Sie sind auf Seite 1von 64

Quarter 5 Review TCP/IP Fundamentals and Concepts

1/ Which of the following MAN components provide connectivity between MANs and LANs, between networks with different topologies, or between networks using different network standards? a. Bridges. b. Routers. c. Switches. d. Repeaters. Correct Answer: -> b 2/ Statement A: With TCP, applications exchange messages over the network with a minimum of protocol overhead. Statement B: TCP enables hosts to maintain multiple simultaneous connections. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true. Correct Answer: -> b 3/ You are analyzing UDP data packets from node A to node B using a network Analyzer. From the given figure, find out the length of the data packet?

a. 53 b. 92 c. 58 d. 1090 Correct Answer: -> c 4/ Sky Lark Inc. is an IT-based company. It has provided laptops with Windows 2000 Professional to their employees. The employee transfers are very frequent in this company so the laptops move from one subnet to another subnet. You want to automatically assign the TCP/IP configuration to the laptop connected. Which service should you use? a. BOOTP

b. DNS c. DHCP d. DHCP relay agent Correct Answer: -> c 5/ You want to enable Windows ME, Linux and Macintosh computers to use Internet Explorer to access your Web servers by using a host name. Which of the following service should you use? a. DHCP b. Hosts c. BOOTP d. DNS Correct Answer: -> d 6/ Statement A: IP generates control messages related to any error in connection or flow control over the network. Statement B: IP is responsible for addressing and forming the data packets to be transferred over the network. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> b 7/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service. b. Fragment Offset. c. Options. d. Flags. Correct Answer: -> a 8/ Statement A: Infrared transmissions can provide line of sight communications over short distances. Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial links. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true. Correct Answer: -> d 9/ You are analyzing IP data packets from node A to node B using a Network Analyzer. From the given figure, identify the error control value?

a. 0x86ee b. 0x01 c. 0x00 d. 0x5332 Correct Answer: -> d 10/ Gregg is a network administrator in a large finance organization, which is having a Windows 2003 Server. For the last 2-3 weeks he found that the network traffic is getting very heavy to the Window 2003 Server. He wants to track all the traffic to the Windows 2003 Server. What action should he perform? A. He should use network analyzer on any node of the network. B. He should use network analyzer on the Windows 2003 Server of the network. C. He should enable the Promiscuous Mode in the network analyzer. D. He should disable the Promiscuous Mode in the network analyzer. a. A and C. b. B and D. c. B and C. d. A and D. Correct Answer: -> c 11/ A local area network is handling large number of client computers. The network administrator was previously using the BOOPTP protocol for handling the client computers. The administrator is having a problem in manually allocating and configuring the IP addresses over the network. The protocol is also not able to detect the unused IP addresses over the network for their future allocation to another client. Which of the following protocol does the administrator implement to overcome that problem? a. DHCP protocol. b. BOOTP protocol. c. Internet protocol. d. Stop-and-wait protocol. Correct Answer: -> a 12/ From the given figure, specify the type of delivery of data packets between Node X to Router 1 and between Router 1 and Router 2.

a. Both will use direct delivery. b. It will be direct delivery between Node X to Router 1 and indirect delivery between Router 1 and Router 2. c. It will be indirect delivery between Node X to Router 1 and direct delivery between Router 1 and Router 2. d. Both will use indirect delivery and Router 2. Correct Answer: -> b 13/ Your company wants to setup a LAN environment. You are assigned to design the new network. You want to implement a device, which: 1. Joins multiple computers or other network devices together to form a single network segment. 2. Amplify and regenerate the signal from one node to another in a network. 3. Provides a common connection point for computers, printers, and other network devices in a star topology network. Which of the following network component will meet the preceding requirements? a. Repeaters. b. Hubs. c. Switch. d. Bridge. Correct Answer: -> c 14/ In which of the following state, the DHCP client enters, after sending the DHCPDISCOVER message? a. Initializing state. b. Requesting state. c. Selecting state. d. Bound state. Correct Answer: -> c 15/ Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the servers are configured as static routers. The network is divided into various subnets depending on departments. He wants to identify the path that a data packet takes as it passes through the routers. Which of the following utility will he use? a. Ipconfig.exe b. Tracert.exe c. Route.exe d. Ping.exe Correct Answer: -> b 16/ Which of the following is a reliable protocol of the Transport layer? a. IP b. TCP d. ICMP c. UDP Correct Answer: -> b

17/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given figure, find out the destination port number?

a. 1090 b. 58 c. 17 d. 53 Correct Answer: -> d 18/ Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header, provides integrity and confidentiality to IPv6 datagrams. Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating Security Header, provides authentication and integrity to IPv6 datagrams. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> d 19/ Alder tries to connect a ftp server from a node having Windows 2000 professional by issuing the command: ftp sales.books.com but it fails. But he is able to connect the server by using the windows explorer program. What is the likely problem? a. No DNS server configured on Alders workstation. b. No DNS client configured on Alders workstation. c. No default gateway defined on the server. d. No DNS server defined on the server. Correct Answer: -> b 20/ In which of the following modes, two nodes can send as well as receive data but not at the same time? a. Simplex mode. b. Half-duplex mode. c. Full-duplex mode. d. Promiscuous mode.

Correct Answer: -> b 21/ Which of the following layer comes below Network Layer in the bottom-up approach of OSI Reference Model? a. Transport Layer. b. Session Layer. c. Presentation Layer. d. Data Link Layer. Correct Answer: -> d 22/ Which of the following is the correct definition for Ethernet Access Method? a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream, by checking for matches between the data transmitted and the data received. b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and which to block. c. Ethernet Access Method is a set of rules that defines how a computer transmits data on the network cable and retrieves data from the cable. d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large, heterogeneous networks. Correct Answer: -> c 23/ Your company decided to open small branch offices in various cities of US. Each branch office will have 10-12 nodes, 1 fax machine and 1 printer. You were asked to design the network of each branch office. You decided to have peer-to-peer network in the branch offices. You were asked to analyze the advantages of the peer-to-peer network. Which of the following are the advantages of peer-to-peer network? A. Strong central security B. Easy setup C. Ability of users to control resources sharing D. No network administrator required E. Optimized dedicated servers a. A, B and D. b. B, D and E. c. A, B and E. d. B, C and D. Correct Answer: -> d 24/ A datagram received from one network may be too large to be transmitted in a single packet on a different network. Which of the following TCP/IP protocol helps the router to divide the datagram into smaller pieces? a. ICMP b. IP c. IGMP d. TCP Correct Answer: -> b 25/ Which of the following is an 8-bit value field that defines the type of BOOTP packet? a. Operation Code. b. Hop count. c. Hardware Type. d. Options. Correct Answer: -> a 26/ Tom tries to connect a ftp server from a node having Windows 2000 professional by issuing the command ftp sales.books.com. He received the following error message Bad IP Address. He then successfully pings the server. What is the likely problem? a. No DNS client configured on Toms workstation. b. No DNS server configured on Toms workstation. c. No default gateway defined on the server. d. No DNS server defined on the server. Correct Answer: -> a 27/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given figure, find out the destination port number?

a. 1090 b. 58 c. 17 d. 53 Correct Answer: -> d 28/ Statement A: Name server is a computer that maintains the database of host names and their corresponding IP addresses for name resolution. Statement B: The function of the resolvers is to pass name request between applications and name servers. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> c 29/ You can connect through Windows explorer to all nodes on the local network, but cannot connect to any nodes on the remote subnet. Which IP address should you ping first to diagnose the problem? a. Ping <IP Address of the local server> b. Ping <IP Address of the remote server> c. Ping <IP Address of the local host> d. Ping <IP Address of the default gateway> Correct Answer: -> d 30/ You cannot connect to a Windows 2000 Server from a node running on Windows 2000 Professional using Windows Explorer. Both the server and the node are in the same physical network. By using a network analyzer, you found that each time the node attempts to connect to the server, it broadcasts an ARP request for the default gateway. What is the most likely cause of the problem? A. Invalid default gateway address on the Windows 2000 Professional node B. Invalid subnet mask on the Windows 2000 Professional node C. Invalid default gateway address on the Windows 2000 Server D. Invalid subnet mask on the Windows 2000 Server a. A b. B

c. C d. D Correct Answer: -> b 31/ It is developed to implement file transfer, printer sharing, and mail service among Apple systems. Macintosh machines have them installed by default. Identify the protocol. a. DLC. b. SNA. c. AppleTalk. d. IPX/SPX. Correct Answer: -> c 32/ Statement A: Transport Layer is responsible for process-to-process communication. Statement B: The Transport layer can delivery a data packet either reliably or unreliably. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> c 33/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address. The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a DHCP address to the node? a. He has to create a new scope for the node. b. A RFC 1542 compliant router to be added in the network. c. Provide a new DHCP server in the network. d. A bridge to be added in the network. Correct Answer: -> b 34/ Which of the following WAN components converts the digital signals from the computer to analog signals? a. Routers. b. Brouters. c. CSU/DSU. d. Modem. Correct Answer: -> d 35/ Which of the following record helps the DNS in providing information about the host such as, operating system used? a. HINFO. b. Start of authority (SOA). c. Address (A). d. Canonical Name (CNAME). Correct Answer: -> a 36/ Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the servers are configured as static routers. The network is divided into various subnets depending on departments. He wants to identify the path that a data packet takes as it passes through the routers. Which of the following utility will he use? a. Ipconfig.exe b. Tracert.exe c. Route.exe d. Ping.exe Correct Answer: -> b 37/ Statement A: IPv6 data packets are exchanged and processed on each host by using IPv6 at the Network Access layer. Statement B: In IPv6, the Internet layer creates IPv6 packets including the source and destination address information that is used to route the data through the network. Which of the following options is correct about the above statement?

a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> b 38/ You are analyzing TCP data packets from node A to node B using a Network Analyzer. From the given figure, find out the size of the header?

a. 28 bytes. b. 8 bytes. c. 60 bytes. d. 40 bytes. Correct Answer: -> a 39/ Which of the following is the correct definition for Ethernet Access Method? a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream, by checking for matches between the data transmitted and the data received. b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and which to block. c. Ethernet Access Method is a set of rules that defines how a computer transmits data on the network cable and retrieves data from the cable d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large, heterogeneous networks. Correct Answer: -> c 40/ Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header, provides integrity and confidentiality to IPv6 datagrams. Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating Security Header, provides authentication and integrity to IPv6 datagrams. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> d

41/ Which of the following layer of the OSI Reference model is responsible for routing, switching, and controlling the flow of data between nodes? a. Transport Layer. b. Network Layer. c. Presentation Layer. d. Physical Layer. Correct Answer: -> b 42/ Tom is designing a network for his office. He is not able to decide on the type of transmission medium. His office is in an area that is prone to high levels of EMI or for long distance data transmissions, where electrical signals are significantly distorted and degraded. He wants minimum distortion of signals in the transmission medium. a. He can select fibre-optic cables. b. He can select twisted-pair cables. c. He can select both fibre-optic cables or twisted-pair cables. d. He can select both coaxial cables or twisted-pair cables. Correct Answer: -> a 43/ Which of the following DHCP message consists of the IP address and additional configuration information, such as lease duration and subnet mask? a. Discover message. b. Offer message. c. Request message. d. Bootreply message. Correct Answer: -> b 44/ Statement A: Infrared transmissions can provide line of sight communications over short distances. Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial links. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true. Correct Answer: -> d 45/ You are a network administrator in a finance organization. You want to configure your Windows 2003 Server on the Internet and download files. Which of the following service you should use in the Windows 2003 Server? a. Telnet. b. SMTP. c. SNMP. d. FTP. Correct Answer: -> d 46/ Which of the following protocols function at the Transport Layer? a. ICMP and IGMP. b. TCP and UDP. c. TCP and FTP. d. Network Access Layer. Correct Answer: -> b 48/ Tim George is a network administrator in an organization. The organization has three subnets. One subnet has only laptop Windows 2000 Professional nodes. The other two subnets have Windows 2000 nodes. Tim has installed a DHCP server to support all the clients. Tim wants to set the IP lease period for the laptops to 7 days and for the other two subnets to 20 days. How should Tim implement this? a. Create one DHCP scope for all subnets. For each node, create an exclusion range with a unique lease period. b. Create one DHCP scope for all subnets. For each node other than laptops, create a reservation with a 30-day lease period. c. Create one DHCP scope for each subnet. Specify the lease period as part of the scopes configuration. d. Create one DHCP scope for each subnet. Create a global option that specifies a lease period that is based on the operating system the client computer is running. Correct Answer: -> c

49/ Which of the following RFCs define the protocols of the Network Access Layer? a. RFC 926 and RFC 951 b. RFC 826 and RFC 894 c. RFC 826 and RFC 951 d. RFC 894 and RFC 926 Correct Answer: -> b 50/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service b. Fragment Offset c. Options d. Flags Correct Answer: -> a

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 2/ Which audit policy is intended for the domain controllers that authenticate users as they log on to other computers? a. Audit object access b. Audit logon events c. Audit Account logon events d. Audit Account management Correct Answer: -> c 3/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 4/ When James tries to open a newly installed application, his computer hangs. He tries to restart his computer but fails to do so. Which of the following options will enable James to restart the computer? a. Boot the computer using the Safe Mode with Networking option. b. Boot the computer using the Last Known Good Configuration. c. Boot the computer using the Safe Mode option. d. Boot the computer using the Windows Startup Disk. Correct Answer: -> c 5/ As a system administrator, you have created a GPO that is applied to the organizations domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users.

