You are on page 1of 133

Question: 1 You are the network administrator for Company.com.

Company has 50 users in the main office 10 users on each of its five branch office. You install Microsoft Windows Server 2003, Standard Edition in native mode on a computer that has a network of client What should you do? computers in each branch office. You connect each branch office to the main office by using WAN connections. You need to ensure A. Install a member server only at each branch office. that users can authenticate to the domain from a remote branch office even when the WAN connection is down. B. Install a domain controller and a DNS server only at each branch office. C. Install a member server, a WINS server, and a DNS server at each branch office. D. Install a domain controller, a DNS server, and the global catalog at each remote office. Answer: D Explanation: A global catalog is a directory database that applications and clients can query to locate any object in a forest. The global catalog is hosted on one or more domain controllers in the forest. It contains a partial replica of every domain directory partition in the forest. These partial replicas include replicas of every object in the forest, as follows: the attributes most frequently used in search operations and the attributes required to locate a full replica of the object. You should install a domain Incorrect answers: controller, a DNS A: You well a a global catalog at each remote server ensure that authentication to the domain server possible server, asneed asdomain controller not a memberoffice toat each remote office in addition to a DNS will be and the global catalog. even in the event ofB: You connection failure. catalog at each branch office as well to facilitate authentication when the WAN WAN would need a global connection is down. C: This option will not facilitate authentication when the WAN connection is down. Reference: J. C. Mackin, Ian McLean, Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, 2003, Chapter 1, p. 28 Question: 2

You are a technical consultant. You are hired by Company technical assessment of the business.Company has one computer that runs Microsoft Windows XP Professional located at the store.The company bookkeeper enters transactions on the computer during What hours. The owner wants to be able to access the accounting information after store hours from his home. businessshould you do? Broadband A. Install a Microsoft Windows Small Business Server 2003 computer at the store. InstallMicrosoft Windows XP connections are installed atat the owners home. Professional computer the office and the owners home. The broadband connection at the office has a static IP B. Install a Microsoft Windows XP Professional computer at the owners home. address. The C. Install a Microsoft Windows Server 2003, Standard Edition computer at the store and aMicrosoft Windows 98 owner does not want to spend more than is absolutely necessary to achieve his objectives. You need to create a solution computer at the owners home. to meet the D. Install a Microsoft Windows Server 2003 computer at the store and one at the owners home. Answer: B owners objectives. Explanation: Since the office has only one computer running Microsoft Windows XP Professional with a static IP address broadband connection, all that would be necessary for the owner is to have aMicrosoft Windows XP Professional computer at home as well. That A, D: There is no need for extra expense as is suggested by options A and D. Incorrect answers: should enable the also involves extra expense with the added informationbe able to house onto the store computer. C: Thus option owner toenter data and access accounting inability to from his access accounting information from the owner's house if he is & James Chellis, MCSA/MCSE: Windows XP house. Reference: Lisa Donaldto have a Microsoft Windows 98computer at hisProfessional Study Guide, Second Edition, Sybex Inc. Alameda, 2003, p. 408 Question: 3 You are the network administrator of a Company.coms Active Directory domain that runs Microsoft Windows Server 2003, Standard Edition. You create a test lab with a sever that runs Windows Server 2003, Standard Edition, a UNIX client computer, and two client computers that run Microsoft Windows XP Professional. The server and the UNIX computer use static IP address and the Windows XP Professionalyou do? What should client computers use the DHCP Server service for IP addressing, which is also configured for WINS. You reconfigure A. Configure can access the corporate network. The client computers can no longer access the UNIX box. All of the the test lab so it the corporate DHCP servers for BOOTP. B. Configure test lab client the corporate DHCP servers for WINS configuration information. C. Ask ISP to create records for the non-WINS client computers in the ISPs DNS computers can access the server that runs Windows Server 2003, Standard Edition. You need both of the test lab client server. computers to D. Create records for the non-WINS client computers in the server. access both the UNIX computer and the Windows Server 2003 corporate DNS server manually. Answer: D Explanation: DNS provides a naming system for network resources and a service for resolving those names into IP addresses. A DNS server communicates with other DNS servers on the network to find out the IP address associated with the requested name,

and then sends it back to the client computer, which initiates communications with the destination system using its IP address. Since the question mentions that the UNIX computer uses a static IP address and the client computers use the DHCP Server (which is also Incorrect answers: configured for relay agent IP addressing, then you should create records for the Requests forComments (RFCs) the A: A DHCP WINS) for supports DHCP/BOOTP message relay as defined in non-WINS client computers in 1541 and DNS server 2131. The DHCP Relay Agent service is managed using the Routing And Remote Access service. B: This This way not service the non-WINS lab computers can manually. option willyou will ensure that the testclient computers. access both the UNIX computer and the Windows Reference: C: The records should be Planning and corporate DNS server and not the ISP's DNS server. Server 2003 Craig Zacker, created on theMaintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, 2004, Chapter 4, p. 66 server. Question: 4 You are the network administrator for Company.com. Companys network structure is growing in size and has several branch offices. The internal users require access to external resources. Each users computer connects to the Internet through routers. should you do? What You need to control Internet usage as well as improve the systems Internet performance. A. Configure the ISA Sever computers to stand alone to block port 80. B. Install Network Address Translation (NAT) protocol on a stand-alone router and use a public IP address on the private network. C. Install Network Address Translation (NAT) protocol and configure a domain controller for user authentication. D. Install ISA Server on the computer and configure Internet access on a user-byuser basis and for Web caching. Answer: D Explanation: Apart from protecting the network from outside intrusion, ISA provides extensive internal security capabilities. Using a policy-based model, you can monitor and regulate user access to the Internet. Using a firewall client provided with the product, you can require users to authenticate to the ISA server before they are granted Internet access and grant them specific levels of access based on their identities. This means you can easily control user access to specific Internet applications and locations as well as Incorrect answers: maintain logs of Internet activities. You can also limit the time users can spend on the Internet by scheduling the hours A: Port 80 would mean that you block only HTTP traffic. This alone will not be controlling internet usage. when access B, C: Network Address Translation (NAT) is a technology that enables a local-area network (LAN) to use one set of is available. In this scenario you have to install ISA server on the computer and configure Internet access on a user-byInternet Protocol user basis and (IP) addresses for internal traffic and a second set ofaddresses for external traffic. Whether it is installed on a for Web caching so as to control Internet usage and improve performance. standalone Reference: Craig public Planning and Maintaining a Microsoft Windows Server 2003 Network for user router and using aZacker, IP address on the private network or configured as a domain controllerInfrastructure, Microsoft Press, authenticationwill Redmond, not suffice 2004, Chapter 3, p. 30 Question: 5 in this instance. You are a network consultant for Company, Inc. Company has 15 computers. The desktop operating systems are running Microsoft Windows XP, Home Edition. Each computer runs Microsoft Office 97 Suite. One employee receives all of the company e-mail

messages on one computer that has an external modem. Printing is accomplished on local inkjet printers that are attached to each computer. Company uses a Microsoft Windows 98 computer for file sharing. Company also uses a network able laser What do you printer for all recommend? (Choose all that apply.) A. Replace the server with a Microsoft Windows 2003, Standard Edition computer that assess the current network employees to share. Management wants to eliminate multiple network logins. You need to runs Active Directory. and make B. Replace the server with a Microsoft Windows Server 2003, Standard Edition stand-alone server. C. Upgrade all Windows XP, Home Edition computers recommendations for addressing management concerns. to Microsoft Windows XP Professional. D. Upgrade the Microsoft Windows 98 file server to Microsoft Windows XP Professional. Answer: A, C Explanation: The Active Directory service is a hierarchical directory service that consists of objects that represent users, computers, groups, and other network resources. The objects are arranged in a tree display that consists of hierarchical layers that ranges upward from organizational units, to domains, to trees, and to forests. Objects are composed of attributes that contain information about the resource the object represents. When users log on to the network, their user names and passwords are authenticated against the Active Directory database by a computer that has been designated as a domain controller. This single Incorrect answers: logonYou need Active Directory. A standalone server will not serve the B: can grant them access to resources anywhere on the network. This should eliminate multiple logins. And since the desktop purpose. operating will not prevent multiple logins. D: This system Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Reference: Craig are all running Windows XP, Home Edition with Microsoft Office 97 Suite as the application, all that is necessary Microsoft Press, would be to upgrade Redmond, 2004, Chapter 19, p. 4 them all to Microsoft Windows XP Professional. Question: 6 You are the network administrator of an Active Directory domain that runs Microsoft Windows Server 2003, Standard Edition. You are responsible for managing and maintaining all DHCP servers in the organization. You need to create a test lab that represents the What should you environment. The lab network needs to be completely isolated from the rest of the production current production do? network. You need A. Back up the current DHCP database and then restore it to the DHCP server in the test lab. to recreate the current production DHCP server configuration in the test lab as quickly as possible. B. Back up the current DHCP database and then reconcile it on the DHCP server in the test lab. C. Reconcile the current DHCP database and then copy the log file to the DHCP server in the test lab. D. Back A Answer:up the current DHCP log file and then copy it to the DHCP server in the test lab. Explanation: The most efficient way to transfer a DHCP database is to make a backup of it. The database can then be restored on the original computer or transferred to another computer. In this case the test tab would be the other computer to which the DHCP database should be restored so as to create a replica that runs independent from the rest of the production network.

Incorrect answers: B: You should be restoring the DHCP database on the DHCP server in the testlab, not reconcile it. C: This will take too long. Reference: J. C. Mackin, Ian McLean, Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network D: Restoring Infrastructure, the DHCP database is quicker than copying it to the server in the testlab. Microsoft Press, Redmond, 2003, Chapter 13, p. 24 Question: 7 You are the network administrator for Company.com. The main office has 30 users. The Company also has three remote offices in various parts of the city. Each remote office has five users. You provide each office with Internet access through a Digital Subscriber What should you do? Lines (DSL) line. You purchase a new server. You need to provide all of the users with Web access to a central file storage location A. Install Microsoft Windows Server 2003, Standard Edition only. in the main office and to e-mail functions that are hosted locally on the new server. B. Install Microsoft Windows Server 2003, Standard Edition with IIS only. C. Install Microsoft Windows Server 2003, Standard Edition and install Microsoft SharePoint Team Services only. Direct all clients to the SharePoint site. D. Install Microsoft Windows Small Business Server 2003 and direct all users to the SharePoint site. Answer: B Question: 8 You are the network administrator for Company.com. The agency has a server that runs Microsoft Windows Sever 2003. The agency connects to the Internet with a broadband router. The agency has 10 employees. Each employee has a mobile computer. Agency policy mandates that all employees connect to the server through a PPTP connection to send and receive e-mail What should messages and you do? A. Direct port 3389 on the an additional 15 employees. Employees now report share files. The agency hires agencys broadband router to point to the server. trouble connecting to the server at B. Increase random timesthe number of PPTP ports in Remote Access Service (RAS). C. Decrease the number of L2TP ports in all employees Service (RAS). throughout the day. You need to ensure thatRemote Accesscan connect to the server at all times. D. Direct ports 25 and 110 on the agencys broadband router to point to the server. Answer: B

Explanation: Remote Access service enables you to use protocol and port numbers to limit the traffic that canreach the computer. In this case you want to increase the traffic to reach the server and thus youneed to increase the number of PPTP ports in RAS to Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, ensure that the additional 15 employees will also be accommodated. Microsoft Press, Redmond, 2004, Chapter 18, p. 18

Question: 9 You are a network consultant for Company.com. Company management wants to install Microsoft Windows Sever 2003 on a new What should you do? computer. Employees rely on the corporate network for all aspects of business. You do not want employees to notice A. Configure any slowdown a set of three hard disks that use hardware RAID 0. in B. Configuredisk failure. You need to implement hard disk specifications for the new server. the event of a set of three hard disks that use software RAID 5. C. Configure a set of two hard disks that use hardware RAID 1. Answer: C D. Configure one hard disk that has two partitions. Explanation: A RAID-1 volume (also known as mirrored volumes) consists of two identical copies of a simple volume, each on a separate hard disk. Mirrored volumes provide fault tolerance in the event that one physical disk fails. This will not result in a slowdown in the event of disk failure. Incorrect answers: A: RAID-0 (also known as a striped volume) combines areas of free space from multiple hard disks into one logical volume. Unlike a spanned volume, however, data is written to all physicaldisks in the volume at the same rate. Because multiple spindles are in use, read and write performance is increased almost geometrically as additional physical disks are added to thestripe. But like extended simple volumes and spanned volumes, if a disk in a striped volume fails, the data in the entire volume is lost. B:Reference: volumes (RAID-1) and RAID-5 volumes provide different levels of fault tolerance. Deciding which option Mirrored to Dan Holme, Orin Thomas, Managing and Maintaining a Microsoft Windows Server 2003 Environment, implement depends onPress, of protection you require and the costof hardware. The major differences between mirrored Microsoft the level volumes and 2004, Chapter 11, p. 38 Redmond, Question: 10 RAID-5 volumes areperformance and cost. You are the network administrator for Company.com. The company provides celebrity bodyguard services. The D: With this option there will be a definite slowdown in the event of disk failure. company has two offices that are located in New York and Los Angeles. Each office has a Microsoft Windows Sever 2003 file server computer, 50 Microsoft Windows XP Professional computers, and a T1 connection for Internet access. Both file servers have Which native tools different domains in should you use? different forests. Some user accounts exist on both networks. Management requests you to connect both Microsoft A. Terminal Services Windows Sever B. Internet Connection Sharing 2003 Network Bridge network. You need to use minimal investment and downtime for each facility. C. networks as one D. Enable Cross Forest Trusts in Active Directory Answer: D

Explanation: A forest trust can only be created between the root domains in two forests. Both forests must be Windows Server 2003 forests. These trusts can be one- or two-way trusts. They are considered transitive trusts because the child domains inside the answers: Incorrect forest A: Terminal Services has two modes: Remote Administration and Application Server Remote Administration enables can authenticate themselves across the forest to access resources in the other forest. you to manage Windows Server computers from across a network, without limiting your access to tools within the Microsoft Management Console (MMC) or even requiring you to use Windows Server 2003 or 2000 as the managing operating system. If you don't use Terminal Services for anything else, use it for managing servers without having to physically move from console to console. In essence Terminal Services makes your Server 2003 system a multi-user computer. This is not what is required. B: ICS is more suitable for sharing a single Internet connection. It is a connection to the Internet (typically a modem or broadband Reference: connection) and a connection to the LAN containing the computers that will share the Internet connection. It has a Michael Cross, Jeffery A. Martin, Todd A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr. Thomas W. couple of Shinder, Planning, limitations: (i) ICS supports only a single Internet IP address and a single LAN connection. The full NAT service can Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure, Syngress Publishing, connect any Rockland, 2003, number of public IP addresses to multiple LANs and (ii) ICS cannot be used on networks that have a DHCP or DNS Chapter 5, p. 397 Mark Minasi, Christa Anderson, Michele Beveridge, C.A. Callahan & Lisa Justice, Mastering server Question: 11 Windows Server implemented. You are a network administrator Chapter 16, pp. 1225-1226. Inc.s network contains of 10 Microsoft Windows XP 2003, Sybex Inc., Alameda, 2003, of Company, Inc. Company, C: A network bridge implies extra costs. Professional computers that are located in the corporate office section of the plant. Another 30 Microsoft Windows 2000 Professional computers are on the main floor of the manufacturing plant. Company, Inc. has a Microsoft Windows Sever 2003 computer that is Whatfor file you do? used should sharing and e-mail services. You need to have a script on Login Properties in Scripts (Logon/Logoff) on Group Policy A. In Group Policy Object Editor, Select Add all of the documents that are in My Documents folder in the client computers saved Object Editor. on In group policy editor select Basic Redirect with the least administrative effort. B. the server. You need to provide this solution everyones folder to the same location. ConfigureCreate a folder for each user under the root path for Target folder location in DesktopProperties in Folder redirection node for Group Policy Object Editor. C. Configure Target folder location in My Documents Properties dialog box on each clientcomputer. D. In group policy editor select Basic - Redirect everyones folder to the same location. ConfigureCreate folder for Answer: D each use under the root path for Target contains policies My DocumentProperties in Folder Redirection node for , My Explanation: Folder Redirection folder location in to redirect certain user folders, such as Application data Group Policy Object start documents;and Editor. menu to alternate locations . Folder redirection is a Group Policy extension that allows you to identify a connection between network servers or DFS roots and the local folders that you want to redirect. In this case you should configure the Create folder for each user under the root path for Target folder location in My Document Properties in the Folder redirection node for the group policy object editor.

Incorrect answers: A: This is not a logging in or out issue. B: This option suggests the target folder to be the Desktop properties instead of the My Documents properties. Reference: C:Michael Cross, Jeffery A. Martin, Todd A. Walls, performed on each client computer. This is & Dr. Thomas W. This option suggests that the same procedure be Martin Grasdal, Debra Littlejohn Shinder unnecessary administrative effort. Shinder, Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure, Syngress Publishing, Rockland, 2003, Chapter 4, Question: 12 p. 328 You are the network administrator for Company.com. The company network runs Microsoft Windows Sever 2003 and contains 150client computer and mobile computer users. The network also contains two print servers named Company1 and Company2. You install a new print server named Company3. You cannot connect to the Company3 by using Remote Desktop. You A. office junior wantConnect to Company1 or Company2 as an administrator. Enable Company3 forremote administration. B. administrators to use only a custom management application every time Remote Desktop is used to level Log on locally to Company3 as a server operator. Configure Company3 for remoteadministration. gain access to C. In the the server. Properties dialog box for Remote Desktop on Company3, enable the Start the following program on connection What two actions should you perform? (Each correct answer presents part of the solution. Choose two.) option. D. Ensure that users are members of the Local Administrators group on Company3. E. On Company3, in the Properties dialog box for Remote Desktop, enable the Redirect local drives when logged on to the Answer: B, C Remote computer option. Explanation: The Server Operators group is intended for system support personnel who need more access to the file system than normal users, but who are not yet trusted with the Full Control permission. Server operators have full access to the key Program Files and Windows folders. Their only limitation is that without the Full Control permission, they cannot grant their permissions to other Reference: Craig Zacker , Planning and Maintaining a Microsoft Windows distant location and Infrastructure, users. Remote Desktop enables an administrator to connect to a computer at aServer 2003 Network remotely operate Microsoft Press, the console. In Redmond, 2004, Chapter 8, p. 22 the Properties dialog box you should enable the Start the following program on connection option to ensure that only the custom Question: 13 management application is used when Remote DesktopThe company has a server that runs Microsoft Windows XP You are the network administrator for Company.com. is used to gain access to the server. Professional. The company server is located in the office area of the showroom. The client computers are located at various stations in the showroom. What should you do? Employees frequently leave the showroom stations to help customers. You need to configure a method to lock client computers when A. Configure each client computer with a screen saver. Configure the screen saver toprotect on resume. employees leave the stations with the least amount of administrative effort. password domain policy to password B. Configure the default domain policy to force a screen saver on all of the computers. C. Configure a new domain policy to force a screen saver on all of the computers. Configure the

protect the screen saver on resume.

