Windows XP.)
a. Neither the PTR nor the A resource record c. Both the PTR and A resource records
b. The PTR resource record d. The A resource record
92. Which of the following statements are NOT true regarding Remote Desktop connections to a
Terminal Services host server running Microsoft Windows Server 2003?
a. Application processing occurs on the host system
b. Application processing occurs on the client system
c. Input is directed to the host system
d. Keyboard and mouse input are directed from the client system to the host.
93. The company has a T-1 connection to a local ISP, which is shared by all clients. Clients access
the Internet using NAT. Several users have reported that they can't access the Internet. You
start diagnosing the problem and find that all users reporting the problem are on the same
subnet. Users on other subnets are not experiencing any problems accessing the Internet.
Which of the following could be the cause of the problem?
a. The NAT router is malfunctioning
b. The users' DNS Server is down
c. The users' DHCP server is down.
d. The users' default gateway for the subnet is malfunctioning
94. Your company has 14 locations and is using OSPF as part of its WAN implementation. You are
training a new WAN engineer to support the WAN. She asks you for the correct name of the
area with an ID of 0.0.0.0. What do you call this area?
40
Windows Server 2003 NetWork SubJect
96. You are attempting to perform an analysis of a computer by using the Security Configuration
and Analysis snap-in. You know you need to complete the following steps:
1. Select the security template to be used in the analysis.
2. Right-click Security Configuration and Analysis and select Analyze Computer Now.
3. Select the log file to be used in the analysis.
4. Right-click Security Configuration and Analysis and select Open Database.
5. Right-click Security Configuration and Analysis and select Configure Computer Now.
6. Select the database to be used in the analysis.
What is the order in which you should perform these steps?
a. 4, 1, 6, 2, 5, 3 c. 2, 6, 1, 3, 4, 5
b. 2, 1, 3, 4, 6, 5 d. 4, 6, 1, 3, 2, 5
97. You want to enable the user account for Will Carver.You decide to use the dsmod.exe tool.
Which of the following commands will enable the Will Carver account?
a. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled no
b. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled yes
c. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled no
d. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled yes
98. One of your Windows Server 2003 printer servers has been responding oddly lately. The Print
Spooler service often seems to get stuck, requiring you to restart either the service or the server.
Performing the server restart is a time-consuming task because the server is located across
town in another building that your company owns. What's the most efficient way to have this
troublesome server restart after the second failure of the Print Spooler service?
a. Configure the service to restart itself after its second failure.
b. Write a batch script that monitors this service and have it force a server restart after the service
has failed twice.
c. Configure the service to restart the server after its second failure.
d. Write a batch script that monitors the service and emails you after the service has failed the
first time so that you can travel to the server and prepare to restart it.
e.
99. You are trying to explain each part of an FQDN. What is the host portion of
sarah.training.urwrite.net?
40
Windows Server 2003 NetWork SubJect
a. net c. training
b. sarah d. urwrite
subnet to which the computers have
100. You are trying to explain how two been moved. You should reconfigure
computers on the same subnet the computers with the correct static IP
communicate with each other. Which of addresses.
the following statements should you use b. The port to which the computers are
to explain the process that two computers connecting on the switch may be
use to communicate with each other on failing. You should replace the switches
the same IP subnet? where computers cannot connect to
a. The packets will be sent to the MAC network resources.
address of the destination computer. c. There are not enough client access
b. The packets will be sent to the IP licenses (CALs) for the Windows
address of the destination computer. Server 2003 computers. You should
c. The packets will be sent to the IP purchase the required number of CALs.
address of the default gateway for d. The statically configured IP
routing to the destination computer's addresses are no longer valid on the
MAC address. subnet to which the computers have
d. The packets will be sent to the MAC been moved. You should reconfigure
address of the default gateway for the computers so that they are DHCP
routing to the destination computer's IP clients.
address.
