You are on page 1of 39

TÀI LIỆU ÔN TẬP WINDOW SERVER 2003

1. You have created several GPOs that are linked at various levels within your Active Directory structure…… in
Active Directory?
Answer: Local, site, domain, OU.
2. Which of the following command-line utilities can be used to automate renaming Active Directory objects?
Answer: Dsmove
3. What type of organizational structure is the domain name system?
Answer: Hierarchical
4. Which is the only layer of the TCP/IP reference model that does not contain any TCP/IP protocols?
Answer: The network interface layer.
5. Which of the following event items is not one of the five default Event viewer event types?
Answer: Caution
6. How can you perform a bulk import of users into Active Directory to create many user accounts at one time?
Answer: Use the csvde.exe command
7. What would be the FQDN of a workstation named WKS042 located in the…. Domain?
Answer: wks042.sales.west.bigcorp.net
8. You have two office locations, each with its own Windows Server 2003 server. The Two locations have been
networked with a T-1 connection …. Static route?
Answer: route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
9. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the old scope. Which
of the following is an appropriate next step?
Answer: Run the ipconfig/release command and then the ipconfig/renew command on every client computer
10.Your corporate network uses variable…. Is 131.39.161.17 with subnet mask of 255.255.248.0 ….?
Answer: 131.39.160.0/21
11.You use a Windows XP professional computer on your company’s network….navigate to?
Answer: Start, All Programs, Accessories, Communications, Remote Desktop Connection.

9. Which file system has the ability to encrypt files?


a. NTFS
b. FAT16
c. FAT32
d. UDF
10. Which file system has the ability to compress files?
a. UDF
b. NTFS
c. FAT32
d. FAT16
11. You need to create a record in DNS to allow Internet mail to be sent to your domain.
What kind of domain record do you need?
a. A CNAME record
b. A PTR record
c. An MX record
d. An A record

12. Which command-line tool can you use to clear the DNS resolver cache on a DNS client?
a. ipconfig
b. tracert
c. netsh
d. pathping
12. Which of the following is used to install Active Directory and establish a server as a domain
controller?

a. Dcpromo
b. Ntdsutil
c. Gpotool
d. Gpresult

13. To start in Safe Mode:


a. Select Start, Accessories, System Tools, Safe Mode.
b. None of the above.
c. Press the F7 key during system boot.
d. Press the F8 key during system boot.

13. You are configuring security for several new workstations running Windows XP Professional.
The computers are members of the Temp OU, and you noticed that users are able to reuse old
passwords whenever they are prompted to change them. Which of the following account
policies can be used to prevent this behavior?
a. Minimum Password Age
b. Maximum Password Age
c. Enforce Password History
d. Store Passwords Using Reversible Encryption

14. Which tool can you use to determine which ports a server has open?
a. NETSH
b. Security Configuration And Analysis
c. NETSTAT
d. Security Monitor

15. You need to determine whether the NIC drivers are digitally signed. Where do you find this
information?
a. System Information
b. Event Viewer
c. Device Manager
d. Driver signing options in the System applet

16. You are experiencing a delay when you connect to a remote Web site.
Which tool allows you to determine whether particular routers are responsible for the delay?
a. Tracert
b. Network Diagnostics
c. PathPing
d. Netdiag
17. You are reviewing DNS parameters, how long a node in an FQDN can be?
a. 63 characters
b. 512 characters
c. 255 characters
d. 43 characters

18. Which of the following are objects in the Active Directory?


a. Shared folders
b. Shared printers
c. Domains
d. All of these
19. Which of the following Windows Server 2003 TCP/IP configuration parameters specifies the
address of a router?
a. IP address
b. Subnet mask
c. Preferred DNS server
d. Default gateway
20. What step does a DNS client perform first to resolve a DNS name?
a. The client checks its local DNS resolver cache.
b. The client queries its primary DNS server.
c. The client queries its alternate DNS server.
d. The client broadcasts on the local subnet.
14. Which of the following is most likely true if a computer with an IP address of 169.254.0.11?
a. The computer has a static IP address
b. No DHCP server is on the network
c. A DHCP server is assigning the computer's IP address
d. The network cable is disconnected

21. Which of the following is a legal NetBIOS computer name?


a. host1.microsoft.com
b. host10_microsoft
c. host1-microsoft
d. host1_local
22. How much disk space is actually available for data in RAID level 5 when there are four disks?
a. 90%
b. 75%
c. 50%
d. 65%

23. You are troubleshooting a network adapter that does not appear to have an IP address assigned to it.
What command could you issue to cause this network adapter to acquire a DHCP lease?
a. ipconfig /acquire
b. ipconfig /renew
c. ipconfig /refresh
d. ipconfig /lease
24. When a TCP/IP computer can communicate with the local network but not with computers on
other networks, which of the following configuration parameters is probably incorrect?
a. Preferred DNS server
b. IP address
c. Subnet mask
d. Default gateway
15. Which of the following command-line utilities should you use to extract user property data
from the Active Directory?
a. Dsget
b. Dsadd
c. Dsmod
d. Dsquery

25. Which of the following messages is not exchanged as part of a DHCP lease initialization?
a. ACK
b. Renew
c. Discover
d. Request
26. (Windows Server 2003) What permissions are granted to the Everyone group over the share
created by the following code? net share MyShare=C:\MyFiles\MyShare
a. Full Control
b. Read
c. None
d. Change

27. You are getting some error messages from the DHCP server. What counter in the Performance
Console would display the number of DHCPOFFER messages sent per second by the DHCP
server to a client computer?
a. Discovers/Sec
b. Acks/Sec
c. DHCPAcks/Sec
d. Offers/Sec

28. To start in Safe Mode:


e. Select Start, Accessories, System Tools, Safe Mode.
f. None of the above.
g. Press the F7 key during system boot.
h. Press the F8 key during system boot.

29. You are configuring the dial-up connection for the portable computer shown in the exhibit.
What address should you use as the default gateway for the portable computer's dial-up
connection?
a. 192.168.111.42
b. 192.168.100.1
c. 209.29.9.20
d. 192.168.100.21
30. You have five Windows XP clients on a network with a Windows Server 2003 server. The server has an
always-on Internet connection with an ISP. What service can you install on the server to allow the clients
to access the Internet, without requiring you to obtain additional IP addresses from your ISP?
a. DNS
b. PPTP
c. NAT
d. DHCP
31. You need to create a second DNS entry for the intranet Web server, so that users can access it
using an easy-to-remember name. What type of record do you need to add if you want to create an
alias in DNS for the server?

a. An A record
b. A CNAME record
c. An MX record
d. A PTR record

16. When configuring the settings for user accounts, you want to map a drive to the location of the
operating system's files. Which of the following environmental variables would be used for this
purpose?
Windows Server 2003 NetWork SubJect

a. %SystemDrive%
b. %HomePath%
c. %SystemRoot%
d. %HomeDrive%

32. a computer named COMP2 on a Windows 2000 network as shown in the exhibit. Your network
uses TCP/IP as the only network protocol. You configure COMP2 with an IP address of
192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway of 192.168.2.1 Though you
are able to log onto the domain, you are not able to connect to any resources on SERV2. Users
need to be able to access this server to access documents and shared printers. What should you
do to ensure that COMP2 can connect to network resources?

a. Configure COMP2 to use a TCP/IP address of 192.168.5.16


b. Create a computer account on the domain for COMP2
c. Configure COMP2 to use a TCP/IP address of 192.168.2.16
d. Configure COMP2 to use a Default Gateway of 192.168.10.1

33. Which of the following TCP/IP protocols does not function at the Internet layer?
a. TCP
b. ARP
c. ICMP
d. IP
34. If GroupA is granted the Change permission over a file share \\someserver\someshare\, it will definitely
have which of the following permissions as well by default?
a. None
b. Read
c. Modify
d. Full Control
17. One important difference between TCP and UDP is that
a. TCP contains source and destination addresses and UDP does not
b. UDP is connection-oriented and TCP is not
c. TCP is connection-oriented and UDP is not
d. UDP cannot be routed, but TCP can

36
Windows Server 2003 NetWork SubJect

35. Which of the following is a transport-layer protocol?


a. UDP
b. IGMP
c. Ethernet
d. DNS

36. You have been asked to simplify the process of configuring TCP/IP on all the client computers.
The network consists of 40 computers running Windows 2000 Professional and 60 computers
running Windows XP Professional. Installing and configuring what service of Windows Server
2003 will help you accomplish your task?
a. DHCP
b. BOOTP
c. WINS
d. DNS

37. Which of the following command-line tools can you use to delete a user from Active Directory?
a. dsrm
b. dsadd
c. dsquery
d. dsmove
38. What is the functionality of ARP (Address Resolution Protocol) ?
a. Resolve machine names to IP addresses
b. Resolve IP addresses to MAC addresses
c. Resolve IP address to machine names
d. Resolve MAC addresses to IP addresses
39. What is the functionality of RARP (Reverse Address Resolution Protocol) ?
a. Resolve IP addresses to MAC addresses
b. Resolve IP address to machine names
c. Resolve machine names to IP addresses
d. Resolve MAC addresses to IP addresses
40. Which of the following is NOT default hidden share under Windows Server 2003?
a. ADMIN$
b. PRINTER$
c. C$
d. IPC$
41. Which protocol provides names and name resolution for workgroups in Windows?
a. Kerberos
b. NetBIOS
c. DNS
d. CIFS