security policy to password

D. Configure the local security policy on each computer to force a screen saver. Configure Answer: C protect on resume. Explanation: Password protect the screen saver - Enabling this policy causes all screen savers to be passwordprotected. That is, to restore the normal desktop when ascreen saver is displayed, the user must enter his or her password. Therefore, someone who leaves the computer for a time doesn't leave its display open to anyone who walks by and jiggles the mouse. (However, no policy explicitly requires users to use a screen saver. If you want to do that, configure a screen saver and then enable the Hide Incorrect answers: Screen A: Configuring each client folder, which prevents users from changing your screen saver configuration.) Further Saver Tab policy in this samecomputer implies unnecessary administrative effort. B: Domain moreYou should also configure the domain policy to password protect the screensaver on resume. D: A new domain policy , not a local security policy, forcing the screen server on all thecomputers , Policy settings take precedence over user settings. should be configured. Reference: Ed Bott & Carl Siechert, Microsoft Windows Security Inside Out, Microsoft Press, Question: 14 Redmond, You are the network administrator for Company.com. The company network contains a Microsoft Windows Sever Washington, 2003, Chapter 19 2003 computer, 15 Microsoft Windows XP Professional computers in the office, and a total of eight Microsoft Windows XP and Microsoft Windows 2000 computers on the manufacturing plant floor. Internet access is provided by a Digital Subscriber Lines (DSL) What should you do? connection. Users on the(Each correct answer presents part of the solution. Choose two.) plantTurn on Performance Monitor.on time. You need to implement a native solution that monitors and creates A. floor are not arriving to work reports when editing for Default Domain Security Settings, Generate Security Audits for B. Turn on users log Microsoft Windows XP onLocalUsers. the network. C. Use Group Policy Management console to create a security policy for all of the users and Professional computers. D. Configure the Account Logon Hours. Answer: B, C Explanation: Setting audit policies in the Default Domain Policy sets them for all computers in the domain.Options B and C would monitor and create reports of user logging on behavior. Reference: J. C. Mackin, Ian McLean., Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, 2004, Chapter 11, p. 75 Question: 15 You are the network administrator for Company.com. Company network contains 35 Microsoft Windows XP Professional computers and one Microsoft Windows Small Business Server 2003 computer. Internet access provided by a Digital Subscriber Lines (DSL) connection. Company Coffee purchases 35 copies of Microsoft Office 2003 for all of its client computers. Management wants to

complete installation of Microsoft Office 2003 on all of the client computers with the minimal amount of time and effort. Employees should save all data do? (Each correctMicrosoft Office applications on the file server rather than on client computers. What should you that is created in answer presents part of the solution. Choose You need to two.) A. Run the Set Up Client Applications Wizard in the Server Management console. B. Install Microsoft Office ensure the employee locally. complete the installation and2003 onthat file server data is stored on the file server with the least amount of C. Install Microsoft administrative effort. Office 2003 physically on each client computer. D. Redirect all users My Documents folder to the file server from the Server ManagementConsole. E. Place the Microsoft Office 2003 CD-ROM in the file server CD-ROM tray and enable sharingon the CD-ROM Answer: A, D drive. Explanation: Before you connect a client computer to the network, you need to run the Set Up Computer Wizard on the Windows Small Business Server computer. This wizard creates computer accounts and optionally assigns software to the computers. Windows Server 2003 has the capacity to redirect users' folders by applying Group Policy. Windows Small Business Server, however, has a Incorrect answers: single setting that implements the redirection of each user's My Documents folder to the server. Options A and D B: Installing Microsoft Office 2003 on the file server locally does not mean that client computers can work in would represent the Microsoft office administrative effort to comply with the request. least amount of and save their work to the file server. C: This option implies a whole lot of unnecessary administrative effort. E:Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: This is not the least amount of administrative effort that is necessary to comply withmanagement's request. Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 12, p. 264 & Chapter 9, p. 169 Question: 16 You are the network administrator for Company.com trucking. Company trucking firm has 80 employees and 40 computers. The firms network is mixed environment of Microsoft Windows XP Professional computers and Microsoft Windows 2000 Professional What should file server computers. Theyou do? runs Microsoft Windows Server 2003. You need to add the new file server to the existing Windows Small A. Run the Active Directory Installation Wizard on the new Windows Server 2003 network. Business Server 2003 network. B. From the Server Management screen, select the Computers, Manage Server Computers,and Setup Server Computers. C. Change the Windows Server 2003 Server computer to the primary domain. Demote the Windows Small Business Server 2003 computer. D. Change the Windows Small Business Server 2003 computer IP address to a subnet on theWindows Server 2003 Answer: network. B Run the Active Directory Installation Wizard. Question: 17 You are the network consultant for Company.com. You have upgraded from a Windows peer-topeer network to Microsoft Windows Small Business Server 2003. You install on the new server legacy line-of-business (LOB) application that is designed for Microsoft Windows 98. The LOB application ceases to function. You need to ensure that the LOB application functions.

What should you do? A. For the application, set the Compatibility mode to Microsoft Windows NT 4.0 Service Pack 5 (SP5) B. For the application, set a Compatibility mode to Microsoft Windows 98. C. Add end users to the Power User group. D. Change the www service form IIS 6.0 Dedicated Application mode to IIS 5.0 Isolation Answer: B mode. Explanation: Windows Small Business Server 2003 seldom exhibits compatibility problems, though it's nonetheless a good idea to check for potential trouble. For the highest level of compatibility with Windows Small Business Server 2003, make sure that the server and all devices are listed in the Windows Server Catalog (formerly known as the Hardware Compatibility List). Incorrect answers: A: The application is designed for Microsoft Windows 98, thus setting the Compatibility mode to Microsoft Windows NT 4.0 will not make it functional. C: Whether end users are added to the Power group or not, the application will not be functional as it will not be Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: compatible. Administrator's D: This option will not render the application functional. Companion, Microsoft Press, Redmond, 2004, Chapter 5, pp. 61-63 Question: 18 You are the consultant for Company.com. You install Microsoft Windows Small Business Server 2003 on a network server. The network contains 15 client computers that run Microsoft Windows XP Professional. You install the firms accounting application that uses Microsoft SQL 2000 Server on a member server that runs Microsoft Windows Server 2003. The accounting application is running should you do? You install a tape drive on the member server for system backups. You need to crate a backup What all of the time. plan that A. Create a backup by using the Windows Small Business Server 2003 Backup wizard performs database backups and transaction log backups of the accounting applications databases. You need to create tool. separate B. Create a backup schedules that contains the SQL databases by using the Backup the logs as a single weekday and weekendof the drivefor each of these backups. You need a backup plan that requires the least amount of wizard. administrative effort. that backs up the databases and C. Create a database maintenance plan on the member server that backs up the databases and maintenance plan. Answer: D database maintenance plan on the Windows Small Business Server 2003 D. Create a computer Explanation: The least amount of administrative effort would be one where all the essentials are backed up as a single the logs plan. This as a single maintenance plan. should preferably be done on the Windows Small Business Server computer so as to facilitate seperate weekday and weekend schedules for each of these backups on one computer. Incorrect answers: A: Creating a backup is not the same as a backup plan.

B: Creating a backup is not the same as a backup plan. C: The database maintenance plan should be created on the Windows Small Business Serverand not on the member Question: 19 server. You are the network administrator for Company.com. The company has a peer-to-peer network that contains 10 Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: computers. You install Microsoft Windows Small Business Server 2003. You are configuring the new network. You need to minimize Administrator's the risk that you do? (Each correct answer presents part of the solution. Choose What should Companion, Microsoft Press, Redmond, 2004, Chapter 13, pp. 305-309 documents are lost in the future. two.) A. Add a script to the user logon batch file to redirect the My Documents folder to the users folder on the server. B. In Server Management, go to the Users node. Select the option to redirect the My Documents folder. C. Run Configure Backup from the To Do list. Select the option to configure Shadows Copy on the server. D. Install backup software on each of the client computers. Answer: B, list E. Deny the C folder contents on the Data Folder properties. Explanation: Windows Server 2003 has the capacity to redirect users' folders by applying Group Policy. Windows Small Business Server, however, has a single setting that implements the redirection of each user's My Documents folder to the server. Redirecting all My Documents folders to the server will take up a lot of disk space. Make sure you have sufficient room. Windows Small Business Incorrect provides Server 2003 answers: an easy-to-use Backup Utility that, combined with the Volume Shadow Copy feature, can help A: Redirecting the My Documents folder to the user's folder on the server is not the same asshadow copies. protect your Therefore this business from loss due to data corruption, server crash, or simple user error. option is not correct. D: Backup software will not be minimizing the risk of document loss. E: The List Folder Contents permission allows the following rights to traverse folders, list the contents of a folder Reference:aCharlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: and to see Administrator's attributes. This permission will not prevent loss of documents whether it is granted or not in this file's or folder's Companion, Microsoft Press, Redmond, 2004, Chapter 9, p. 168 case. 20 Question: You are a network administrator for Company.com. Company has a peer-to-peer network that contains 16 client computers. You are installing Microsoft Windows Small Business Server 2003 on the network. You need to configure all of the existing users so they are What the Active Directory database. You need to add and configure multiple accounts with the least amount of added toshould you do? administrative A. Use the Add a Template option in the User templates within Server Management. effort. Computers. B. Use New User in the appropriate organizational unit (OU) within Active Directory Users and C. In the Server Management console, use the Add Multiple Users option in the Users node. D. Use Add user Wizard with in the To Do List option in the Server Management console.

Answer: C

Explanation: The ability to add several user accounts at once is a new and highly helpful feature in Windows Small Business Server 2003. The process works much like adding a single user. This is also theoption that suggests the least amount of administrative effort. Incorrect answers: A: This method still involves single accounts being created and a template being applied. This is not necessary when all that is needed is one step as described in the Add Multiple Users option in the Users Node of the Server management console. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, B: This option involves unnecessary administrative effort. Microsoft Windows Small Business Server 2003: Administrator's unnecessary administrative effort. D: This involves Companion, Microsoft Press, Redmond, 2004, Chapter 9, p. 165 Question: 21 You are a network consultant for Company.com. You install Microsoft Windows Small Business Server 2003 on a network computer. The network contains 35 client computers, named Company1, Company2, .,Company35, and 10 mobile computers that all run Microsoft Windows 98. You enhance the security on the Microsoft Windows Small Business Server 2003 computer for connections from the Internet by you do? What should assigning the Security Server (Request Security) IPSec policy. Several users now report that they cannot connect to the A. Unassign shared files the Secure Server (Request Security) policy from the server. Assign the Server (Request Security) policy. B. the server. You need to allow these users of the client the shared files on the client without compromising security on Install the appropriate certificate on eachto connect to computers to allow the server computersto negotiate security associations with the Microsoft Windows Small Business Server 2003computer. for the C. Create a newto the server. Internet traffic policy that permits traffic from IP addresses on the companys internal network. Assign this policy as well as the Secure Sever (Request Security) policy. D. Unassign the Secure Security (Request Security) policy from the server. Create a new policy that permits traffic from IP addressesD the companys internal network and requires security for traffic from outside the companys network. Answer: on Assign this Explanation: The Server (Request Security) policy is intended for computers that do not require the highest levels of new policy. security and might communicate with systems not supporting IPSec. Require Security, if chosen, accepts unsecured communication but always responds using IPSec. If the client cannot speak IPSec, then the conversation ends there. It is as if you speak only English and another person speaks only Spanish. You ask a question and the other person responds, but you cannot understand. Incorrect answers: Request A: This different. Although the does not responds change when you unassign a policy and the just Security isoption is obsolete since itcomputer imply any to a non-IPSec request by using IPSec, ifthen other computer reassign it. does not answer B: IPSec, the first one drops connect does shared files and comply with all the security measures. usingThis will not allow users toback andto the not use IPSec. The communication can continue. C: This option could work, but you first need to unassign the Secure Server (Request Security) policy from the server.

Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Question: 22 Redmond, 2004, administrator 27 You are a network Chapter 12, p. for Company.com. Company has eight shops and a main business office located in one city. The main office contains 10 Microsoft Windows XP Professional client computers and a single Microsoft Windows Small Business Server 2003 computer. At each shop, there are two Microsoft Windows XP Professional client computers. The company needs to What should you do? be able to communicate Add a website in IIS console. Publish a Web site with thereleased. You on theto provideand point the of A. Configure with store managers about new products that are being information need Web site to the manager each shop to managers the ability to view and modify the company event listings and the company schedule. the site. Update the Web site with all company news andmeeting dates. B. Configure Microsoft SharePoint Team Services with a calendar that allows data sharing. Add Events Web part for Shared Calendaring to the SharePoint site. Create a Managers group and add the group to the Contributors group through the SharePoint site. Create a Managers group and add the group to the Contributors group thought the SharePoint Administration page. C.Answer:aB Create Manager Distribution Group. Add the manager of each shop location to the Mangers group. Send e-mail notifications Explanation: Microsoft Windows Small Business Server 2003 automatically creates a Microsoft Windows SharePoint of company news and meetings to the Manager Distribution Group. Services Web D. Add the manager of each shop location to the Mobile User Template. Install Connection Manager on the remote site (http://companyweb) during installation. This Web site provides a central location for employees to collaborate shop client and share Reference: Allow managers to connect to the Jason Gerend, Microsoft Connection Manager. computers. Charlie Russel, Sharon Crawford,main office server throughWindows Small Business Server 2003: information. Consider it a bulletin board, digitized and turbo-boosted. Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 17, pp. 445-449 Question: 23 You are the network security administrator for Fabrikam, Inc. Fabrikam is a software development company with 20 Microsoft Windows XP Professional client computers and one file server that runs Microsoft Windows Small Business Server 2003, Standard Edition. Fabrikam has a DSL connection for Internet access and uses a hardware-based firewall device. Fabrikam employees want A. Have all of the employees access e-mail messages from a single remote location. remote access to e-mail messages on the server by using Microsoft Smartphone and other Wireless Application B. Obtain a certificate from a Certification Authority by running the Web Server Certificate Wizard from the Protocol (WAP) Management Console to devices. You need to ensure that employees access e-mail messages in a secure environment with a certificate create the request. authority. You want C. Run the Configure E-mail and Internet Connection Wizard and publish Outlook Mobile Access. to provide security that uses a certificate and requires the least amount of administrative effort. What should you do? D. Do not allow access by using Microsoft Smartphone and other Wireless Application Protocol (WAP) devices. It is unreliable and Answer: C unsupported. Question: 24 You are the administrator for Company. Company has 50 client computers. Atlantic has a server that runs Microsoft Windows Small

Business Server 2003. The server runs DHCP and assigns IP addresses to all of the computers in the company. The company has a

broadband connection. The ISP company changes its DNS servers IP address frequently. You want to make sure that What should you do? all of the A. Set up DNS forwarders on the Windows Small Business Server computer that point to the Digital Subscriber Lines (DSL) company computers can access the Internet at all times. Companys DNS server and change as needed. Configure the DNS server option in the DHCP Scope with the address of the Windows Small Business Server computer. B. Configure the DNS server option in the DHCP Scope with the Digital Subscriber Lines (DSLs) DNS server addresses. Change as needed. C.Answer: Aof the client computers to use static DNS server addresses. Point all of the computers to the Digital Set up all Subscriber Explanation: DHCP scopeDNS range of Internet Protocol (IP) addresses that are available to be leased or assigned to Lines (DSL) companys is a server and change as needed. Dynamic all of D. Set up Host the client computers to use reserved IP addresses. Configuration Protocol (DHCP) clients by the DHCP service. You can configure a DNS server to forward all name resolution requests it cannot resolve itself to a server called a forwarder. If your DNS server uses a forwarder, the requests sent by your server to the forwarder will be recursive queries. It is mentioned in the question that DNS queries on the Windows Small Business Incorrect answers: Server 2003 B: DHCP are functioning, but not DNS lookups for domains that internet. You need to configure forwarders to point computer scope is a range of Internet Protocol (IP) addressesin theare available to be leased orassigned to Dynamic Host to the ISP's Configuration Protocol is required to by the DHCP service.However, properly resolve internal and external fully name servers.This is what(DHCP) clientsensure that client computers canyou first need to set up DNS forwarders. C: This option will not ensure access to the Internet at all times for all of the company computers. qualified domain D: Making use of reserved IP addresses does not necessarily mean that the client computers willbe able to access the names. Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Internet Microsoft Press, at all times. Redmond, 2004, Chapter 4, p. 40 Question: 25 You are a network administrator for Company.com. The firm has a server that runs Microsoft Windows 2000 Small Business Server. The server has 256 MB of RAM and the Pentium 3 500mhz processor. You need to upgrade the server without losing any datashould you do? What and maintain all functionality. A. Upgrade the server to Microsoft Windows Small Business Server 2003, Premium Edition withall available options. B. Upgrade the server to Microsoft Windows Small Business Server 2003, Standard Edition. C. Upgrade the server to Microsoft Windows Server 2003. D. Do a clean install of Microsoft Windows Small Business Server 2003, Premium Edition. Delete the partition and format the hard disk as an NTFS file system partition. Answer: A Explanation:

Windows Small Business Server 2003, Premium Edition, includes Microsoft Window Server 2003,Standard Edition ; Microsoft Window Share Point Services ; Microsoft Exchange Server 2003; and Microsoft Shared Fax Services plus Microsoft Internet Security and Acceleration (ISA) Server 2000 for firewall and Web caching services, Microsoft SQL Server 2000 to handle Incorrect answers: databases, and B: The upgrade to the Standard Edition of the Microsoft Windows Small Business Server 2003does not include all the Microsoft Office FrontPage 2003.These products give you a fully developed business solution that includes all the necessary services that are necessary to maintain all functionality. essentials: e-mail, C: Upgrading the server to Windows Server 2003 will not maintain all functionality since the server already runs on Microsoft Internet connectivity, Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small remote users and mobile Reference: Charlie a preconfigured internal Web site, a shared fax service, services for Business Server 2003: Windows Small Business Server 2000. users, and install would mean that some data that is already there will be lost. Administrator's D: A clean Companion, Microsoft Press, Redmond, 2004 Question: 26 wizards to make configuration easy. You are the network administrator of Company.com. Company has a server that runs Microsoft Windows Small Business Server 2000 and 156 client computers that run Microsoft Windows XP Professional. Company has a rougher and a T1 connection to the Internet. The servers Microsoft Exchange Server configuration is left at the default and all of the internal and external e-mail message should youhosted on the server. All of he employees use Microsoft Outlook for all e-mail message needs and What sending is do? routinely send A. graphic files. You run an in-place upgrade of the largeUse Service Manager to turn off Mailbox Limits. server to Microsoft Windows Small Business Server 2003 B. Start the during after- Simple Mail Transfer Protocol (SMTP) and POP3 services in Service Manager. C. Run the Configure workday, Internet Connection Wizard from the To Do send any external or internal business hours. The nextE-mail andsome employees report that they are unable toList option and configure mail e-mail support. messages. D. Run to Windows all users can send and receive e-mail messages. You need theensure thatSmall Business server 2003 client setup from the server on each client computers to install the mail Answer: C client.

Explanation: The Configure E-mail and Internet Connection Wizard allows you to easily configure the network, set up a shared Internet broadband or dial-up connection, configure firewall services, and customize Exchange Server for e-mail. Use Exchange Server 2003 with Microsoft Office Outlook 2003 and add numerous features including the ability to schedule meetings and hold online conferences. E-mail is retrieved either directly from POP3 (Post Office Protocol 3) mailboxes and then routed to Exchange, or the eIncorrect answers: mail is delivered directly to Exchange. POP3 mailboxes are the easiest to manage. How factor once mail can be your ISP handles incoming eA: You should be configuring mail support first and not turn off Mailbox limits. This mail will only be a determines the configuration of email delivered directly to Exchange. Either it's delivered to Exchange as soon as received and sent. received, or it's B: Starting these services does not mean that e-mail is configured. held until your server sends a signal to the ISP. D: This is not how to configure e-mail in Microsoft Windows Small Business Server 2003.

Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Question: 27 Companion, Microsoft Press, Redmond, a marketing firm. Company.com is a 10-person firm with its headquarters Company is the network administrator for 2004, Chapter 6, pp. 79-82 located in Denver. The company opens a second office in New York and hires five new employees to operate that office. The main office has computers that run Microsoft Windows XP Professional and a server that runs Microsoft Windows Small Business Server 2003. The New York office has five computers that run Microsoft Windows XP Professional in a peer-to-peer network. A Digital Subscriber Lines do? (Each correct answer presents part of the solution. Choose two.) What should you (DSL) connection is available forYork office to access thelocation. CompanyTerminal keep both locations up to date on A. Set up each user in the New Internet access at each file server trough wants to Services and access Microsoft projects and Windows current events that take place in the company. The company currently relies on access to e-mail messages and a shared SharePoint Services. company alert notifications in Microsoft Windows SharePoint Services to notify the remote users when any changes B. Set up calendar and contacts to communicate between both offices. The New York office needs to receive notification when are made in information is Microsoft Windows SharePoint Services site. posted to or modifiedin the New York office as a remote usersite. allow them to connect to the server through Remote C. Set up each user on the Microsoft Windows SharePoint and Web Workplace. Then have each user install Connection Manager on the users computer to connect directly to the Answer: Small Windows B, C Business Server 2003. Explanation: With Connection Manager installed the user can connect to the Windows Small Business Server D. Set up a VPN connection for each user in New York and create a bookmark for MicrosoftWindows SharePoint remotely. Microsoft Services Windows Small Business Server 2003 automatically creates a Microsoft Windows SharePoint Services Web site in their web browser. (http://companyweb) during installation. This WebSharon Crawford, Jason Gerend, Microsoft Windows Small and share information. Reference: Charlie Russel, site provides a central location for employees to collaborate Business Server 2003: Consider it a bulletin Administrator's board, digitized and turbo-boosted. Companion, Microsoft Press, Redmond, 2004, Chapter 17, p. 445 Question: 28 You are the network administrator for Company.com. Company has a new server that runs Microsoft Windows Small Business Server 2003. Company has a broadband router with a static IP address. Company registers the domain name southridgevideo.com. Company wants to host its own e-mail messaging. You configure Microsoft Exchange Server 2003. You install What should you Microsoft Office do? (Choose all that apply.) Outlook2003 on all 110 oncompany computers. Employees report that they are receiving internal e-mail messages but A. Forward port of the the broadband router to the server. are not B. Forward port 25 on the broadband router to the server. receiving external e-mail messages.Express for all employeesemployees can receive external e-mail messages. C. Configure Microsoft Outlook You need to ensure that to receive external email messages. D. Have the ISP create a mail exchange (MX) record for Company. Answer: B, D Explanation: Simple Mail Transfer Protocol (SMTP) protocol use port number 25.The mail exchanger (MX) resource record is used

by e-mail applications to locate a mail server within a zone. It allows a domain name such as lucernepublishing.com, specified in an e-mail address such as joe@lucernepublishing.com, to be mapped to the A resource record of a computer hosting the mail server for Incorrect answers: A: Post Office type of 3 (POP3) protocol use port number 110. the domain. ThisProtocolrecord thus allows a DNS server to handle e-mail addresses in which no particular mail employees. C: You need to have an MX record created, and not configure Microsoft Outlook server is specified. Express forCraig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Reference: the Often, multiple MX records are created to provide fault tolerance and failover to another mail server when the Microsoft Press, Redmond, 2004, Chapter 12, p. 3 preferred server listed Question: 29 You are network administrator for Company.com. You configure the database file of the Microsoft Exchange 2000 is not available. server to store all email messages on one physical disk. You store the transaction log files on a separate physical disk. You perform a full online backup of the Exchange 2000 server on Saturday night. On Monday, Tuesday and Wednesday nights, you perform Which data can online differential you restore? backups. On Thursday up throughthe disk that is maintaining the database file crashes. You attempt to restore the full A. Only data backed afternoon, Saturday night backup. The backed up through Tuesday night B. Only data differential backup for up through Wednesday C. Only data backed Wednesday night is corrupt. You are successful in restoring the differential backup from Tuesday night. night D. All of the data Answer: B Explanation: A differential job consists of all the files that have changed since the last full backup. With differentials, you only have to restore the most recent differential backup since the last full backup, because the differential contains all the files that have changed since the full backup in their latest versions. Since the question mentions that the differential backup of the Wednesday answers: Incorrect night failed you only need to use the data backed up through the Tuesday night. A: This option will not obtain all the relevant uncorrupted data. C: This will include corrupted data. D: This option includes corrupted data. Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Reference: Craig Zacker, Planning and Microsoft Press, Redmond, 2004, Chapter 6, p. 38 Question: 30 You are the office manager of an advertising agency. Company is an ad agency that has 13 employees. The agencys network contains computers running a mix of Microsoft Windows XP Professional and Macintosh OS. The file server is running Microsoft Windows Small Business Server 2003. Employees have access only to a shared company calendar and a personal calendar Microsoft Outlook. Company wants to initiate a team-building effort. The agency wants the ability to share information centrally through a Web browser. Efforts do not produce the expected productivity. You need to implement a solution that meets the companys needs without any additional technology purchases.

What should you do? A. Install Microsoft Windows Messenger on all of the client computers. B. Create new forms in Microsoft Outlook so that employees can add additional customerinformation. C. Set up Microsoft Windows Share Point Services and provide training to staff on how to enterand manage information Answer: C between Microsoft Windows Share Point Services and MicrosoftOffice. Explanation: Since a SharePoint Web site contains several types of items (Document and Picture Libraries,Lists, Discussion Boards D. Designate a common shared folder on the file server for document storage. Give allemployees access to the and Surveys) and allows interaction such as Change the view , Add items , check out items, Get alerted to changes , Import andfolder. shared export files ; and Discuss pages and documents ;Jason Gerend, Microsoft the companys needs without having to make Reference: Charlie Russel, Sharon Crawford, this will be ideal to meet Windows Small Business Server 2003: any Administrator's additionaltechnology purchases.Redmond, 2004, Chapter 17, pp. 446-449 Companion, Microsoft Press, Question: 31 You are the network administrator for Company.com. You install Microsoft Windows Small Business Server 2003 with 30 client computers in the main office and 20 client computers in the branch office. All client computers are running Microsoft Windows XP Professional. Branch office users have the user dial-up properties set to require a call back to the remote office data What should line number. you do? When the users existing policy to ignore user dial-in properties. A. Change the visits the main office, the users encounter problems when trying to connect mobile computers to the wireless B. Change the existing policy to allow both dial-in and wireless connections. network. You additional policy condition that ifpolicy plan to avoid this problem. Callback option is switched to C. Define an want to revise the remote access a mobile computer is detected, the Off. D. Define an additional policy set to ignore user dial-in properties when the user is connecting through a wireless access point. Answer: D Explanation: The dial-in properties for remote users are set to require a call back to the remote office data line number. This would be obsolete if the remote users find themselves in the main office and this would also result in the remote users being unable to connect to the wireless network when at the main office. Thus the policy has to be set to ignore dial-in properties when connecting answers: Incorrect through a wireless access point. to ignore dial-in properties will result in those remote users not being able to A: Changing the existing policy connect to the network when they find themselves away from the main office. B: This option will not solve the problem the remote users experience when they visit the main office. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small the main office. C: This option will not solve the problem that the remote users experience when the visitBusiness Server 2003: Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 6, pp. 88-90 Question: 32 You are a network consultant. Your client, Company.com is a company of financial planners and stockbrokers who have

approximately 800 customers. The company uses a specialized Microsoft Access-based customer relationship management (CRM) application. Company investment in this software is considerable and management is not considering alternatives. The company A. Move the CRM application to a more savable database. B. its customer data. hardware and software. loses Install tape backupRecover of the data requires the re-keying of all of the customer information form original C. Install The documents. a RAID 5 driver system on the CRM database server. D. Create scripts to compact and repair the CRM database on a daily basis. recreation of this mission-critical database is expensive and time-consuming. You need to implement a backup and E. Create a backup tape rotation and storage procedure. disaster recovery F. Establish a weekly defragmentation schedule of all hard disks. Answer: B, C, E solution. What should you do? (Each correct answer presents part of the solution. Choose three.) Explanation: A RAID-5 volume is a fault-tolerant striped volume. Space on three or more physical disks is unified as a single volume. Data is written to all physical disks at the same rate, but unlike a striped volume, the data is interlaced with checksum information, called parity. Should a single disk in the volume fail, the data on that disk can be regenerated through calculations involving the remaining data and the checksum information. It is an interesting technical note that parity is distributed among all Incorrect answers: volumes in the A: It is not a matter of moving the CRM application. This will not contribute towards a backup and disaster RAID-5 set. Furthermore making use of tape backup hardware and software would be cost efficient since the tapes recovery plan. can be reused in D: Compacting and repairing database on a daily a rotational manner with properastorage procedures. basis would be time consuming. F: You optimize disks by running defragmentation. It will keep the disks working smoothly. It is hardly a Reference: disaster backup andCraig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, recovery solution. Redmond, 2004, Chapter 6, p. 38 Question: 33 You are a network consultant for Company.com. Company uses graphic applications to view and edit large image files. The network consists of 25 client computers than run a mix of Microsoft Windows 2000 Professional and Microsoft Windows XP Professional. A server that runs Microsoft Windows Small Business Server 2003, Premium Edition stores shared image documents. What should you Users report that recommend? (Each correct answer presents part of the solution. Choose two.) system performance is slow when5. A. Install and configure RAID opening and saving image files. Users are concerned about fault tolerance. You need to B. Upgrade current network equipment including network adapters, structured switches. recommend the necessary configurations to improve file access and fault tolerance. cabling, and C. Install and configure the ISA Server computer for Web page caching. D. Install and configure Microsoft SharePoint Services to share files. E. Use Group Policy Management Console to set up a disk quota policy. Answer: A, B Question: 34 You are the network administrator for Company.com. Users in the Company3 department need to access files from four servers on

What should you do? A. Create a stand-alone Dfs root on each of the other servers. B. Create Dfs links under the Dfs root to shares on each of the other servers. C. Create a stand-alone Dfs root on Company31, and then create a domain Dfs root the other servers. on each of D. Create a Dfs link on each of the other servers. Answer: B Explanation: Distributed file system (Dfs) is a service that allows system administrators to organize distributed network shares into a logical namespace, enabling users to access files without specifying their physical location and providing load sharing across network shares. You can use Distributed File System (DFS) to build an easily browsed structure for all the shared folders on your network. Reference: After users connect to the root DFS share, they can browse shared resources regardless of the server that hosts the J. C. Mackin, Ian McLean, Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network share. Infrastructure, Microsoft Question: 35Press, Redmond, 2003, Chapter 4, p. 7 You work as a network administrator for Company.com. You have windows SBS 2003 premium edition. Company.com is experiencing a SQLand SBS server slow down because the SQL database is too large Company.com wants to buy new server and A. to install SQL server wantbuy second processor 2005edition. They want to buy a server with 5x300GB SCS, 1 gigabit Ethernet, one 3, 4 B. processor, GHz buy second card gigabit Ethernet card C. increase RAM and 8GB RAM. You must optimize this server. What you should do? D. increase hard drive Answer: Pending. Send your suggestions at feedback@Testkingprep.com Question: 36 You are a network administrator of Company.com. You have a network of 20 Microsoft Windows XP Professional client computers. The network also contains a computer that runs Microsoft Windows Small Business Server 2003. There is no regular backup process in What should youto back up all of the files that are stored on the server and initiate reminders to the delegated place. You need do? administrator for A. In the Server Management Console, implement a backup schedule by using Configure Small Business Server in tape changes. Backup Backup. B. Use Backup Wizard in the Backup within System Tools. C. Schedule Volume Shadow Copy on the System and all of the data drives. D. In the Server Management Console, select Setup Monitoring Reports and Alerts.

Answer: A Explanation: The first time you use the Backup Configuration Wizard for Windows Small Business Server, you will also be configuring your regular backup schedule. To get started, click Backup in the Server Management console. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 13, p. 310 Question: 37 You are the network administrator for Company.com. The company has a showroom and a warehouse. The company has a Microsoft Windows Small Business Server 2003-based network with a broadband connection. The network is located at its showroom. The warehouse has a stand-alone Microsoft Windows XP Professional computer. Office personnel and salespersons in the showroom use a third-party application to track the availability of furniture. Warehouse employees use Microsoft Outlook that is preconfigured with an offline folder and an on-demand dial-in connection to examine e-mail messages and receive furniture orders. What should The third-partyyou do? application is not supported over a dial-in Services on the server. Teach the Warehouse employees warehouse location, A. Install Microsoft Windows SharePoint connection. Broadband currently is not available at the to use SharePoint but it is Services to update the file records. Team availablewarehouse employees send e-mail message updates to an e-mail-enabled public folder on the server. inventory B. Have in one month. Management wants warehouse employees to submit regular updates of the furniture to the C. Configure Microsoft Windows Messenger on both the warehouse computer and a computer at the showroom by showroom where they will be entered into the application. Management wants the updating to being immediately. You using Microsoft need to Passport. Teach the warehouse employees to send instant messages to the showroom by using Microsoft Passport. configure a temporary solution for updating the showroom records. You do not want warehouse employees to have Teach the any Internet employees to send instant messages to the showroom. warehouse Access. Warehouse employees connect to the server with a VPN connection and browse the server for a shared folder. D.Answer: B Have Have Explanation: Distribution groups, or distribution lists, as they are more commonly called when talking about e-mail, the employees update the file records. are a convenient mechanism for ensuring that e-mail gets consistently routed to the appropriate individuals without each user having to maintain his or her own individual list. You might have one list that goes to Finance, for example, that your sales people use to send in Reference: their expense Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's reports. Rather than sending e-mail to a specific individual-who might be on vacation or no longer with the companyCompanion, the user sends Microsoft Press, Redmond, 2004, Chapter 14, pp. 344 - 345 Question: 38 the e-mail tonetwork The list ensures the e-mail gets routed as necessary, even when a key person is absent. 2003 You are the the list. administrator for Company.com. You install Microsoft Windows Small Business Server with Microsoft SQL Server on a network computer. You configure and install the data files by using SQL Server. Employees use these files to provide all What should you do first? accounting reports to customer. You maintain the data file on one disk and the transaction log file on a separate disk. The disk with A. Replace the failed disk. the data file fails. You want to recover the data completely.

B. Restore the full database backup. C. Back up the current active transaction log. D. Restore each required transition log in sequence. Answer: C Explanation: The transaction log records all changes made to the database and stores enough information to allow any changes to be undone (rolled back) or redone (rolled forward) in the event of a system failure or if it is told to do so by the application (in the case of a rollback command). Physically, the transaction log is a set of files associated with a database at the time the database is created or altered. Modules that perform database updates write log entries that exactly describe the hanges made. Each log entry is labeled Incorrect answers: with a log sequence number (LSN) that is guaranteed to be unique. All log entries that are part of the same transaction A: Replacing the failed disk is not recovering data. are linked B: Since only the disk with the data files failed, you do not need to restore the full database backup. together so that all parts of a transaction can be easily located for both undo activities (as with a rollback) and redo D: It is not necessary to restore the required transaction logs in sequence since all log entries thatare part of the same activities (during transaction system recovery). Delaney, Inside Microsoft SQL Server 2000, Microsoft Press, Redmond, 2001, Part Reference: Kalen are linked together. II,Chapter 3 Question: 39 You are the network administrator for Company.com. Company has a server that runs Microsoft Windows Small Business Server 2003. the Company network has 10 client computers that run Microsoft Windows XP Professional. Company has a third-party line-ofbusiness (LOB) application that runs on the server. The LOB application requires a mapped drive to the server. You set up all user accounts in Active Directory to map the required drive to the server. An employee reports that he can access the networkshould you do? What but cannot access the LOB application. All of the other employees can use the LOB application. You check the client computer of A. Log on as then the employee Administrator and map the drive locally on the employees computer. Log have the user log on. off, and who is reporting the problem and find that the mapped drive does not appear in Microsoft Windows Explorer. You B. Have check the the user log on at another computer and map the drive on that computer. C. Change the security permissions on profile settings are the same for Domain Users employees account settings and find thatthe mapped folder to include the all employees. You need to ensure the group. employee can D. Give LOB application. Answer: D access the the employee share permissions on the mapped folder. Explanation: After a drive or folder is shared, restrictions can be added or removed in the form of share permissions. These permissions apply only at the drive or folder level-not at the file level-and are limited to allowing or denying Full Control, Read, and Change. In this case the drive is already mapped and it is also mentioned that the profile settings are the same for all the employees. It Incorrect answers: of checking that the correct share permissions are applied since the mapped drive does not is then just a matter A: The employee needs share permissions on the mapped folder. This option will not solve the appear in the problem. employee's Windows Explorer.

B: If this employee's account settings are the same as everyone else's then logging on at another computer will result in the same problem. Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Reference: Administrator's C:Companion, Microsoftare not Redmond, 2004, Chapter 10, p. 178 Security permissions Press, the same as share permissions. Question: 40 You are a network administrator for Company.com. The firm has 30 client computers and a single Microsoft Windows Small Business Server 2003 computer. You maintain all of the computers in the company. You need to ensure that all of the computers remain do? (Each correct answer presents part of the solution. Choose two.) What should you current on all ofupdates on an intranet SharePoint site with links to the downloadable patch. and service updates. A. Post patch the latest patches. You want to automate the process of implementing patches B. Install and configure Software Update Services (SUS). C. In Group Policy Object Editor, redirect the My Documents folder in Folder Specify Internet Microsoft Redirection node. D. In Group Policy Object Editor console, go to Computer Configuration. Select Windows Update. Answer: B, D location. update service Explanation: Microsoft Software Update Services (SUS) is an intranet version of the Microsoft Windows Update Web site that notifies administrators when new software updates are released and deploys them to the computers on the internal network. Group policies are among the most powerful security features. You can create Group Policy Objects (GPOs) that do everything from distributing new software to configuring system security settings to remapping directories, etc.Server 2003 Network Infrastructure, Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows You then associate the Group Policy Object with an Microsoft Press, Active Directory container object, such as a domain, a site, or an organizational unit, and the Windows operating Redmond, 2004, Chapter 8, p. 26 Question: 41 the system applies You are the the objects in that container. Options B and D would hastheserver that runs Microsoft Windows Small policy to all network administrator for Company.com. Company be a correct procedure to automate the Business Server of patches implementation 2003. Company Wants to give an outside vendor access to one folder on Companys server. Company wants the and service updates. vendor to access the server with a Remote Access Service (RAS) PPTP connection. You create an account for the vendor on the server. What should You check a you do? shared folder for the vendors use. You need to make sure shared folders and examine the permission on A. Search by using Microsoft Windows Explorer for all that the vendor does not have access to any other folders on the server. each folder. You need to accomplish this with the least amount of administrative effort. B. Examine the security permission on all shares in the Server Management console. C. Open Active Directory Domains and Trusts and examine the share permissions on all of the shares. D. Open Microsoft SharePoint Central Administrator and examine all of the share permission. Answer: B Explanation: Shared folder permissions are permissions that restrict a shared resource's availability over thenetwork to specific users. In this case however, you need to make sure that the other folders will not be accessible to the vendor. Thus you need to

check the permissions on all the shares. Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Question: 42Press, Redmond, 2004, Chapter 5, p. 25 You are a network administrator for Company.com. The network contains 10 Microsoft Windows 2000 Professional client computers with similar hardware and software configuration and a freshly installed Microsoft Windows Small Business Server 2003 computer. All of the client computers are joined to the new domain. The owner of the company, Dr Sheet, wants to increase security from outside attacks through the Internet. You implement a new firewall device between the local area network and the Internet. You cannot What should you do? access Web page on the Internet. From a client computer, you can ping the server and the ISPs DNS server. DNS A. In the Client Computers node in Server Management, add Computer Accounts for computers. server. DNS the clientthe Windows Small Business Server 2003 computer are functioning. DNS lookups for domains on the queries on B. Add Zone Internet are notfor Reverse Lookup Zone in the DNS console. C. Configure the DNS Servers Scope option the client computers DNS server. functioning properly. You need to ensure that in DHCP to the ISPscan properly resolve internal and external fully D. Configure DNS forwarders on the server to point to the ISPs name servers. qualified domain Answer: D names. Explanation: A forwarder is a DNS server that receives queries from other DNS servers that are explicitly configured to send them. With Windows Server 2003 DNS servers, the forwarder requires no special configuration. However, you must configure the other DNS servers to send queries to the forwarder. You can configure a DNS server to forward all name resolution requests it cannot answers: Incorrect resolve itself to a need tocalled a forwarder. A: There is no server add computer accounts for the client computers. Zones will not help in solving B: In reverse lookup zones, DNS servers map IP addresses to FQDNs. Adding reverse Lookup the problem as you need to configure forwarders rather. Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, C: This is not a DNS scope problem. Microsoft Press, Redmond, 2004, Chapter 4, p. 40 Question: 43 Company a network consultant for a marketing company. Exams installs Microsoft Windows Small Business Server 2003 on a network computer. The network contains a server, 35 client computers, and 15 mobile computers. Finance department users want to have a print device near the departments location and they want exclusive use of the device. She installs a remote What print networkshould she do? device close to these users. You create agroup and grantExamspermissions to to the Finance group. Company wants to A. Deny permissions to the Everyone Finance group. Print add the users the Creator group. configure Owner permissions to the the print device to meet the users requirement with the default groups and thedevice. permissions. B. Remove all existing groups and add the Finance group access to the print assigned C. Change permission from the Everyone group to Mange Documents Only and grant Print