Correct Answer: -> c 6/ Consider the following statements: Statement A: Audit policies enable you to track the success of certain events and failure of all the events. Statement B: Audit policies only track the activities performed by a user. Statement C: You can use the audit policies to track the location where the activity occurred. Which of the following is correct about the above statements? a. Only Statement A is true. b. Only Statement B is true. c. Statements A, B, and C are true. d. Only Statement C is true. Correct Answer: -> d 7/ You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all client computers updated with patches and critical system updates from Microsoft. You plan to install software update service on a server, which will download all the required software updates and distribute the updates to the clients. Identify the server on which you should install the software update service. a. Server with DNS installed. b. Server with RRAS installed. c. Server with IIS installed. d. Server with DHCP installed. Correct Answer: -> c 8/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the clients computer. Correct Answer: -> a 9/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You dont have appropriate rights for the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 10/ Which of the following is a logical boundary of an organizations network? a. Domain b. Tree c. Forest d. Organizational unit Correct Answer: -> a 11/ You are a system administrator of an organization that consists of 1000 users who use Windows Server 2003 and Windows 2000 computers. To secure the organizations network, you and the junior administrators have planned and implemented several GPOs on the domain and organizational units. In addition, you have implemented Group Policies on individual users also. As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and Group Policies. While conducting this review you need to view the configured GPOs in a report format, which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which the GPO is applied. Identify the tool that will enable you to view GPOs in the report format. a. Group Policy Modeling b. Group Policy HTML Report c. Group Policy Reporting d. Group Policy HTML Reporting Correct Answer: -> c 12/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can

be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition. Correct Answer: -> b 13/ Consider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed. Which of the following options is correct about the above statements? a. Statement A is true and Statement B is false. b. Both, statement A and statement B are true. c. Both, statement A and statement B are false. d. Statement A is false and Statement B is true. Correct Answer: -> d 14/ Identify the hardware device required for printing a document. a. Print device b. Print driver c. Print server d. Print job Correct Answer: -> a 15/ As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid a similar situation, you plan to apply security settings for the fresh installation. Which security template will you use to perform this task? a. Setup security.inf b. DC security.inf c. Secure*.inf d. Security setup.inf Correct Answer: -> a 16/ Consider the following statements: Statement A: The backup utility of Windows Server 2003 enables you to backup files and folders, schedule a backup, and restore data on the Windows Server 2003 computer. Statement B: ASR is a feature of the backup utility that enables you to recover a Windows Server 2003 computer that does not boot. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 17/ Which container lists the default users and group accounts created by Windows Server 2003? a. Users and Computers b. Builtin and Computers c. Builtin and Users d. Users and Domain Controllers Correct Answer: -> c 18/ Which of the following actions should you take if folder redirection is successful but the files and subfolders are not available? a. Check if the redirected folder exists. b. Check if Remote Desktop for Administration is enabled. c. Check your permissions on the redirected folder. d. Check for the extensions of the files contained in the redirected folder. Correct Answer: -> c 19/ You are the system administrator for CellGo. The network of CellGo consists of a single Active Directory domain named CellGo.com. All network servers run Windows Server 2003. Some of the client

computers run Windows XP Professional and some work on Windows NT Workstation. You install terminal server on three member servers named Cell1, Cell2, and Cell3. You place all three terminal servers in an organizational unit named Terminal Server. You link a GPO to the Terminal Server OU. Five days later, end users notify that the performance of Cell2 is very slow. You discover that Cell2 has 70 disconnected Terminal Server sessions. You need to configure all the three terminal servers to end the disconnected session after 15 minutes of inactivity. You must achieve this goal by using the minimum amount of administrative effort. What should you do? a. Log on to the console of each terminal server. In the RDP-Tcp connection properties dialog box, set the End a disconnected session option to 15 minutes. b. Edit the GPO to set the time limit for disconnected sessions to 15 minutes. c. On Cell2, run the tsdiscon command to disconnect all 70 users from Cell2. d. In Active Directory Users and Computers, set the End a disconnected session option for all domain user accounts to 15 minutes. Correct Answer: -> b 20/ Jenny is the system administrator of a domain named Aztec.com. In this domain, the accounting group and the marketing group share the same printer. Jenny receives a complaint from the marketing group that their small print jobs take a lot of time to print. Jenny finds that the accounting group gives large print jobs to the printer, which causes the delay. She learns that the accounting jobs are not needed on the same day on which the request has been sent to the printer. What should Jenny do to improve the situation? a. Create a separate printer; configure the printer to print directly to the printer port and then direct the accounting group to print through this printer. b. Create a separate printer; configure the printer to start printing immediately, and then direct the marketing group to print through this printer. c. Create a separate printer; configure the printer to be available only after certain hours, and then direct the accounting group to print large documents through this printer. d. Create a separate printer; configure the printer to be available only after certain hours, and then direct the marketing group to print documents through this printer. Correct Answer: -> c 21/ Which of the following options enables you to install the device drivers that are not digitally signed? a. Warn. b. Install. c. Ignore. d. Update. Correct Answer: -> c 22/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 23/ As a system administrator, you want to provide high degree of security to domain controllers. For implementing this level of security, you want that the domain controllers should use digitally signed communication channels. Which of the following security templates will enable you to do this? a. Compatws.inf b. Securedc.inf c. Hisecdc.inf d. Setup Security.inf Correct Answer: -> c 24/ Consider the following statements: Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003. Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false.

d. Statement A is false and Statement B is true. Correct Answer: -> b 25/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales department to the administration department. You plan to move Harrys computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. c. Disable the computer account, PC02, in the sales organizational unit. d. Create a new computer account, PC02, in the administration organizational unit. Correct Answer: -> a 26/ Catherine is a user in your domain. Her username is Cath13 and she has a roaming profile stored in the domain controller. At what location will her desktop be stored? a. \\domain controller\ documents and settings\Cath13\desktop b. C:\documents and settings\Cath13\desktop c. C:\winnt\Profiles\Catherine\desktop d. C:\Profiles\desktop\Catherine Correct Answer: -> b 27/ You are the system administrator of your organization. You need to take backup of the data stored in the Sales_Data folder on the first Monday of every month. Which of the following options enables you to accomplish this task with least administrative effort? a. Take incremental backup of Sales_Data folder on the first Monday of every month. b. Schedule backup job of Sales_Data folder for the first Monday of every month. c. Take normal backup of Sales_Data folder on the first Monday of every month. d. Take differential backup of Sales_Data folder on the first Monday of every month. Correct Answer: -> b 28/ Which of the following protocols uses Transmission Control Protocol to ensure that data transfer is complete and accurate? a. FTP. b. HTTP. c. NNTP. d. SMTP. Correct Answer: -> a 29/ Consider the following statements: Statement A: Security policies cannot be implemented using GPOs. Statement B: Audit policies can be implemented using GPOs. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> b 30/ Identify the NTFS folder permission that enables users to only view the names of files and subfolders contained within a folder? a. List folder contents. b. Full Control. c. Modify. d. Read and Execute. Correct Answer: -> a 31/ Identify the group that has the rights and permissions to create and delete shared resources, stop and start services, and backup and restore files. a. Backup Operators. b. Administrators. c. Print Operators. d. Server Operators. Correct Answer: -> d 32/ You are the system administrator of Red Star Corp. John requests you to install a printer on his computer. To install the printer for John, you required the printer driver files. Identify the folder that you

need to access to get the files. a. Print$ folder. b. Admin$ folder. c. Printer$ folder. d. Prn$ folder. Correct Answer: -> a 33/ You are working as a system administrator in an organization, which has its head office in Chicago. The organization has two branch offices, one in New York and the other in Texas. All the three offices have an interconnected WAN network. As a system administrator, you have been assigned the task of viewing the Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for each computer using the computer name, you decide to use the IP address of each computer with the Gpresult command. Which parameter of the Gpresult command will help you define the name or IP address of the remote computers? a. /u Domain/User b. /p Password c. /user TargerUserName d. /s Computer Correct Answer: -> d 34/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk During installation, setup displays an error message, ERROR_CREATE_FAILED. What does this error message indicate? a. The Windows Installer service has failed to start. b. The hard disk does not have the disk space required to install Windows Server 2003. c. One of the parameters entered is invalid. d. The data entered is of incorrect type. Correct Answer: -> a 35/ Consider the following statements: Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services (DNS) namespace. Statement B: Trees are implemented in the domain structure of an organization when the organization requires multiple domains. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ Christina is the system administrator of StarMoon Technologies. She wants to restore the default permissions for a system drive that has been modified. Which of the following security templates will enable her to do this? a. Hisecws.inf b. Rootsec.inf c. Rootws.inf d. Rootdc.inf Correct Answer: -> b 2/ You want to generate RsoP queries for the users in your organization to view the Group Policy settings applied to them. Which of the following tools will enable you to perform this task? a. Gpupdate.exe b. Gpresult.exe c. Group Policy Management Console. d. Group Policy Object Editor. Correct Answer: -> d

3/ As a system administrator, you have created a GPO that is applied to the organizations domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users. Correct Answer: -> c 4/ Consider the following statements: Statement A: You need at least 100 MB free space on a volume for creating shadow copies. Statement B: You cannot edit shadow copies because they are read-only. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 5/ You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you want to save disk space and back up only those files that have been created or modified. Which of the following options will enable you to accomplish this task? a. Schedule incremental backup of the Accounts folder on the first Monday of every month. b. Schedule normal backup of the Accounts folder on the first Monday of every month. c. Schedule copy backup of the Accounts folder on the first Monday of every month. d. Schedule daily backup of the Accounts folder on the first Monday of every month. Correct Answer: -> a 6/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP. b. SSL. c. NNTP. d. FTP. Correct Answer: -> b 7/ Which policy enables you to specify password restrictions, account lockout policies, and Kerberos policies? a. Local Policies. b. Event Log Policies. c. Password Policies. d. Account Policies. Correct Answer: -> d 8/ Identify the correct method to create local user accounts? a. Select the Start > Programs > Administrative Tools > Microsoft Management Console menu command. b. Select the Start > Programs > Administrative Tools > Computer Management menu command. c. Select the Start > Programs > Administrative Tools menu command. d. Select the Start > Programs > Administrative Tools > Active Directory Users and Computers menu command. Correct Answer: -> b 9/ Which of the following options enables you to prevent the installation of any unsigned device driver? c. Prevent. a. Warn. d. Block. b. Stop. Correct Answer: -> d 10/ You are working as a system administrator in an organization, which has its head office in Chicago. The organization has two branch offices, one in New York and the other in Texas. All the three offices have an interconnected WAN network. As a system administrator, you have been assigned the task of viewing the Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not know the computer accounts of the Texas office. Instead of viewing the applied Group

Policies for each computer using the computer name, you decide to use the IP address of each computer with the Gpresult command. Which parameter of the Gpresult command will help you define the name or IP address of the remote computers? a. /u Domain/User b. /p Password c. /user TargerUserName d. /s Computer Correct Answer: -> d 11/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> d 12/ Consider the following statements: Statement A: A spanned volume offers fault tolerance. Statement B: A striped volume increases the speed at which data is read and written, but it does not offer fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 13/ As a system administrator, you need to secure the organizations domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To implement this, which security policy do you need to configure? a. Configure the Enforce old password history policy. b. Configure the Enforce password history policy. c. Configure the Enforce password history list policy. d. Configure the Enforce old password history list policy. Correct Answer: -> b 14/ The network of your organization consists of 300 end users who use the Windows application server. This application server is used for storing and processing data. The users complain it takes a long time to access the application server. In addition, it takes a long time to process data at certain times of the day. To solve this problem, you need to perform the following tasks: Task 1: Determine if processor is the bottleneck. Task 2: Determine if memory is the bottleneck. Task 3: Determine if network is the bottleneck. To perform these tasks, you propose to run the system monitor at different times throughout the day for a number of days, and view the data generated by the counters of Processor Time, Processor Queue Length, Pages per Second, and Average Disk Queue Length objects. Identify the tasks that will be completed by you if you use the proposed solution. a. Tasks 1 and 3. b. Task 1. c. Tasks 2 and 3. d. Task 3. Correct Answer: -> b 15/ You are the system administrator for CellGo. The organizational hierarchy consists of a head office and three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All the servers run Windows Server 2003. You work from the head office. Each branch office has a system administrator assigned to it. You want to review the auditing information of each branch office server.