2. What are the default share permissions in Windows Server 2003?


a. Everyone:Allow Full Control

36
Windows Server 2003 NetWork SubJect

b. Users:Allow Full Control


c. Everyone:Allow Read
d. Users:Allow Read and Execute
3. You need to back up critical data on your server. However, you do not have enough backup
tapes to back up everything on your server. You want to make sure that, in addition to the user
data you are backing up, you back up the Registry on your server. What should you select in
addition to the data files that you want to back up?
a. System State
b. My Computer
c. C: drive
d. My Documents
4. What utility do you use to view audit information?
a. Audit Log Viewer
b. Audit Viewer
c. Event Viewer
d. Log Viewer
5. Which of the following is not a legal top-level domain name?
a. findem.org
b. findem.net
c. findem.art
d. findem.com
6. When a DNS server converts a computer name to a dotted decimal address, this is called
e. Name resolution
f. Name recognition
g. Piping
h. Pinging
7. You are in the process of configuring a counter log to create a baseline log for a new Windows
Server 2003 computer that you are placing on the production network. You have configured the
counter log to start and stop automatically each day. You now need to configure it so that the
resulting log files will be easily identified by the date and time that they were created. Which log
numbering style should you use to accomplish this?
a. yyyymmddhh
b. yyyymm
c. mmddhhmm
d. nnnnnn

8. You've installed network monitor and configured a network to monitor. What do you need to do
to capture data?
a. Click Capture --> Trigger
b. Click Capture --> Start
c. Click Capture --> Networks
d. Click Capture --> Filter
9. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level
Domain?
a. west.bigcorp.net

36
Windows Server 2003 NetWork SubJect

b. .net
c. wks042
d. bigcorp.net
10. How many primary partitions without an extended partition can reside on a basic disk under
Windows Server 2003?
a. Four
b. Unlimited
c. One
d. Three
11. You are troubleshooting network connectivity between two computers on a routed IP network.
What command can you use to send a continuous flow of ICMP echo request packets to the
destination IP address?
a. ping -t
b. ping -l
c. ping -a
d. ping -f
12. You have just completed a default installation of Windows 2003 Server.
Where can you look on your computer's hard disk to see the Windows 2003 Server files?
a. WINNT Folder
b. WINDOWS2003 Folder
c. WINDOWSNT Folder
d. WINDOWS Folder
13. Which of the following is not a valid Safe mode option?
a. Safe Mode with Command Prompt
b. Safe Mode
c. Safe Mode with Base Video
d. Safe Mode with Networking
14. You are troubleshooting user complaints of slow Internet access to a partner Web site. You have
been told by the partner that they are experiencing high latency on several links leading to their
network. What tool can you use to determine exactly which routers and links are dropping packets
and what the ping time is for each link?
a. tracert
b. nslookup
c. pathping
d. ping
15. What tool should you use if you suspect an application is not responding?
a. Computer Management
b. Performance
c. Task Manager
d. System Monitor
16. What tool should you use to configure security templates?
a. Security Templates snap-in
b. Network Monitor
c. Active Directory Users And Computers
d. Security Configuration And Analysis snap-in

36
Windows Server 2003 NetWork SubJect

17. You've just written a new script and need to ensure that new policy settings are immediately
applied when the script has been completed. Which of the following command-line utilities
should you use?
a. secedit.exe
b. gpresult.exe
c. gpapply.exe
d. gpupdate.exe

18. You are currently logged in to the Sales server as an Administrator. You want to add additional
security to the D:\Data folder. When you attempt to set permissions, you see the following
dialog box that does not display a Security tab. What is the most likely reason for this?

a. The folder has already been encrypted with EFS.


b. You need to be logged on as a member of the Server Operators group.
c. Your account has been assigned No Access rights through the user account or through group membership.
d. The partition is not configured as NTFS.
19. What are the default share permissions in Windows Server 2003?
a. Everyone: Allow Full Control
b. Everyone: Allow Read
c. Users: Allow Full Control
d. Users: Allow Read and Execute
20. Which type of NIC is likely to provide the fastest performance?
e. EISA
f. ISA

36
Windows Server 2003 NetWork SubJect

g. MCA
h. PCI
18. What type of zone should you create if you want to create a read-only copy of the master DNS
data for the zone?
a. Stub
b. Root Hints
c. Primary
d. Secondary

19. Which of the following network/transport layer protocols can you use for Windows file sharing
when installed alone?
a. TCP/IP and IPX only
b. TCP/IP, IPX, and NetBEUI
c. TCP/IP only
d. TCP/IP and NetBEUI only

20. What type of resource record must you configure to enable reverse lookups for host computers?
a. Pointer (PTR) records
b. Mail Exchanger (MX) records
c. Name Server (NS) records
d. Host (A) records

21. You are using Windows Server 2003 as the network operating system in all four of company's
locations. You are using a server in corporate headquarters and another in the Boston sales
office to establish an ISDN-based demand-dial routing connection. In order to control costs, this
has been implemented as an on-demand connection. During operation, however, you notice that
the connection is coming up fairly regularly, even during the evening, when you know that
there is no communication occurring between the offices. What could be the problem?
a. A default route has been configured on the answering router, and anytime a packet is received, it is
forwarded to the destination demand-dial router.
b. This is normal; it is an indication that the demand-dial routing solution is functioning normally.
c. A default route has been configured on the calling router, and anytime a packet is received, it is
forwarded to the destination demand-dial router.
d. Legitimate data is being transferred during the connection.

22. You are the WAN administrator for General Telecommunications, a large manufacturer of
network equipment. When you started with the company, you had 10 office locations, each with
its own Windows Server 2003 servers. These locations were networked using fractional T-1s
and Windows Server 2003 servers running RRAS, and they used RIP for routing information.
General Telecommunications now has 120 sales offices throughout the United States and
Europe, and you have been tasked with networking these locations by using hardware routers.
You have been asked to design a solution that will support both the Windows Server 2003
servers and the hardware routers. The solution must also support failover connections between
the original 10 locations.
What routing method should you select?
a. EIGRP b. RIP

36
Windows Server 2003 NetWork SubJect

c. Autostatic updates d. OSPF

23. You are running in a mixed environment, and you are using a Windows Server 2003 DHCP
service to support three network segments. Your client computers consist of Windows 2000
Professional, Windows NT Workstation, and Windows 98 SE workstations.
What do you need to do to ensure that all the client computers can receive DHCP addresses?
a. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. For the Windows NT Workstation client computers, ensure that the DHCP
update from Service Pack 6 has been installed.
b. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. Configure the DHCP service for mixed mode.
c. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically. Configure the DHCP service for backward compatibility.
d. Configure a scope for each network segment. Configure each client computer to receive IP
addresses dynamically.

24. Which OU structure in the Active Directory is likely to result in the most CPU resource use?
a. 15 OUs on the same level c. 5 OUs on the same level
b. OUs nested 5 layers deep d. OUs nested 15 layers deep
25. You have installed a new file server on server, you notice the DHCPServer
the network and formatted it to use service is being shutdown and you can't
NTFS. After formatting is complete,you get the service to stay running.What is
use EFS to encrypt a folder containing the most likely cause of this problem?
files belonging to users. If a user a. The DHCP server has not be authorized
accesses a file belonging to him in this in Active Directory.
folder, and then copies it across the b. The DHCP Server service is improperly
network for another user to access, installed
which of the following will occur? c. The active scope has invalid TCP/IP
a. The file on the hard disk and the data options
sent over the network will be decrypted d. The DHCP server does not have an
and remain that way. active scope
b. The file on the hard disk and the data
sent over the network will remain 27. You set up a share in the computer lab
encrypted. but neither students nor lab
c. The file on the hard disk will be administrators can access it. You
decrypted, so EFS can send it encrypted checked the share permissions, which
over the network. are configured properly. Students and
d. The file on the hard disk will remain lab administrators see an "Access is
encrypted, but data sent over the denied" message when they try to access
network will be nencrypted. the share. Joe has no problem accessing
the share.
26. You are a network administrator for an What should you do to resolve the p1:5HUI -
Active Directory domain with servers CENTER FOR INFORMATION
running Windows Server 2003. You TECHNOLOGY
recently installed a second DHCP server a. Change the share permissions so that
on the local subnet. When testing the everyone has Full Control.

36
Windows Server 2003 NetWork SubJect

b. Check and modify as necessary the computers in SubnetA are able to obtain
NTFS permissions on the folder being DHCP leases and the proper TCP/IP
shared. configuration. However, client
c. Instruct the users on the proper way to computers on SubnetB are unable to
connect to the share obtain DHCP leases. What is the most
d. Nothing; the users must be mapping to likely cause of this problem?
the share improperly a. The DHCP server is not authorized is
SubnetB
28. You have been asked to implement b. The DHCP Server service is stopped
dynamic IP addressing the company's c. A DHCP Relay Agent is not installed in
newly installed network, which has two SubnetB.
subnets in one Active Directory domain d. The DHCP scope for SubnetB is not
with servers running Windows Server active
2003. After you install and configure the
DHCP server in SubnetA, client
b. The policy settings will be cumulative
and applied in the order of policies at
29. Your network consists of servers the site level, domain level, and finally
running Windows 2003 Server and OU level.
workstations running Windows 2000 c. The policy setting at the local computer
Professional. You have applied several level will be overwritten by the OU-
custom security templates to GPOs level GPO, which will be overwritten
linked to the OU, domain, and site levels by the domain-level GPO, which will
in Active Directory. In addition to this, finally be overwritten by the site-level
there are security settings that have also GPO. For this reason, major security
been applied at the local computer level settings must be made at the site-level
of all machines that are on the network. GPO; all others will be overwritten.
Because several policies now affect the d. Security settings in the GPOs will not
computer accounts within the domain, be applied to machines running
site, and OU, Windows 2000 that have joined the
which of the following will occur when the domain.
user logs on to the domain?
a. The security settings at the local
computer level will override those of
the GPOs.