Administrator group. D. Deny permissions to the Everyone group and grant Print permissions to the Finance group. B Answer: Explanation: This is fairly straightforward. For exclusive usage of a network print device, you need to remove the unwanted groups from the access to the print device. Resource access permissions are stored as access control entries (ACEs) on an ACL that is part of the security descriptor of each resource. When a user attempts to access a resource, the user's security access token, which Incorrect answers: contains the security identifiers (SIDs) of the user's accountBeing the creator ownercompared to the SIDs in the ACEs A: The ACL should be changed as described in option B. and group accounts, is does notnecessarily mean ofexclusive the ACL. access to the print device. C: Granting permissions to the administrator group is not the same as granting exclusive use of the print device to the Finance group. D: The denial of permissions should be done by removing the existing groups from access to the print device and not Reference: print Dan Holme, Orin Thomas, Managing and Maintaining a Microsoft Windows Server 2003 Environment, permissions to groups per se. Microsoft Press, Redmond, Question: 44 2004, Chapter 6, p. 13 You are the network administrator for Company.com, a growing construction company. The network at the corporate office contains a Microsoft Windows Small Business Server 2003 computer and seven computers that run Microsoft Windows XP Professional. What access you do? Internet should is provided through a Digital Subscriber Lines (DSL) connection. You work of-site. Users save company documents in A. Access Microsoft Outlook Web Access and send instructions to all of the users to cut and paste the My the My Documents folders. You need to redirect each users My Documents folder to the users network folder. Documents folder to the network folder. B. Set up users to save company documents to the users offline folders. C. Access Remote Web Workplace and connect to Server Management. Redirect the users MyDocuments folders. D. Access Remote Web Workplace and connect to Server Desktop and client Computers. Answer: C Explanation: In many places, problems with remote access make up the largest single category of calls to the Help desk.To improve this situation, Windows Small Business Server has the Remote Web Workplace. Using any device that can connect to the Internet, authorized users can access this dynamically created Web site using a simple Internet address. These users can then read their email, access the company intranet, and connect to their own computers' desktops. Users can download Connection Manager, which automates the process of connecting their remote computers to the company's network, making the whole process Incorrect quite easy. answers: Although redirecting the My Documents folder to the default server folder is the simplest approach, you might want to use a shared folder at a different location. This requires setting several types of permissions on the shared folder to be sure that the user's My Documents folder is accessible to the user but not to the world at large.

A: This does not necessarily mean that all employees will know how and comply with the instruction. B: You need to make use ofSharon Crawford,Workplace to redirect the Windows Small Business Server 2003: Reference: Charlie Russel, the Remote Web Jason Gerend, Microsoft folders. Administrator's D: The question states pertinently to redirect each user's My5Documents folder to the user's Companion, Microsoft Press, Redmond, 2004, Chapter 1, p. & Chapter 9, network folder. p. 169 Question: 45 You are a network consultant for Company.com. Company has a network of 40 Microsoft Windows XP Professional client computers and one Microsoft Windows Server 2003 computer. Employees are consistently overwriting images from other employees in the A. Select Volume in the Shadow Copies tab in Volume Properties. Click Create from office. Consequently, employees constantly request your assistance to restore files Now. backup tapes. You need to B. Select the allow users Volume in the Shadow Copies tab in Volume Properties. Click Create Now. Settings button. Select Select restore files up to 24 hours old. What should you do? ability tothe Schedule and select Every Monday. in the Settings property. C. Select Volume in the Shadow Copies tab in volume Properties. Click Enable. D. Select Volume in the Shadow Copies tab in Volume Properties. Select Adjust Answer: C Maximum Size Explanation: Volume Shadow Copy Service (VSS) allows a user to access previous versions of files and folders in network shares. With those previous versions, users can restore deleted or damaged files or compare versions of files. The Shadow Copies feature for shared folders is not enabled by default. To enable the feature, open the Properties dialog box of a drive volume from Windows Incorrect the Disk Explorer oranswers: Management snap-in. On the Shadow Copies tab, select the volume and click Enable . Once A: You all enabled , can manually initiate a shadow copy by clicking Create Now, but this is not the solution. Volume Shadow copy folders on sharedhas to be the volume will be shadowed;specific shares on a volume cannot be selected. enabled in this case. B: You can manually initiate a shadow copy by clicking Create Now, but this is not the solution. Volume Shadow copy has to be enabled in this case. Furthermore selecting to schedule the shadow copies to Mondays is not the solution. Reference: of the volume is not actual making of shadow copies; you need to enable shadow copies. D: The size Dan Holme, Orin Thomas, Managing and Maintaining a Microsoft Windows Server 2003 Environment, Microsoft Press, Redmond, 2004, Chapter 7, p. 30 Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, 2004, Chapter 6, p. 40 Question: 46 You are action or actions should you perform? (ChooseCompany has 30 users in its main office and 10 users in its two What the network administrator for Company.com. all that branch offices. apply.) A. Assign updates to all of the client computers. You install Microsoft Windows Small Business Server 2003 on the main office network server. You want to provide all Server 2003. of B. Install Software Update Services (SUS) on the computer that runs Windows Small the client Business computers with the latest critical updates. Business Server 2003 server C. Approve updates that are downloaded from the Microsoft Windows Update site. D. Configure all of the client computers to automatically install updates from the Windows Small

2000 with Service Pack 3 (SP3) E. Install the Automatic Updates feature on all of the client computers that run Microsoft Windows Answer: B, C, D or Microsoft Windows XP Professional with Service Pack 1 (SP1). Explanation: Microsoft Software Update Services (SUS), a free service that enables administrators to approve which Windows updates are applied to client computers. It provides a seamless patch, scanning, and installation service. SUS scans the machines on your network, lets you know which patches are needed, connects to Windows Update, downloads needed patches, and then applies your local policy Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: for automatic distribution of patches. SUS is a good solution for networks large enough to require centralized control Administrator's over patch Companion, Microsoft Press, Redmond, 2004, Chapter 6, p. 95 Question: 47 management (and the centralized downloading of updates), but it takes some time to set up and configure and requires You are the a monthly network administrator for Company.com. You install a new server for Company. The new server runs Microsoft Windows commitment to reviewing patches. Small Business Server 2003. The Company network contains 20 client computers and 10 mobile computers. You configure all of the client computers to receive e-mail messages from the server by using Microsoft Outlook XP. You configure all of the What mobile should you do? computers off receive e-mail messages by using Microsoft the server. A. Turn to Simple Mail Transfer Protocol (SMTP) on Outlook Express. Employees report that they can receive email Run Internet connection sharing on the mobile computers. B. messages whileRun Configure E-mail and Internet Connection Wizard on the C. off-site with Microsoft Outlook Web Access, but they cannot receive e-mail messages with Microsoft Outlook Express. server. D. Configure POP3 connector on the server. Answer: C Explanation: The Configure E-mail and Internet Connection Wizard allows you to easily configure the network, set up a shared Internet broadband or dial-up connection, configure firewall services, and customize Exchange Server for e-mail. Use Exchange Server 2003 with Microsoft Office Outlook 2003 and add numerous features including the ability to schedule meetings and hold online Incorrect answers: conferences. off SMTP will not solve the problem. A: Turning B: Internet connection sharing is not the same as being able to receive e-mail while off-site with Web Access. D: This is unnecessary as the Configure E-mail and Internet Connection Wizard on the server will do the Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: necessary. Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 6, pp. 79-82 Question: 48 You are the network administrator for Company.com. Company has a server that runs Microsoft Windows Small Business Server 2003. Company has 15 client computers. All of the client computers run Microsoft Windows XP Professional. Company employees store shared files on the server in a shared company. Folder. You create folders in the company folder for each division within the company. Each division has full permissions on its own folder and no permissions on the folders of other divisions. An employee in

that runs Software Update Services (SUS).

the auditing division needs to access a subfolder of the accounting divisions folder. You need to give the employee access to the What should you do? needed subfolder only. A. Assign the employee the Domain Users share permission on the accounting division subfolder. B. Assign the employee permission on the accounting division folder. C. Create a new share on the subfolder. Assign the employee permission on that share. D. Assign the employee Security permission on the subfolder. Create a desktop shortcut to the folder by using the full Universal Naming Convention (UNC) path. Answer: D Explanation: Universal Naming Convention (UNC) is a multivendor, multiplatform convention for identifying shared resources on a network. UNC names follow the naming convention \\computername\sharename. To specify a local path folder, choose the Local Path option and type the path in the text box next to that option. To specify a network path for a folder, choose the Connect option and specify a network path using a Universal Naming Convention (UNC) path. Assigning the proper security Incorrect answers: permission on the A: Assigning the employee Domain Users share users computer, by using the UNC path will granted the other subfolder and creating a desktop shortcut on that permission will result in that employee being ensure that the specific share employee will permissions that the Domain Users have. have access to only the needed subfolder. B: The employee only needs permission to access one specific subfolder and not the whole folder. C: There is no need to create a new share as the folder that should be shared already exists. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide, Second Edition, Question: 49 Sybex Inc. You are a network administrator for Company.com. The Company.com network contains 10 Microsoft Windows 2000 Alameda, 2003, p. 213 Professional computers and 15 Microsoft Windows XP Professional mobile computers. A single computer that runs Microsoft Windows Small Business Server 2003, Standard Edition hosts e-mail functions and file sharing. You set up a Microsoft SharePoint site to enable the What should you do? employees to share documents. The SharePoint site works properly, however, employees out of the office report they cannot access console, configure the internal DNS server with the appropriate Forward Lookup Zone. A. In the DNS the SharePoint Manager, test and confirm the thaton the Share Point Company Web virtual server. B. In the IIS site. You clear the IP restrictions Internet connectivity is working properly. You need to ensure that allC. In the DNS console, configure the external DNS server with the appropriate Reverse Lookup Zone. remote employees can access the SharePoint site. Share Point administration site. D. Allow anonymous access through the E. Run the Configure E-mail and Internet Connection Wizard to publish the Microsoft WindowsShare Point Site. Answer: B Explanation: Since Microsoft Windows Small Business Server 2003 has this high level of integration, fixing things can be a delicate operation. If IIS, Windows SharePoint Services, or a related product becomes corrupted, do some research on the Microsoft Knowledge Base and the Windows Small Business Server newsgroups, and contact Microsoft Product Support, if necessary. Before attempting to fix things, make a current backup, save your IIS configuration to a file, and try creating a duplicate Web site to

experiment with. In this case it is mentioned that you already confirmed that the Internet connectivity is functioning properly and that the Sharepoint Site is Russel, Sharon Crawford, Jasonbe that there are IP Windows Small Business the remote Reference: Charlie working properly. It could thus Gerend, Microsoft restrictions that prevent Server 2003: employees from Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 18, p. 488 Question: 50 connecting to the Sharepoint site. You are the network administrator for your company. The network contains a server that runs Microsoft Windows Small Business Server 2003. You discover that employees use an unauthorized application that compromises network security. You need to A. Create a security policy that prevents employees from accessing implement a new Software Restriction Policy based on the path rule.unauthorizedapplications. You want to achieve B. goal by thisCreate a new Software Restriction Policy based on the hash rule. C. Set the default software of administrative effort. What should Create using the minimum amount restriction security level to Disallowed.you do? a new Software Restriction Policy that allows only authorized applications to run based on the path rule. D. Set the default software restriction security level to Disallowed. Create a new Software Restriction Policy that allows only Answer: B applications to run based on the hash rule. authorized Question: 51 You are the network administrator for Company.com. Company.com has a server that runs Microsoft Windows Small Business Server 2003, Standard Edition as its network operating system. The network contains eight computers that run Microsoft Windows XP Professional. The primary software program that is used by the staff is a proprietary tax management application. A broadband connection is used for Internet access and remote access for the users to check e-mail messages and access company files. What standard should you choose? Because of the sensitivity of the data, the senior accountant accesses data regularly from remote locations. The firm A. UPnP wants to use a B. DHCP firewall for file server protection from unauthorized users. You research several hardware firewall devices to install onC. RPC over HTTP the network. D. NAT You are interested in a simple device that does not require a complex installation. You need to choose a standard that meets the Answer: A needs of the firm and requires the least amount of administrative effort. Explanation: Universal Plug and Play (UPnP) is a standard that enables a network-attached device such as a PC, peripheral, or wireless device to acquire an Internet Protocol (IP) address and then, using Internet and Web protocols such as Hypertext Transfer Protocol (HTTP), to announce its presence and availability on the network. Remote Assistance supports Universal Plug and Play Incorrect answers: (UPnP) to Traverse Network Address Translation devices. This is helpful on smaller, home office networks, as B: DHCP is a Transmission Control Protocol/Internet Protocol (TCP/IP) protocol used toautomatically assign IP Windows XP Internet addresses Connection Sharing (ICS) supports UPnP. and configure TCP/IP for network clients. However, thisinvolves unnecessary administrative effort in this case.

C: RPC over HTTP implies administrative effort insofar as you then need to make sure that theRPC service is running on all

the computers in the network that has to be accessed remotelyby the senior accountant. However, this is not the option with the least amount of administrative D: NAT is a technology that enables a local-area network (LAN) to use one set of InternetProtocol (IP) addresses for effort. Reference: Dan Holme, Orin Thomas, Managing and Maintaining a Microsoft Windows Server 2003 Environment, internal Microsoft Press, Redmond, and a second set of addresses for external traffic. traffic 2004, Chapter 2, p. 23 Question: 52 You are the network consultant for Company.com. Company.com has 40 client computers that run Microsoft Windows XP Professional. Company.com wants to integrate all of the computer users and needs to allow users access to all company files and folders resources. Users need to access individual e-mail accounts and the Internet for external communication. You What should need to be able you do? to back up all files and e-mail messages that are stored on theand configure the to provide the Connect all of the client A. Install Microsoft Windows Server 2003, Standard Edition server. You need POP3 server. owner with reporting on a weekly computers and print devices to the network. basis. You need to install the appropriate system configurationset up a company. B. Install Microsoft Windows Small Business Server 2003 and for the Digital Subscriber Lines(DSL) connection. Connect all of all the users and all of the computers to the domain. C. Install a modem on each of the client computers. Host e-mail messaging with Web-basedaccess in an ISP mail server. Designate one computer as a file and print server. Back up all data daily. D.Answer: B Install Microsoft Windows Server 2003, Enterprise Edition with Microsoft SQL Server 2003.Connect all client computers and Explanation: DSLthean always-onup the company as such is fast and convenient to use. Installing MicrosoftWindows print devices to is domain. Set connection and databasesin the SQL Server computer. Small Business Server 2003 and connecting all users and computers to the domain will comply with the company's needs since Microsoft Windows Small Business Server 2003, includes Microsoft Windows Server 2003, Windows SharePoint Services, Exchange Server 2003, Routing and Remote Access firewall technology, and five client access licenses. And that's just the Standard Incorrect answers: Edition. In the A: This is not enough for the needs of the company. Premium Edition, you get all that plus Microsoft SQL Server 2000, Internet Security and Acceleration Server 2000, C: There is and Microsoftno need to install a modem on each client computer. Office FrontPage 2003. In both editions, the technologies are optimized to work as a package for the small business D: Reference: not comply with all the needs of the company. user. This willCharlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 6, p. 76 Question: 53 You are the network consultant for Company.com. You want to set up a network for the company with six computers. The computers and all of the users are located at one location. You want to connect all of the computers on the network with a broadband router. The company does not require centralized security. You want the users to share all of the data files and also share one laser print device. You want the users to have a secure access to the Internet. You need to deploy this network for as small an investment as possible and with a minimum of administrative effort.

What should you do? A. Configure one of the computers with Microsoft Windows Server 2003, Standard Edition as adomain controller. Configure the other computers with Microsoft Windows XP Professional.Join each of the computers to the same domain. B. Configure each computer with Microsoft Windows XP Professional and join each of the computers to the same workgroup. C. Configure one of the computers with Microsoft Windows Server 2003, Standard Edition.Configure the other computers with Microsoft Windows XP Professional. Join each of thecomputers to the same workgroup. D.Answer: B one of the computers with Microsoft Windows Small Business Server 2003,Premium Edition. Configure Configure the other Explanation:with Microsoft Windows Professional of several computers whose work theusers are connected and who computers The workgroup is a logical grouping and joineach of the computers to or same domain. want to share their resources with each other. Usually, all the computers in a workgroup are equal, which is why such setups are referred to as peer-to-peer networks. The most cost and administrative efficient solution in this case where no centralized security is required would Incorrect use of Microsoft Windows XP Professional with all the computers in the same workgroup. This would be to makeanswers: A: There is no need cater for connection to buy Microsoft Windows Server 2003. C: This computers with a broadband router. of all theoption involves unnecessary expenses. Joining each computer to the same workgroup is the correct strategy, but you do not need to purchase a Windows Server 2003 package to put this into effect. D: Joining computers to the same domain is not the same as joining them to the same Workgroup. The domain is not Reference: Charlie Russel, workgroup and does include aserver which Windows Small Business expenses. exclusive it is the same as a Sharon Crawford, Jason Gerend, Microsoftwould mean possible extraServer 2003: Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 2, p. 18 Question: 54 You are a network consultant for Company.com. Most of the users in the company work normal business hours, Monday through Friday, 8:30 A.M. to 5:30 P.M. You set up a backup schedule for a computer that runs Microsoft Windows Server 2003. This schedule Which plan do you recommend? provides sufficient time between 11:00 P.M. and 6:00 A.M. to back up the files. There is adequate storage capacity to hold the A. A copy backup to the server hard disk on Monday and normal backups to the server hard diskon Tuesday backup. You need to recommend a backup plan that allows a restore in the fewest number of steps. through Friday. B. A normal backup to backup tapes on Monday and differential backups to backup tapes onTuesday through Friday. C. A normal backup to backup tapes on Monday and incremental backups to backup tapes in Tuesday through Answer: Friday. B D. An incremental backup to the server hard disk on Monday and differential backups to theserver hard drive on Explanation: Tuesday A Normal backup does not use the archive attribute to determine which files to Back up ; all selected items are through Friday. transferred to the destination media. Every backup strategy begins with a Normal backup that essentially creates a baseline, capturing all files in the backup job. Incremental backup copies only the selected files that have archive bits, and then resets those archive bits whereas Differential backup Copies only the selected files that have archive bits without resetting those archive bits.