What should you do to view the auditing information with minimum administrative cost? a. View the security template from the Security Configuration and Analysis snap-in. b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view Event Viewer. c. Run the Seregcedit.exe utility and specify the appropriate parameters. d. Establish a Remote Desktop client session with each branch office server. Correct Answer: -> b 16/ Which of the following enables you to monitor the performance of printers? a. Device Manager. b. Event Viewer. c. Performance Console. d. Task Manager. Correct Answer: -> c 17/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 29. What should you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver. b. Verify that the device driver is not corrupt. c. Verify that the device driver has been properly configured. d. Check if the BIOS for the hardware device is enabled. Correct Answer: -> d 18/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? a. Create user accounts using user account template. b. Create 30 user accounts one by one. c. Create user accounts using user profiles. d. Create user accounts using command line tools. Correct Answer: -> a 19/ Which of the following options is a collection of multiple domains that share a common schema and global catalog server? a. Active Directory. b. Tree. c. Forest. d. Organizational unit. Correct Answer: -> c 20/ Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of Windows Server 2003 computer from the client computer? a. Admin$ b. Print$ c. C$ d. D$ Correct Answer: -> b 21/ Identify the physically separated part of a domain network, which is connected with a slow wide area network (WAN) link to the domain network. a. Domain controller. b. Site. c. Forest. d. Organizational unit. Correct Answer: -> b 22/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH. What does this error message indicate? a. The Windows Installer service has failed to start. b. The data entered is invalid.

c. One of the parameters entered is invalid. d. The data entered is of incorrect type. Correct Answer: -> d 23/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 24/ Consider the following statements: Statement A: Group Policy is a feature of the Computer Management utility. Statement B: Group Policies can only be applied to multiple users. Which of the following options is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> a 25/ You are the system administrator of your organization. You plan to enhance the availability of data stored in your Windows Server 2003 computer by implementing RAID-5 volumes on two hard disks. However, on the Select the Volume Type page, the RAID-5 volume option is not highlighted. What can be the possible cause of this problem? a. There are bad sectors in any of the hard disks. b. The hard disks are not of the same manufacturer. c. A minimum of three hard disks is required for creating RAID-5 volumes. d. The hard disks have not been activated. Correct Answer: -> c 26/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 27/ Identify the group that has full control over all domains that exist in an Active Directory forest. a. Security. b. Domain Admins. c. Backup Operator. d. Enterprise Admins. Correct Answer: -> d 28/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the clients computer. Correct Answer: -> a 29/ Kate, the system administrator in ServeYourMoney Inc. wants to ensure that the call center

executives of the company are able to view the daily calls data file in the calls folder. Kate also wants to ensure that the executives do not delete data from the folder. Which option will enable Kate to accomplish this task? a. Apply Full Control folder permission on the calls folder. b. Apply Write folder permission on the calls folder. c. Apply Read folder permission on the calls folder. d. Apply Modify folder permission on the calls folder. Correct Answer: -> c 30/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition. Correct Answer: -> b 31/ As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid a similar situation, you plan to apply security settings for the fresh installation. Which security template will you use to perform this task? a. Setup security.inf b. DC security.inf c. Secure*.inf d. Security Set up.inf Correct Answer: -> a 32/ As a system administrator, you need to deploy different types of GPOs on the domain, organizational units, and individual users working on server computers. To avoid problems related to Group Policy inheritance, you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on server computers. Which of the following tools will enable you to do this task? a. Group Policy Modeling b. Group Policy Object Reporting c. Group Policy Object Modeling d. Group Policy Object Simulating Correct Answer: -> a 33/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You dont have appropriate rights for the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 34/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales department to the administration department. You plan to move Harrys computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. c. Disable the computer account, PC02, in the sales organizational unit. d. Create a new computer account, PC02, in the administration organizational unit. Correct Answer: -> a 35/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.

Correct Answer: -> b

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ A user account that has similar properties already configured is called ___________. a. Domain user account b. Local user account template c. Local account template d. User account template Correct Answer: -> d 2/ Which of the following audit policies is enabled by the Default Domain Controllers Policy? a. Audit Service Access b. Audit Directory Service Access c. Audit Domain Controllers d. Audit Child Domain Policies Correct Answer: -> b 3/ You notice that the applications on your Windows Server 2003 computer are running slowly. As a first step to troubleshoot this problem, you open the Task Manager window, which shows the CPU usage as 100%. You uninstall a downloaded application, which you suspect was causing the problem. In future, you want to be notified through a CPU alert whenever the processor usage exceeds the limit of 50 percent. What will you do to receive the notification? a. Configure an alert when CPU usage exceeds 50 percent. b. Configure a counter log when CPU usage exceeds 50 percent. c. Configure a trace log when CPU usage exceeds 50 percent. d. Configure a security log when CPU usage exceeds 50 percent. Correct Answer: -> a 4/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> d 5/ You want to ensure similar desktop settings for all users in an organization. Which option will enable you to do this task? a. Make all the end user profiles mandatory. b. Set the background of each computer. c. Create a group account and configure the settings of the group account. d. Customize all user accounts one by one. Correct Answer: -> a 6/ Which of the following is a logical boundary of an organizations network? a. Domain b. Tree c. Forest d. Organizational unit Correct Answer: -> a 7/ You are the system administrator of your organization. You have applied various Group Policies on the users of the network. Now, you want to reapply these Group Policies on a new group. Which option of the Gpupdate command will you use to perform this task? a. /Target b. /Force c. /sync d. /Wait Correct Answer: -> b 8/ You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all

client computers updated with patches and critical system updates from Microsoft. You plan to install software update service on a server, which will download all the required software updates and distribute the updates to the clients. Identify the server on which you should install the software update service. a. Server with DNS installed b. Server with RRAS installed c. Server with IIS installed d. Server with DHCP installed Correct Answer: -> c 9/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 10/ Which of the following is a collection of user accounts and domain local groups that are created on a member server or a stand-alone server? a. Local group b. Global group c. Universal group d. Security group Correct Answer: -> a 11/ You have implemented mirrored volume on your Windows Server 2003 computer to enhance availability of the data stored in your computer. You plan to avoid a situation in which the data becomes inaccessible due to the failure of the common disk controller. Which of the following options will enable you to accomplish this task? a. Add another hard disk. b. Add another hard disk and create a stripe set and copy the temp folder to it. c. Add another hard disk and create a mirror partition. d. Add separate disk controllers for each hard disk. Correct Answer: -> d 12/ You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you want to save disk space and back up only those files that have been created or modified. Which of the following options will enable you to accomplish this task? a. Schedule incremental backup of the Accounts folder on the first Monday of every month. b. Schedule normal backup of the Accounts folder on the first Monday of every month. c. Schedule copy backup of the Accounts folder on the first Monday of every month. d. Schedule daily backup of the Accounts folder on the first Monday of every month. Correct Answer: -> a 13/ Consider the following statements: Statement A: You can extend a simple or spanned volume on a dynamic disk by using the DISKPART command. Statement B: You can create an extended partition only on a basic disk. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 14/ Consider the following statements: Statement A: Group Policy is a feature of the Computer Management utility. Statement B: Group Policies can only be applied to multiple users. Which of the following options is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.

Correct Answer: -> a 15/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 16/ Steve is the system administrator in PQR Corp. The network of PQR Corp consists of 300 computers running Windows 2000 Professional and 50 computers running Windows Server 2003. To enhance network security, Steve applies a GPO from his Windows Server 2003 computer. Steve notices that the logon process on his computer becomes very slow after the GPO is applied. Which of the following options will enable him to solve this problem? a. Steve should disable unused policies in a GPO. b. Steve should install service pack 3 of Windows Server 2003 to speed up the log on process. c. Steve should increase the RAM of his Windows Server 2003 computer to speed up the logon process. d. Steve should re-install Windows Server 2003 on his compute and re-apply the GPO. Correct Answer: -> a 17/ You are a system administrator of an organization that consists of 1000 users who use Windows Server 2003 and Windows 2000 computers. To secure the organizations network, you and the junior administrators have planned and implemented several GPOs on the domain and organizational units. In addition, you have implemented Group Policies on individual users also. As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and Group Policies. While conducting this review you need to view the configured GPOs in a report format, which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which the GPO is applied. Identify the tool that will enable you to view GPOs in the report format. a. Group Policy Modeling b. Group Policy HTML Report c. Group Policy Reporting d. Group Policy HTML Reporting Correct Answer: -> c 18/ You can access a folder locally but you cannot access the same folder through the network even if the folder is shared. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. Offline caching is implemented on the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 19/ As a system administrator, you need to secure the organizations domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To implement this, which security policy do you need to configure? a. Configure the Enforce old password history policy. b. Configure the Enforce password history policy. c. Configure the Enforce password history list policy. d. Configure the Enforce old password history list policy. Correct Answer: -> b 20/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition. Correct Answer: -> b

21/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 1. What will you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver or verify that the device has been properly configured. b. Verify that the device driver is not corrupt. c. Restart the computer. d. Verify that the BIOS for the hardware device is enabled. Correct Answer: -> a 22/ You want to promote a member server as an additional domain controller in your domain for fault tolerance. For ensuring security for this additional domain controller, you need to apply specific security policies. Which security template will you use to perform this task? a. Secure DC.inf b. DC security.inf c. Secure*.inf d. Set up DC.inf Correct Answer: -> b 23/ A local group called Printer User consists of end user accounts that are currently accessing the printer in your domain. You have already removed the Everyone special group from the Printer user group so that only the specified end users have access to the printer. To tighten security, you want the individuals using the printer to manage their own print jobs. However you want the users to view all the print jobs sent to the printer. What is the best way to implement this? a. Assign the Print permission to the Printer user group. b. Assign the Manage document permission to the Printer user group. c. Assign the Read and manage document permission to the Creator owner group. d. Assign the Manage documents permission to the Creator owner group. Correct Answer: -> a 24/ As a system administrator, you want to allocate disk quotas for each user in your organization. When you try to allocate disk quotas, you receive an error message that indicates that you cannot configure disk quotas. What is the probable cause of this problem? a. You do not have the right to configure disk quotas. b. The file system being used is not NTFS. c. The disks have not been configured properly. d. The disks being used are corrupt. Correct Answer: -> b 25/ Which of the following options enables you to install the device drivers that are not digitally signed? a. Warn. b. Install. c. Ignore. d. Update. Correct Answer: -> c 26/ The printer translates the print language into ______before printing the document. a. Bitmap. b. PNG. c. JPEG. d. TIFF. Correct Answer: -> a 27/ As a system administrator, you want to provide high degree of security to domain controllers. For implementing this level of security, you want that the domain controllers should use digitally signed communication channels. Which of the following security templates will enable you to do this? a. Compatws.inf b. Securedc.inf c. Hisecdc.inf d. Setup Security.inf Correct Answer: -> c 28/ Which of the following enables you to centrally administer files and applications over a network? a. Group Policy. b. User Accounts. c. NTFS.