30. Hannah reports that she's having a tough time connecting to resources on your Windows Server
2003 domain.You ask for more information, and Hannah reveals that she is trying to connect to
a server in Washington. Other users can connect to that server, but she cannot. Hannah can
ping the IP address of other hosts on her segment, her default gateway, and even the IP address
of the server in Washington, but when she uses the server's hostname to enter the name of the
server, she cannot connect. What do you suspect is the problem?
a. Hannah needs to renew her IP address by running the command ipconfig/release and then
ipconfig/renew.
b. Hannah has a faulty network adapter card.
c. Hannah has a blank or invalid subnet mask.

36
Windows Server 2003 NetWork SubJect

d. Hannah has a blank or invalid DNS server IP address.

31. You need to ensure that your users will be able to resolve hostnames to IP addresses.
What type of zones do you need to configure?
a. A reverse lookup zone c. A delegated zone
b. A forward lookup zone d. A stub zone
b. Authorize the DHCP server
32. (DHCP) You want to migrate a subnet c. Run the Ipconfig /release command and
to a new scope. You create a new scope then the Ipconfig /renew command on
and then deactivate the old scope. every client computer.
Which of the following is an appropriate d. Restart the DHCP Server service
next step?
a. Delete the old scope.
33. All your Windows XP Professional client computers are configured to get DHCP leases from
your Windows Server 2003 DHCP server. This morning, one of your client computers no longer
had connectivity with the rest of the network. The user claims that she did not change any
network settings and has verified that the network cable is properly connected to both the
network adapter and the wall jack. What is the most likely reason for the problem that the
computer is experiencing?
a. The computer is not a member of the domain and is being refused an IP address.
b. The network cable has been damaged and is no longer passing a signal.
c. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.
d. The TCP/IP stack on the computer is corrupt and needs to be reset.

34. Your Windows Server 2003 DHCP server issues a block of 40 addresses to 120 salespeople on
the Sales network. These users are frequently in and out of the office, so no more than 40 users
are ever on the network at one time. What do you need to do to ensure that users get addresses
when needed?
a. Configure an exclusion for each user. c. Set the DHCP lease duration to 60 minutes.
b. Set the DHCP lease duration to 5 days d. Configure a reservation for each user.

35. A user has the username JohnB. He wants to access a Microsoft Access database called db.mdb
that’s located on a DC called syngress.com, in a directory called DB. Using the URL, what will
this user enter into a browser to access the database?
a. JohnB@syngress.com c. http://syngress.com/DB/db.mdb
b. syngress.com d. \\syngress.com\DB\db.mdb

36. A client computer that makes a DNS query to a DNS server for name resolution of a remote
host is referred to as what?
a. A recursive query c. An iterative query
b. A DNS resolver d. A DNS forwarder

36
Windows Server 2003 NetWork SubJect

37. Which of the following is NOT default hidden share under Windows Server 2003?
e. ADMIN$ g. C$
f. PRINTER$ h. IPC$

38. You have installed a Windows Server 2003 DNS server, but people are unable to resolve names.
You need to test the DNS server. Where should you start in your troubleshooting efforts?
a. From the command prompt of a Windows XP Professional host, run the nslookup utility to check
the functionality of the DNS service.
b. From the Windows Server 2003 DNS server, type ping -R and the address of the DNS server.
Examine the results to see if the server is working.
c. From the command prompt of a Windows XP Professional host, run the ipconfig utility to check
the functionality of the DNS service.
d. From the Windows Server 2003 DNS server, type ping -a and the address of the DNS server.
Examine the results to see if the server is working.

39. You install a new FireWire adapter card and the server immediately stops responding. You need
the server up on the network as soon as possible. How do you fix this problem?
a. You need to use Last Known Good c. You need to use Safe Mode.
Configuration. d. You need to the ASR utility.
b. You need to restore the System State.

40. The network consists of 6 Windows Server 2003 servers running all network services. You have
200 desktop computers running Windows XP Professional on the LAN, and you have just
purchased 30 laptops that need to be able to dial in to the network at night. You configure and
install RRAS on one of the Windows Server 2003 servers. This server is a member of the
production Active Directory domain operating at the Windows Server 2003 domain functional
level. The new laptop users are unable to connect remotely. Which of the following is the most
likely problem?
a. You did not enable MS-CHAP as the default authentication protocol.
b. The Windows Server 2003 running RRAS has conflicting remote access policies, and the first one
that is applied to the remote users prevents them from accessing the data.
c. You did not modify the default dial-in policy, which restricts access unless it is modified.
d. Windows Server 2003 RRAS does not support dial-in from a Windows XP system.
41. Which statement is NOT correct?
a. An organizational unit can be a member of a group.
b. A group can be located within an organizational unit.
c. A group can be a member of other groups.
d. An organizational unit can be located within another organizational unit.

42. In the fully qualified domain name wks042.sales.west.bigcorp.net, what is the Top Level
Domain?
e. west.bigcorp.net g. wks042
f. .net h. bigcorp.net

36
Windows Server 2003 NetWork SubJect

43. The development team of your company a. On the GPO linked to the Corp OU,
has started a new research project. They select Block Policy inheritance.
want to ensure that only the members of b. On the GPO linked to the Technical
their project team are allowed to see the OU, negate any options set in the Corp
new directories that they create. You OU by choosing Disabled for those
created a new OU that contains the user options.
accounts of the development team, the c. On the GPO linked to the Technical
computers they will be using, a shared OU, select Block Policy inheritance.
folder where they are going to place d. On the GPO linked to the Technical
their research documents, and several OU, select No Override.
printers that are to be isolated from the
rest of the company. They are concerned
about who will have access to the new 45. Which of the following statements are
directories. How will you protect the NOT true regarding access
directories from unauthorized access? permissions?
a. Do nothing. Since the directories and a. NTFS permissions are available for
files are part of an OU, no one outside files stored on NTFS-formatted
the OU can access them. partitions
b. Create a security group that contains the b. Share permissions are available for
members of the research group. shared folders on FAT32-formatted
Remove the Everyone group from the partitions
ACL. Add the new group to the ACL c. NTFS permissions are available for
and grant it the appropriate permissions. files stored on FAT32-formatted
c. Create a GPO that will limit access to partitions
the directories. Apply the GPO to the d. Share permissions are available for
domain. shared folders on NTFS-formatted
d. Create a GPO that will limit access to partitions
the directories. Apply the GPO to the
new OU. 46. A user attempts to access a resource,
and entries in the ACL are analyzed to
44. Your Active Directory domain has two match the SID. The system examines the
OUs. The Corp OU is a parent OU to entire ACL, but no match is found.
the Technical OU. You have Which of the following will occur?
implemented a GPO linked to the Corp a. The account will be disabled
OU. You do not want those settings b. Each ACE in the ACL will be read until
affecting the users in the Technical OU. a match is eventually found
How can you accomplish this with c. The user will be denied access
minimal effort? d. The user will be granted access

47. In the IP address assignment 10.54.113.0/24, what does the number 24 represent?
a. The number of bits in the host identifier
b. The number of bits in the combined network and subnet identifiers
c. The number of bits in the combined subnet and host identifiers

36
Windows Server 2003 NetWork SubJect

d. The number of bits in the subnet identifier

48. You have been asked to simplify the process of configuring TCP/IP on all the client computers.
The network consists of 40 computers running Windows 2000 Professional and 60 computers
running Windows XP Professional. Installing and configuring what service of Windows Server
2003 will help you accomplish your task?
e. DHCP g. WINS
f. BOOTP h. DNS

d. The most restrictive permissions take


49. You use Network Monitor to capture precedence.
network traffic, but when you go to
view the capture, you realize there is 51. A user had trouble remembering his
more information available than you password and tried several things. Now,
need or want to see. he says his account is telling him he is
What can you do to make it easier to find the locked out. You need to restore his
information you're looking for? ability to log on as quickly as possible
a. Create a capture filter. with the least amount of administrative
b. Create a display filter. effort. How should you accomplish this?
c. Enable OSPF on the network adapter. a. You should use the Active Directory
d. Start Network Monitor from the Users and Computers MMC snap-in to
command line using the netmon unlock the user's account.
command. b. You should use the Active Directory
Users and Computers MMC snap-in to
50. When both share permissions and change the user's password.
NTFS permissions exist on the same
shared folder, how is access control to c. You should use the Active Directory
the shared folder affected for users Users and Computers MMC snap-in to
trying to access the files stored in the copy the user's account and create a
shared folder over the network? new unlocked copy.
a. The most liberal permissions take d. You should use the command-line
precedence. utility Dsmod to change the user's
b. NTFS permissions take precedence. password.
c. Share permissions take precedence.