Incorrect answers: A: All selected files and folders are backed up. Copy neither uses nor clears the archive attribute.Copy backups are not used for typical or scheduled backups. C: Incremental backup copies only the selected files that have archive bits, and then resets thosearchive bits. Differential Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Reference: Microsoft Press, backups would be the best6, p. 38 if you want to backup with the leastamount of steps. To restore, you need the last Redmond, 2004, Chapter option Question: 55 full You are the network consultant for Company.com. Company.com has a server that runs Microsoft Windows Server 2003. Theand all the incremental backups since then. backup company owner logs in locally to the server to run reports. Company, the owner, wants you to be able to resolve server issues when D: This option does not provide the least amount of steps to the backup plan in case of restoration. To restore, you you the needare offsite. Work during business hours should not affect the owners ability to run reports. You enable Remote What should Access Service you do? (Choose all that apply.) (RAS)full backup and all configure PPTP.the server.to be able to remotely administer the server withoutthe last full lastConfigure Microsoftthe incremental backups since then .With the differential copies you also need affecting the A. on the server and NetMeeting on You need ownersandTerminal Server License Server. backup ability B. Install to C. Install the server.Services in Application Server work on Terminal the latest differential backup. mode. D. Enable Remote Desktop for Administration. E. Configure a Terminal Server License Server. Answer: D Explanation: Remote Desktop enables an administrator to connect to a computer at a distant location andremotely operate the console. Remote Desktop is an administrative feature that enables users toaccess computers from remote locations, with no answers: A:Configuring NetMeeting on the server will not help you to administer Incorrect interactionremotely without affecting the owner's ability to work on the server. B, E: the server required at the remote site. These options will result in affecting the owner of the Server. C: All that is necessary to remotely administer the server without affecting the owner's ability towork is to enable Remote Desktop for Administration. Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Question: 56 Microsoft Press, You are the network administrator for Company.com. You regularly fix minor problems on client computers that are Redmond, 2004, Chapter 13, p. 25 caused by employees changing the settings on the computers. You want to improve network management over the client computers. You also What should you do? want to limit the ability of employees to manipulate the network configurations on client computers. You need to find a method to deny A. Add a new Group Policy object named Network Lockdown. In the Network node of Policy Object Editor, select employees the ability to change any network configurations on the client computers. the Group

Enable Prohibit viewing of status for an active connection in Network Connection. B. Add an new Group Policy object named Network Lockdown. In the Network node of the Group Policy Object Editor, select Enable Prohibit TCP/IP advanced configuration in Network Connection. C. Add a new Group Policy object named Network Lockdown. In the Network node of the GroupPolicy Object Answer: D Editor, select Explanation: The most common method of configuring security for servers that are assigned specific roles is to use Enable Prohibit group policies. A changing properties of private remote accessconnection in Network Connection. group policy is an Active Directory object that consists of specific settings for a collection of configuration parameters. D. Add a new Group Policy Object called Network Lockdown. Select Enable Prohibit access to properties of When you components of a associate a Group Policy Object (GPO) with an Active Directory container object, all the computers in that container receive the group LAN connection in the Network group the Group PolicyObject Editor. policy settings. To create and modifynode of policies, you use the Group Policy Object Editor snap-in for Microsoft Incorrect answers: Management A: Whether Viewing is enabled or disabled, it will not prevent employees changing the configurations. Console (MMC). The Group Policy Object Editor console enables you to modify any of the configuration settings in B: This Policy the Groupsetting does not prevent employees from changing the network configurations. C: It associated to the properties any other) object. Objectsis the accesswith a domain (or of components of a LAN connection that should be enabled and not changing properties of Reference: Craigaccess connection. and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, private remote Zacker, Planning Microsoft Press, Redmond, 2004, Chapter 14, pp. 6-8 Question: 57 You are the network administrator for Company.com. Company.com has five employees. The peer-to-peer LAN consists of five desktop computers that run Microsoft Windows 98, Second Edition. Connection to the Internet is through an ISPprovided Digital Line (DSL) modem that runs Network Address Translation (NAT). Because physical access to the computers is not What should you restricted, users aredo? concerned that other employees or other individualsProfessional. Require passwords forneed to implement a solution A. Upgrade the desktop computers to Windows XP can access their personal files. You userlogons. that eliminates B. Add a Windows Small Business Server 2003, Standards Edition server to the network. EnableInternet Connection the single biggest security risk to the network. Firewall. C. Add a Windows Small Business Server 2003. Premium Edition server to the network. EnableInternet Security and Acceleration (ISA) Web traffic reporting. D. Add a hardware-based firewall to the LAN and enable Web traffic reporting. Answer: A Explanation: When installing Microsoft Windows XP Professional one of the steps are "In the Users of This Computer dialog box, select the Users Must Enter a User Name and Password to Use This Computer option and click the Next button." Due to unrestricted access to the computers the use of passwords for user logons will prevent other individuals and employees from accessing other Incorrect answers: users' personal files.

B: According to the question, the biggest security risk is that other individuals and employees can

access others' personal files.

Enabling Internet Connection Firewall is not going to prevent this from happening. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide, Second Edition, C: This is an intranet problem and not a Internet problem. Sybex Inc. Alameda, 2003, p. 61 Question: 58 Web traffic reporting is not the same as addressing the security risk in this D: Enabling You are the network consultant for Company.com. Company.com has 20 users in the main office and 15 users in a case. branch office. In addition, there can be as many as six remote project sites at any given time. Each remote project site has a temporary office with two computers. Company.com uses an e-mail system that is hosted at its ISP. Much of the communication between employees and much of the communication between employees and customers is conducted by e-mail. Project sites use dial-up connections over dedicated telephone lines for Internet access. Project sites use Microsoft Windows Server 2003 Terminal Server for What to the access additional information do you need before you can recommend a solution?(Each correct answer presents part of the solution.Company.com has a dedicated Internet Security and Acceleration (ISA) Server 2000 computer for main office. Choose two.)for security and application that are in use. A. The LOB Internet restrictionscompany that is used foris dedicated server that runs Windows Server 2003 Terminal Server for B. The telephony and monitoring. There dial-up lines at the project sites. the remote sites. servers are owned or leased. C. Whether the There is anumber of remote project sites that the companyaopens and closes each 50 GB of data. The company needs a D. The dedicated backup server. Each evening there is backup of as much as file and year. printWhether thecan run line-of-businessserver consolidation. You need to recommend a server solution that improves E. server that company will consider (LOB) applications. network C, E Answer: efficiency and makes network administration easier. Explanation: E: Considerations regarding server consolidation will impact on easier network administration and efficiency. Consolidation will ease the administration effort. C: Leased servers require that the company need to liaise with the hosting company in terms of administration and if the servers are owned, the company network administrators have to administrate the network themselves. Thus there is a Incorrect answers: definite impact on B: The telephone company in use at the different sites for dial-up lines is irrelevant at this consideration. you decision on improving network efficiency and easier administration. A: The LOB applications in use are not a factor in this scenario. D: The number of remote project sites that the company opens or closes each year will in any event be part of the company operations Question: 59 and is irrelevant in the considerations regarding a solution for improved network efficiency and easier administration. You are the consultant of an IT consulting firm. You are responsible for the network of Company.com. The network Also the six consists of number of projects will vary from year to year. client computers that rum Microsoft Windows 98 and Microsoft Office 2000 with Microsoft Outlook. Company.com wants to give costumers the ability to send questions to salespersons by means of e-mail messages. Salespersons use the Internet to search for products for buyers. Company.com wants to allow e-mail accounts for each of its salespersons. The salespersons need to keep track of contacts and scheduling. Company.com currently has one Digital Subscriber Lines (DSL) connection with IP addresses assigned

to each computer. You need to allow Company.com the function it needs with the least amount of expense. What should you do? A. Install Microsoft Windows Small Business Server 2003, Premium Edition with Microsoft ISA Server. B. Install Microsoft Windows Small Business Server 2003, Premium Edition with Microsoft SQLServer. C. Install Microsoft Windows Small Business Server 2003, Standard Edition. D. InstallC Answer: Microsoft Windows Server 2003 Standard Edition. Configure the POP3 Service. Explanation: Windows Small Business Server 2003, Standard Edition, includes Microsoft Window Server 2003, Standard Edition ; Microsoft Windows Share Point Services; Microsoft Exchange Server 2003; and Microsoft Shared Fax Service . These products give you a fully developed business solution that includes all the essentials: e-mail, Internet connectivity, a preconfigured Incorrect answers: internalStandard Edition will be able to see to the company's needs. A: The Web site, a shared fax service, will be sufficient forusers and mobile users, and wizards to make configuration easy. B: The Standard Edition services for remote the company. D: You need to install Microsoft Small Business Server 2003 Standard Edition and not MicrosoftWindows Server 2003 Standard Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Edition. The latter is included in the Small Business Server 2003 package. Also it will suffice for the needs of the Administrator's company. Companion, Microsoft Press, Redmond, 2004, p. 3 Question: 60 You are the network administrator for a regional automobile club. The club accepts new memberships and also takes orders for merchandising. The club currently is running an online Web site at a third-party hosting company. The clubs network consists of five Microsoft Windows XP Professional client computers. The network has a single server that runs Microsoft Windows Server 2000. The What should you do? (Choose all that apply.) server hosts shared files and a single printer device. The users share the Internet through a router that is connected to a high-speed A. Install DHCP Server service on the Windows 2000 Server computer. Configure the DHCP scope options with Digital Subscriber Lines (DSL) connection. You need to move the organizations Web site from a third-party hosting appropriate service onto own Name Server. server. B. Install DNS Server service on the Windows 2000 Server computer. Configure DNS ForwardLookup Zones. C. Copy Web files into directory on the server. Configure IIS to the new Web site directory. D. Configure the external DNS server to point Host (A) records to the companys IP address. E. Forward port 80 on the router to point to the server. Answer: C, D, E

Explanation: TCP port 80 is used for HTTP traffic. Windows 2000 includes Internet Information Server (IIS) 5. When it is installed, two service accounts are created: 1IUSR_<SERVERNAME> used for directory access by the IIS service when anonymous connections are made to the server. 2IWAM_<SERVERNAME> used when the server has to start out-of-process applications .Directories can be published for HTTP access either through the Web Sharing tab of the folder's Properties dialog box or through Internet Services Manager.

Incorrect answers: A: This is not a DHCP issue. Reference: Dennis Maione, MCSE Training Guide: Windows 2000 Server, New Riders Publishing, USA, B: There is no need for DNS Forward lookup 2000, p. 134 Question: 61 zones. You are the sales engineer for a technology consulting firm. A customer, Company.com, is using Microsoft Windows Small Business Server 4.5 as its network operating system. The network consists of one file server and twenty computers that use a mixed environment of Microsoft Windows XP Professional and Microsoft Windows 2000 Professional. Company.com is considering an upgradeshould you propose? (Each correct answer presents a complete need to identify the key features of What of its network to a Microsoft Windows Server 2003 product. You Microsoft Windows solution.Choose two A. Present a proposal to retain the current network system and upgrade all Microsoft Windows2000 Professional Server products that enable team building and collaboration. Company.com needs to ensure a moderate investment, computers to but reliability is Microsoft Windows XP to present a proposal that benefits Company.coms need for improving team building and a high priority. You need Professional. B. Present costprovides a a proposal to individually purchase Microsoft Exchange 2000 Server with MicrosoftOutlook 11. C. Present a proposal to replace the current file server with a new file server. Present a case study that highlights the effective network solution. features of Microsoft Windows Server 2003, Enterprise Edition. D. Present a proposal to upgrade the existing file server and upgrade the Microsoft Windows 2000 Professional computers to Microsoft Windows XP Professional. Answer: D, E E. Present a proposal that shows Microsoft Windows Small Business Server 2003 provides moreteam building and Explanation: collaboration Windows Small Business Server Server companies with Edition. three or as many as 75 computers to have an tools than Microsoft Windows allows 2003, Standard as few as affordable, real client/server network with all the security and efficiencies that implies. Microsoft Windows Small Business Server 2003, includes Microsoft Windows Server 2003, Windows SharePoint Services, Exchange Server 2003, Routing and Remote Access firewall technology, and five client access licenses. And that's just the Standard Edition. In the Premium Edition, you get all Incorrect answers: that plus A: Retaining the current network system would mean making use of the existing Microsoft Windows Small Business Microsoft SQL Server 2000, Internet Security and Acceleration Server 2000, and Microsoft Office FrontPage 2003. In Server both editions, 4.5 as its network operating system which would not beimproving the company's team building. the technologies are optimized to work as a package for the small business user. B: Exchange 2000 Server with Microsoft Outlook 11 alone will not enhance the current networksystem for team building purposes. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: C: A new file server alone will not be improving on the current situation. Furthermore theMicrosoft Windows Administrator's Enterprise Companion, Microsoft Press, Redmond, 2004 Question: 62 Edition is but a component that is included in Microsoft Windows Small Business Server 2003.

You are the network consultant for Company.com. Company.com has 20 employees in the main office and 15 employees in a branch office. All client computers run Microsoft Windows 2000 Professional. Due to the nature of the companys business, email

communication is not considered to be essential. The company has a dedicated Network Address Translation (NAT) Which component of Windows Small Business Server 2003, Premium Edition will provide the greatest improvement to router for the company network? A. The availability Users save their data on their local Internet connectivity.of a centralized backup solution. hard disks. They back up their data to floppy disks at the B. The implementation of Microsoft Exchange Server 2003 end of each day. C. The implementation of Microsoft Internet Security and Acceleration (ISA) Server. As a result of sudden growth, Company.com has not maintained a stable computer infrastructure. Users experience D. The availability of Microsoft SQL Server 2000. multiple error Answer: A messages on client computers. You recommend Windows Small Business Server 2003, Premium Edition to improve Explanation: network core of every backup procedure are a backup tool and a backup plan. Since the question mentions that data A: At the is being stability. backed-up to floppy disks at the end of each day, a definite improvement would be to centralize the backups so as to be able to restore the network in cases of the inability to maintain a stable computer infrastructure for the company. Incorrect answers: B: Exchange Server 2003 will only solve the messaging platform and this is not the real cause of the instability in the network infrastructure. C: ISA Server is a proxy server product that provides extensive firewall capabilities, including filtering at the packet, circuit, Question: 63 and application levels. This is not the problem. You are Server wouldadministrator for adatabase application and will single-serverthe issue that runs Microsoft D: SQL the network be used mainly in small office. The office has a not address domain of an unstable network Windows Small infrastructure. Business Server 2003, Premium Edition with Microsoft Internet Security and Acceleration (ISA) Server 2000 enabled. There are 25 Windows 2000 Professional desktop computers. Twenty of the desktop computers and the server do not have current Windows What should you do? (Each correct answer presents part of the solution. Choose critical and security updates installed. The other five desktop computers run antivirus programs, all of which have two.) expired definitions. critical and security updates on all the desktop computers and on the A. Update Windows The ISA Firewall Client is not enabled on any of the desktop computers. The latest updates for ISA Server are not server. installed on and update the antivirus program definitions on all the desktop computers and on B. Install the server. You need to implement a solution that eliminates the two biggest security risks to the network. the server. C. Enable the ISA Firewall Client on the desktop computers. D. InstallA, Blatest updates for ISA Server 2000. Answer: the Explanation: Update releases might include bug fixes, new features, or drivers, but for network administrators, security updates are often the most important releases. In many cases, Microsoft releases hotfixes to address specific security issues that cannot wait until the next service pack release.

Security updates are relatively frequent, and in some cases, must be installed as quickly as possible, to eliminate a potential hazard. Incorrect answers: C: This option does not protect the server. D: This option does not state where the latest updates for ISA Server 2000 are to be installed. Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Reference: Microsoft Press, Redmond, 2004, Chapter 13, p. 3 Question: 64 You are the network consultant for a new company named Company.com. There are six client computers that run Microsoft Windows XP, Home Edition. Connection to the Internet is through a Digital Subscriber Line (DSL) connection. The owner of the company states that the company has no plans to open additional offices. However, the owner plans to hire 20 more employees Which networking environment should you within the next 18recommend? are sufficient startup funds available to invest in an stable IT computers. Configuremust be kept toin A.months.Windows XP Professional on one of the Windows XP, Home Edition infrastructure. Costs all computers a Install There minimum. You a need to recommend a networking environment for the company. peer-to-peer network.

B. Install Windows XP Professional on all the client computers. Configure all computers in a peer-to-peer network. C. Do not upgrade any of the client operating systems. Install Windows Small Business Server 2003 on a new server computer. Configure all computers in a client/server network. D. Install Windows XP Professional on all the client computers. Install Windows Small Business Server 2003 on a new Answer: D server computer. Microsoft all computers in a client/server 2003, includes Microsoft Windows Server 2003, Windows Explanation: Configure Windows Small Business Servernetwork. Share Point Services, Exchange Server 2003, Routing and Remote Access firewall technology, and five client access licenses. And that's just the Standard Edition. In the Premium Edition, you get all that plus Microsoft SQL Server 2000, Internet Security and Acceleration Server 2000, and Microsoft Office FrontPage 2003. Windows Small Business Server is a client/server-based network-a single, centralized server and multiple clients. The server is the central computer on which most of the network operating system runs, Incorrect answers: and the client appropriate for a company as it will not foster a networking environment. A: This is not comprises the computers that use the resources managed by the will not In both editions, the technologies areneither B: A peer-to-peer networking structure is cost effective, but it server. be stable enough for acompany and optimized to work as a will it be package for the for work purposes. Option D would represent the optimum networking environment whilst keeping appropriate small business user. cost at a upgrading the client computer systems will result in non-communication between them and the rest of the C: Not Reference: minimum. due to network Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's unstable network infrastructure. Companion, Microsoft Press, Redmond, 2004, Chapter 2, p. 15 & Chapter 3, p. 39 Question: 65 You are the network administrator for Company.com. Company.com has a server that runs Microsoft Windows Small Business

Server 2003. Coho Winery has a member server that runs Microsoft Windows Server 2003. Coho Winery has 15 offsites employees.