d. Shared folder. Correct Answer: -> d 29/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, Dumping Physical Memory. Which of the following options can be a possible solution to this problem? a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want to install Windows Server 2003. b. Disable the Cache Shadow option in the BIOS. c. Replace the RAM. d. Replace the hard disk. Correct Answer: -> b 30/ You are the system administrator of your organization. You want to delegate the following rights and permissions to your junior, Chris, who has recently joined your organization: Create and delete shared resources Stop and start services Backup and restore files. Format drives and shut down domain controllers in the network. Which of the following options will enable you to accomplish this task with least administrative effort? a. Add Chris to the Server Operators group. b. Add Chris to the Performance Log Users group. c. Add Chris to the Enterprise Admins group. d. Add Chris to the Backup Operators group. Correct Answer: -> a 31/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP b. SSL c. NNTP d. FTP Correct Answer: -> b 32/ Consider the following statements: Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services (DNS) namespace. Statement B: Trees are implemented in the domain structure of an organization when the organization requires multiple domains. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 33/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 34/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort?

c. Create user accounts using user profiles. d. Create user accounts using command line tools. a. Create user accounts using user account template. b. Create 30 user accounts one by one. Correct Answer: -> a 35/ Consider the following statements: Statement A: Filtering enables you to apply specific Group Policy settings to specific users and computers in a container. Statement B: The Explicitly deny method is used to deny access to the Group Policy settings. Statement C: The Remove Authenticated Users method restricts explicit permissions for the GPO to the domain administrators. Which of the following is correct about the above statements? a. Statement A, B, and C are true. b. Only Statements A and B are true. c. Only Statements A and C and true. d. Statement A, B, and C are false. Correct Answer: -> b

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH. What does this error message indicate? a. The Windows Installer service has failed to start. b. The data entered is invalid. c. One of the parameters entered is invalid. d. The data entered is of incorrect type. Correct Answer: -> d 2/ Which of the following options enables a print device to communicate with the operating system? a. System Monitor b. Print Driver c. Print Server d. Print Job Correct Answer: -> b 3/ You are the system administrator for CellGo. The organizational hierarchy consists of a head office and three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All the servers run Windows Server 2003. You work from the head office. Each branch office has a system administrator assigned to it. You want to review the auditing information of each branch office server. What should you do to view the auditing information with minimum administrative cost? a. View the security template from the Security Configuration and Analysis snap-in. b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view Event Viewer. c. Run the Seregcedit.exe utility and specify the appropriate parameters. d. Establish a Remote Desktop client session with each branch office server. Correct Answer: -> b 4/ Identify the physically separated part of a domain network, which is connected with a slow wide area network (WAN) link to the domain network. a. Domain controller. b. Site. c. Forest. d. Organizational unit. Correct Answer: -> b 5/ Consider the following statements: Statement A: When you copy a file from an NTFS partition and paste it within the NTFS partition, the file inherits the permissions of the destination folder.

Statement B: When you copy a file from an NTFS partition and paste it to a different NTFS partition, the file inherits the permissions of the destination folder. Statement C: When you copy a file from an NTFS partition and paste it to a FAT partition, the file loses its permissions. Which of the following is correct about the above statements? a. Statements A, B, and C are false. b. Statements A, B, and C are true. c. Only Statements A and C are true. d. Only Statement B is true. Correct Answer: -> b 6/ John needs to back up all the files changed during the day. The backup method should be such that in case of breakdown he can recover the files at the earliest. John wants to use a backup method that does not use too many resources. Which of the following backup methods should John use? a. Normal backup on Sunday and incremental backup from Monday to Saturday. b. Normal backup on Sunday and differential backup from Monday to Saturday. c. Normal backup on Sunday and daily backup from Monday to Saturday. d. Normal backup on all days. Correct Answer: -> b 7/ As a system administrator, you need to secure the member servers of your network by defining stronger password and audit settings. Which of the following security templates will enable you to do this? a. DC Security.inf b. Securews.inf c. Securedc.inf d. Wssecure.inf Correct Answer: -> b 8/ Identify the group that has the rights and permissions to create and delete shared resources, stop and start services, and backup and restore files. a. Backup Operators. b. Administrators. c. Print Operators. d. Server Operators. Correct Answer: -> d 9/ You are the system administrator of CellGo, which has a single domain called CellGo.com. All the servers run on Windows Server 2003. The head office of CellGo is situated in Washington from where you want to administer the Windows Server 2003 computer named, ServerNY, located at the New York branch. _Which of the following options will enable you to administer ServerNY from your node in the Washington office? a. Install terminal server on ServerNY and connect it to your node. b. Enable remote connection and Remote Desktop on ServerNY and use Remote Desktop for Administration. c. Install Remote Desktop for Administration on ServerNY and enable remote connection and Remote Desktop. d. Enable IIS on your node and implement Offline caching. Correct Answer: -> b 10/ Consider the following statements: Statement A: You can apply disk quotas on a FAT partition to track and limit the disk space used for a selected volume or disk. Statement B: You can use the shadow copies utility to store read-only copies of files stored in shared folders at specific time intervals. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 11/ Which of the following options enables you to prevent the installation of any unsigned device driver? a. Warn. b. Stop.

c. Prevent. d. Block. Correct Answer: -> d 12/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the clients computer. Correct Answer: -> a 13/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 1. What will you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver or verify that the device b. Verify that the device driver is not corrupt. has been properly configured. c. Restart the computer. d. Verify that the BIOS for the hardware device is enabled. Correct Answer: -> a 14/ You want to generate RsoP queries for the users in your organization to view the Group Policy settings applied to them. Which of the following tools will enable you to perform this task? a. Gpupdate.exe b. Gpresult.exe c. Group Policy Management Console d. Group Policy Object Editor Correct Answer: -> d 15/ Which audit policy is intended for the domain controllers that authenticate users as they log on to other computers? a. Audit object access b. Audit logon events c. Audit Account logon events d. Audit Account management Correct Answer: -> c 16/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 17/ A user account that has similar properties already configured is called ___________. a. Domain user account b. Local user account template c. Local account template d. User account template Correct Answer: -> d 18/ Which edition of Windows Server 2003 matches the requirements of small organizations and provides several key utilities, such as secure Web access and printer sharing? a. Standard edition b. Enterprise edition d. Web edition c. Datacenter edition Correct Answer: -> a

19/ Consider the following two statements: Statement A: When you move a file within an NTFS partition, the file loses its original permissions. Statement B: When you move a file from an NTFS partition to a different NTFS partition, the file inherits the permissions of the destination folder. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 20/ Consider the following statements: Statement A: A spanned volume offers fault tolerance. Statement B: A striped volume increases the speed at which data is read and written, but it does not offer fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 21/ As a system administrator, you want to configure security settings for the password and account lockout policies for all the users of the domain. In addition, you want to configure security settings for security and application log sizes. Which of the following security policies will you need to configure? a. Account lockout policies and Application log policies. b. Account policies and Event log policies. c. Account policies and Application log policies. d. Account lockout policies and Event log policies. Correct Answer: -> b 22/ You are the system administrator of Red Star Corp. John requests you to install a printer on his computer. To install the printer for John, you required the printer driver files. Identify the folder that you need to access to get the files. a. Print$ folder b. Admin$ folder c. Printer$ folder d. Prn$ folder Correct Answer: -> a 23/ Consider the following statements: Statement A: Filtering enables you to apply specific Group Policy settings to specific users and computers in a container. Statement B: The Explicitly deny method is used to deny access to the Group Policy settings. Statement C: The Remove Authenticated Users method restricts explicit permissions for the GPO to the domain administrators. Which of the following is correct about the above statements? a. Statement A, B, and C are true. b. Only Statements A and B are true. c. Only Statements A and C and true. d. Statement A, B, and C are false. Correct Answer: -> b 24/ Which file system supports partitions only up to 2 TB in size? a. FAT. b. FAT 32. c. NTFS. d. FAT 16. Correct Answer: -> b 25/ As a system administrator, you need to secure the organizations domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To

implement this, which security policy do you need to configure? a. Configure the Enforce old password history policy. b. Configure the Enforce password history policy. c. Configure the Enforce password history list policy. d. Configure the Enforce old password history list policy. Correct Answer: -> b 26/ As a system administrator, you need to deploy different types of GPOs on the domain, organizational units, and individual users working on server computers. To avoid problems related to Group Policy inheritance, you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on server computers. Which of the following tools will enable you to do this task? a. Group Policy Modeling. b. Group Policy Object Reporting. c. Group Policy Object Modeling. d. Group Policy Object Simulating. Correct Answer: -> a 27/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> d 28/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You dont have appropriate rights for the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 29/ You want to delegate the task of performing backup and restore operations to your junior administrator, Steve. Which of the following options will enable you to do this? a. Add Steve to the Backup Operators group. b. Add Steve to the Enterprise Administrator group. c. Add Steve to the Network group. d. Add Steve to the Domain Users group. Correct Answer: -> a 30/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? a. Create user accounts using user account template. b. Create 30 user accounts one by one. c. Create user accounts using user profiles. d. Create user accounts using command line tools. Correct Answer: -> a 31/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP. b. SSL. c. NNTP. d. FTP. Correct Answer: -> b 32/ Consider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.

Which of the following options is correct about the above statements? a. Statement A is true and Statement B is false. b. Both, statement A and statement B are true. c. Both, statement A and statement B are false. d. Statement A is false and Statement B is true. Correct Answer: -> d 33/ Ken finds that the access token granted during the log on session is large. He decides to reduce the token size so that the logon process can be fast. Which group should Ken create to achieve this? a. Security. b. Distribution. c. Universal. d. Global. Correct Answer: -> b 34/ You have created a GPO, Security_GPO, and linked it to the Marketing and Finance organizational units. However, due to change in the organizational structure, you do not want this GPO to be applied to both the organizational units. In addition, you want to retain this GPO. Which of the following options will enable you to do this task? a. Delete the Security_GPO GPO and create a similar GPO. b. Create another GPO containing similar Group Policies. c. Remove the GPO link and delete the Security_GPO GPO. d. Remove the Security_GPO GPO link. Correct Answer: -> d 35/ You are the system administrator of your organization. John complains that his Windows Server 2003 computer is taking more time in accessing files. Which option is a possible solution to this problem? a. Disable shadow copies on his computer. b. Clean the disk space by using the Disk Cleanup utility and defragment the hard disk by using the Disk Defragmenter utility. c. Reinstall Windows Server 2003. d. Repair Windows Server 2003. Correct Answer: -> b TCP/IP Fundamentals and Concepts 1 b 21 d 41 b 2 b 22 c 42 a 3 c 23 d 43 b 4 c 24 b 44 d 5 d 25 a 45 d 6 b 26 a 46 b 7 a 27 d 47 b 8 d 28 c 48 c 9 d 29 d 49 b 10 c 30 b 50 a 11 a 31 c 51 12 b 32 c 52 13 c 33 b 53 14 c 34 d 54 15 b 35 a 55 16 d 36 b 56 17 d 37 b 57 18 d 38 a 58 19 b 39 c 59 20 b 40 d 60

Managing and Maintaining Windows Server 2003 (1) 1 b 21 c 2 c 22 b 3 b 23 c 4 c 24 b 5 c 25 a 6 d 26 b 7 c 27 b 8 a 28 a 9 a 29 b 10 a 30 a 11 c 31 d 12 b 32 a 13 d 33 d 14 a 34 a 15 a 35 b 16 b 36 17 c 37 18 c 38 19 b 39 20 c 40

Managing and Maintaining Windows Server 2003 (2) 1 b 21 b 2 d 22 d 3 c 23 b 4 b 24 a 5 a 25 c 6 b 26 b 7 d 27 d 8 b 28 a 9 d 29 c 10 d 30 b 11 d 31 a 12 d 32 a 13 b 33 a 14 b 34 a 15 b 35 b 16 c 36 17 d 37 18 a 38 19 c 39 20 b 40