40
Windows Server 2003 NetWork SubJect
b. Set group policy in a domain GPO 104. What is one of the major
to lock out accounts after three disadvantages of distance-vector
unsuccessful logon attempts routing?
c. Remove the local policies from a. It involves high overhead on the
each PC. network.
d. Set the local policy on each PC to b. It suffers from the count-to-infinity
lock out accounts after three attempts, problem.
and set No Override on the local c. It has problems with slow convergence.
policy. d. A network that uses it can connect to a
maximum of only 15 hops.
105. The company network consists of 3 Windows Server 2003 servers and 100 Windows XP
Professional workstations. The Sales Department spends a lot of time doing Web research at a
variety of supplier, customer, and competitor Web sites. You have been asked to provide a
solution to speed up name resolution for these users. You configure a cache-only server.
Which of the following will have the largest impact on the response time for DNS requests?
a. The processor speed d. The speed of the network adapter
b. The amount of RAM installed card
c. The speed and type of the hard
drive
106. When a client can successfully ping a DNS server, but fails to receive any response to a
name resolution query from that server, which of the following might be the cause of the
problem?
a. The server’s cache is polluted
b. The server has an incorrect IP address
c. The DNS Server service is not started
d. The server is not the authority for the
requested name
107. Which of the following command-line tools can you use to delete a user from Active
Directory?
e. dsrm g. dsquery
f. dsadd h. dsmove
108. You are designing a new network and plan to use Class C IP addresses. You want to be
able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.
Which of the following subnet masks should you use for the network?
a. 255.255.255.192 c. 255.255.255.128
b. 255.255.255.240 d. 255.255.255.224
109. What is the proper way to create
and then apply a custom security
template to a computer?
40
Windows Server 2003 NetWork SubJect
110. Which of the following is the FQDN for the host home in the sales domain for the UR
write company if the company's domain is urwrite.net?
a. home.sales.net c. home
b. home.urwrite.net d. home.sales.urwrite.net
111. A customer has asked you to install the DHCP service on her Windows Server 2003
computer, get one scope configured, and issue addresses. What minimum steps do you need to
take in order to accomplish this?
a. Install the DHCP service from the Windows Components Wizard. After the service is installed,
authorize it in Active Directory. Next, create the scope. Finally, configure the DNS integration.
b. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope. Create a superscope and add the scope to it. Authorize the server in Active
Directory.
c. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope. Authorize the server in Active Directory.
d. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope and then configure the DNS integration.
112. You're creating a saved query within the Active Directory Users and Computers MMC
snap-in. Which of the following query types are NOT directly available for query selection by
default?
a. Users, contacts, and groups c. Exchange recipients
b. Printers d. Computers
113. What is the correct subnet mask to use on a Class B network with a 10-bit subnet
identifier?
a. 255.255.255.192 c. 255.192.0.0
b. 255.255.192.0 d. 255.192.255.255
114. Which of the following is used to uninstall Active Directory and demote a domain
controller?
a. Gpotool b. Gpresult
40
Windows Server 2003 NetWork SubJect
c. Dcpromo d. Ntdsutil
115. You have just set up a Windows Server 2003 Active Directory network, and you want to
use group policies to control user configuration. You have configured local policies on some of
the machines in your domain, and you also want to configure some site and OU policies for
more granular control, but you are concerned about policies at different levels “canceling each
other out.”
Which of the following types of GPOs will override settings applied at the domain level?
a. Site c. Domain
b. OU d. Local
116. You configure and install RRAS on one of your Windows Server 2003 servers. Your
Windows Server 2003 network is running at the Windows Server 2003 domain functional level.
Because this is the first time you have configured RRAS, you first modify the default policy.
Then, as part of your testing, you configure 12 additional remote access policies. After this, the
users complain that they cannot successfully access any information on the network.
What is the most likely source of the problem?
a. You need to enable IPSec to ensure that the connections are encrypted.
b. You did not modify the default dial-in policy.
c. You have some conflicting policies, and the first one that the users apply refuses them access to
the information on the network.
d. You did not enable MS-CHAP.