All employee computers run Microsoft Windows XP Professional. You configure Terminal Services on the member What should you do? server. You need A. Configure a PPTP connection to the Windows Small Business Server 2003 computer and configure a Remote to Desktop method for the off-sites users to connect to the domain. The initial connection should occur as quickly as set up a connection to the member server. possible. B. Configure a PPTP connection to the member server and configure a Remote Desktop connection to the member server. C. Have users connect to the Remote Web Workplace. Have users connect directly to the terminal server. D. Configure a PPTP connection to the Windows Small Business Server 2003 computer. Configure a Remote Desktop Answer: C connection to the Windows Small Business Server 2003 computer and connect from the Windows Small Business Server Explanation: Terminal Services is the underlying technology that enables Remote Desktop for Administration, Remote 2003 computer to the member server with a Remote Desktop connection. Assistance, and Terminal Server. A benefit of Terminal Services is that users can runprograms that they might otherwise be unable to use.Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Reference: Effortless Remote Access is provided through Remote Web Workplace. Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 1, p. 5 Question: 66 You are the network administrator for Company.com. You install Microsoft Windows Small Business Server 2003 on a network computer. The network contains a server, 30 client computers, and 10 mobile computers. You add all of the users and all of the computers to the domain. One of the users leaves the company and is replaces by a temporary user. You need to give What should the temporary you do? user the same the original user account to the temporary user and reset the password. want to expend the least A. Rename access to the network resources that the original company user had. You amount of a new user account. Copy the original user profile to the new account. B. Create administrative effort. C. Create a new account for the new user. Manually grant the new user account access to all of the resources to which the original user had access. Delete the original user account. D. Create a new account for the new user. Manually grant the new user account access to all of the resources to Answer: A which the original user had access. Disable the original user account. Explanation: All the users and computers reside in one domain and since the temporary user has to have the same access to network resources as the original user had, the least amount of administrative effort that has to be expended would be to use the same user account, obviously with a different password, hence the rename of the account and resetting of the Incorrect answers: password. a new user account and then copying the original user profile to the new account, B: Creating amounts to unnecessary administrative work. C, D: These options suggest even more administrative effort. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Companion, Microsoft Press, Redmond, 2004, chapter 12, pp. 264-265

Question: 67 You are the network administrator for Company.com. Company.com has a server that runs Microsoft Windows Small Business What should you do first? Server 2003. The company relies on Small Business Server Faxing to send and receive company faxes. Employees report that faxes A. Connect to the fax line with a PPTP connection and reset the modem. are not being received. You attempt to send a fax to Company.com and the call is not answered. You need to enable B. Restart the server. the company to Administrator and restart the modem. C. Open Server D. Open Services and restart without disrupting Consolidated Messengers business. receive faxes as soon as possiblethe shared fax service. Answer: D Explanation: Restarting the shared fax service will not affect the other services that might currently be running. Thus resulting in a disruption free troubleshoots of the fax services. Incorrect answers: A: This will cause a disruption. B: Restarting the Server will result in an interruption for Company's business. C: It is not a matterRussel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Reference: Charlie of restarting the modem. Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 6, pp. 91-94 Question: 68 You are the network administrator for Company.com. Company.com has 15 computers located throughout the store. All of the computers run Microsoft Windows XP Professional. All of the computers are part of a Microsoft Windows Small Business Server 2003 domain. The owner of Company.com wants all screen savers standardized. You need to standardize the screen savers A. Configure the Domain Controller group policy object that specifies a screen for all saver. computers with the least amount of administrative effort. B. Configure a do? What should you Local Computer policy on the server that specifies a screen saver. C. Configure a Domain group policy on the server that specifies a screen saver D. Configure a Local Security policy on each computer that specifies a screen Answer: C saver. Explanation: If you configure the Domain Policy it means that every computer in the domain will receive those settings. Further more Domain Policy settings take precedence over user settings. Incorrect answers: A: The domain controller group policy is different from the domain group policy. B: This should also work, but this option involves unnecessary administrative effort. work, it involves unnecessary D: Local Security Policy is superseded by domain group policy. Although this option would also administrative effort.

Reference: Ed Bott & Carl Siechert, Microsoft Windows Security Inside Out, Microsoft Press, Redmond, Washington, 2003, Chapter 19 Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Question: 69 Press, Redmond, You are the network administrator of a CPA firm. You want to upgrade your companys existing Microsoft Windows 2004, Chapter 14, p. 6 CharlieRussel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server Server 2000 to Microsoft Windows Small Business Server 2003. You want to perform the appropriate steps to prepare for an 2003: upgrade. What should A. Ensure communication between the uninterruptible power supply (UPS) and the server. Administrator'sfull system backup that includes the System State data and Exchange. you do? (ChooseCompanion, Microsoft Press, Redmond, 2004, Chapter 10, p. 203 B. Perform a all that apply.) C. Complete a virus scan of all of the hard disks and all of the files. Make sure to scan the Exchange drive M. D. Turn off or disable all disk utilities that may be running, such as real-time antivirus monitoring software. E. Ensure that you have updated drivers for the hardware devices and the last system BIOS. Answer: B,the E, F disk by running Disk Cleanup and Disk Defragmenter. F. Prepare D, hard Explanation: Part of the preparation for an upgrade includes checking compatibility issues regarding system requirements, third party applications, device drivers, client computers and language. Preparation also includes fixing any current problems, installing required service packs, removing unnecessary software, and check the items in this list: Check Event Viewer, Collect Internet setup information, Uninstall unnecessary software, Remove Windows 2000 Administration Tools, Install the latest system BIOS, Install all Incorrect answers: necessary service packs and updates, Remove discontinued Exchange components, Remove Remote Storage, Remove A: This is irrelevant to the upgrade. any trust C: You should rather prepare the hard disk by means of the Disk Cleanup and Disk Defragmenter than running a relationships, Remove CALs, Remove the Windows Server 2003 POP3 service, Make sure that all domain controllers virus scan on the are online, disks. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Assign all operations master roles to the Small Business Server computer and Upgrade or retire any Window NT 4.0 Administrator's BDCs; hence Companion, Microsoft Press, Redmond, 2004, Chapter 5, pp. 61-65 Question: B,D,E and F. the option 70 You are the network administrator for a small ad agency named Company.com. The agency has 10 Microsoft Windows XP Professional computers in a peer-to-peer network. The agency purchases a new file server. The new file server meets the system requirements of Microsoft Windows Small Business Server 2003. The file server has an uninterruptible power supply What should (UPS) attached you do? to A. and currently is running. You want to install Microsoft Windows Small Business Server 2003 on the new file it Ensure that the UPS is connected to the server and is operating. server. You need to installation and install the UPS software immediately upon completion of the install. B. Proceed with the ensure the successful completionthe the installation. C. Disconnect the UPS before of installation of Windows Small Business Server 2003. D. Ensure the UPS is running. Simulate a power failure before installing Microsoft Windows SmallBusiness Server 2003. Answer: C

Explanation: Part of the preparation for the installation of the Microsoft Windows Small Business Server 2003 includes unplugging the UPS even if it is USB. Incorrect answers: A: One makes use of an uninterruptible power supply (UPS) to allow the server to shut down gracefully in the event of a power failure. Not to install Microsoft Windows Small BusinessServer 2003. B: The question states that the UPS is running. This means you need to disconnect it first in preparation for the Reference: installation.Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's D: This is in contrast to the preparation of the server for the installation of Microsoft Windows Small Business Companion, Microsoft Press, Redmond, 2004, Chapter 4, Server 71 HOTSPOT You are the network administratorp. 54 Question:2003. of Company.com. You install Microsoft Small Business Server 2003 on a network computer. The network contains 35 client computers and 15 mobile computers. The mobile computer users need the ability to view e-mail messages from a Web browser. They also need to view shared document libraries on the internal company site. How should you configure the mobile computers? (To answer, select the appropriate services in the diagram.)

Answer:

uestion: 72 You are the network administrator for Company.com. Company.com has a server with a full installation of Microsoft Windows Small Business Server 2003 including Microsoft Exchange. The owner of Company.com is out of the office 50% of the time. The owner has What should you do? a paging device with a non-corporateforward all e-mail messageswants you to have all of thein Add Users and A. Configure the owners account to e-mail address. The owner to a pager contact created e-mail messages forwarded to the Computers. Configure a group policy that blocks e-mail messages to the pager contact. pager and a copy owners message to forwardserver. The owner doesanot want anyone to send directUsers and B. Configure the of each account left on the all e-mail messages to pager contact created in Add e-mail messages to the pager. Send computers. an e-mail message to all corporate users that directs the corporate users to avoid sending e-mail messages directly to You need to configure a method to have the owners e-mail messages sent to the pager. You need to ensure that no one the sends e- contact. pager Answer: D C. Create a pager contact in System Manager that forwards all of the owners e-mail messages to the owners pager. mail messages directly to the ownersAdd Users and Computers an forward all e-mail messages to a pager contact. Use D. Configure the owners account in And Computers console is to administrative tool designed to perform day-to-day Explanation: Active Directory Users pager. Active Directory Users and Computers to hide the contact from Exchange mail lists. Directory administration tasks. These tasks include creating, deleting, modifying, moving, and setting permissions on objects stored in

the directory. These objects include organizational units, users, contacts, groups, and computers. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Companion, Question: 73 Microsoft Press, Redmond, 2004, Chapter 1, p. 5 You are the IT manager of Company.com. The firm consists of 15 Microsoft Windows 2000 Professional computers and 1 Microsoft Windows Small Business Server 2003. A Digital Subscribers Lines (DSL) connection is attached directly to the Windows Small Business Server 2003 by utilizing Microsoft ISA Server. All employees use Microsoft Outlook 2000 to access the employee mailboxes. The finance department uses a billing application that runs a Microsoft Access database to track customer information. you do? What should Graphic design applications are used to develop marketing material for customers and are stored in shared directories A. Enable Active Server Pages in the Web Extension for IIS. Add the Manager account to theOperators group for the on the server. IIS The files that are stored on the server are generally small. John Anderson, the manager of Company.com, needs to Web site. access e-mail B. In theand files that are stored in the shared directories onoption. Useserver from a mobile computer at home. You messages Server Management Console, go to the To Do List the office Fax Configuration Wizard. C. Add the manager to mobile User template. Install Connection Manager on the client computer.Use Connection need to enable Manager to access for John. establish remote connection to the server. D. Install and configure Terminal Services. In the Server Management Console, open the User Node. Open User Answer: C Properties, and enable the Terminal Service connection. Explanation: Connection Manager automates the process of connecting remote computers to the company's network, making the whole process quite easy. All that would then be necessary is to add the manager to the mobile User template. Incorrect answers: A: This option will not give the manager access to the e-mail and files in the shared directories on the office server. B: Faxing is not access to e-mail and files stored in the shared directories. D: This is not a Terminal Services issue. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 1, p. 5 Question: 74 You are the network administer for Company.com, a construction company with 30 network users in the main office and 20 network users in a branch office. The computer that runs Microsoft Windows Small Business Server 2003 is also used as file server. Users What should cannot report that theyyou do? download one of the applications. You check the computer and discover that several folders are deleted from A. Add the Security log to the Event Viewer snap-in. the share for the applications that is installed on the server. You want to determine which user account is deleting B. Modify the Small Business Server Auditing Policy object by enabling the Audit Object Accesspolicy. folders. C. Modify the Small Business Server Auditing Policy object by enabling the Audit Account Management policy. D. Enable the Audit System Events option in the Small Business Server Auditing Policy object.

Answer: B Explanation: Audit Object Access - A user accesses an operating system element such as a file, folder, or registry key. To audit elements like these, you must enable this policy and you must enable auditing on the resource that you want to monitor. For example, to audit user accesses of a particular file or folder, you display its Properties dialog box with the Security tab active, Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, navigate to the Microsoft in the Auditing tabPress, Advanced Security Settings dialog box for that file or folder, and then add the users or groups Redmond, whose access 2004, Chapter 9, p. 6 Question: 75 to that file or folder youadministrator of Company.com. You install Microsoft Windows Small Business Server 2003 on a You are the network want to audit. network computer. The network contains 35 client computers and 15 mobile computers. You use remote access policies to manage access to the VPN server. The VPN server is configured to use the Microsoft Windows Authentication Provider. The domain contains a groups of users you do?VPNUsers who may access the VPN server. The remote access policy is assigned to this group. What should named A new A. Configure company needs to be to run access the VPN employee in theWinSock Proxy client able to the VPN client. server. You configure the new employees user account to B. Configure packet filtering on the external router in the path to enable all protocols. use remote C. Configure Virtual add the user to the and select group. The tab. Check Enable Internet Connection access policies, and you Private Connection VPNUsers the Sharing new employee attempts to connect to the VPN Sharing with this server. The connection for the VPN need attempt is unsuccessful. Youclient. to provide the new employee with access to the VPN server. Answer: D the VPN client and the VPN server to use at least one common authentication method. D. Configure Explanation: VPNs use encryption and other security mechanisms to make sure only authorized users can access the network and that the data cannot be intercepted. The new VPN client and the VPN server should use at least one common authentication method to Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: enable the new employee to access the VPN server. Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 12, p. 264 Question: 76 You are the network administrator for Company.com. Company.com has one Microsoft Windows Small Business Server 2003 computer and 10 client computers. All off the client computers run Microsoft Windows XP Professional. John Anderson, the manager, reports that she can log on at her own computer with her user account and password. However, she cannot access the What should you do? Internet or the line-of-business (LOB) application. The manager can access the Internet by using other computers. Another the Server Manager MMC to connect the managers computer to the network. A. Use employee cannot log on to to the managers computer and make user account and password. You need to ensure that B. Reconnect the cables the managers computer by using his sure the network adapter light turns the manager on. can work the managerscomputer. to the computer list in Active Directory Users and Computers. C. Add from her own computer D. Log on to the computer as Administrator and give the manager local Administrator rights on the computer.

Answer: B Explanation: The circumstances points to the manager's computer being the one that is giving problems. And since the manager is able to access the Internet from other workstations, it stands to reason that her computer is most probably not connected to the Internet. Thus making sure that the manager's computer is connected via the cables and that the network adapter Question: 77 light are a network administrator for a young adult learning center sponsored by Company.com. The center has four You shows that it is so, will ensure that she can work from her own computer. classrooms and 24 client computers that run Microsoft Windows XP Professional. You install software updates on each client computer manually. What should you do? (Each correct answer presents part of the solution. Choose You install a Microsoft Windows Small Business Server 2003 computer. You want to automate the process of two.) deploying software A. Configure Automatic Updates option on each client computer to look for update on ascheduled basis from updates to the client computers. Microsoft Windows Update servers. B. Create a Group policy object. Enable Configuration Automatic Updates Properties in Windows Update in Group Policy Object Editor with appropriate update schedule. Enable Specify intranet Microsoft update service location properties with appropriate serve rinformation. Answer: B, D C. Create a Group Policy object. In Group Policy Object Editor, enable User control over installs in Windows Installer. Explanation: D. Install Software Update Service (SUS) on the Windows Small Business Windows XPcomputer. To keep clients updated you should use the Automatic Updates feature of Server 2003 and Windows 2000 E. Create computer account by using the Client Computers node in Server Management Professional Service Pack 3 or later to keep client systems updated automatically, or use Windows Update. Ideally you should install Software Update Services (SUS) so that you can centrally control which updates are installed. Following is one of the steps that has to be completed Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: when configuring Automatic Updates: If you want clients to get updates from an intranet site instead of connecting to Administrator's Windows Companion, Microsoft Press, Redmond, 2004, Chapter 3, p. 42 & Chapter 10, pp. 219-220 Question: 78 Update over the Internet, select Enabled in the Specify Intranet Microsoft Update Service Location setting and type You are the network the address of the consultant for Company.com. You install a server that runs Microsoft Windows Small Business Server 2003. SUS server (http://sbssrv) in both boxes, and then click Next Setting. You configure Microsoft Exchange Server to the default locations for data storage. You install Microsoft Outlook on all of the client What should you do? computers. Employees report that they cannot send or receive e-mail messages. You open Microsoft Windows Explorer and find that A. Compress the hard drive to save disk space. the system partition has only 1 MB of free space. You need to get e-mail messaging to work properly. B. Open the Server Management MMC and restart Microsoft Exchange services. C. Move the Exchange Server database to a different partition that has more space on it. D. Restart the server. Answer: C

Explanation: 1MB of free space is not enough for e-mail messaging to work. Being connected to the Internetand emailing is space intensive. Moving the Exchange Server database to a partition that has more free space on it would help. Incorrect answers: and software" then it A: Compressing the disk will mean more space, but when you work with the compressed "data uncompresses, thus leaving you with no free space. B: Restarting the Microsoft Exchange Services is not going to create more space. Question: 79 the server is not going to create more space. D: Restarting You are the network administrator for Company.com. Company.com uses a server that runs Microsoft Windows Small business Server 2003 on its network. The network has 15 client computers. Employees connect to the network from home by using Remote Access Service (RAS) PPTP connection to the server. You limit the DHCP scope on the server to 25 IP addresses due to the What should you do? address limit on the network firewall. You add 10 new clients computers to the network. Users report that client computers can only A. Configure all new client computers with reserved IP connect to the Internet intermittently and never more than 15 computers at a time. You need to ensure that all 25 addresses. client computers DHCP lease time to one hour. B. Shorten the can always connect to server entry without restricting access to the RAS client computers. C. Change the DNS the Internet on the new computer. D. Change DHCP in RAS to a static scope. Answer: D Explanation: Changing the DHCP in RAS to a static scope will ensure that all 25 clients can always connect tothe Internet without restrictions to access. The Server can be configured to use an alternate static IP configuration if a DHCP server is unavailable.answers: Incorrect address. But having the same A: Using address reservations in DHCP, allows devices the ability to always have the same address does not always relate to the ability to connect. This is arestriction. B: Shortening the lease time to one hour will not solve the problem. C: Changing the DNS server entry on the new computer?? What new computer? Reference: J. C. Mackin, and Ian McLean, Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, Washington, 2004, Chapter 7 Question: 80 You are a network administrator of Company.com. The network consists of five Microsoft Windows 2000 Professional computers and 20 Microsoft Windows XP Professional mobile computers. A single Microsoft Windows Small Business Server 2003 computer hosts e-mail messaging and file sharing. The company wants to increase productivity and communication among the What should employees. The you do? employees need the ability to share documents, schedule meetings and set up surveys. You need to set up the network to meet the companys needs.

A. In Server Management console, enable the Allow logon to Terminal Server property in theUser Properties. B. Add a new member server that runs Microsoft Exchange 2000 Server. C. Add a C Answer: calendar Web Part to the SharePoint site.

Explanation: You Mobile User with pages Install Connection Manager fromof ways: Change the view, Add items, D. Add users to can interact Template. on a SharePoint site in a number the Remote Web Workspace Check out items, site. Get alerted to changes, Import and export files and Discuss pages and documents. A calendar Web Part added to the Sharepoint site will improve communication amongst employees since it will aid them in sharing documents as well as schedule Incorrect answers: meetings and setincrease productivity and communication. It will only grant the ability to log on to the Terminal A: This will not up surveys. server which means that employees still has to be informed about documents, meetings and surveys. B: Adding a new member server running Microsoft Exchange 2000 Server will not be sufficient in proving for the needs of the Reference: Charlie really Sharon Crawford, Jason Gerend, Microsoft Windows company. All that isRussel,necessary is to make use of the Share point Web site. Small Business Server 2003: D:Administrator's This will not improve productivity and communication. Companion, Microsoft Press, Redmond, 2004, Chapter 17, pp. 448-449 Question: 81 You are a network consultant for Company.com. Company.com is a start-up company with 20 employees. Company.com purchases a server that runs Microsoft Windows Small Business Server 2003, Standard Edition an 12 client computers that run Microsoft Windows XP Professional. All employees are assigned to a specific desk. Desks with computers are shared by all employees on a rotating shouldEmployees need to access documents from any computer. Management wants all employees to share all What basis. you do? completed A. Configure a SharePoint site be company documents. Have employees post completed documents users. You need to documents. Employees want to for sure that changes are not made to unfinished documents by other to the site. Create subsites configure with individualized permissions for unfinished documents. B. Configure the default domain documents from any client computer. You also all employees toa method for a method for employees to accessGroup Policy to redirect My Document folder ofneed to configure acentral location on the server. document sharing C. Configure a drive among employees. mapping in all employee profiles to a shared folder. Have employees keep finished documents in the shared folder. Have each employee keep unfinished work in the employees own My Document folder. D.Answer:roaming profiles for all employees. Create A Explanation: Windows SharePoint Services enables teams to create Web sites for information sharing and document collaboration. Windows SharePoint Services is a component of the Windows Server 2003 information worker infrastructure and provides team services and sites to Project Server 2003. This Web site provides a central location for employees to collaborate and share information. Consider it Incorrect answers: a bulletin board, digitized and turbo-boosted. By also creating subsites for the unfinished documents, you will be able tomeet the employees demands.