Quarter 5 Review TCP/IP Fundamentals and Concepts

1/ Which of the following MAN components provide connectivity between MANs and LANs, between networks with different topologies, or between networks using different network standards? a. Bridges. b. Routers. c. Switches. d. Repeaters. Correct Answer: -> b 2/ Statement A: With TCP, applications exchange messages over the network with a minimum of protocol overhead. Statement B: TCP enables hosts to maintain multiple simultaneous connections. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true. Correct Answer: -> b 3/ You are analyzing UDP data packets from node A to node B using a network Analyzer. From the given figure, find out the length of the data packet?

a. 53 b. 92 c. 58 d. 1090 Correct Answer: -> c 4/ Sky Lark Inc. is an IT-based company. It has provided laptops with Windows 2000 Professional to their employees. The employee transfers are very frequent in this company so the laptops move from one subnet to another subnet. You want to automatically assign the TCP/IP configuration to the laptop connected. Which service should you use? a. BOOTP b. DNS c. DHCP d. DHCP relay agent

Correct Answer: -> c 5/ You want to enable Windows ME, Linux and Macintosh computers to use Internet Explorer to access your Web servers by using a host name. Which of the following service should you use? a. DHCP b. Hosts c. BOOTP d. DNS Correct Answer: -> d 6/ Statement A: IP generates control messages related to any error in connection or flow control over the network. Statement B: IP is responsible for addressing and forming the data packets to be transferred over the network. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> b 7/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service. b. Fragment Offset. c. Options. d. Flags. Correct Answer: -> a 8/ Statement A: Infrared transmissions can provide line of sight communications over short distances. Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial links. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true. Correct Answer: -> d 9/ You are analyzing IP data packets from node A to node B using a Network Analyzer. From the given figure, identify the error control value?

a. 0x86ee b. 0x01 c. 0x00 d. 0x5332 Correct Answer: -> d 10/ Gregg is a network administrator in a large finance organization, which is having a Windows 2003 Server. For the last 2-3 weeks he found that the network traffic is getting very heavy to the Window 2003 Server. He wants to track all the traffic to the Windows 2003 Server. What action should he perform? A. He should use network analyzer on any node of the network. B. He should use network analyzer on the Windows 2003 Server of the network. C. He should enable the Promiscuous Mode in the network analyzer. D. He should disable the Promiscuous Mode in the network analyzer. a. A and C. b. B and D. c. B and C. d. A and D. Correct Answer: -> c 11/ A local area network is handling large number of client computers. The network administrator was previously using the BOOPTP protocol for handling the client computers. The administrator is having a problem in manually allocating and configuring the IP addresses over the network. The protocol is also not able to detect the unused IP addresses over the network for their future allocation to another client. Which of the following protocol does the administrator implement to overcome that problem? a. DHCP protocol. b. BOOTP protocol. c. Internet protocol. d. Stop-and-wait protocol. Correct Answer: -> a 12/ From the given figure, specify the type of delivery of data packets between Node X to Router 1 and between Router 1 and Router 2.

a. Both will use direct delivery. b. It will be direct delivery between Node X to Router 1 and indirect delivery between Router 1 and Router 2. c. It will be indirect delivery between Node X to Router 1 and direct delivery between Router 1 and Router 2. d. Both will use indirect delivery and Router 2. Correct Answer: -> b 13/ Your company wants to setup a LAN environment. You are assigned to design the new network. You want to implement a device, which: 1. Joins multiple computers or other network devices together to form a single network segment. 2. Amplify and regenerate the signal from one node to another in a network. 3. Provides a common connection point for computers, printers, and other network devices in a star topology network. Which of the following network component will meet the preceding requirements? a. Repeaters. b. Hubs. c. Switch. d. Bridge. Correct Answer: -> c 14/ In which of the following state, the DHCP client enters, after sending the DHCPDISCOVER message? a. Initializing state. b. Requesting state. c. Selecting state. d. Bound state. Correct Answer: -> c 15/ Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the servers are configured as static routers. The network is divided into various subnets depending on departments. He wants to identify the path that a data packet takes as it passes through the routers. Which of the following utility will he use? a. Ipconfig.exe b. Tracert.exe c. Route.exe d. Ping.exe Correct Answer: -> b 16/ Which of the following is a reliable protocol of the Transport layer? a. IP b. TCP d. ICMP c. UDP Correct Answer: -> b

17/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given figure, find out the destination port number?

a. 1090 b. 58 c. 17 d. 53 Correct Answer: -> d 18/ Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header, provides integrity and confidentiality to IPv6 datagrams. Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating Security Header, provides authentication and integrity to IPv6 datagrams. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> d 19/ Alder tries to connect a ftp server from a node having Windows 2000 professional by issuing the command: ftp sales.books.com but it fails. But he is able to connect the server by using the windows explorer program. What is the likely problem? a. No DNS server configured on Alders workstation. b. No DNS client configured on Alders workstation. c. No default gateway defined on the server. d. No DNS server defined on the server. Correct Answer: -> b 20/ In which of the following modes, two nodes can send as well as receive data but not at the same time? a. Simplex mode. b. Half-duplex mode. c. Full-duplex mode. d. Promiscuous mode.

Correct Answer: -> b 21/ Which of the following layer comes below Network Layer in the bottom-up approach of OSI Reference Model? a. Transport Layer. b. Session Layer. c. Presentation Layer. d. Data Link Layer. Correct Answer: -> d 22/ Which of the following is the correct definition for Ethernet Access Method? a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream, by checking for matches between the data transmitted and the data received. b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and which to block. c. Ethernet Access Method is a set of rules that defines how a computer transmits data on the network cable and retrieves data from the cable. d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large, heterogeneous networks. Correct Answer: -> c 23/ Your company decided to open small branch offices in various cities of US. Each branch office will have 10-12 nodes, 1 fax machine and 1 printer. You were asked to design the network of each branch office. You decided to have peer-to-peer network in the branch offices. You were asked to analyze the advantages of the peer-to-peer network. Which of the following are the advantages of peer-to-peer network? A. Strong central security B. Easy setup C. Ability of users to control resources sharing D. No network administrator required E. Optimized dedicated servers a. A, B and D. b. B, D and E. c. A, B and E. d. B, C and D. Correct Answer: -> d 24/ A datagram received from one network may be too large to be transmitted in a single packet on a different network. Which of the following TCP/IP protocol helps the router to divide the datagram into smaller pieces? a. ICMP b. IP c. IGMP d. TCP Correct Answer: -> b 25/ Which of the following is an 8-bit value field that defines the type of BOOTP packet? a. Operation Code. b. Hop count. c. Hardware Type. d. Options. Correct Answer: -> a 26/ Tom tries to connect a ftp server from a node having Windows 2000 professional by issuing the command ftp sales.books.com. He received the following error message Bad IP Address. He then successfully pings the server. What is the likely problem? a. No DNS client configured on Toms workstation. b. No DNS server configured on Toms workstation. c. No default gateway defined on the server. d. No DNS server defined on the server. Correct Answer: -> a 27/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given figure, find out the destination port number?

a. 1090 b. 58 c. 17 d. 53 Correct Answer: -> d 28/ Statement A: Name server is a computer that maintains the database of host names and their corresponding IP addresses for name resolution. Statement B: The function of the resolvers is to pass name request between applications and name servers. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> c 29/ You can connect through Windows explorer to all nodes on the local network, but cannot connect to any nodes on the remote subnet. Which IP address should you ping first to diagnose the problem? a. Ping <IP Address of the local server> b. Ping <IP Address of the remote server> c. Ping <IP Address of the local host> d. Ping <IP Address of the default gateway> Correct Answer: -> d 30/ You cannot connect to a Windows 2000 Server from a node running on Windows 2000 Professional using Windows Explorer. Both the server and the node are in the same physical network. By using a network analyzer, you found that each time the node attempts to connect to the server, it broadcasts an ARP request for the default gateway. What is the most likely cause of the problem? A. Invalid default gateway address on the Windows 2000 Professional node B. Invalid subnet mask on the Windows 2000 Professional node C. Invalid default gateway address on the Windows 2000 Server D. Invalid subnet mask on the Windows 2000 Server a. A b. B

c. C d. D Correct Answer: -> b 31/ It is developed to implement file transfer, printer sharing, and mail service among Apple systems. Macintosh machines have them installed by default. Identify the protocol. a. DLC. b. SNA. c. AppleTalk. d. IPX/SPX. Correct Answer: -> c 32/ Statement A: Transport Layer is responsible for process-to-process communication. Statement B: The Transport layer can delivery a data packet either reliably or unreliably. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> c 33/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address. The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a DHCP address to the node? a. He has to create a new scope for the node. b. A RFC 1542 compliant router to be added in the network. c. Provide a new DHCP server in the network. d. A bridge to be added in the network. Correct Answer: -> b 34/ Which of the following WAN components converts the digital signals from the computer to analog signals? a. Routers. b. Brouters. c. CSU/DSU. d. Modem. Correct Answer: -> d 35/ Which of the following record helps the DNS in providing information about the host such as, operating system used? a. HINFO. b. Start of authority (SOA). c. Address (A). d. Canonical Name (CNAME). Correct Answer: -> a 36/ Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the servers are configured as static routers. The network is divided into various subnets depending on departments. He wants to identify the path that a data packet takes as it passes through the routers. Which of the following utility will he use? a. Ipconfig.exe b. Tracert.exe c. Route.exe d. Ping.exe Correct Answer: -> b 37/ Statement A: IPv6 data packets are exchanged and processed on each host by using IPv6 at the Network Access layer. Statement B: In IPv6, the Internet layer creates IPv6 packets including the source and destination address information that is used to route the data through the network. Which of the following options is correct about the above statement?

a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> b 38/ You are analyzing TCP data packets from node A to node B using a Network Analyzer. From the given figure, find out the size of the header?

a. 28 bytes. b. 8 bytes. c. 60 bytes. d. 40 bytes. Correct Answer: -> a 39/ Which of the following is the correct definition for Ethernet Access Method? a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream, by checking for matches between the data transmitted and the data received. b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and which to block. c. Ethernet Access Method is a set of rules that defines how a computer transmits data on the network cable and retrieves data from the cable d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large, heterogeneous networks. Correct Answer: -> c 40/ Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header, provides integrity and confidentiality to IPv6 datagrams. Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating Security Header, provides authentication and integrity to IPv6 datagrams. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false. Correct Answer: -> d

41/ Which of the following layer of the OSI Reference model is responsible for routing, switching, and controlling the flow of data between nodes? a. Transport Layer. b. Network Layer. c. Presentation Layer. d. Physical Layer. Correct Answer: -> b 42/ Tom is designing a network for his office. He is not able to decide on the type of transmission medium. His office is in an area that is prone to high levels of EMI or for long distance data transmissions, where electrical signals are significantly distorted and degraded. He wants minimum distortion of signals in the transmission medium. a. He can select fibre-optic cables. b. He can select twisted-pair cables. c. He can select both fibre-optic cables or twisted-pair cables. d. He can select both coaxial cables or twisted-pair cables. Correct Answer: -> a 43/ Which of the following DHCP message consists of the IP address and additional configuration information, such as lease duration and subnet mask? a. Discover message. b. Offer message. c. Request message. d. Bootreply message. Correct Answer: -> b 44/ Statement A: Infrared transmissions can provide line of sight communications over short distances. Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial links. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true. Correct Answer: -> d 45/ You are a network administrator in a finance organization. You want to configure your Windows 2003 Server on the Internet and download files. Which of the following service you should use in the Windows 2003 Server? a. Telnet. b. SMTP. c. SNMP. d. FTP. Correct Answer: -> d 46/ Which of the following protocols function at the Transport Layer? a. ICMP and IGMP. b. TCP and UDP. c. TCP and FTP. d. Network Access Layer. Correct Answer: -> b 48/ Tim George is a network administrator in an organization. The organization has three subnets. One subnet has only laptop Windows 2000 Professional nodes. The other two subnets have Windows 2000 nodes. Tim has installed a DHCP server to support all the clients. Tim wants to set the IP lease period for the laptops to 7 days and for the other two subnets to 20 days. How should Tim implement this? a. Create one DHCP scope for all subnets. For each node, create an exclusion range with a unique lease period. b. Create one DHCP scope for all subnets. For each node other than laptops, create a reservation with a 30-day lease period. c. Create one DHCP scope for each subnet. Specify the lease period as part of the scopes configuration. d. Create one DHCP scope for each subnet. Create a global option that specifies a lease period that is based on the operating system the client computer is running. Correct Answer: -> c

49/ Which of the following RFCs define the protocols of the Network Access Layer? a. RFC 926 and RFC 951 b. RFC 826 and RFC 894 c. RFC 826 and RFC 951 d. RFC 894 and RFC 926 Correct Answer: -> b 50/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service b. Fragment Offset c. Options d. Flags Correct Answer: -> a

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 2/ Which audit policy is intended for the domain controllers that authenticate users as they log on to other computers? a. Audit object access b. Audit logon events c. Audit Account logon events d. Audit Account management Correct Answer: -> c 3/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 4/ When James tries to open a newly installed application, his computer hangs. He tries to restart his computer but fails to do so. Which of the following options will enable James to restart the computer? a. Boot the computer using the Safe Mode with Networking option. b. Boot the computer using the Last Known Good Configuration. c. Boot the computer using the Safe Mode option. d. Boot the computer using the Windows Startup Disk. Correct Answer: -> c 5/ As a system administrator, you have created a GPO that is applied to the organizations domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users.