117. The network consists of 16 training rooms with 30 PCs each, running a mix of Windows
2000 Professional and Windows XP Professional, as well as 16 Windows Server 2003 servers,
which provide all network services. You are working on a remote access problem, and you want
to check the network to see if the policies have been deleted. Where should you look for these
policies?
a. Remote access policies are stored in the computer properties in Active Directory.
b. Remote access policies are stored in the user properties in Active Directory.
c. Remote access policies are stored individually on every RRAS server.
d. Remote access policies are stored on the global catalog server in Active Directory.
118. You have created several GPOs that are linked at various levels within your Active
Directory structure. You are preparing to run the Resultant Set of Policies (RSoP) tool to
examine the net result of the various GPOs that have been applied on the Accounting OU. In
what order are Group Policy Objects applied in Active Directory?
a. Domain, OU, local, site c. Local, site, domain, OU
b. OU, local, site, domain d. Site, domain, OU, local
119. You need to create a new GPO to tree. What is the next step in the process
enable settings for a particular OU. You of creating a GPO for this OU?
open Active Directory Users and a. From the Actions menu, select Create
Computers and select the OU in the New GPO.
40
Windows Server 2003 NetWork SubJect
b. From the Actions menu, select Group d. Right-click on the OU and select Create
Policy Object Editor. New GPO.
c. Right-click on the OU and select
Properties.
120. You have a 50-host network and 122. How the client computer requests
are running a Windows Server 2003 and receives an address from the DHCP
DHCP server to assign IP addresses. server?
You also have five IP-based printers a. The client computer broadcasts a
with static IP addresses. Your assistant DHCPDISCOVER message. The
administrator has been working on the DHCP server offers an IP address. The
DHCP server and has made some client computer accepts the address and
changes. Now, your users cannot print sends a request to use that address back
to one of the printers. What is most to the DHCP server. The client
likely the problem? computer uses the address to
a. The scope from which the printers communicate on the network.
were receiving their IP addresses has b. The client computer broadcasts a
been deleted. DHCPDISCOVER message. The
b. The existing scope has been DHCP server offers an IP address. The
modified so that it overlaps the client computer accepts the address and
addresses reserved for the printers. sends a request to use that address back
c. The DHCP service was to the DHCP server. The DHCP server
inadvertently stopped. acknowledges the request and grants
d. The existing scope has been the client computer a lease to use the
modified so that it overlaps the address. The client computer responds
addresses reserved for the printers, and with an acknowledgement of the lease
a workstation has been assigned the and uses the address to connect to the
same address as one of the printers. network.
c. The client computer broadcasts a
121. An application using NetBIOS DHCPDISCOVER message. The
needs a NetBIOS name resolved. To DHCP server offers an IP address. The
resolve the NetBIOS name, local cache client computer accepts the address and
is checked first. The needed resolution is sends a request to use that address back
not already cached, so the LMHOSTS to the DHCP server. The DHCP server
file is checked next. The desired entry is acknowledges the request and grants
not in the LMHOSTS file. Based on the client computer a lease to use the
this, what is the next step taken in address. The client computer uses the
resolving the NetBIOS name? address to connect to the network.
a. The DNS server issues a recursive d. The client computer broadcasts a
query DHCPDISCOVER message. The
b. The DNS server is queried using an NS DHCP server offers an IP address. The
type record client computer accepts the address and
c. NetBIOS over TCP resolves the name uses it to communicate on the network.
to an IP address
d. The WINS server is queried
40
Windows Server 2003 NetWork SubJect
123. You install and create a primary DNS for a subnet. You are concerned about DNS fault
tolerance for the Primary DNS zone. What can you do to provide load balancing and fault
tolerance for the primary DNS server?