B: This option does not ensure that other users will not tamper with unfinished documents. C: This option does not avail the documents to all the employees to be able to access them from any workstation. You need a Reference: site for that purpose. Sharepoint Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's D: Roaming profiles does not necessarily mean sharing. This option will enable employees toaccess their documents Companion, Microsoft from Question: 82Press, Redmond, 2004, Chapter 17 You are the network administrator of Company.com. Company.com has four branch offices, two in California and two any workstation, but not sharing with other employees. in Nevada. All of the Company.coms 50 client computers run Microsoft Windows operating systems. You want to design a Microsoft WINS What should you do? replication infrastructure that runs Microsoft Windows Server 2003 for the company. You need to implement a WINS replication plan A. Plan a series replication model. Configure all of the WINS servers as push/pull partners. that minimizes the convergence time. B. Plan a loop replication model. Configure the WINS servers as pull partners with its neighbors. C. Plan a hub-and-spoke replication model. Configure the hub as a push partner with the otherWINS servers. D. Plan a hub-and-spoke replication model. Configure all of the hubs and all of the spokes as push/pull partners with each other. Answer: D Explanation: The elapsed time between the failure of the router and its removal from the other routers' routing tables is the convergence period. On a WINS server a push partner sends messages to all its pull partners whenever the database changes, causing the pull partners to request an update. A pull partner issues requests to its push partners for database records with version numbers higher than the number of the last record it received during the previous replication. The hub and spoke Incorrect answers: network topology A: Connecting the horizontal networks in series would require packets to pass through a hubs and all the spokes means that all network devices must be plugged into a central hub or switch. Thus if all the separate router for eachare network as configured they traverse. You with each and you will keep convergence to a minimum. push/pull partnersneed a hubotherspoke replication model to minimize convergence time and not a series replication model. B: A loop cannot have more than two servers and as such cannot service the companyadequately insofar as a Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: network Administrator's topology is concerned. Companion, Microsoft Press, Redmond, with the other WINS server, you will not have the least convergence time. C: With only the hub as push partner 2004, Chapter 3, p. 31 Craig Zacker, Planning and Maintaining a Microsoft Windows Server Question: 83 2003 Network Infrastructure, Microsoft Press, Redmond, 2004,Microsoft15, p. 48 Small Business Server 2003 on a You are a network consultant for Company.com. You install Chapter Windows new network computer. You connect the server to 35 client computers and 15 mobile computers. You have three disk drives available with a do? What should you capacity of 36 GB each. You need to maximize storage capacity and provide fault tolerance. A. Initialize the hard disk with basic storage. Create RAID 1 volumes, and format the partition with NTFS file system. B. Initialize the hard disks with dynamic storage. Create RAID 5 volumes, and format the volumes with NTFS file system.

C. Initialize the hard disks with dynamic storage. Create a primary partition and an extended partition. Format the partitions with FAT32. D. Initialize the hard disks with dynamic storage. Create spanned colume onto the existing volume. Format the Answer: B partition Explanation: Mirrored volumes and RAID-5 volumes are fault-tolerant dynamic disk with FAT32. configurations. Incorrect answers: A: RAID 1 volumes also provides fault tolerance, but you need to have dynamic disks and not basic disks. C: This option does not provide fault tolerance and maximum storage capacity. D: S panned volumes are not fault-tolerant, and cannot participate in any fault tolerant Business Server 2003: Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small configurations. Administrator's Companion, Microsoft Press, Redmond, 2004, Chapter 7, p. 103 Question: 84 You are a consultant for Company.com. Company.com's network contains 50 client computers. The client computers include a mixed environment of Microsoft Windows 98 and Microsoft Windows 2000 Professional computers. There are 15 traveling salespersons who use Microsoft Windows XP Professional mobile computers to connect to the server by using a dialup connection. A single What should you do? Microsoft Windows Server 2003 computer hosts e-mail services and dial-up connectivity. Mobil users report that access to e-mail A. Install additional phone modems on the server. messages and company data through their phone connections isaslow. You need to connection on themobile computers. B. Install Terminal Services in Application Mode. Configure Remote Desktop improve the mobile users ability to access both C. Configure the server to accept incoming remote access. Configure mobile computers to dial in to a local ISP and data and e-mail messages. the use a VPN connection. D. Configure the server to accept incoming remote access. Configure the mobile computers to dial in to the server. Answer: B Explanation: To establish a Remote Desktop connection to the computer, giving you complete control over the computer, click Connect To Computer Via Terminal Services. Terminal Services run in two server modes: Administration and Application. In Administration mode, a maximum of two connections can be established for the purposes of administering a server. In Application mode, 90 days grace is given from the point when Terminal Services is placed into that mode. After that, licenses must Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: be purchased Administrator's from Microsoft and managed by the Terminal Services License Manager. Companion, Microsoft Press, Redmond, 2004, Chapter 12, p. 300 Question: 85 These licenses are separate from client access licenses for regular connections to a server. Thus installing Terminal You are services in the network administrator for Company.com. Company.com has a server that runs Microsoft Windows Server 2003. Application mode will allow all 15 mobile users access to both data and e-mail messages.

Company.com has four divisions. Each division has 25 employees. All employees use the server for data storage. Each division also has its own line-ofbusiness (LOB) application that runs on the server. Management at Company.com wants to set up specific group What should you do? policies for each division. You need to configure the group policies for the divisions. You want log on times kept as A. Create an organizational unit (OU) for each division. Move the users to the appropriate OU. Configure a group short as possible. policy for each OU. You want to be able to move employees to different divisions easily and you want the appropriate policies applied to B. Create an organizational unit (OU) for each division. Move the users to the appropriate OU. Configure the Default the employees Domain policy. who are moved. in one organizational unit (OU). Create four group policies. Configure security filtering to apply C. Create all users each group policy Answer: A to the appropriate employees. D. Create a security group for each division. a type of system Directory container object used within domains. Us are Explanation: An organizational unit (OU) is Create s Active policy for each group. logical containers into which you can place users, groups, computers, and other OUs. An OU can contain objects only from its parent domain. An OU is the smallest scope to which you can apply a group policy or delegate authority. Linking a GPO to an organizational unit deploysanswers: Incorrect the security settings in the GPO to allDomain in the organizationalevery computer subordinate containers. those B: If you configure the Default objects Policy it means that unit, including in the domain will receive settings. This would be inappropriate. C: Creating all users in one organizational unit will defy the purpose of having employees in different divisions with different Reference: Craig Zacker, Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, policies applied to them. Microsoft Press,ensure the appropriate policies to specific divisions of employees. D: This will not Redmond, 2004, Chapter 14, p. 6 Question: 86 You are a network consultant for Company.com which runs Microsoft Windows Server 2003 with Active Directory.You configure the computer with a static IP address, subnet mask, and default gateway. You the use the Add/Remove Programs utility in the Control Panel to install the DHCP Services. You verify that the service starts automatically during installation. You create a DHCP scope and exclude the appropriate static IP addresses from the scope. Some of the client computers run Microsoft Windows 2000 What should you do? Professional A. Run of the from the command prompt at Windows and some arp aclient computers run Microsoftthe server. XP. You enable all of the client computers as DHCP clients. B. Fix the You reboot incorrect IP address in the client computer reservation in the DHCP console. one of the client computers. You discover that IP addressing information is not assigned to the computer. You want all of C. Configure the scope in the DHCP console with the proper IP address. the client D. Authorize the DHCP serverconfiguration information from the DHCP server. computers to receive IP address in Active Directory. Answer: D

Explanation: DHCP servers must be authorized if they are to be integrated in Active Directory networks. Only domain controllers and domain member servers participate in Active Directory, and only these server types can become authorized. When your network Incorrect answers: A: The arp -a command is used to determine the MAC address. You need to have computers to receive IP address all the includes Active Directory domains, the first DHCP server you install on the network must be an authorized DHCP client server. configuration information from the DHCP server. B: The DHCP server has to be authorized first. C: There is no need to configure the scope in this case. Reference: J. C. Mackin, Ian McLean, Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, 2003, Chapter 7, p. 5 Question: 87 You are the network administrator for Company.com. Company.com has a server that runs Microsoft Windows Small Business Server 2003. The Windows Small Business Server 2003 is named Server1. Company.com has a second server, named Server2, that runs Microsoft Windows Server 2003. Company.com uses a line-of-business (LOB) application for data entry by its employees. The LOB application resides on the Windows Small Business Server 2003 computer. All of the client computers are configured withyou do? What should a mapped drive to the Windows Small Business Server 2003 computer. Access to the LOB application is through this A. Move the LOB application to Server2. Create a share on Server2 for the LOB application with the same name as drive. Employees the original report difficulty sending and receiving e-mail messages. Windows Small Business Server 2003 reports 90% CPU use share. time when the B. Move the LOBis accessed. You need to Create a share on Server2 for the LOBdifficulty sending and receiving e-mail LOB application application to Server2. make sure that the employees have no application.Change the drive mapping on messages. the client computer to the the share. You also need to ensure thatnew use of the LOB application is not affected. C. Move the Microsoft Exchange component from Server1 to Server2. D.Answer: BLOB application to Server2. Create a share on Server2 for the LOB application.Create a mapped drive Move the on Explanation: Server1 to the share on are configured with a mapped drive to the Microsoft Windows Small Business Server 2003 Since all client computersServer2. computer and access to the LOB application is through this drive you need to make Server2 the server where the LOB application resides. Then create a share for the LOB application and change the mapping on the client computers to the new share. This should Incorrect answers: ensure e-mail A: Creating a employees and LOB the same name as activity for theshare on Server2 withapplication access. the original share is not going to grant e- mail abilities and access to the LOB application to the employees. They will then still encounterdifficulty. C: The question pertinently state that the client computers have mapped drives to the server. Thisoption does not mention that Reference: Charlie be mapped to Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: the client computersRussel, Sharonthe new place where theExchange component has been shifted to. Administrator's D: The drive mapping should be changed to the new share on the client computers and not on the server.

Companion, Microsoft Press, Redmond, 2004, Chapter 5, p. 60 Question: 88 You are a network consultant for Company.com. You have a network that contains 50 Microsoft Windows XP Professional client computers with similar hardware configuration and software configuration. There is a single Microsoft Windows Small Business Server 2003 computer that host e-mail function, file sharing, and a proprietary database for an accounting software package. The accounting group reports poor response of the accounting software, which stores data on the server. You diagnose that What should you do? the A. Install Windows Microsoft Small Business Server 2003 on a new computer in Microsoft Windows Small accounting accounting database is consuming excessive resources from other services on the a new Domain.Migrate the Business database Server 2003 to the member server and redirect the accounting software to the the member server. computer. You purchase a new computer system to offload some of newserver load. You need to add a new member B. Install server to Microsoft Windows 2003 Server on a new member server. Join the new member server to the Windows Small Business Company.coms need with least amount of administrative effort. accommodate the Server 2003 domain. Install Microsoft SQL Server on the newmember server. C. Install Microsoft Windows 2003 Server on a new member server. Join the new member server to the Windows Small Business Server 2003 domain. Migrate the accounting database to themember server and redirect the accounting software to Answer: the new C member server. Explanation: D. Install Microsoft Windows 2003 Server on a new member server. Join the new member server to the Windows Because Windows Server 2003 is the underlying operating system in Windows Small Business Server, all files, records, Small Business and Server 2003 domain. Install Microsoft Exchange Server on thenew member server. Configure replication partners configurations are migrated without change. You lose nothing and gain all the abilities of a Windows Server 2003 that run domain. Migrating Windows Small Business Server 2003. to a new server is a complex process that requires a new domain (hosted by the new server) and moving all data and Incorrect But accounts. answers: A: This option are only best if to wanted the additional server to take on server load. Thus option C is the solution. in this case youwould be addingyouthe existing server to offload some of the the whole workload of the existing server. However, you only need to offload some of the server load. Besides you should be installing Microsoft Windows 2003 Server on the new member server and not the Small Business Server software. B: You need to migrate the accounting database to the member server and redirect the accounting software to the new member 89 Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Reference: Question: server. There is no need to install SQL server on thenew member server. Administrator's You are consultant who specializes in small to medium-size businesses. Company.com has five employees who work at D:Companion, need to install Microsoft Exchange Server and to configure replication partners.This is not going to ease There its office. is no Microsoft Press, Redmond, 2004, Chapter 1, p. 9 the Company has 20 additional employees who work from home. The office is connected the Internet by means of a load of the line. All fractional T1existing server. of the employees have computers that run Microsoft Windows XP Professional. All of the employees who are working at home have broadband connections to the Internet. Company purchases an SQL-based third-party line-of-business (LOB) application for its business. You want the application to be used by all employees. You also want home users to access the program through a Terminal Services connection. You need to install the necessary hardware and software to meet management needs while keeping costs to a minimum.

What should you do?

A. Install one server with 512 MB of RAM run Microsoft Windows Small business Server 2003, Premium Edition. B. Install one server with 384 MB or RAM that runs Microsoft Windows Small Business Server 2003, Premium Edition and a second server with 256 MB or RAM that runs Microsoft Windows 2003 Server. C. Install one server with 384 MB of RAM that runs Microsoft Windows Small Business Server, Standard Edition. D. Install one server with 384 MB or RAM that runs Microsoft Windows Small Business Server 2003, Standard Edition and a second Answer: B server with 128 MB or RAM that runs Microsoft Windows Server 2003. Explanation: Terminal services only works in remote administration mode on a small business server 2003server. Answer "A" cannot be the correct answer. In order to run terminal services in a smallbusiness server 2003 environment, you need an additional member server, making answer "B" the only correct answer. Question: 90 Company.com has five employees who work at its office. Humongous Insurance has 20 additional employees who work from home. The office is connected to the Internet by means of a fractional T1 line. All of the employees who are working at home What should you do? have broadband connections to the Internet. Humongous purchases a SQLbased third-party line-of-business (LOB) A. Install one server with 512 MB of RAM that runs Microsoft Windows Small Business Server 2003, Premium application for its Edition. You want the application to be used by all employees. You also want home users to access the program business. B. Installaone server with 384 MB of RAM that runs Microsoft Windows Small Business Server 2003, Premium through terminal Edition connection. You need to install the necessary hardware and software to meet management needs while keeping Service and a second server with 256 MB of RAM that runs Microsoft Windows 2003 Server. costs to a C. Install one server with 384 MB of RAM that runs Microsoft Windows Small Business Server, Standard Edition. minimum. D. Install one server with 384 MB of RAM that runs Microsoft Windows Small Business Server 2003, Standard Answer: B Edition and a second server with 128 MB bandwidth of 1.544 Mbps actually consists of 24 separate 64-Kbps channels. A fractional T1 Explanation: The T1of RAM that runs Microsoft Windows Server 2003. line lets you purchase as many of these channels as you need. For example, if you need 512 Kbps of total bandwidth, you can make a cost comparison between eight channels of a fractional T1 and a 512-Kbps DSL line. Microsoft Windows Small Business Server 2003 Incorrect answers: includesnot mentioned whichServer 2003. Both can accommodate computers are running. Making this option A: It is Microsoft Windows type of Operating systems the client Terminal Services connections. undesirable since you might need to make use of a second server that runs Windows Server 2003 to accommodate all users. C: The Standard Edition will be able to accommodate Terminal Services; however, it will not meet all the Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: management Administrator's needs. Companion, Microsoft Press, Redmond, 2004, Chapter 3, p. 39further unnecessary costs. & Chapter 6, p. 77 D: Again this Question: 91 option implies extra hardware that would imply You are the network consultant for a Company.com. The network contains the server that runs Microsoft Small Business Server 2003

Standard Edition. The company uses Microsoft Access Database. Users report that the response time of the database is slow. You also discover that data is not saving correctly to the database. You need to recommend the database solution that decreases query response time and ensures that data is saved correctly. There are two possible solutions to achieve these goals: (Each correct

answer presents a complete solution. Choose two.) Answer: B, C A. Upgrade the server to Microsoft Windows Server 2003. Question: 92 You are the network consultant for a Company.com. The network contains the Migrate the runs Microsoft Small B. Purchase and install Microsoft SQL Server 2005 on a new server computer. server that Access database to the Business Server 2003 Microsoft Standard Edition. You are implementing a backup strategy. You need to ensure that you can restore all the data in the eventPerform a normal backup to tape every day. A. of the SQL Server computer. natural disaster. Which threeto tape. would you perform? (Each correct answer presents part of the solution. Choose B. Perform a daily backup actions three.) C.C. Store copies of backup tapes inWindows Small Business Server 2003 Premium Edition. Migrate the Access Upgrade the server to Microsoft the fire-proof safe in office. D. Store copies database to the of backup tapes in a remote location. E. Use the Automated System Recovery (ASR) wizard once a week to create an ASR backup. Microsoft SQL server component of Microsoft Windows Small Business Server 2003 Premium Edition F. Create a startup disk by using the format a: /s command. Store the disk at a remote D.Answer: A, D, E of the MaxBufferSize variable in the Msaccess.ini file to allocate more memory to the Access Increase location. the value database. 93 Question: You are the network administrator for Company.com. The network contains the server that runsMicrosoft Server 2003. The Company.com employs two interns who assist with routineadministrative tasks. You need to design and implement a procedure the Audit Privilege Use option in intern accounts. A. Enable to enables interns to perform required tasksInstruct each intern to always logon administrative privileges. What should B. Create a user account for each intern. whileminimizing potential abuse of to the network by using this account and you do? to use the runas command for any tasks that require administrative privileges. C. Rename the built-in administrator account. Create a password that meets complexity requirements and instruct interns to use this account. D. Create user account for each intern. Add the accounts to the Domain Administrators group and instruct the interns Answer: B to use these accounts. Question: 94 You are the network consultant for a Company.com. The network contains the server that runs Microsoft Small Business Server 2003 ... Edition. The network also contains 15 client computers.Employees currently use a custom application to enter a customer data. The company wants topurchase the application that uses SQL Server 2005.The company wants to upgrade the server, which currently have the following specification: * One 3.4 GHz processor * 8 GB of RAM * Five 300 GB SCSI disks in a hardware RAID-5 array