Correct Answer: -> c 6/ Consider the following statements: Statement A: Audit policies enable you to track the success of certain events and failure of all the events. Statement B: Audit policies only track the activities performed by a user. Statement C: You can use the audit policies to track the location where the activity occurred. Which of the following is correct about the above statements? a. Only Statement A is true. b. Only Statement B is true. c. Statements A, B, and C are true. d. Only Statement C is true. Correct Answer: -> d 7/ You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all client computers updated with patches and critical system updates from Microsoft. You plan to install software update service on a server, which will download all the required software updates and distribute the updates to the clients. Identify the server on which you should install the software update service. a. Server with DNS installed. b. Server with RRAS installed. c. Server with IIS installed. d. Server with DHCP installed. Correct Answer: -> c 8/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the clients computer. Correct Answer: -> a 9/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You dont have appropriate rights for the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 10/ Which of the following is a logical boundary of an organizations network? a. Domain b. Tree c. Forest d. Organizational unit Correct Answer: -> a 11/ You are a system administrator of an organization that consists of 1000 users who use Windows Server 2003 and Windows 2000 computers. To secure the organizations network, you and the junior administrators have planned and implemented several GPOs on the domain and organizational units. In addition, you have implemented Group Policies on individual users also. As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and Group Policies. While conducting this review you need to view the configured GPOs in a report format, which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which the GPO is applied. Identify the tool that will enable you to view GPOs in the report format. a. Group Policy Modeling b. Group Policy HTML Report c. Group Policy Reporting d. Group Policy HTML Reporting Correct Answer: -> c 12/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can

be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition. Correct Answer: -> b 13/ Consider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed. Which of the following options is correct about the above statements? a. Statement A is true and Statement B is false. b. Both, statement A and statement B are true. c. Both, statement A and statement B are false. d. Statement A is false and Statement B is true. Correct Answer: -> d 14/ Identify the hardware device required for printing a document. a. Print device b. Print driver c. Print server d. Print job Correct Answer: -> a 15/ As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid a similar situation, you plan to apply security settings for the fresh installation. Which security template will you use to perform this task? a. Setup security.inf b. DC security.inf c. Secure*.inf d. Security setup.inf Correct Answer: -> a 16/ Consider the following statements: Statement A: The backup utility of Windows Server 2003 enables you to backup files and folders, schedule a backup, and restore data on the Windows Server 2003 computer. Statement B: ASR is a feature of the backup utility that enables you to recover a Windows Server 2003 computer that does not boot. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 17/ Which container lists the default users and group accounts created by Windows Server 2003? a. Users and Computers b. Builtin and Computers c. Builtin and Users d. Users and Domain Controllers Correct Answer: -> c 18/ Which of the following actions should you take if folder redirection is successful but the files and subfolders are not available? a. Check if the redirected folder exists. b. Check if Remote Desktop for Administration is enabled. c. Check your permissions on the redirected folder. d. Check for the extensions of the files contained in the redirected folder. Correct Answer: -> c 19/ You are the system administrator for CellGo. The network of CellGo consists of a single Active Directory domain named CellGo.com. All network servers run Windows Server 2003. Some of the client

computers run Windows XP Professional and some work on Windows NT Workstation. You install terminal server on three member servers named Cell1, Cell2, and Cell3. You place all three terminal servers in an organizational unit named Terminal Server. You link a GPO to the Terminal Server OU. Five days later, end users notify that the performance of Cell2 is very slow. You discover that Cell2 has 70 disconnected Terminal Server sessions. You need to configure all the three terminal servers to end the disconnected session after 15 minutes of inactivity. You must achieve this goal by using the minimum amount of administrative effort. What should you do? a. Log on to the console of each terminal server. In the RDP-Tcp connection properties dialog box, set the End a disconnected session option to 15 minutes. b. Edit the GPO to set the time limit for disconnected sessions to 15 minutes. c. On Cell2, run the tsdiscon command to disconnect all 70 users from Cell2. d. In Active Directory Users and Computers, set the End a disconnected session option for all domain user accounts to 15 minutes. Correct Answer: -> b 20/ Jenny is the system administrator of a domain named Aztec.com. In this domain, the accounting group and the marketing group share the same printer. Jenny receives a complaint from the marketing group that their small print jobs take a lot of time to print. Jenny finds that the accounting group gives large print jobs to the printer, which causes the delay. She learns that the accounting jobs are not needed on the same day on which the request has been sent to the printer. What should Jenny do to improve the situation? a. Create a separate printer; configure the printer to print directly to the printer port and then direct the accounting group to print through this printer. b. Create a separate printer; configure the printer to start printing immediately, and then direct the marketing group to print through this printer. c. Create a separate printer; configure the printer to be available only after certain hours, and then direct the accounting group to print large documents through this printer. d. Create a separate printer; configure the printer to be available only after certain hours, and then direct the marketing group to print documents through this printer. Correct Answer: -> c 21/ Which of the following options enables you to install the device drivers that are not digitally signed? a. Warn. b. Install. c. Ignore. d. Update. Correct Answer: -> c 22/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 23/ As a system administrator, you want to provide high degree of security to domain controllers. For implementing this level of security, you want that the domain controllers should use digitally signed communication channels. Which of the following security templates will enable you to do this? a. Compatws.inf b. Securedc.inf c. Hisecdc.inf d. Setup Security.inf Correct Answer: -> c 24/ Consider the following statements: Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003. Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false.

d. Statement A is false and Statement B is true. Correct Answer: -> b 25/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales department to the administration department. You plan to move Harrys computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. c. Disable the computer account, PC02, in the sales organizational unit. d. Create a new computer account, PC02, in the administration organizational unit. Correct Answer: -> a 26/ Catherine is a user in your domain. Her username is Cath13 and she has a roaming profile stored in the domain controller. At what location will her desktop be stored? a. \\domain controller\ documents and settings\Cath13\desktop b. C:\documents and settings\Cath13\desktop c. C:\winnt\Profiles\Catherine\desktop d. C:\Profiles\desktop\Catherine Correct Answer: -> b 27/ You are the system administrator of your organization. You need to take backup of the data stored in the Sales_Data folder on the first Monday of every month. Which of the following options enables you to accomplish this task with least administrative effort? a. Take incremental backup of Sales_Data folder on the first Monday of every month. b. Schedule backup job of Sales_Data folder for the first Monday of every month. c. Take normal backup of Sales_Data folder on the first Monday of every month. d. Take differential backup of Sales_Data folder on the first Monday of every month. Correct Answer: -> b 28/ Which of the following protocols uses Transmission Control Protocol to ensure that data transfer is complete and accurate? a. FTP. b. HTTP. c. NNTP. d. SMTP. Correct Answer: -> a 29/ Consider the following statements: Statement A: Security policies cannot be implemented using GPOs. Statement B: Audit policies can be implemented using GPOs. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> b 30/ Identify the NTFS folder permission that enables users to only view the names of files and subfolders contained within a folder? a. List folder contents. b. Full Control. c. Modify. d. Read and Execute. Correct Answer: -> a 31/ Identify the group that has the rights and permissions to create and delete shared resources, stop and start services, and backup and restore files. a. Backup Operators. b. Administrators. c. Print Operators. d. Server Operators. Correct Answer: -> d 32/ You are the system administrator of Red Star Corp. John requests you to install a printer on his computer. To install the printer for John, you required the printer driver files. Identify the folder that you

need to access to get the files. a. Print$ folder. b. Admin$ folder. c. Printer$ folder. d. Prn$ folder. Correct Answer: -> a 33/ You are working as a system administrator in an organization, which has its head office in Chicago. The organization has two branch offices, one in New York and the other in Texas. All the three offices have an interconnected WAN network. As a system administrator, you have been assigned the task of viewing the Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for each computer using the computer name, you decide to use the IP address of each computer with the Gpresult command. Which parameter of the Gpresult command will help you define the name or IP address of the remote computers? a. /u Domain/User b. /p Password c. /user TargerUserName d. /s Computer Correct Answer: -> d 34/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk During installation, setup displays an error message, ERROR_CREATE_FAILED. What does this error message indicate? a. The Windows Installer service has failed to start. b. The hard disk does not have the disk space required to install Windows Server 2003. c. One of the parameters entered is invalid. d. The data entered is of incorrect type. Correct Answer: -> a 35/ Consider the following statements: Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services (DNS) namespace. Statement B: Trees are implemented in the domain structure of an organization when the organization requires multiple domains. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ Christina is the system administrator of StarMoon Technologies. She wants to restore the default permissions for a system drive that has been modified. Which of the following security templates will enable her to do this? a. Hisecws.inf b. Rootsec.inf c. Rootws.inf d. Rootdc.inf Correct Answer: -> b 2/ You want to generate RsoP queries for the users in your organization to view the Group Policy settings applied to them. Which of the following tools will enable you to perform this task? a. Gpupdate.exe b. Gpresult.exe c. Group Policy Management Console. d. Group Policy Object Editor. Correct Answer: -> d

3/ As a system administrator, you have created a GPO that is applied to the organizations domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users. Correct Answer: -> c 4/ Consider the following statements: Statement A: You need at least 100 MB free space on a volume for creating shadow copies. Statement B: You cannot edit shadow copies because they are read-only. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 5/ You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you want to save disk space and back up only those files that have been created or modified. Which of the following options will enable you to accomplish this task? a. Schedule incremental backup of the Accounts folder on the first Monday of every month. b. Schedule normal backup of the Accounts folder on the first Monday of every month. c. Schedule copy backup of the Accounts folder on the first Monday of every month. d. Schedule daily backup of the Accounts folder on the first Monday of every month. Correct Answer: -> a 6/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP. b. SSL. c. NNTP. d. FTP. Correct Answer: -> b 7/ Which policy enables you to specify password restrictions, account lockout policies, and Kerberos policies? a. Local Policies. b. Event Log Policies. c. Password Policies. d. Account Policies. Correct Answer: -> d 8/ Identify the correct method to create local user accounts? a. Select the Start > Programs > Administrative Tools > Microsoft Management Console menu command. b. Select the Start > Programs > Administrative Tools > Computer Management menu command. c. Select the Start > Programs > Administrative Tools menu command. d. Select the Start > Programs > Administrative Tools > Active Directory Users and Computers menu command. Correct Answer: -> b 9/ Which of the following options enables you to prevent the installation of any unsigned device driver? c. Prevent. a. Warn. d. Block. b. Stop. Correct Answer: -> d 10/ You are working as a system administrator in an organization, which has its head office in Chicago. The organization has two branch offices, one in New York and the other in Texas. All the three offices have an interconnected WAN network. As a system administrator, you have been assigned the task of viewing the Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not know the computer accounts of the Texas office. Instead of viewing the applied Group

Policies for each computer using the computer name, you decide to use the IP address of each computer with the Gpresult command. Which parameter of the Gpresult command will help you define the name or IP address of the remote computers? a. /u Domain/User b. /p Password c. /user TargerUserName d. /s Computer Correct Answer: -> d 11/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> d 12/ Consider the following statements: Statement A: A spanned volume offers fault tolerance. Statement B: A striped volume increases the speed at which data is read and written, but it does not offer fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 13/ As a system administrator, you need to secure the organizations domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To implement this, which security policy do you need to configure? a. Configure the Enforce old password history policy. b. Configure the Enforce password history policy. c. Configure the Enforce password history list policy. d. Configure the Enforce old password history list policy. Correct Answer: -> b 14/ The network of your organization consists of 300 end users who use the Windows application server. This application server is used for storing and processing data. The users complain it takes a long time to access the application server. In addition, it takes a long time to process data at certain times of the day. To solve this problem, you need to perform the following tasks: Task 1: Determine if processor is the bottleneck. Task 2: Determine if memory is the bottleneck. Task 3: Determine if network is the bottleneck. To perform these tasks, you propose to run the system monitor at different times throughout the day for a number of days, and view the data generated by the counters of Processor Time, Processor Queue Length, Pages per Second, and Average Disk Queue Length objects. Identify the tasks that will be completed by you if you use the proposed solution. a. Tasks 1 and 3. b. Task 1. c. Tasks 2 and 3. d. Task 3. Correct Answer: -> b 15/ You are the system administrator for CellGo. The organizational hierarchy consists of a head office and three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All the servers run Windows Server 2003. You work from the head office. Each branch office has a system administrator assigned to it. You want to review the auditing information of each branch office server.