a. Install an AD-integrated DNS server c. Install a secondary DNS server
b. Install a second NIC card d. Install DHCP
124. You need to manage several servers remotely. What is the best tool for you to use?
a. The runas command c. AD Users and Computers
b. The Remote Desktop connection utility d. MMC snap-in tools
125. Which of the following servers does not require a computer with a registered IP address?
a. Internet Web servers c. Internet e-mail servers
b. DNS servers used for Internet name resolution d. DNS servers used for Internet domain hosting
126. Your network consists of 20 Windows NT 4.0 servers and 30 Windows Server 2003
servers. Some of the NT 4.0 servers are configured as routers. You have just started to
configure some of the Windows Server 2003 servers as routers, but you are having some
problems. The new routers cannot communicate with the old routers. You confirm that all the
routers are configured to use RIP. What could be the problem?
a. You need to install and configure OSPF.
b. RIP does not propagate more than 15 hops.
c. You have to change the RIPv2 incoming packet protocol to use only RIPv1.
d. You have to change the RIPv2 outgoing packet protocol to use broadcast instead of multicast.
129. The network consists of 75 locations interconnected with Windows Server 2003 servers
running RRAS. Business has been very good, and you have recently added a number of
segments to the network in several of the offices. You have noticed lately that you are receiving
an increased number of "host unreachable" error messages. You believe that your routing
tables are inaccurate. What should you enable in the Windows Server 2003 Routing and
Remote Access console to prevent routing loops and count-to-infinity problems?
a. Poison reverse c. Split horizon
b. Topological database d. Distance-vector routing
130. You currently have a supernetted network and would like to simplify the management of
DHCP. What component should you configure in DHCP?
40
Windows Server 2003 NetWork SubJect
132. While troubleshooting a Windows XP Professional computer, you discover that it has an
IP address of 169.254.176.132, a subnet mask of 255.255.0.0, and no configured default gateway.
What is the most likely reason this computer has gotten these IP settings?
a. The TCP/IP stack on the computer is corrupt.
b. The DHCP server scope has become corrupt.
c. The user of the computer has configured new settings without fully understanding how routed IP
networks function.
d. The computer has been unable to contact a DHCP server.
133. You are responsible for 75 Windows XP Professional workstations and 5 Windows
Server 2003 member server computers. You have been directed to perform a security analysis
on each computer, comparing its settings to those contained in the hisecws.inf template. How
can you accomplish the assigned task with the least amount of administrative effort and the
smallest number of trips to remote computers?
a. You can create a script that runs Security Configuration and Analysis on each computer and collect
the results in a central location for later viewing.
b. You can analyze remote computers from the Security Configuration and Analysis snap-in by
targeting it at the desired computer.
c. You can create a script that runs the secedit /analyze command on each computer and collect the
results in a central location for later viewing.
d. The only way to perform this analysis is to physically visit each computer and use the Security
You are installing Configuration and Analysis snap-in.
134. In what situation would you design your network as a workgroup instead of a domain?
a. When you have several hundred clients spread out over multiple geographic regions.
b. When the network has multiple servers.
c. When you need to use Active Directory.
d. When the network is small and has no servers.
40
Windows Server 2003 NetWork SubJect
135. You have two office locations, each with its own Windows Server 2003 server. The two
locations have been networked with a T-1 connection that runs between the Windows Server
2003 servers, which are running RRAS. You just added a new network in the main location,
and you need to add a static route on the far end to provide connectivity to the location; you are
not using any dynamic routing protocols. The network address, which you are using as a Class
C address, is 10.10.10.0. The correct gateway address is 10.10.10.254. What command do you
need to use to add a static route?
a. route /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
b. route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
c. netstat add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
d. ipconfig /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
137. You're in the process of evaluating which users should be members of the Power Users
group, but first want to make sure that they require the rights that accompany that group
assignment. Which of the following rights are NOT granted to the local Power Users group by
default?
a. Reset local account passwords c. Take ownership of local files
b. Create local file shares d. Log on locally
138. A user with the username of JaneD works in the Sales department. Her account is located
in the syngress.com domain. Based on this information, what canonical name would be used to
identify this object in Active Directory?
a. /syngress.com/Sales/JaneD
b. OU=Sales
c. /CN=JaneD /OU=Sales /DC=syngress /DC=com
d. CN=JaneD
139. Your computer is configured to use DHCP. When you log on, you notices you can't
connect to the network. The computer has no IP address according to ipconfig. Which of the
following is most likely true?
a. No DHCP server is on the network
b. The computer is using dynamic IP addressing
c. The network cable to the computer is disconnected
d. The computer is using Automatic Private IP Addressing.