52. You install Active Directory and creates an AD-integrated DNS server for your domain. You are
concerned about DNS fault tolerance.
What can you do to provide fault tolerance for your AD domain?
a. Install a primary DNS server
b. Install a secondary DNS Server c. Install a caching-only DNS server

36
Windows Server 2003 NetWork SubJect

d. Install another AD-integrated DNS server

53. You want to migrate a subnet to a new scope. You create a new scope and then deactivate the
old scope. Which of the following is an appropriate next step?
a. Restart the DHCP Server service
b. Run the Ipconfig /release command and then the Ipconfig /renew command on every client
computer.
c. Delete the old scope
d. Authorize the DHCP server

54. You recently have been having unexplained problems with the Print Spooler service on two of
your Windows Server 2003 printer servers. You can find nothing wrong with the Print Spooler
service itself, and you have restarted it numerous times, with no effect. What else might you
consider examining to determine the cause of the problems for the Print Spooler service?
a. The services that are dependent on the Print Spooler service
b. The services on which the Print Spooler service is dependent
c. The currently installed drivers for the printers attached to the printer server
d. The cables being used to connect the printers to the printer server

55. You have just installed the DHCP service through the Windows Component Wizard. You now
need to configure DHCP to support a scope that will be used for streaming multimedia delivery.
In the MMC, you right-click the server icon under DHCP. What option should you select to
configure the scope?
a. New IP Scope c. New Multicast Scope
b. New Scope d. New Superscope

56. You’ve configured a DHCP server to use the following range of IP addresses when assigning
addresses to clients: 131.107.0.0/19 through 131.107.224.0/19. You set the subnet mask for this
range of addresses to 255.255.240.0. Users are complaining that they cannot connect to the
network.
What is the most likely cause of this problem?
a. The subnet mask is wrong. It should be 255.255.224.0.
b. The subnet mask is wrong. It should be 255.224.0.0.
c. The range of addresses is illegal.The first address cannot be 131.107.0.0/19.
d. The range of addresses is illegal. It should end at 131.107.192.0/19.

57. You are a network administrator. Multiple users have reported that they can access some local
resources but not all, and they have no access to resources on the Internet. You try to diagnose
the problem and find that the preferred DNS server used by the clients having the problem can
only resolve names for zones stored on the server. The TCP/IP settings on the DNS server are
configured correctly. What is the likely cause of the problem?
a. The DNS server is not getting zone transfers.
b. The DNS server's resolver cache is corrupted.
c. The DNS server doesn't have any forwarders configured.
d. The DNS server has incorrect or corrupt root hints.

36
Windows Server 2003 NetWork SubJect

58. Which of the following is the major disadvantage of using RIP as the network routing protocol?
a. High cost of software c. Count-to-infinity problem
b. A maximum of only 12 hops d. Low overhead on the network

59. You have a single DNS server resolving names for your internal domain, and you have an
Internet connection. You need to configure DNS on the client computers to resolve Internet
addresses.
How will you make this configuration?
a. Install a new DNS server to resolve Internet domain names. On each client computer, configure the
DNS settings under the Internet Protocol (TCP/IP) Properties dialog box of the LAN connection to
resolve to the DNS server.
b. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP)
Properties dialog box of the LAN connection to resolve to the DNS server.
c. On each client computer, install the Microsoft DNS client. Configure the client computer to
resolve to the DNS server. Configure the root hints on the server to point at the Internet root
servers.
d. On each client computer, configure the DNS settings under the Internet Protocol (TCP/IP)
Properties dialog box of the LAN connection to resolve to the DNS server. Configure the root hints
on the server to point at the Internet root servers.

60. You are responsible for maintaining the company's Windows Server 2003 DHCP server. While
doing your daily system checks, you notice that the number of DHCPDISCOVER packets
spiked at 9:00 this morning. What could cause the Discovers/Sec counter to spike at 9:00 a.m.?
a. The DHCP service being restarted
b. A network problem
c. A large number of computers entering the network at approximately the same time
d. A rogue DHCP server issuing duplicate addresses

61. You have three office locations, each with its own Windows Server 2003 servers. Each office has
a local LAN that is very stable, and the company has no plans to add locations for the next three
years. There are plans to network the three locations by using the existing Windows Server 2003
servers and ISDN lines. You have been asked to design a solution that will have the lowest
impact on the servers, with no requirements for redundancy or failover. What routing method
should you select?
a. OSPF c. RIP
b. Static routes d. Autostatic updates

62. You are running in a purely Windows Server 2003 environment, and you need to make sure
workstations are registered properly in DNS for Active Directory integration.
How should you configure DNS integration?
a. Configure the DHCP server to be sure to send dynamic updates.
b. Install the Windows Server 2003 DNS client on the workstations.
c. Configure the DNS server to accept dynamic updates
d. Configure the appropriate zones to accept dynamic updates

36
Windows Server 2003 NetWork SubJect

63. Which is NOT folder share permission?


a. Full control c. Change
b. Execute d. Read

64. You are attempting to troubleshoot and correct a network connectivity problem that was
reported by users between a server and several workstations. What communication
troubleshooting tool should you start with to determine where the problem lies?
a. ipconfig c. nslookup
b. ping d. telnet

65. You are in the process of configuring a counter log to create a baseline log for a new Windows
Server 2003 computer that you are placing on the production network. You have configured the
counter log to start and stop automatically each day. You now need to configure it so that the
resulting log files will be easily identified by the date and time that they were created. Which log
numbering style should you use to accomplish this?
e. yyyymmddhh g. mmddhhmm
f. yyyymm h. nnnnnn
d. Make sure all your domain client
66. You are running a purely Windows computers are running Windows 2000
Server 2003 network using Active or higher.
Directory and the Windows Server 2003
DHCP service. A user in another 67. (DHCP) You want to configure multiple
department has installed a DHCP server standard scopes so that they can be
on a Unix server. easily activated or deactivated. What
How do you prevent your client computers should you do?
from receiving DHCP addresses from that a. Create a multicast scope and add the
server? standard scopes to it.
a. Reconfigure BOOTP on the router. b. Configure server options instead of
b. Disable the unauthorized server in scope options.
Active Directory. c. Create a superscope and add the
c. Go to each client computer and enter standard scopes to it.
the address of the production DHCP d. Delete all the scopes except one.
server in the Internet Protocol (TCP/IP)
Properties dialog box.

68. You have just completed an analysis of a computer by using the Security Configuration and
Analysis snap-in. When you examine the results, you notice several items that have red X icons
next to them. What does this type of icon indicate?
a. The item is defined in the analysis database but not on the computer.
b. The item is defined in the analysis database and on the computer, and it matches the currently
configured setting.
c. The item is defined in the analysis database and on the computer, but it does not match the
currently configured setting.

36
Windows Server 2003 NetWork SubJect

d. The item is not defined in the analysis database and was not examined on the computer
69. You are responsible for maintaining the company's Windows Server 2003 DHCP server. The
company recently added a new router and routed a segment to the network. Now that segment
must be added to the DHCP server. The address of the router port is 10.10.25.1, and the router
is subnetted with a Class C subnet mask. You need to provide 40 addresses, starting at
10.10.25.20. What needs to occur for you to get DHCP working on that segment?
a. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20
through10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the
BOOTP forwarder for the new segment's router, using the address of the DHCP server. You need to
activate the scope.
b. You need to install and configure an additional DHCP server on that segment to provide DHCP
services.
c. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through
10.10.25.59. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP
forwarder for the new segment's router, using the address of the DHCP server. You need to activate
the scope.
d. You need to add to the DHCP server a scope that contains the addresses from 10.10.25.20 through
10.10.25.60. The scope needs a subnet mask of 255.255.255.0. You need to configure the BOOTP
forwarder for the new segment's router, using the address of the DHCP server. You do not need to
activate the scope because that happens automatically when the scope is created.

70. To configure file access auditing for all files in the CorpDocs folder on the file server. In which
section of the Group Policy Editor will you find the auditing options?
a. Account Policies c. File System
b. Restricted Groups d. Local Policies

71. DNS servers can be configured to perform name resolution using several types of queries. With
which type of query does the server return results only from its records or from its cache?
a. Iterative query c. Recursive query
b. Forward query d. Reverse query
b. You could use Event Viewer.
72. You would like to be able to verify some c. You could type nslookup at a command
entries on one of your Windows Server prompt.
2003 DNS servers. How could you verify d. You could type ipconfig at a command
the entries in the DNS zone? prompt.
a. You could use the Properties dialog box
of the DNS server in the MMC.
73. (DNS) What is the next step a forwarder takes when it is unable to resolve a query?
a. The forwarder returns an error to the originating DNS server.
b. The forwarder performs a broadcast to determine the root name server to contact
c. The forwarder returns an error directly to the client.
d. The forwarder uses the root hints Cache.dns file to determine the root name server to contact.

74. Which resource record is used to resolve domain names specified in e-mail addresses to the IP
address of the mail server associated with the domain?
a. PTR b. A

36
Windows Server 2003 NetWork SubJect

c. CNAME d. MX

b. User names must be unique, but only on


75. Which of the following are NOT true a per-machine basis
regarding names assigned to users, c. Each computer must have a unique
groups, and computers in workgroups name.
under Windows Server 2003? d. User names must be unique throughout
a. Group names must be unique, but only the workgroup
on a per-machine basis.

76. Your task is to segment the Class B IP address 145.65.0.0 into 20 different subnets. You must
allow for the number of networks to increase. The maximum number of hosts per subnet will
never surpass 950 hosts. What subnet mask would enable you to segment the network and allow
for the required growth?
a. 255.255.240.0 c. 255.255.0.0
b. 255.255.252.0 d. 255.255.255.252

b. Install both servers in Active Directory,


and on the Profiles tab of each server's
77. Your company has 75 users running Properties dialog box, select the Store
Windows XP Professional that need to Profiles in Active Directory option.
be able to access the company's network Make sure both servers are in the same
remotely. You would like to be able to domain.
provide redundant remote access c. Install IAS and use it as the central
servers by using Windows Server 2003 repository for the profiles.
running RRAS to allow users to dial in d. Install both servers in Active Directory,
to the network, but you want to and on the Profiles tab of each server's
maintain only one set of remote access Properties dialog box, select the Store
profiles. How can you accomplish this? Profiles in Active Directory option.
a. Install ISA Server and use it as the Configure each server to point at the
central repository for the profiles. same domain in the Profile Location
field.