What should you do to view the auditing information with minimum administrative cost? a. View the security template from the Security Configuration and Analysis snap-in. b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view Event Viewer. c. Run the Seregcedit.exe utility and specify the appropriate parameters. d. Establish a Remote Desktop client session with each branch office server. Correct Answer: -> b 16/ Which of the following enables you to monitor the performance of printers? a. Device Manager. b. Event Viewer. c. Performance Console. d. Task Manager. Correct Answer: -> c 17/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 29. What should you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver. b. Verify that the device driver is not corrupt. c. Verify that the device driver has been properly configured. d. Check if the BIOS for the hardware device is enabled. Correct Answer: -> d 18/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? a. Create user accounts using user account template. b. Create 30 user accounts one by one. c. Create user accounts using user profiles. d. Create user accounts using command line tools. Correct Answer: -> a 19/ Which of the following options is a collection of multiple domains that share a common schema and global catalog server? a. Active Directory. b. Tree. c. Forest. d. Organizational unit. Correct Answer: -> c 20/ Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of Windows Server 2003 computer from the client computer? a. Admin$ b. Print$ c. C$ d. D$ Correct Answer: -> b 21/ Identify the physically separated part of a domain network, which is connected with a slow wide area network (WAN) link to the domain network. a. Domain controller. b. Site. c. Forest. d. Organizational unit. Correct Answer: -> b 22/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH. What does this error message indicate? a. The Windows Installer service has failed to start. b. The data entered is invalid.

c. One of the parameters entered is invalid. d. The data entered is of incorrect type. Correct Answer: -> d 23/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 24/ Consider the following statements: Statement A: Group Policy is a feature of the Computer Management utility. Statement B: Group Policies can only be applied to multiple users. Which of the following options is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> a 25/ You are the system administrator of your organization. You plan to enhance the availability of data stored in your Windows Server 2003 computer by implementing RAID-5 volumes on two hard disks. However, on the Select the Volume Type page, the RAID-5 volume option is not highlighted. What can be the possible cause of this problem? a. There are bad sectors in any of the hard disks. b. The hard disks are not of the same manufacturer. c. A minimum of three hard disks is required for creating RAID-5 volumes. d. The hard disks have not been activated. Correct Answer: -> c 26/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 27/ Identify the group that has full control over all domains that exist in an Active Directory forest. a. Security. b. Domain Admins. c. Backup Operator. d. Enterprise Admins. Correct Answer: -> d 28/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the clients computer. Correct Answer: -> a 29/ Kate, the system administrator in ServeYourMoney Inc. wants to ensure that the call center

executives of the company are able to view the daily calls data file in the calls folder. Kate also wants to ensure that the executives do not delete data from the folder. Which option will enable Kate to accomplish this task? a. Apply Full Control folder permission on the calls folder. b. Apply Write folder permission on the calls folder. c. Apply Read folder permission on the calls folder. d. Apply Modify folder permission on the calls folder. Correct Answer: -> c 30/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition. Correct Answer: -> b 31/ As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid a similar situation, you plan to apply security settings for the fresh installation. Which security template will you use to perform this task? a. Setup security.inf b. DC security.inf c. Secure*.inf d. Security Set up.inf Correct Answer: -> a 32/ As a system administrator, you need to deploy different types of GPOs on the domain, organizational units, and individual users working on server computers. To avoid problems related to Group Policy inheritance, you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on server computers. Which of the following tools will enable you to do this task? a. Group Policy Modeling b. Group Policy Object Reporting c. Group Policy Object Modeling d. Group Policy Object Simulating Correct Answer: -> a 33/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You dont have appropriate rights for the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 34/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales department to the administration department. You plan to move Harrys computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. c. Disable the computer account, PC02, in the sales organizational unit. d. Create a new computer account, PC02, in the administration organizational unit. Correct Answer: -> a 35/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.

Correct Answer: -> b

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ A user account that has similar properties already configured is called ___________. a. Domain user account b. Local user account template c. Local account template d. User account template Correct Answer: -> d 2/ Which of the following audit policies is enabled by the Default Domain Controllers Policy? a. Audit Service Access b. Audit Directory Service Access c. Audit Domain Controllers d. Audit Child Domain Policies Correct Answer: -> b 3/ You notice that the applications on your Windows Server 2003 computer are running slowly. As a first step to troubleshoot this problem, you open the Task Manager window, which shows the CPU usage as 100%. You uninstall a downloaded application, which you suspect was causing the problem. In future, you want to be notified through a CPU alert whenever the processor usage exceeds the limit of 50 percent. What will you do to receive the notification? a. Configure an alert when CPU usage exceeds 50 percent. b. Configure a counter log when CPU usage exceeds 50 percent. c. Configure a trace log when CPU usage exceeds 50 percent. d. Configure a security log when CPU usage exceeds 50 percent. Correct Answer: -> a 4/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> d 5/ You want to ensure similar desktop settings for all users in an organization. Which option will enable you to do this task? a. Make all the end user profiles mandatory. b. Set the background of each computer. c. Create a group account and configure the settings of the group account. d. Customize all user accounts one by one. Correct Answer: -> a 6/ Which of the following is a logical boundary of an organizations network? a. Domain b. Tree c. Forest d. Organizational unit Correct Answer: -> a 7/ You are the system administrator of your organization. You have applied various Group Policies on the users of the network. Now, you want to reapply these Group Policies on a new group. Which option of the Gpupdate command will you use to perform this task? a. /Target b. /Force c. /sync d. /Wait Correct Answer: -> b 8/ You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all

client computers updated with patches and critical system updates from Microsoft. You plan to install software update service on a server, which will download all the required software updates and distribute the updates to the clients. Identify the server on which you should install the software update service. a. Server with DNS installed b. Server with RRAS installed c. Server with IIS installed d. Server with DHCP installed Correct Answer: -> c 9/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 10/ Which of the following is a collection of user accounts and domain local groups that are created on a member server or a stand-alone server? a. Local group b. Global group c. Universal group d. Security group Correct Answer: -> a 11/ You have implemented mirrored volume on your Windows Server 2003 computer to enhance availability of the data stored in your computer. You plan to avoid a situation in which the data becomes inaccessible due to the failure of the common disk controller. Which of the following options will enable you to accomplish this task? a. Add another hard disk. b. Add another hard disk and create a stripe set and copy the temp folder to it. c. Add another hard disk and create a mirror partition. d. Add separate disk controllers for each hard disk. Correct Answer: -> d 12/ You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you want to save disk space and back up only those files that have been created or modified. Which of the following options will enable you to accomplish this task? a. Schedule incremental backup of the Accounts folder on the first Monday of every month. b. Schedule normal backup of the Accounts folder on the first Monday of every month. c. Schedule copy backup of the Accounts folder on the first Monday of every month. d. Schedule daily backup of the Accounts folder on the first Monday of every month. Correct Answer: -> a 13/ Consider the following statements: Statement A: You can extend a simple or spanned volume on a dynamic disk by using the DISKPART command. Statement B: You can create an extended partition only on a basic disk. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 14/ Consider the following statements: Statement A: Group Policy is a feature of the Computer Management utility. Statement B: Group Policies can only be applied to multiple users. Which of the following options is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.

Correct Answer: -> a 15/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 16/ Steve is the system administrator in PQR Corp. The network of PQR Corp consists of 300 computers running Windows 2000 Professional and 50 computers running Windows Server 2003. To enhance network security, Steve applies a GPO from his Windows Server 2003 computer. Steve notices that the logon process on his computer becomes very slow after the GPO is applied. Which of the following options will enable him to solve this problem? a. Steve should disable unused policies in a GPO. b. Steve should install service pack 3 of Windows Server 2003 to speed up the log on process. c. Steve should increase the RAM of his Windows Server 2003 computer to speed up the logon process. d. Steve should re-install Windows Server 2003 on his compute and re-apply the GPO. Correct Answer: -> a 17/ You are a system administrator of an organization that consists of 1000 users who use Windows Server 2003 and Windows 2000 computers. To secure the organizations network, you and the junior administrators have planned and implemented several GPOs on the domain and organizational units. In addition, you have implemented Group Policies on individual users also. As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and Group Policies. While conducting this review you need to view the configured GPOs in a report format, which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which the GPO is applied. Identify the tool that will enable you to view GPOs in the report format. a. Group Policy Modeling b. Group Policy HTML Report c. Group Policy Reporting d. Group Policy HTML Reporting Correct Answer: -> c 18/ You can access a folder locally but you cannot access the same folder through the network even if the folder is shared. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. Offline caching is implemented on the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 19/ As a system administrator, you need to secure the organizations domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To implement this, which security policy do you need to configure? a. Configure the Enforce old password history policy. b. Configure the Enforce password history policy. c. Configure the Enforce password history list policy. d. Configure the Enforce old password history list policy. Correct Answer: -> b 20/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition. Correct Answer: -> b

21/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 1. What will you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver or verify that the device has been properly configured. b. Verify that the device driver is not corrupt. c. Restart the computer. d. Verify that the BIOS for the hardware device is enabled. Correct Answer: -> a 22/ You want to promote a member server as an additional domain controller in your domain for fault tolerance. For ensuring security for this additional domain controller, you need to apply specific security policies. Which security template will you use to perform this task? a. Secure DC.inf b. DC security.inf c. Secure*.inf d. Set up DC.inf Correct Answer: -> b 23/ A local group called Printer User consists of end user accounts that are currently accessing the printer in your domain. You have already removed the Everyone special group from the Printer user group so that only the specified end users have access to the printer. To tighten security, you want the individuals using the printer to manage their own print jobs. However you want the users to view all the print jobs sent to the printer. What is the best way to implement this? a. Assign the Print permission to the Printer user group. b. Assign the Manage document permission to the Printer user group. c. Assign the Read and manage document permission to the Creator owner group. d. Assign the Manage documents permission to the Creator owner group. Correct Answer: -> a 24/ As a system administrator, you want to allocate disk quotas for each user in your organization. When you try to allocate disk quotas, you receive an error message that indicates that you cannot configure disk quotas. What is the probable cause of this problem? a. You do not have the right to configure disk quotas. b. The file system being used is not NTFS. c. The disks have not been configured properly. d. The disks being used are corrupt. Correct Answer: -> b 25/ Which of the following options enables you to install the device drivers that are not digitally signed? a. Warn. b. Install. c. Ignore. d. Update. Correct Answer: -> c 26/ The printer translates the print language into ______before printing the document. a. Bitmap. b. PNG. c. JPEG. d. TIFF. Correct Answer: -> a 27/ As a system administrator, you want to provide high degree of security to domain controllers. For implementing this level of security, you want that the domain controllers should use digitally signed communication channels. Which of the following security templates will enable you to do this? a. Compatws.inf b. Securedc.inf c. Hisecdc.inf d. Setup Security.inf Correct Answer: -> c 28/ Which of the following enables you to centrally administer files and applications over a network? a. Group Policy. b. User Accounts. c. NTFS.