140. You are configuring a new Windows Server 2003 server to be a file server for your home
office intranet that will be used only by local users. Which of the following will NOT need to
have to suitably configure the IP address with a statically assigned address?
a. A valid subnet mask c. A valid IP address for the server
b. A valid WINS server IP address d. A valid default gateway
40
Windows Server 2003 NetWork SubJect
141. You are designing a network for a large branch office and have been assigned the
network address 10.10.0.0/18.
What are the maximum number of subnets and the maximum number of hosts on each subnet?
a. 512 subnets; 32,766 hosts c. 1024 subnets; 16,382 hosts
b. 256 subnets; 65,534 hosts d. 128 subnets; 131,070 hosts
142. Although you can use the Configure Your Server Wizard to configure a server as domain
controller, which program or utility do you use to promote or demote a domain controller?
a. Active Directory Users And Computers c. NETSH DIAG
b. NTDSUTIL.EXE d. DCPROMO.EXE
145. Your network includes two Domain Controllers and three member servers that provide
file, print, and backup/restoration services. You want to implement a more secure configuration
on all five Windows Server 2003 servers. You have decided to use the secure templates, but is
not sure what the current configuration is on each server.
What is the best way for you to get these servers configured with the secure templates?
a. You should apply the Default security template from one of her member servers to all five servers
and then apply the securews.inf and securedc.inf templates to them.
40
Windows Server 2003 NetWork SubJect
b. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securedc.inf template to the DCs and the securews.inf
template to the member servers.
c. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securews.inf template to the DCs and the securedc.inf
template to the member servers.
d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After
doing this, you should apply the securews.inf and securedc.inf templates to the servers.
146. You manage the Windows Server 2003 DHCP servers for a Corporation. You are
running in a purely Windows Server 2003 environment with all Windows XP Professional
clients, and you need to make sure that workstations are registered properly in DNS for Active
Directory integration. How should you configure DNS integration?
a. Set DNS integration to enable updates for DNS clients that do not support dynamic updates.
b. Set DNS integration to enable DNS keepalives.
c. Set DNS integration to automatically update DHCP client information in DNS
d. Set DNS integration to discard A and PTR records when a lease is deleted.
147. Which of the following performance counters you could NOT use to determine a possible problem
with memory or a memory leak?
a. Processor\%Processor Time c. Memory\Available Kbytes
b. Memory\Nonpaged Kbytes d. Process(process_name)\Pool Paged Bytes
148. You are installing a new domain controller. You want the domain controller to be in a
separate domain that is not part of an existing forest. What type of domain should you install?
a. A parent domain
b. A forest root domain
c. A domain in a new domain tree in the existing forest
d. A child domain
149. You 3.0 mbsigning a new network and plan to use Class C IP addresses. You want to be
able to create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.
Which of the following subnet masks should you use for the network?
a. 255.255.255.192 c. 255.255.255.224
b. 255.255.255.128 d. 255.255.255.240
150. Your network consists of a central site with 60 local users, 120 remote sales
representatives who travel 90 percent of the time, and 16 Windows Server 2003 servers
providing core network services, including remote access using RRAS. Your sales
representatives need the ability to dial in to access resources on the network while traveling.
The problem you are having is that the sales organization is split into eight geographic regions
covering eight time zones, and the sales representatives from each region are only allowed to
make remote connections during specific hours. Each region has a Windows security group that
contains all of the sales representatives in that region.
What do you need to do to ensure that the sales representatives can connect the remote access server,
but only during the allowed times for their regions?