78. The network consists of 1,500 Windows Server 2003 servers spread over 150 OUs that have
approximately 10 servers each. You have just finished creating a customized security template
that specifies the Account Policies and Audit Policy settings that are required by your
organization's corporate policy for specific departments. What is the best way for you to apply
this template to only the Sales, Marketing, Production, and Engineering OUs?
a. Script the secedit.exe command to apply the security template to the required computers.
b. Import the security template into each required OU by using a GPO.
c. Import the security template at the domain level into a GPO.
d. Manually apply the security template to each of the computers.

36
Windows Server 2003 NetWork SubJect

79. You're writing a logon script that will be used to automatically link a remote file share as the
home directory for the current logon account. Which option would be best used to create a link
for the home file share?
a. Utilize the net start command to create the home file share link
b. Utilize the net share command to create the home file share link
c. Utilize the net use command to create the home file share link
d. Utilize the net send command to create the home file share link

80. Your network includes two Domain Controllers and three member servers that provide file,
print, andbackup/restoration services. You want to implement a more secure configuration on
all five Windows Server 2003 servers. You have decided to use the secure templates, but is not
sure what the current configuration is on each server. What is the best way for you to get these
servers configured with the secure templates?
a. You should apply the Default security template from one of her member servers to all five servers
and then apply the securews.inf and securedc.inf templates to them.
b. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securedc.inf template to the DCs and the securews.inf
template to the member servers.
c. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securews.inf template to the DCs and the securedc.inf
template to the member servers.
d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After
doing this, you should apply the securews.inf and securedc.inf templates to the servers.

81. In what role should a DNS server be configured if it should maintain a cache of resolve queries
but not have zone files?
a. Forwarding-only c. Primary
b. Secondary d. Stub

82. You are trying to determine what settings (in addition to an IP address with your DHCP server)
can be assigned to client computers running Windows XP Professional. What settings can be
assigned?
a. The IP address of the file server
b. The IP address of the Active Directory domain controller
c. The IP address of the DHCP server
d. The IP address of the DNS server

83. You've been tasked with using the Dsmod command-line utility for administration. Which of the
following object types you can NOT modify using Dsmod?
a. GPO c. User accounts
b. Groups d. Computer accounts

84. After installing and configuring DNS on Where does the server store the zone
a Windows Server 2003 server, you set information?
up an Active Directory-integrated zone. a. In the server's cache

36
Windows Server 2003 NetWork SubJect

b. In the %systemroot%\system32\DNS c. The BOOTP forwarder service is not


directory enabled on the DHCP server.
c. In the %systemroot%\DNS directory d. The BOOTP forwarder service is not
d. In Active Directory enabled on the routers.

85. The corporation is running a routed 86. Replacing the hubs and routers on an
network with a centrally located internetwork with switches creates a
Windows Server 2003 DHCP server. network that has which of the
The server is able to issue addresses to following?
users on the local segment but cannot a. One collision domain and multiple
issue addresses to any of the sites that broadcast domains
are across a router. What is the most b. One broadcast domain and multiple
probable cause of this problem? collision domains
a. The DHCP forwarder service is not c. One broadcast domain and one collision
enabled on the DHCP server. domain
b. The DHCP forwarder service is not d. Several collision domains and several
enabled on the routers. broadcast domains

87. The company has 200 end users running Windows XP Professional that need to be able to
access the
company's network remotely. Several months ago you installed a Windows Server 2003 server
running RRAS to allow users to dial in to the server for remote access. This server is in the
corporate Active Directory tree, and after you configured it, the profiles worked perfectly. Last
weekend you added another Windows Server 2003 server with RRAS loaded to provide a failover
access device in the event of a server crash. Both servers are in the same native-mode Active
Directory domain, and test users are unable to log in to the new RAS server.
What is the most likely problem?
a. The Windows Server 2003 RRAS service needs to be authorized in Active Directory.
b. You need to add the new Windows Server 2003 server to the Global Remote Access Servers group
in Active Directory.
c. You can have only a single Windows Server 2003 server running RRAS in an Active Directory
domain.
d. The remote access profiles are not shared and need to be re-created on the new Windows Server
2003 server before anyone can access the server.

88. The network consists of 3 Windows Server 2003 servers and 50 workstations running Windows
XP Professional. In order to improve Internet DNS resolution, you have installed DNS on one of
the Windows Server 2003 servers and configured it as a caching-only DNS server. Where does
the new DNS server store its zone files?
a. The zone files are stored in Active Directory.
b. The zone files are stored in the server's %systemroot%\system32\etc\DNS directory.
c. Caching-only servers do not have any zone information.
d. The zone files are stored in the server's RAM.

89. You must decide the security settings that will be applied to the MyGuestLogon account (for
guest only). Which of the following settings is most appropriate to the solution presented?

36
Windows Server 2003 NetWork SubJect

a. User cannot change password c. User must change password at next logon
b. Account is disabled d. Password never expires

90. Which of the following statements about a network’s infrastructure is true?


a. A network infrastructure includes both hardware and software products.
b. A network infrastructure is a design that does not include specific hardware
or software products.
c. A network infrastructure includes software products only.
d. A network infrastructure includes hardware products only.

91. You have not modified the default settings for DNS on the DHCP client or server. Which of the
following client record or records will be updated in DNS by the DHCP server? (Assume that
the clients are running Windows XP.)
a. Neither the PTR nor the A resource record c. Both the PTR and A resource records
b. The PTR resource record d. The A resource record

92. Which of the following statements are NOT true regarding Remote Desktop connections to a
Terminal Services host server running Microsoft Windows Server 2003?
a. Application processing occurs on the host system
b. Application processing occurs on the client system
c. Input is directed to the host system
d. Keyboard and mouse input are directed from the client system to the host.

93. The company has a T-1 connection to a local ISP, which is shared by all clients. Clients access
the Internet using NAT. Several users have reported that they can't access the Internet. You
start diagnosing the problem and find that all users reporting the problem are on the same
subnet. Users on other subnets are not experiencing any problems accessing the Internet. Which
of the following could be the cause of the problem?
a. The NAT router is malfunctioning
b. The users' DNS Server is down
c. The users' DHCP server is down.
d. The users' default gateway for the subnet is malfunctioning

94. Your company has 14 locations and is using OSPF as part of its WAN implementation. You are
training a new WAN engineer to support the WAN. She asks you for the correct name of the
area with an ID of 0.0.0.0. What do you call this area?
a. The AS c. The LSDB
b. The default route d. The OSPF backbone
b. Because the DHCP client must inform
95. Why must a DHCP client use broadcast all the other clients on the network of
transmissions to request an IP address its intention to request an IP address
from a DHCP server? c. Because the DHCP server can service
a. Because the DHCP client does not yet requests only from computers on the
have an IP address same LAN

36
Windows Server 2003 NetWork SubJect

d. Because the DHCP server can only


receive broadcasts

96. You are attempting to perform an analysis of a computer by using the Security Configuration
and Analysis snap-in. You know you need to complete the following steps:
1. Select the security template to be used in the analysis.
2. Right-click Security Configuration and Analysis and select Analyze Computer Now.
3. Select the log file to be used in the analysis.
4. Right-click Security Configuration and Analysis and select Open Database.
5. Right-click Security Configuration and Analysis and select Configure Computer Now.
6. Select the database to be used in the analysis.
What is the order in which you should perform these steps?
a. 4, 1, 6, 2, 5, 3 c. 2, 6, 1, 3, 4, 5
b. 2, 1, 3, 4, 6, 5 d. 4, 6, 1, 3, 2, 5

97. You want to enable the user account for Will Carver.You decide to use the dsmod.exe tool.
Which of the following commands will enable the Will Carver account?
a. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled no
b. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -enabled yes
c. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled no
d. dsmod user “CN=Will Carver,CN=Users,DC=trainingconcepts,DC=org” -disabled yes

98. One of your Windows Server 2003 printer servers has been responding oddly lately. The Print
Spooler service often seems to get stuck, requiring you to restart either the service or the server.
Performing the server restart is a time-consuming task because the server is located across town
in another building that your company owns. What's the most efficient way to have this
troublesome server restart after the second failure of the Print Spooler service?
a. Configure the service to restart itself after its second failure.
b. Write a batch script that monitors this service and have it force a server restart after the service has
failed twice.
c. Configure the service to restart the server after its second failure.
d. Write a batch script that monitors the service and emails you after the service has failed the first
time so that you can travel to the server and prepare to restart it.
e.
99. You are trying to explain each part of an FQDN. What is the host portion of
sarah.training.urwrite.net?
a. net c. training
b. sarah d. urwrite
use to communicate with each other on
100.You are trying to explain how two the same IP subnet?
computers on the same subnet a. The packets will be sent to the MAC
communicate with each other. Which of address of the destination computer.
the following statements should you use b. The packets will be sent to the IP
to explain the process that two computers address of the destination computer.