d. Shared folder. Correct Answer: -> d 29/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, Dumping Physical Memory. Which of the following options can be a possible solution to this problem? a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want to install Windows Server 2003. b. Disable the Cache Shadow option in the BIOS. c. Replace the RAM. d. Replace the hard disk. Correct Answer: -> b 30/ You are the system administrator of your organization. You want to delegate the following rights and permissions to your junior, Chris, who has recently joined your organization: Create and delete shared resources Stop and start services Backup and restore files. Format drives and shut down domain controllers in the network. Which of the following options will enable you to accomplish this task with least administrative effort? a. Add Chris to the Server Operators group. b. Add Chris to the Performance Log Users group. c. Add Chris to the Enterprise Admins group. d. Add Chris to the Backup Operators group. Correct Answer: -> a 31/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP b. SSL c. NNTP d. FTP Correct Answer: -> b 32/ Consider the following statements: Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services (DNS) namespace. Statement B: Trees are implemented in the domain structure of an organization when the organization requires multiple domains. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 33/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 34/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort?

c. Create user accounts using user profiles. d. Create user accounts using command line tools. a. Create user accounts using user account template. b. Create 30 user accounts one by one. Correct Answer: -> a 35/ Consider the following statements: Statement A: Filtering enables you to apply specific Group Policy settings to specific users and computers in a container. Statement B: The Explicitly deny method is used to deny access to the Group Policy settings. Statement C: The Remove Authenticated Users method restricts explicit permissions for the GPO to the domain administrators. Which of the following is correct about the above statements? a. Statement A, B, and C are true. b. Only Statements A and B are true. c. Only Statements A and C and true. d. Statement A, B, and C are false. Correct Answer: -> b

Quarter 5 Review Managing and Maintaining Windows Server 2003


1/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH. What does this error message indicate? a. The Windows Installer service has failed to start. b. The data entered is invalid. c. One of the parameters entered is invalid. d. The data entered is of incorrect type. Correct Answer: -> d 2/ Which of the following options enables a print device to communicate with the operating system? a. System Monitor b. Print Driver c. Print Server d. Print Job Correct Answer: -> b 3/ You are the system administrator for CellGo. The organizational hierarchy consists of a head office and three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All the servers run Windows Server 2003. You work from the head office. Each branch office has a system administrator assigned to it. You want to review the auditing information of each branch office server. What should you do to view the auditing information with minimum administrative cost? a. View the security template from the Security Configuration and Analysis snap-in. b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view Event Viewer. c. Run the Seregcedit.exe utility and specify the appropriate parameters. d. Establish a Remote Desktop client session with each branch office server. Correct Answer: -> b 4/ Identify the physically separated part of a domain network, which is connected with a slow wide area network (WAN) link to the domain network. a. Domain controller. b. Site. c. Forest. d. Organizational unit. Correct Answer: -> b 5/ Consider the following statements: Statement A: When you copy a file from an NTFS partition and paste it within the NTFS partition, the file inherits the permissions of the destination folder.

Statement B: When you copy a file from an NTFS partition and paste it to a different NTFS partition, the file inherits the permissions of the destination folder. Statement C: When you copy a file from an NTFS partition and paste it to a FAT partition, the file loses its permissions. Which of the following is correct about the above statements? a. Statements A, B, and C are false. b. Statements A, B, and C are true. c. Only Statements A and C are true. d. Only Statement B is true. Correct Answer: -> b 6/ John needs to back up all the files changed during the day. The backup method should be such that in case of breakdown he can recover the files at the earliest. John wants to use a backup method that does not use too many resources. Which of the following backup methods should John use? a. Normal backup on Sunday and incremental backup from Monday to Saturday. b. Normal backup on Sunday and differential backup from Monday to Saturday. c. Normal backup on Sunday and daily backup from Monday to Saturday. d. Normal backup on all days. Correct Answer: -> b 7/ As a system administrator, you need to secure the member servers of your network by defining stronger password and audit settings. Which of the following security templates will enable you to do this? a. DC Security.inf b. Securews.inf c. Securedc.inf d. Wssecure.inf Correct Answer: -> b 8/ Identify the group that has the rights and permissions to create and delete shared resources, stop and start services, and backup and restore files. a. Backup Operators. b. Administrators. c. Print Operators. d. Server Operators. Correct Answer: -> d 9/ You are the system administrator of CellGo, which has a single domain called CellGo.com. All the servers run on Windows Server 2003. The head office of CellGo is situated in Washington from where you want to administer the Windows Server 2003 computer named, ServerNY, located at the New York branch. _Which of the following options will enable you to administer ServerNY from your node in the Washington office? a. Install terminal server on ServerNY and connect it to your node. b. Enable remote connection and Remote Desktop on ServerNY and use Remote Desktop for Administration. c. Install Remote Desktop for Administration on ServerNY and enable remote connection and Remote Desktop. d. Enable IIS on your node and implement Offline caching. Correct Answer: -> b 10/ Consider the following statements: Statement A: You can apply disk quotas on a FAT partition to track and limit the disk space used for a selected volume or disk. Statement B: You can use the shadow copies utility to store read-only copies of files stored in shared folders at specific time intervals. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 11/ Which of the following options enables you to prevent the installation of any unsigned device driver? a. Warn. b. Stop.

c. Prevent. d. Block. Correct Answer: -> d 12/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the clients computer. Correct Answer: -> a 13/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 1. What will you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver or verify that the device b. Verify that the device driver is not corrupt. has been properly configured. c. Restart the computer. d. Verify that the BIOS for the hardware device is enabled. Correct Answer: -> a 14/ You want to generate RsoP queries for the users in your organization to view the Group Policy settings applied to them. Which of the following tools will enable you to perform this task? a. Gpupdate.exe b. Gpresult.exe c. Group Policy Management Console d. Group Policy Object Editor Correct Answer: -> d 15/ Which audit policy is intended for the domain controllers that authenticate users as they log on to other computers? a. Audit object access b. Audit logon events c. Audit Account logon events d. Audit Account management Correct Answer: -> c 16/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> b 17/ A user account that has similar properties already configured is called ___________. a. Domain user account b. Local user account template c. Local account template d. User account template Correct Answer: -> d 18/ Which edition of Windows Server 2003 matches the requirements of small organizations and provides several key utilities, such as secure Web access and printer sharing? a. Standard edition b. Enterprise edition d. Web edition c. Datacenter edition Correct Answer: -> a

19/ Consider the following two statements: Statement A: When you move a file within an NTFS partition, the file loses its original permissions. Statement B: When you move a file from an NTFS partition to a different NTFS partition, the file inherits the permissions of the destination folder. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 20/ Consider the following statements: Statement A: A spanned volume offers fault tolerance. Statement B: A striped volume increases the speed at which data is read and written, but it does not offer fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. Correct Answer: -> d 21/ As a system administrator, you want to configure security settings for the password and account lockout policies for all the users of the domain. In addition, you want to configure security settings for security and application log sizes. Which of the following security policies will you need to configure? a. Account lockout policies and Application log policies. b. Account policies and Event log policies. c. Account policies and Application log policies. d. Account lockout policies and Event log policies. Correct Answer: -> b 22/ You are the system administrator of Red Star Corp. John requests you to install a printer on his computer. To install the printer for John, you required the printer driver files. Identify the folder that you need to access to get the files. a. Print$ folder b. Admin$ folder c. Printer$ folder d. Prn$ folder Correct Answer: -> a 23/ Consider the following statements: Statement A: Filtering enables you to apply specific Group Policy settings to specific users and computers in a container. Statement B: The Explicitly deny method is used to deny access to the Group Policy settings. Statement C: The Remove Authenticated Users method restricts explicit permissions for the GPO to the domain administrators. Which of the following is correct about the above statements? a. Statement A, B, and C are true. b. Only Statements A and B are true. c. Only Statements A and C and true. d. Statement A, B, and C are false. Correct Answer: -> b 24/ Which file system supports partitions only up to 2 TB in size? a. FAT. b. FAT 32. c. NTFS. d. FAT 16. Correct Answer: -> b 25/ As a system administrator, you need to secure the organizations domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To

implement this, which security policy do you need to configure? a. Configure the Enforce old password history policy. b. Configure the Enforce password history policy. c. Configure the Enforce password history list policy. d. Configure the Enforce old password history list policy. Correct Answer: -> b 26/ As a system administrator, you need to deploy different types of GPOs on the domain, organizational units, and individual users working on server computers. To avoid problems related to Group Policy inheritance, you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on server computers. Which of the following tools will enable you to do this task? a. Group Policy Modeling. b. Group Policy Object Reporting. c. Group Policy Object Modeling. d. Group Policy Object Simulating. Correct Answer: -> a 27/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false. Correct Answer: -> d 28/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You dont have appropriate rights for the folder. d. Shadow copies are configured on the folder. Correct Answer: -> a 29/ You want to delegate the task of performing backup and restore operations to your junior administrator, Steve. Which of the following options will enable you to do this? a. Add Steve to the Backup Operators group. b. Add Steve to the Enterprise Administrator group. c. Add Steve to the Network group. d. Add Steve to the Domain Users group. Correct Answer: -> a 30/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? a. Create user accounts using user account template. b. Create 30 user accounts one by one. c. Create user accounts using user profiles. d. Create user accounts using command line tools. Correct Answer: -> a 31/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP. b. SSL. c. NNTP. d. FTP. Correct Answer: -> b 32/ Consider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.

Which of the following options is correct about the above statements? a. Statement A is true and Statement B is false. b. Both, statement A and statement B are true. c. Both, statement A and statement B are false. d. Statement A is false and Statement B is true. Correct Answer: -> d 33/ Ken finds that the access token granted during the log on session is large. He decides to reduce the token size so that the logon process can be fast. Which group should Ken create to achieve this? a. Security. b. Distribution. c. Universal. d. Global. Correct Answer: -> b 34/ You have created a GPO, Security_GPO, and linked it to the Marketing and Finance organizational units. However, due to change in the organizational structure, you do not want this GPO to be applied to both the organizational units. In addition, you want to retain this GPO. Which of the following options will enable you to do this task? a. Delete the Security_GPO GPO and create a similar GPO. b. Create another GPO containing similar Group Policies. c. Remove the GPO link and delete the Security_GPO GPO. d. Remove the Security_GPO GPO link. Correct Answer: -> d 35/ You are the system administrator of your organization. John complains that his Windows Server 2003 computer is taking more time in accessing files. Which option is a possible solution to this problem? a. Disable shadow copies on his computer. b. Clean the disk space by using the Disk Cleanup utility and defragment the hard disk by using the Disk Defragmenter utility. c. Reinstall Windows Server 2003. d. Repair Windows Server 2003. Correct Answer: -> b TCP/IP Fundamentals and Concepts 1 b 21 d 41 b 2 b 22 c 42 a 3 c 23 d 43 b 4 c 24 b 44 d 5 d 25 a 45 d 6 b 26 a 46 b 7 a 27 d 47 b 8 d 28 c 48 c 9 d 29 d 49 b 10 c 30 b 50 a 11 a 31 c 51 12 b 32 c 52 13 c 33 b 53 14 c 34 d 54 15 b 35 a 55 16 d 36 b 56 17 d 37 b 57 18 d 38 a 58 19 b 39 c 59 20 b 40 d 60

Managing and Maintaining Windows Server 2003 (1) 1 b 21 c 2 c 22 b 3 b 23 c 4 c 24 b 5 c 25 a 6 d 26 b 7 c 27 b 8 a 28 a 9 a 29 b 10 a 30 a 11 c 31 d 12 b 32 a 13 d 33 d 14 a 34 a 15 a 35 b 16 b 36 17 c 37 18 c 38 19 b 39 20 c 40

Managing and Maintaining Windows Server 2003 (2) 1 b 21 b 2 d 22 d 3 c 23 b 4 b 24 a 5 a 25 c 6 b 26 b 7 d 27 d 8 b 28 a 9 d 29 c 10 d 30 b 11 d 31 a 12 d 32 a 13 b 33 a 14 b 34 a 15 b 35 b 16 c 36 17 d 37 18 a 38 19 c 39 20 b 40

Das könnte Ihnen auch gefallen