40
Windows Server 2003 NetWork SubJect
151. You received a call from a user who said that he could not access any network resources. Upon
investigation, you have determined that the workstation has an IP address of 169.254.170.145.
What is the most likely reason for the user's inability to connect to any network resources?
a. The TCP/IP stack on the computer is corrupt and needs to be reset.
b. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.
c. The computer is not a member of the domain and is being refused an IP address.
d. The network cable has been damaged and is no longer passing a signal.
152. You have installed a new file server on the network and formatted it to use NTFS. After
formatting is complete, you use EFS to encrypt a folder containing files belonging to users. If a user
accesses a file belonging to him in this folder, and then copies it across the network for another user to
access,
which of the following will occur?
a. The file on the hard disk will remain encrypted, but data sent over the network will be unencrypted.
b. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network.
c. The file on the hard disk and the data sent over the network will remain encrypted.
d. The file on the hard disk and the data sent over the network will be decrypted and remain that way.
153. YoDL: 0.0 kb UL: 0.0 kbhoot a user's account. Which of the following statements are true
regarding user account membership?
a. A user account can be a member of multiple organizational units at the same time.
b. A user account can be a member of only a single organizational unit.
c. A user account can be a member of only a single domain.
d. A user account can be a member of only a single group
154. You're responsible for review of shared resources on several servers within a corporate domain.
To accomplish this task, you've decided to use an automated script that will run several times per day to
determine what shared resources are being used. Which of the following options would be most useful in
meeting this requirement?
a. Utilize the net session command to review the shared resources
b. Utilize the net file command to review the shared resources
c. Utilize the net accounts command to review the shared resources
d. Utilize the net config command to review the shared resources
155. A Windows XP Professional client computer will receive a DHCPACK broadcast message from
the DHCP server after which of the following events?
a. When the client computer sends a request to use a lease it was offered
b. When a DHCP server offers it a lease
c. When the client computer first requests an IP address
d. Successfully receiving or renewing an IP address from the DHCP server
156. You have just installed DNS on the network, and configured a primary server and a secondary
server.
What must you do to specify the authoritative name servers for the zone?
40
Windows Server 2003 NetWork SubJect
a. Create the NS records for the primary and secondary name server.
b. Create the NS record for the secondary name server.
c. Create the NS record for the primary name server.
d. Nothing, all necessary NS records are created automatically.
157. You maintain a Windows Server 2003 DHCP server to dynamically assign addresses. You have
threesuperscopes set up, and within each superscope are four scopes. One day, you start experiencing
problems with one of the scopes issuing bad addresses. You check the server and suspect that there is a
database problem. How can you verify that the database is intact?
a. Open the DHCP console. Select the superscope that contains the scope in question and then select Action,
Reconcile All Scopes.
b. Open the DHCP console. Select the DHCP server that contains the scope in question and then select
Action, Reconcile DHCP Database.
c. Open the DHCP console. Select the scope in question and select Action, Reconcile Scope.
d. Open the DHCP console. Select the DHCP server that contains the scope in question and then select
Action, Reconcile All Scopes.
158. Your Windows XP computer has several shared folders. You are conducting a security audit and
wish to view the permissions on each of the shared folders. How can you quickly view all shared folders
on your computer? What should you do?
a. Use Windows Explorer to search for shared folders.
b. Use disk management to view the shared folders on each drive.
c. Use System information in Computer Management to view shared folders.
d. Use Shared Folders in Computer Management to view shared folders.
159. The network con 3.0 mbf 1,500 Windows Server 2003 servers spread over 150 OUs that have
approximately 10 servers each. You have just finished creating a customized security template that
specifies the Account Policies and Audit Policy settings that are required by your organization's
corporate policy for specific departments. What is the best way for you to apply this template to only the
Sales, Marketing, Production, and Engineering OUs?
a. Import the security template into each required OU by using a GPO.
b. Manually apply the security template to each of the computers.
c. Script the secedit.exe command to apply the security template to the required computers.
d. Import the security template at the domain level into a GPO.