36
Windows Server 2003 NetWork SubJect

c. The packets will be sent to the IP which the computers have been moved.
address of the default gateway for You should reconfigure the computers
routing to the destination computer's so that they are DHCP clients.
MAC address.
d. The packets will be sent to the MAC
address of the default gateway for 102.You are trying to troubleshoot one of
routing to the destination computer's IP your DNS servers. It seems that your
address. computers running Windows XP
Professional have not registered
101.Your network consists of 15 Windows dynamically with your DNS server. You
Server 2003 computers, 5 of which are would like to force these computers to
domain controllers. The remaining 10 register with DNS. What should you do?
servers are file and print servers for a. At the command prompt, type ipconfig
your 750 Windows XP Professional /renew.
workstation clients. The previous b. At the command prompt, type ipconfig
administrator had carefully assigned /registerdns.
every computer a static IP address, c. Get the user to reboot the system.
equally split up among five Class C d. At the command prompt, type ipconfig
subnets. Now some users have started /release.
moving their computers from one 103.You decide that you want to enforce
location in the building to another; this account lockout to occur after three
trend will be the norm for your unsuccessful logon attempts across the
company. After moving, the users company. How would you achieve this?
complain to you that they can no longer a. Set the Block Policy Inheritance on the
access network resources. What is the group policy.
most likely cause of this problem, and b. Set group policy in a domain GPO to
what should you do about it? The senior lock out accounts after three
systems administrator has DHCP servers unsuccessful logon attempts
available for you to use, should you c. Remove the local policies from each
decide to use them? PC.
a. The statically configured IP addresses d. Set the local policy on each PC to lock
are no longer valid on the subnet to out accounts after three attempts, and
which the computers have been moved. set No Override on the local policy.
You should reconfigure the computers
with the correct static IP addresses. 104.What is one of the major disadvantages
b. The port to which the computers are of distance-vector routing?
connecting on the switch may be a. It involves high overhead on the
failing. You should replace the switches network.
where computers cannot connect to b. It suffers from the count-to-infinity
network resources. problem.
c. There are not enough client access c. It has problems with slow convergence.
licenses (CALs) for the Windows d. A network that uses it can connect to a
Server 2003 computers. You should maximum of only 15 hops.
purchase the required number of CALs.
d. The statically configured IP addresses
are no longer valid on the subnet to

36
Windows Server 2003 NetWork SubJect

105.The company network consists of 3 Windows Server 2003 servers and 100 Windows XP
Professional workstations. The Sales Department spends a lot of time doing Web research at a
variety of supplier, customer, and competitor Web sites. You have been asked to provide a
solution to speed up name resolution for these users. You configure a cache-only server.
Which of the following will have the largest impact on the response time for DNS requests?
a. The processor speed c. The speed and type of the hard drive
b. The amount of RAM installed d. The speed of the network adapter card

106.When a client can successfully ping a DNS server, but fails to receive any response to a name
resolution query from that server, which of the following might be the cause of the problem?
a. The server’s cache is polluted
b. The server has an incorrect IP address
c. The DNS Server service is not started
d. The server is not the authority for the
requested name

107.Which of the following command-line tools can you use to delete a user from Active Directory?
e. dsrm g. dsquery
f. dsadd h. dsmove

108.You are designing a new network and plan to use Class C IP addresses. You want to be able to
create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.
Which of the following subnet masks should you use for the network?
a. 255.255.255.192 c. 255.255.255.128
b. 255.255.255.240 d. 255.255.255.224
security settings as necessary, and then
109.What is the proper way to create and apply the database to the computer.
then apply a custom security template c. Use the Security Templates snap-in to
to a computer? create a custom template, configure the
a. Create a database in the SECEDIT security settings as necessary, and then
utility, modify the security settings as apply the settings using Security
necessary in Security Configuration And Analysis.
Configuration And Analysis, and then d. Create a database in Security
apply the template to the computer Configuration And Analysis, modify the
using the Security Templates snap-in. security settings as necessary, and then
b. Create a database in Security apply the settings using the SECEDIT
Configuration And Analysis, modify the utility.

110.Which of the following is the FQDN for the host home in the sales domain for the UR write
company if the company's domain is urwrite.net?
a. home.sales.net c. home
b. home.urwrite.net d. home.sales.urwrite.net

36
Windows Server 2003 NetWork SubJect

111.A customer has asked you to install the DHCP service on her Windows Server 2003 computer,
get one scope configured, and issue addresses. What minimum steps do you need to take in order
to accomplish this?
a. Install the DHCP service from the Windows Components Wizard. After the service is installed,
authorize it in Active Directory. Next, create the scope. Finally, configure the DNS integration.
b. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope. Create a superscope and add the scope to it. Authorize the server in Active
Directory.
c. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope. Authorize the server in Active Directory.
d. Install the DHCP service from the Windows Components Wizard. After the service is installed,
create the scope and then configure the DNS integration.

112.You're creating a saved query within the Active Directory Users and Computers MMC snap-
in. Which of the following query types are NOT directly available for query selection by default?
a. Users, contacts, and groups c. Exchange recipients
b. Printers d. Computers

113.What is the correct subnet mask to use on a Class B network with a 10-bit subnet identifier?
a. 255.255.255.192 c. 255.192.0.0
b. 255.255.192.0 d. 255.192.255.255

114.Which of the following is used to uninstall Active Directory and demote a domain controller?
a. Gpotool c. Dcpromo
b. Gpresult d. Ntdsutil

115.You have just set up a Windows Server 2003 Active Directory network, and you want to use
group policies to control user configuration. You have configured local policies on some of the
machines in your domain, and you also want to configure some site and OU policies for more
granular control, but you are concerned about policies at different levels “canceling each other
out.”
Which of the following types of GPOs will override settings applied at the domain level?
a. Site c. Domain
b. OU d. Local

116.You configure and install RRAS on one of your Windows Server 2003 servers. Your Windows
Server 2003 network is running at the Windows Server 2003 domain functional level. Because
this is the first time you have configured RRAS, you first modify the default policy. Then, as
part of your testing, you configure 12 additional remote access policies. After this, the users
complain that they cannot successfully access any information on the network.
What is the most likely source of the problem?
a. You need to enable IPSec to ensure that the connections are encrypted.

36
Windows Server 2003 NetWork SubJect

b. You did not modify the default dial-in policy.


c. You have some conflicting policies, and the first one that the users apply refuses them access to the
information on the network.
d. You did not enable MS-CHAP.

117.The network consists of 16 training rooms with 30 PCs each, running a mix of Windows 2000
Professional and Windows XP Professional, as well as 16 Windows Server 2003 servers, which
provide all network services. You are working on a remote access problem, and you want to
check the network to see if the policies have been deleted. Where should you look for these
policies?
a. Remote access policies are stored in the computer properties in Active Directory.
b. Remote access policies are stored in the user properties in Active Directory.
c. Remote access policies are stored individually on every RRAS server.
d. Remote access policies are stored on the global catalog server in Active Directory.

118.You have created several GPOs that are linked at various levels within your Active Directory
structure. You are preparing to run the Resultant Set of Policies (RSoP) tool to examine the net
result of the various GPOs that have been applied on the Accounting OU. In what order are
Group Policy Objects applied in Active Directory?
a. Domain, OU, local, site c. Local, site, domain, OU
b. OU, local, site, domain d. Site, domain, OU, local

119.You need to create a new GPO to b. From the Actions menu, select Group
enable settings for a particular OU. You Policy Object Editor.
open Active Directory Users and c. Right-click on the OU and select
Computers and select the OU in the Properties.
tree. What is the next step in the process d. Right-click on the OU and select Create
of creating a GPO for this OU? New GPO.
a. From the Actions menu, select Create
New GPO.
120.You have a 50-host network and are c. The DHCP service was inadvertently
running a Windows Server 2003 DHCP stopped.
server to assign IP addresses. You also d. The existing scope has been modified
have five IP-based printers with static so that it overlaps the addresses
IP addresses. Your assistant reserved for the printers, and a
administrator has been working on the workstation has been assigned the same
DHCP server and has made some address as one of the printers.
changes. Now, your users cannot print
to one of the printers. What is most 121.An application using NetBIOS needs a
likely the problem? NetBIOS name resolved. To resolve the
a. The scope from which the printers were NetBIOS name, local cache is checked
receiving their IP addresses has been first. The needed resolution is not
deleted. already cached, so the LMHOSTS file is
b. The existing scope has been modified checked next. The desired entry is not in
so that it overlaps the addresses the LMHOSTS file. Based on this, what
reserved for the printers.

36
Windows Server 2003 NetWork SubJect

is the next step taken in resolving the sends a request to use that address back
NetBIOS name? to the DHCP server. The DHCP server
a. The DNS server issues a recursive acknowledges the request and grants
query the client computer a lease to use the
b. The DNS server is queried using an NS address. The client computer responds
type record with an acknowledgement of the lease
c. NetBIOS over TCP resolves the name and uses the address to connect to the
to an IP address network.
d. The WINS server is queried c. The client computer broadcasts a
122.How the client computer requests and DHCPDISCOVER message. The
receives an address from the DHCP DHCP server offers an IP address. The
server? client computer accepts the address and
a. The client computer broadcasts a sends a request to use that address back
DHCPDISCOVER message. The to the DHCP server. The DHCP server
DHCP server offers an IP address. The acknowledges the request and grants
client computer accepts the address and the client computer a lease to use the
sends a request to use that address back address. The client computer uses the
to the DHCP server. The client address to connect to the network.
computer uses the address to d. The client computer broadcasts a
communicate on the network. DHCPDISCOVER message. The
b. The client computer broadcasts a DHCP server offers an IP address. The
DHCPDISCOVER message. The client computer accepts the address and
DHCP server offers an IP address. The uses it to communicate on the network.
client computer accepts the address and

123.You install and create a primary DNS for a subnet. You are concerned about DNS fault
tolerance for the Primary DNS zone. What can you do to provide load balancing and fault
tolerance for the primary DNS server?
a. Install an AD-integrated DNS server c. Install a secondary DNS server
b. Install a second NIC card d. Install DHCP

124.You need to manage several servers remotely. What is the best tool for you to use?
a. The runas command c. AD Users and Computers
b. The Remote Desktop connection utility d. MMC snap-in tools

125.Which of the following servers does not require a computer with a registered IP address?
a. Internet Web servers c. Internet e-mail servers
b. DNS servers used for Internet name resolution d. DNS servers used for Internet domain hosting

126.Your network consists of 20 Windows NT 4.0 servers and 30 Windows Server 2003 servers.
Some of the NT 4.0 servers are configured as routers. You have just started to configure some
of the Windows Server 2003 servers as routers, but you are having some problems. The new
routers cannot communicate with the old routers. You confirm that all the routers are
configured to use RIP. What could be the problem?
a. You need to install and configure OSPF.

36
Windows Server 2003 NetWork SubJect

b. RIP does not propagate more than 15 hops.


c. You have to change the RIPv2 incoming packet protocol to use only RIPv1.
d. You have to change the RIPv2 outgoing packet protocol to use broadcast instead of multicast.

127.What would be the decimal value of 11001100.10101110.00011101.11101010?


a. 198.174.29.234 c. 204.174.29.240
b. 204.174.29.234 d. 204.176.29.234
128.A Windows Server 2003 has startup problems. A message displays stating that at least one
service has failed during startup. How do you determine which service failed?
a. You need to use Event Viewer to investigate system events.
b. You need to use Device Manager.
c. You need to use Event Viewer to investigate application events.
d. You need to use the System Information utility.

129.The network consists of 75 locations interconnected with Windows Server 2003 servers running
RRAS. Business has been very good, and you have recently added a number of segments to the
network in several of the offices. You have noticed lately that you are receiving an increased
number of "host unreachable" error messages. You believe that your routing tables are
inaccurate. What should you enable in the Windows Server 2003 Routing and Remote Access
console to prevent routing loops and count-to-infinity problems?
a. Poison reverse c. Split horizon
b. Topological database d. Distance-vector routing

130.You currently have a supernetted network and would like to simplify the management of
DHCP. What component should you configure in DHCP?
a. BOOTP scope c. Superscope
b. Scope d. Multicast scope
b. Configure a caching-only server and have
131.You are responsible for maintaining the all the DNS client computers resolve from
Windows Server 2003 network for the that server.
company, including the Windows Server c. Create a delegated zone for the remote
2003 DNS servers. You have one remote office and have all the DNS client
office that is located across a slow WAN computers in that office resolve from that
link. What is the best way to set up DNS to zone.
resolve internal hostnames? d. Use a centralized DNS server and
a. Configure the DNS client computers to configure it for incremental updates.
autodiscover the closest DNS server.

132.While troubleshooting a Windows XP Professional computer, you discover that it has an IP


address of 169.254.176.132, a subnet mask of 255.255.0.0, and no configured default gateway.
What is the most likely reason this computer has gotten these IP settings?
a. The TCP/IP stack on the computer is corrupt.
b. The DHCP server scope has become corrupt.
c. The user of the computer has configured new settings without fully understanding how routed IP
networks function.

36
Windows Server 2003 NetWork SubJect

d. The computer has been unable to contact a DHCP server.

133.You are responsible for 75 Windows XP Professional workstations and 5 Windows Server 2003
member server computers. You have been directed to perform a security analysis on each
computer, comparing its settings to those contained in the hisecws.inf template. How can you
accomplish the assigned task with the least amount of administrative effort and the smallest
number of trips to remote computers?
a. You can create a script that runs Security Configuration and Analysis on each computer and collect
the results in a central location for later viewing.
b. You can analyze remote computers from the Security Configuration and Analysis snap-in by
targeting it at the desired computer.
c. You can create a script that runs the secedit /analyze command on each computer and collect the
results in a central location for later viewing.
d. The only way to perform this analysis is to physically visit each computer and use the Security
You are installing Configuration and Analysis snap-in.

134.In what situation would you design your network as a workgroup instead of a domain?
a. When you have several hundred clients spread out over multiple geographic regions.
b. When the network has multiple servers.
c. When you need to use Active Directory.
d. When the network is small and has no servers.

135.You have two office locations, each with its own Windows Server 2003 server. The two
locations have been networked with a T-1 connection that runs between the Windows Server
2003 servers, which are running RRAS. You just added a new network in the main location, and
you need to add a static route on the far end to provide connectivity to the location; you are not
using any dynamic routing protocols. The network address, which you are using as a Class C
address, is 10.10.10.0. The correct gateway address is 10.10.10.254. What command do you need
to use to add a static route?
a. route /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
b. route add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
c. netstat add 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2
d. ipconfig /addroute 10.10.10.0 mask 255.255.255.0 10.10.10.254 metric 2

136.Identify the underlying network ID for this IP address: 199.214.36.132/25.


a. 199.214.36.128/25 c. 199.214.36.0/24
b. 199.214.36.0/25 d. 199.214.36.128/24

137.You're in the process of evaluating which users should be members of the Power Users group,
but first want to make sure that they require the rights that accompany that group assignment.
Which of the following rights are NOT granted to the local Power Users group by default?
a. Reset local account passwords c. Take ownership of local files
b. Create local file shares d. Log on locally

36
Windows Server 2003 NetWork SubJect

138.A user with the username of JaneD works in the Sales department. Her account is located in
the syngress.com domain. Based on this information, what canonical name would be used to
identify this object in Active Directory?
a. /syngress.com/Sales/JaneD
b. OU=Sales
c. /CN=JaneD /OU=Sales /DC=syngress /DC=com
d. CN=JaneD

139.Your computer is configured to use DHCP. When you log on, you notices you can't connect to
the network. The computer has no IP address according to ipconfig. Which of the following is
most likely true?
a. No DHCP server is on the network
b. The computer is using dynamic IP addressing
c. The network cable to the computer is disconnected
d. The computer is using Automatic Private IP Addressing.

140.You are configuring a new Windows Server 2003 server to be a file server for your home office
intranet that will be used only by local users. Which of the following will NOT need to have to
suitably configure the IP address with a statically assigned address?
a. A valid subnet mask c. A valid IP address for the server
b. A valid WINS server IP address d. A valid default gateway

141.You are designing a network for a large branch office and have been assigned the network
address 10.10.0.0/18.
What are the maximum number of subnets and the maximum number of hosts on each subnet?
a. 512 subnets; 32,766 hosts c. 1024 subnets; 16,382 hosts
b. 256 subnets; 65,534 hosts d. 128 subnets; 131,070 hosts

142.Although you can use the Configure Your Server Wizard to configure a server as domain
controller, which program or utility do you use to promote or demote a domain controller?
a. Active Directory Users And Computers c. NETSH DIAG
b. NTDSUTIL.EXE d. DCPROMO.EXE

b. A pool of IP addresses is required.


143.Which of the following are NOT true c. Public IP addresses are assigned by your
regarding IP addresses used with NAT? ISP.
a. NAT uses public IP addresses when client d. IP address reservations can be defined.
computers need to access the Internet.

36
Windows Server 2003 NetWork SubJect

144.You maintain a Windows Server 2003 b. Open the DHCP console. Select the DHCP
DHCP server to dynamically assign server that contains the scope in question
addresses. You have three superscopes set and then select Action, Reconcile All
up, and within each superscope are four Scopes.
scopes. One day, you start experiencing c. Open the DHCP console. Select the DHCP
problems with one of the scopes issuing server that contains the scope in question
bad addresses. You check the server and and then select Action, Reconcile DHCP
suspect that there is a database problem. Database.
How can you verify that the database is d. Open the DHCP console. Select the scope
intact? in question and select Action, Reconcile
a. Open the DHCP console. Select the Scope.
superscope that contains the scope in
question and then select Action, Reconcile
All Scopes.

145.Your network includes two Domain Controllers and three member servers that provide file,
print, and backup/restoration services. You want to implement a more secure configuration on
all five Windows Server 2003 servers. You have decided to use the secure templates, but is not
sure what the current configuration is on each server.
What is the best way for you to get these servers configured with the secure templates?
a. You should apply the Default security template from one of her member servers to all five servers
and then apply the securews.inf and securedc.inf templates to them.
b. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securedc.inf template to the DCs and the securews.inf
template to the member servers.
c. You should apply the Default security template found on each computer to that specific computer.
After doing this, you should apply the securews.inf template to the DCs and the securedc.inf
template to the member servers.
d. You should reinstall Windows Server 2003 on all five servers and re-create the domain. After
doing this, you should apply the securews.inf and securedc.inf templates to the servers.

146.You manage the Windows Server 2003 DHCP servers for a Corporation. You are running in a
purely Windows Server 2003 environment with all Windows XP Professional clients, and you
need to make sure that workstations are registered properly in DNS for Active Directory
integration. How should you configure DNS integration?
a. Set DNS integration to enable updates for DNS clients that do not support dynamic updates.
b. Set DNS integration to enable DNS keepalives.
c. Set DNS integration to automatically update DHCP client information in DNS
d. Set DNS integration to discard A and PTR records when a lease is deleted.