160. Your network contains 240 computers running Windows 2000 Professional and 225 computers
running Windows XP Professional and uses Class C IP addresses. All the computers are located on the
same network segment. You has been asked to automate the process of assigning IP addresses. What do
you need to do?
a. You need to install DHCP and configure a scope
b. You need to install DHCP and configure a superscope
c. You need to install DHCP and configure DNS integration
d. You need to install DHCP and configure BOOTP
161. You have been hired as a network consultant to install DNS in the new corporate headquarters of
Zanzibar Sports. The network currently consists of 3,000 computers running Windows XP Professional
and 4,000 computers running Windows 2000 Professional. The servers providing DNS for the network
are presently located in the largest branch location, but you want to move them into the new corporate
data center. You also want to ensure that all remote offices and manufacturing sites can perform DNS
resolution queries without adding additional traffic on your WAN links. What should you do to ensure
that the remote offices and manufacturing sites do not add additional traffic to your WAN links?
a. Configure the DNS servers at the corporate data center with standard secondary zones.
40
Windows Server 2003 NetWork SubJect
162. You are trying to explain DNS and reverse lookup zones to your co-workers. What should you tell
your co-workers that reverse lookup zone allows users to resolve?
a. A hostname to an FQDN c. A hostname to an IP address
b. An IP address to a hostname d. An IP address to a MAC address
d. The file on the hard disk and the data sent
163. You have installed a new file server on over the network will remain encrypted.
the network and formatted it to use NTFS.
After formatting is complete, you use EFS to
encrypt a folder containing files belonging to 164. You just installed and configured a
users. If a user accesses a file belonging to him DHCP server. After the installation, the wizard
in this folder, and then copies it across the asked you to activate the scope, and you did. Staff
network for another user to access, from your company are complaining, however, that
which of the following will occur? they are not obtaining IP addresses. What could be
a. The file on the hard disk will remain the problem?
encrypted, but data sent over the network will a. You did not authorize the server.
be unencrypted. b. You did not activate the server.
b. The file on the hard disk and the data sent c. You were not authorized to activate the scope;
over the network will be decrypted and remain only administrators can activate the scope.
that way. d. Your scope is misconfigured.
c. The file on the hard disk will be
decrypted, so EFS can send it encrypted over
the network.
165. You are experiencing a delay when you connect to a remote Web site. Which tool allows you to
determine whether particular routers are responsible for the delay?
a. Tracert c. PathPing
b. Network Diagnostics d. Netdiag
166. Your corporate network uses variable length subnetting to make more efficient use of IP
addresses. One of the IP addresses for a host is 131.39.161.17 with a subnet mask of 255.255.248.0.What
is the proper notation for the network to which this host is connected?
a. 131.39.161.17/21 c. 131.36.161.0/20
b. 131.36.160.0/20 d. 131.39.160.0/21
On each computer, at the command
167. You have been assigned the task of prompt, type ipconfig /renewdns.
identifying and correcting a problem with one On each computer, at the command
of the Windows Server 2003DNS servers. prompt, type ipconfig /renew.
Computers running Windows 2000 On each computer, at the command
Professional have not registered dynamically prompt, type ipconfig /registerdns.
with the DNS server. You would like to force Reboot the system so that the computer is
these computers to register with DNS as issued a new DHCP address.
quickly as possible. What should you do?
40
Windows Server 2003 NetWork SubJect
168. You need to create several new file shares on your server. Which of the following options can
NOT be used for this purpose in a default installation of Windows Server 2003?
a. Utilize the net share command-line utility
b. Create the file shares within the Windows Explorer
c. Create the file shares within the Internet Explorer
d. Utilize the Computer Management MMC snap-in
169. Which of the following best describes the function of a subnet mask?
A subnet mask enables an IP address to be visible from the Internet.
A subnet mask specifies the sizes of the network and host identifiers in an IP address.
A subnet mask indicates whether an IP address is registered or unregistered.
A subnet mask is a value assigned by the IANA to uniquely identify a specific
network on the Internet.
40