147.Which of the following performance counters you could NOT use to determine a possible problem with
memory or a memory leak?
a. Processor\%Processor Time c. Memory\Available Kbytes
b. Memory\Nonpaged Kbytes d. Process(process_name)\Pool Paged Bytes

36
Windows Server 2003 NetWork SubJect

148.You are installing a new domain controller. You want the domain controller to be in a separate
domain that is not part of an existing forest. What type of domain should you install?
a. A parent domain
b. A forest root domain
c. A domain in a new domain tree in the existing forest
d. A child domain

149.You 3.0 mbsigning a new network and plan to use Class C IP addresses. You want to be able to
create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID.
Which of the following subnet masks should you use for the network?
a. 255.255.255.192 c. 255.255.255.224
b. 255.255.255.128 d. 255.255.255.240
150.Your network consists of a central site with 60 local users, 120 remote sales representatives who
travel 90 percent of the time, and 16 Windows Server 2003 servers providing core network
services, including remote access using RRAS. Your sales representatives need the ability to dial
in to access resources on the network while traveling. The problem you are having is that the
sales organization is split into eight geographic regions covering eight time zones, and the sales
representatives from each region are only allowed to make remote connections during specific
hours. Each region has a Windows security group that contains all of the sales representatives
in that region.
What do you need to do to ensure that the sales representatives can connect the remote access server,
but only during the allowed times for their regions?
a. Create local security policies with the Group Policy Editor.
b. Configure multiple RRAS servers with different local policies and get the different groups to dial
in to their respective servers.
c. Give all remote users the same policy.
d. Create different remote access policies for the different users.

151.You received a call from a user who said that he could not access any network resources. Upon
investigation, you have determined that the workstation has an IP address of 169.254.170.145.
What is the most likely reason for the user's inability to connect to any network resources?
a. The TCP/IP stack on the computer is corrupt and needs to be reset.
b. The computer was not able to contact a DHCP server and has assigned itself an APIPA IP address.
c. The computer is not a member of the domain and is being refused an IP address.
d. The network cable has been damaged and is no longer passing a signal.

152.You have installed a new file server on the network and formatted it to use NTFS. After formatting is
complete, you use EFS to encrypt a folder containing files belonging to users. If a user accesses a file
belonging to him in this folder, and then copies it across the network for another user to access,
which of the following will occur?
a. The file on the hard disk will remain encrypted, but data sent over the network will be unencrypted.
b. The file on the hard disk will be decrypted, so EFS can send it encrypted over the network.
c. The file on the hard disk and the data sent over the network will remain encrypted.
d. The file on the hard disk and the data sent over the network will be decrypted and remain that way.

153. YoDL: 0.0 kb UL: 0.0 kbhoot a user's account. Which of the following statements are true regarding
user account membership?

36
Windows Server 2003 NetWork SubJect

a. A user account can be a member of multiple organizational units at the same time.
b. A user account can be a member of only a single organizational unit.
c. A user account can be a member of only a single domain.
d. A user account can be a member of only a single group

154.You're responsible for review of shared resources on several servers within a corporate domain. To
accomplish this task, you've decided to use an automated script that will run several times per day to
determine what shared resources are being used. Which of the following options would be most useful in
meeting this requirement?
a. Utilize the net session command to review the shared resources
b. Utilize the net file command to review the shared resources
c. Utilize the net accounts command to review the shared resources
d. Utilize the net config command to review the shared resources

155.A Windows XP Professional client computer will receive a DHCPACK broadcast message from the
DHCP server after which of the following events?
a. When the client computer sends a request to use a lease it was offered
b. When a DHCP server offers it a lease
c. When the client computer first requests an IP address
d. Successfully receiving or renewing an IP address from the DHCP server

156.You have just installed DNS on the network, and configured a primary server and a secondary server.
What must you do to specify the authoritative name servers for the zone?
a. Create the NS records for the primary and secondary name server.
b. Create the NS record for the secondary name server.
c. Create the NS record for the primary name server.
d. Nothing, all necessary NS records are created automatically.

157.You maintain a Windows Server 2003 DHCP server to dynamically assign addresses. You have
threesuperscopes set up, and within each superscope are four scopes. One day, you start experiencing
problems with one of the scopes issuing bad addresses. You check the server and suspect that there is a
database problem. How can you verify that the database is intact?
a. Open the DHCP console. Select the superscope that contains the scope in question and then select Action,
Reconcile All Scopes.
b. Open the DHCP console. Select the DHCP server that contains the scope in question and then select
Action, Reconcile DHCP Database.
c. Open the DHCP console. Select the scope in question and select Action, Reconcile Scope.
d. Open the DHCP console. Select the DHCP server that contains the scope in question and then select
Action, Reconcile All Scopes.
158.Your Windows XP computer has several shared folders. You are conducting a security audit and wish
to view the permissions on each of the shared folders. How can you quickly view all shared folders on
your computer? What should you do?
a. Use Windows Explorer to search for shared folders.
b. Use disk management to view the shared folders on each drive.
c. Use System information in Computer Management to view shared folders.
d. Use Shared Folders in Computer Management to view shared folders.

159.The network con 3.0 mbf 1,500 Windows Server 2003 servers spread over 150 OUs that have
approximately 10 servers each. You have just finished creating a customized security template that
specifies the Account Policies and Audit Policy settings that are required by your organization's

36
Windows Server 2003 NetWork SubJect

corporate policy for specific departments. What is the best way for you to apply this template to only the
Sales, Marketing, Production, and Engineering OUs?
a. Import the security template into each required OU by using a GPO.
b. Manually apply the security template to each of the computers.
c. Script the secedit.exe command to apply the security template to the required computers.
d. Import the security template at the domain level into a GPO.

160.Your network contains 240 computers running Windows 2000 Professional and 225 computers running
Windows XP Professional and uses Class C IP addresses. All the computers are located on the same
network segment. You has been asked to automate the process of assigning IP addresses. What do you
need to do?
a. You need to install DHCP and configure a scope
b. You need to install DHCP and configure a superscope
c. You need to install DHCP and configure DNS integration
d. You need to install DHCP and configure BOOTP

161.You have been hired as a network consultant to install DNS in the new corporate headquarters of
Zanzibar Sports. The network currently consists of 3,000 computers running Windows XP Professional
and 4,000 computers running Windows 2000 Professional. The servers providing DNS for the network
are presently located in the largest branch location, but you want to move them into the new corporate
data center. You also want to ensure that all remote offices and manufacturing sites can perform DNS
resolution queries without adding additional traffic on your WAN links. What should you do to ensure
that the remote offices and manufacturing sites do not add additional traffic to your WAN links?
a. Configure the DNS servers at the corporate data center with standard secondary zones.
b. Create a stub zone at the corporate data center.
c. Configure the DNS servers at the corporate data center as Active Directory integrated.
d. Configure standard secondary zone DNS servers at all remote offices and manufacturing sites.

162.You are trying to explain DNS and reverse lookup zones to your co-workers. What should you tell your
co-workers that reverse lookup zone allows users to resolve?
a. A hostname to an FQDN c. A hostname to an IP address
b. An IP address to a hostname d. An IP address to a MAC address
d. The file on the hard disk and the data sent over
163.You have installed a new file server on the the network will remain encrypted.
network and formatted it to use NTFS. After
formatting is complete, you use EFS to encrypt
a folder containing files belonging to users. If a 164.You just installed and configured a DHCP server.
user accesses a file belonging to him in this After the installation, the wizard asked you to
folder, and then copies it across the network activate the scope, and you did. Staff from your
for another user to access, company are complaining, however, that they are
which of the following will occur? not obtaining IP addresses. What could be the
a. The file on the hard disk will remain problem?
encrypted, but data sent over the network will a. You did not authorize the server.
be unencrypted. b. You did not activate the server.
b. The file on the hard disk and the data sent over c. You were not authorized to activate the scope;
the network will be decrypted and remain that only administrators can activate the scope.
way. d. Your scope is misconfigured.
c. The file on the hard disk will be decrypted, so
EFS can send it encrypted over the network.

36
Windows Server 2003 NetWork SubJect

165.You are experiencing a delay when you connect to a remote Web site. Which tool allows you to
determine whether particular routers are responsible for the delay?
a. Tracert c. PathPing
b. Network Diagnostics d. Netdiag

166.Your corporate network uses variable length subnetting to make more efficient use of IP addresses. One
of the IP addresses for a host is 131.39.161.17 with a subnet mask of 255.255.248.0.What is the proper
notation for the network to which this host is connected?
a. 131.39.161.17/21 c. 131.36.161.0/20
b. 131.36.160.0/20 d. 131.39.160.0/21
On each computer, at the command
167.You have been assigned the task of identifying prompt, type ipconfig /renewdns.
and correcting a problem with one of the On each computer, at the command
Windows Server 2003DNS servers. Computers prompt, type ipconfig /renew.
running Windows 2000 Professional have not On each computer, at the command
registered dynamically with the DNS server. prompt, type ipconfig /registerdns.
You would like to force these computers to Reboot the system so that the computer is
register with DNS as quickly as possible. What issued a new DHCP address.
should you do?

168.You need to create several new file shares on your server. Which of the following options can NOT be
used for this purpose in a default installation of Windows Server 2003?
a. Utilize the net share command-line utility
b. Create the file shares within the Windows Explorer
c. Create the file shares within the Internet Explorer
d. Utilize the Computer Management MMC snap-in

169.Which of the following best describes the function of a subnet mask?


A subnet mask enables an IP address to be visible from the Internet.
A subnet mask specifies the sizes of the network and host identifiers in an IP address.
A subnet mask indicates whether an IP address is registered or unregistered.
A subnet mask is a value assigned by the IANA to uniquely identify a specific
network on the Internet.

36

You might also like