* 1Gigabit Ethernet card You need to make recommendation to optimize server performance. What should you recommend? A. Increase hard disk capacity. B. Increase the RAM capacity. C. Install a second processor. D. Install a second Ethernet card. Answer: C Question: 95 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Small Business Server 2003.You discover that employees use an unauthorized application that compromised network security.You need to implement a A. Create a new Software Restriction Policy accessing unauthorizedapplication. You want to ad...using the security policy that prevents employees from based in the path rule. B. Create a new Software Restriction Policy based in the hash rule. minimum amount of C. Set the default software should you? administrative effort. What restriction security level to Disallowed. Create a new Software Restriction Policy that allows application to run in the path rule. D. Set the default software restriction security level to Disallowed. Create a new Software Restriction Policy that allows Answer: B to run in the hash rule. application Question: 96 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Small Business Server 2003, Standard Edition. Company.com frequently purchases software to be installed on the client computers. You need to identify a A. Create an unattended installation source on a shared folder on the network. Install software on client computers by solution that will push software on client computers with minimum amountof administrative effort. What should you? using logon script. B. Share the drive on the server that contains the new software. Create an unattended setup file on CD-ROM. Instruct users to run the CD-ROM on their computers. C. Publish the software to users through a Group Policy Object (GPO). D.Answer:the software to users through a Group Policy Object (GPO). Assign D Question: 97 You are the network administrator for Company.com. The network contains the server that runs Microsoft Server 2003 Standard Edition and Microsoft Exchange Server 2003. The company recently hired several interns and is concerned about accessibility to personalinformation in the Global Address List A. Configure need to restrict interns from accessing information about permanent employees of the company in the (GAL). You recipient filtering in the GAL to restrict the view for interns. B. Permit the Read permission for interns from the GAL. Assign access only to custom address lists that do not GAL, however include permanentable to access information about other interns. What should you? interns should be

employees. C. Configure an alternate GAL for interns that does not include permanent employees. D. Specify a higher priority level for mailboxes of permanent employees than that for mailboxes Answer: C of interns. Question: 98 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2003. As part of a backup strategy, you perform a normal backup of data to tape every night. You need to ensure that backup logs stored on the server. A. Review backups are backup logs storedthree actions would you perform? (Each correct answer presents part of the solution. B. Review successful. Which on the backup tape. Choose three.) C. Restore data in the production environment. D. Restore data in the test environment. E. Verify the integrity of data on the backup tapes. Answer: A, D, E Question: 99 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Small Business Server 2003. All client computers on the network are assigned IP addresses through DHCP. You install a high-security firewall device between the company network and the Internet. Users report that they cannot access web pages on the Internet. You can A. On the firewall device, open a port 53. successfully ping the internal server and the ISP's DNS server from the client computer. You can also successfully B. On the firewall device, open a port 25. resolve DNS C. On the server configure a forward lookup zone. queries for internal names, however, DNS queries for domain names on the Internet fail. You need to ensure that all D. On the server configure the DNS Server option to use the ISP's DNS client computers server. can resolve internal and external domain names.What should you? Answer: A Question: 100 You are the network consultant for a Company.com. You install a server that runs Microsoft Small Business Server 2003. You add two shared printers to the network. Users must be able to print documents on these printers by using their web browsers. A. Publish the two shared printers of server components. Which two actions would you perform? (Each correct You need to complete the installationin the network to Active Directory. answer presents B. of the that IIS Choose two.) part Verifysolution. is installed with default settings on the server. C. Reshare the two printers in the network. D. Install the Internet Printing Service on the server. E. Start the World Wide Web Service on the server. Answer: B, D

Question: 101 You are the network administrator for Contoso, LTD. The network contains a server that runsMicrosoft Small Business Server A. Create company merges with that includes the SMTP suffix for Company.com 2003.Your a new Recipient PolicyCompany.com, users must retain their existing e-mail addresses aswell as receive eB. Create Mail enabled contacts for all employees of Company.com Add Company.com, e-mail addresses to mail the contact information. messages addressed to the Contoso, LTD domain. You need to ensure that Company.com, users have e-mail C. In the Properties dialog of the SMTP Virtual Server, select the Only the list below option. Enter the addresses in both domain name of Company.com domains. What should you? Answer: A D. In the Message Delivery settings, add the IP address of Company.com, your Exchange server's Accept List. Question: 102 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2000. The server does not run any service packs. You want to upgrade the server to Windows Small Business Server 2003 a full backup of the server. A. Perform Premium Edition. You need to upgrade the server without losing any data. What should you? B. Perform a System State backup. C. Ensure that at least 500 Mb of free space is available on the server. D. Ensure that at least 2 Gb of free space is available on the server. E. Install Windows Small Business Server 2000 Service Pack 1 on the server before you upgrade. F. Install Microsoft Windows 2000 Server Service Pack 4 on the server before you Answer: A, D, E upgrade. Question: 103 You are the network administrator for Company.com. The network contains the server that runs Microsoft Windows Small Business Server 2003. The server uses DHCP and assigns IP addresses to all computers in the network. The IP address of the ISP's DNS server changes frequently, which disrupts Internet access for users. You need to A. Set up ensure that DNS forwarders on the company's server that point to the ISP's DNS server. Configure the DNS Server option with of Internet access for users is uninterrupted. What should you? address of the Windows Small Business Server. B. Configure the DNS server option with the ISP's DNS server address. Instruct all users to run the ipconfig /renew command. Upgrade the ISP's DNS server address as required. C. Configure all client computers to use alternate static DNS server addresses. Instruct all users to run the ipconfig /renew Answer: D command. Upgrade the ISP's DNS server address as required. D. Configure the DNS server on Windows Small Business Server 2003 to use the default root hints. Question: 104 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2003. You discover that several files are deleted from a shared folder on the server. You need to identify the user who is deleting the files. What should you?

A. Create a Group Policy Object (GPO) that enables the Audit Privilege Use policy. Enable auditing on the folder. Link the GPO to the Users container. B. Create a Group Policy Object (GPO) that enables the Audit Privilege Use policy. Enable auditing on the folder. Link the GPO to the Answer: D domain. C. Create a Question: 105 Group Policy Object (GPO) that enables the Audit Object Access policy. Enable auditing on the You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows folder. Link the Small Business GPO to Premium Edition. The Server 2003 the Users container. company hosts themessaging solution by using Microsoft Exchange Server 2003 Standard D. Create company hires Object (GPO) that enables the use external Access policy. Enable auditing able to Edition.The a Group Policy several vendors. These vendorsAudit Objecte-mail addresses. Users mustbe on the find A. Create a the folder. contact LinkMailbox enabled user account for each vendor. B. Create of vendors in the Global Address List (GAL). information a Mail enabled user account for each vendor. You do not wantto grant vendors logon rights to the C. Create the domain. GPO to a need to network. You Mail enabled group named vendors, and add user accounts to the vendors group. ensure that vendors are listed in the GAL. What should you? D. Create a Mail enabled contact for each vendor. Answer: D Question: 106 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2003 Standard Edition. Users connect to the Internetby using a high-speed connection leased from an ISP. Users report that they are unable to open Web pages on the Internet when they enter URLs in the browser address bar. When you ping an external A. Set up forwarders to the ISP's DNS server. address by IP number, you receive a response. However, when you try to ping an external address by name, you do B. Enable zone transfers on the company's DNS not receive a server. response.You need to ensure that users are able to open Web pages when they enter URLs in the browser address bar. C. Add an SRV record for the ISP's DNS server. What should D. Add a reversal lookup zone for the ISP's DNS you? server. A Answer: Question: 107 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2003. Use Microsoft Exchange Server 2003 to host the company's messaging solution. Users report that they are unable to A. Configure an messages. You discover that the hard disk is files. access their e-mail alert to run script that deletes transaction logfull because the transaction logs were not purged. You Then B. to need Configure an alert to send you an e-mail notification when transaction log files exceed the defined manually size that ensurelimit. transaction logs are purged regularly from the hard disk. What should you? delete log files. C. Run an offline full backup. D. Run an online full backup.

Answer: D Question: 108 You are the network administrator for your company. The network contains a server that runs Windows Small Business Server 2003.As a fault tolerance strategy for the operating system volume, you configure the server to use disk mirroring. The operating system volume is mirrored on two disks, disk0 and disk1. Disk1 fails. You need to install a new disk and re-establish fault tolerance for the operating system volume. What should you do? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Question: 109 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2003. You are in the process of standardizing of appearance and functionality on the desktop for all client computers. You A. to ensure that users cannot modify desktop settings. Which two actions should of perform? (Each correct need In the Active Directory Users and Computers snap-in, specify the network pathyouthe standardized answer presentsprofile. B. of the solution.Choose two.) part On the client computers, in the Computer Management window, specify the path of the standardized profile. C. On the server, on the Computer Management window, specify the path of the standardized profile. Answer: A, D folder on the server, rename the Ntuser.dat file to Ntuser.man. D. In the shared E. In the local profile directory of all client computers, rename the Ntuser.dat file to Ntuser.man.

Question: 110 You are the network administrator for your company. The network contains a server that runs Microsoft Windows Small Business Server 2003. As part of regular backup strategy, you use the Automated System Recovery (ASR) wizard once a week on the server. The system files on the server become corrupted and must be restored. You need to begin the restore process of the server.

Answer:

Question: 111 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2003. The server stores user information in the shared folder on the hard disk. Mobile users access this data through the the Performance console on the server, create a counter log that will monitor network utilization through A. By using virtual private network.You need to create a baseline log to monitor network utilization of the VPN. What should you? the VPN adapter. B. By using the Performance console on the server, create a trace log that will monitor network utilization through the VPN adapter. C. By using Remote Access Logging on the server, create a Periodic Status log that will record data from the VPN adapter. D. By using the properties tab on the server object in the Routing and Remote Access console, enable Log All Events option.

Question: 112 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business

Server 2003. Company leases a broadband cable connection from an ISP to connect to the Internet. You decide to host your own A. Add an MX record for your Exchange server to your DNS server. B. Add an MX record for Microsoft Exchange Server external DNS server. messaging solution by using your Exchange server to the 2003. Afterconfiguring the server, you discover that you can C. Add a Host record for your Exchange server to your DNS server. send D. Add a Host record for your Exchange server to the external DNS server. E. Restart the SMTP Virtual Server. messages, but you cannot receivemessages through the Internet. You can successfully send and receive internal F. Create a new SMTP connector for your server. Configure the connector to point to your ISP's messages. You SMTP server. Answer: B, D need to ensure that you can receive messages through the Internet. Which two actions should you perform? (Each Question: 113 correct answer You are the network administrator for Company.com. The company's main office has 30 users.There are three branch offices with of the solution.Choose two.) presents part five users in each. All offices connect to the Internet through abroadband connection. You purchase a new server to store company data in a central location and to host internal e-mailaccounts of users. You must ensure that users can access the new server in the A. Install Microsoft Windows Server 2003 Standard Edition on the new server. main officethrough the Internet. You must also ensure that users can access e-mail messages that hostedon the new B. Install Microsoft Windows Server 2003 Standard Edition with Internet Information Services (IIS) on the new server. You server. Install Microsoft need to choose and install an operating system that will meet these requirements. You needto achieve these goals while Exchange Server 2003 on the server to enable messaging. minimizing C. Install Microsoft Windows Server 2003 Standard Edition and then install Windows Share Point Services on the new costs. What should you? server. Instruct all users to use the Share Point site on the new server. Answer: D D. Install Microsoft Windows Small Business Server 2003 Standard Edition on the new server. Instruct all users to use the Share 114 Question: Point the You aresite. network administrator for Company.com. The network contains the server that runsMicrosoft Windows Server 2003. You add another hard disk to the server, and you configure the disk for use with the Windows operating system. When you restart the server you receive the following error message:

You need to ensure that the server starts correctly. What should you? A. Start the server in a Safe Mode with Command Prompt. Use the Fdisk tool to reconfigure the logical drives. B. Start the server from the Windows Server 2003 installation CD-ROM. Press F6 and upgrade the Mass Storage driver. Then, restart the server. C. Start the server from the Windows Server 2003 installation CD-ROM. Modify the boot order in the boot.ini file. Then, restart the server. Answer: C D. Reconfigure the BIOS so that the newly installed disk drive is added to existing drives. Then, restart the server. Question: 115 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Server 2003. You want to set up an account policy that locks user accounts after three consecutive failed logonattempts. You need to unsure that only anA. Set the valuecanthe Account lockout duration option to 0. should you perform? (Each correct answer presents administrator of unlock user accounts. Which two actions B. of the part Set the value of the Account lockout duration option to 3. C. Set the value of the solution.Choose two.) Account lockout threshold option to 0. D. Set the value of the Account lockout threshold option to 3. E. Set the value of the Reset Account Lockout counter after option to 3. Answer: A, D

Question: 116 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Small Business Server 2003. Company uses the third-party line-of-business (LOB) application. You want to upgrade the server to the Microsoft Windows Server 2003 Standard Edition. You need to ensure successful migration of the LOB application by using the A. Set up a test network that runs Windows Server 2003 Standard Edition. Install a LOB application and test its minimum compatibility with the effort. amount ofadministrative Windows Server 2003 Standard Edition operating system. There are two possible ways to achieve this goal. (Each correct answer presents a complete solution. Choose two.) B. Create a full backup of the current network environment, upgrade the server to Windows Server 2003 Standard Edition and install the application on the server. Restore server data from the backup tapes. C. Install the Application Migration Wizard on the server. Run the wizard to check the compatibility of the LOB application with the WindowsA, C 2003 Standard Edition operating system. Answer: Server D. Upgrade the server Windows Server 2003 Standard Edition, install the Application Migration Wizard on the Question: 117 server. Run the wizard You check the compatibility of the LOBCompany.com. The network contains the server that runsMicrosoft Windows to are the network administrator for application with the Windows Server 2003 Standard Edition operating system. Small Business Server 2003. Client computers run Windows XP Professional. IP addresses for client computers are assigned statically. One client computer cannot connect to the network. You run the ipconfig command on the computer and receive the following output:

What is the possible cause of the connectivity issue? A. Default gateway settings are not specified in the TCP/IP settings. B. The IP address of the client computer is incorrectly specified in the TCP/IP settings. C. The client computer is configured to automatically obtain the IP address. D. The subnet mask settings are incorrectly specified in the TCP/IP settings. Answer: C Question: 118 You are the network administrator for your company. The network contains a server that runs Microsoft Windows Small Business Server 2003. You implement the following backup schedule: Sunday: Full backup Monday: Differential backup Tuesday: Differential backup Wednesday: Incremental backup Thursday: Differential backup Friday; Differential backup All backups occur at 01:00 every day. On Thursday at 19:00, all data on the server becomes corrupted.

Answer:

Question: 119 You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Server 2003 It takes a long time to log on to the network. Standard*Edition. The company's branch office at the remote location uses a high-latency satellite connection that * The LOB application takes a long time to process requests and requests often frequently time out. The LOB application stops running when the two causes should you unavailable. identify the causes of these problems. Whichconnection terminates. identify? (Each correct answer You need*to There are 15 users in the branch office. These users remotely access aline-of-business (LOB) application. User at the of the presents part solution. Choose two.) A. The bandwidth of the branch office report that: satellite connection is inadequate to support user requests. B. Authentication occurs at the main office rather than at the branch office. C. The LOB application runs on the server at the main office. D. Disk throughput on the server at the main office is inadequate to support user requests. Answer: B, C Question: 120 You are the network consultant of the company. The company president uses a broadbandconnection to connect to the Internet from the... The network contains 10 client computers that run Microsoft Windows 95 in a peer-to-peer network. One of these client * Employees can share data without using floppy by using floppy disks, and they do not have access to the computer function as the file server. Employees share datadisks Internet. * Employees can access the Internet through a single You connection. need to modify the network environment to meet the following requirements: * Centralized user administration. * Dedicated e-mail server. You need*to identify solutions that meet these requirements while minimizing costs. Which three solutions should you Ability to encrypt files on the client computers. recommend? (Each correct answerbroadband connection. A. Use the existing presents part of the solution. Choose three.) B. Purchase a leased broadband connection to the Internet. C. Upgrade all client computers to Windows XP Professional. D. Upgrade all client computers to the latest Windows 95 service pack.

E. Install the server that runs Microsoft Windows Small Business Server 2003 Standard Edition. F. Install A, C, E Answer: the server that runs Microsoft Windows Small Business Server 2003 Premium Edition. Question: 121 You are the network consultant for a Company.com. The network contains 10 servers that runboth Microsoft Windows NT Server 4.0 and Microsoft Exchange Server 5.5. There are 400 client computers that run Microsoft Windows 2000 Professional. The company * Ensure the ability to add additional server to the messaging has the following requirements: environment * Ensure that user can retrieve e-mail messages from remote locations * Ensure that achieve limit goals exceed 200 Mb for each user The company wants tomailbox these do notwhile minimizing costs.You need to submit a proposal that meets these requirements. Which two recommendations should your proposal include? (Each correct answer presents part of the solution. Choose two.) A. Migrate all servers to Microsoft Windows Server 2003 Standard Edition. B. Purchase hardware to setup a server cluster. Implement an active/active cluster by using Microsoft Exchange Server 2003. C. Purchase hardware to setup a server cluster. Implement an active/passive cluster by using Microsoft Exchange Server 2003. E Answer: A, D. Migrate all servers to Microsoft Windows Server 2003 Enterprise Edition. Question: 122 Exchange 5.5 servers to Microsoft Exchange Server 2003 Standard Edition. E. Migrate all You are the all Exchange 5.5 serversato Microsoft Exchange Server 2003The network contains theserver that runs F. Migrate network consultant for company that has 175 employees. Enterprise Edition. Microsoft Windows Server NT 4.0. The company plans to open a branch office that will be connected to the main office through anISDN connection. branch office to the existing network.Ensure the network security when users connect to the branch office Add the The company has the following requirements: over the Internet.Enable a session to be mutually authenticated and encrypted between the main office and the branch office.Centralize management of user and computers privileges.Allow users in the branch office to authenticate to the domain even the ISDN connection is You need to submit a network upgrade proposal that will meet the company's requirements. Which two actions unavailable. should you recommend? (Each correct answer presents at the the solution. Choose two.) A. Install a backup domain controller (BDC)part of branch office. B. Install a domain controller and a global catalog server that runs Microsoft Windows Server 2003 at the branch office. C. Migrate the Microsoft Windows Server NT 4.0 domain to the Microsoft Windows Server 2003. D. Purchase and install the Microsoft Internet Security and Acceleration (ISA) Server 2004 on a new server computer. Configure (all) authenticate requests from the branch office to connect to this server. E. Upgrade the Microsoft Windows Server NT 4.0 domain to the Microsoft Windows Small Business Server 2003 Answer: B, C Premium Edition.

Question: 123 You are the network administrator for Company.com. The network contains a server namedServer1 that runs Microsoft Windows Small Business Server 2003 Standard Edition. You install a database application on the server. The response time of A. Microsoft the server to Windows Small Business Server 2003 Premium Edition. B. Microsoft Windows Small Business Server 2003 You decide numerousconcurrent requests becomes unacceptable.Standard to host the application on another servernamed Edition. Server2. You C. Microsoft Windows Server 2003 Standard Edition. D. to choose Windows an operating system on Server2. Answer: C need Microsoft and installServer 2003 Enterprise Edition. You want to achieve these goals while minimizing costs.Which operating Question: 124 You are the network administrator for Company.com. The network contains a server Microsoft Windows Server systemStandard choose? 2003 should you Edition.In the event of a hard disk failure, you want to ensure that no data is lost. You also want toachieve this goal by using of A. Implement a RAID 0 array. minimum amount of hard disk capacity. You need to set up a fault tolerance solution that meets these requirements. B. Implement What should a RAID 1 array. C. Implement a RAID 5 array. you? D. Implement a RAID 0+1 array. Answer: C Question: 125 You are the network administrator for Company.com. The network consists of a singe ActiveDirectory domain and contains a server that runs Microsoft Windows Small Business Server 2003Standard Edition. You need to migrate the domain to Microsoft Windows A. Purchase a using a minimum amount of administrative effort. You also want to achieve environment minimizing Server 2003 byTransition Pack. Migrate the Microsoft Windows Small Business Server 2003this goal whileto Microsoft Windows costs. What Server 2003. should you? B. Purchase a copy of Microsoft Windows Server 2003. Migrate the Microsoft Windows Small Business Server 2003 environment to Microsoft Windows Server 2003. C. Purchase a new server computer and Transition Pack. Migrate the Microsoft Windows Small Business Server 2003 to Microsoft Windows Server 2003 on the new server computer. D.Answer: Aa new server computer and a copy of Microsoft Windows Server 2003. Migrate the Microsoft Windows Purchase Small Question: 126 Business Server 2003 to Microsoft Windows Server 2003 on the new server computer by using the Active Directory You are the network administrator for Company.com. The network contains the server that runsMicrosoft Windows Connector. Server 2003. You create an organizational unit (OU) named Finance to hold all objects associated with useraccounts and computer accounts for the finance department. You create a global group namedFinance Admins group whose members will administer these objects. You need to assign the appropriate permissions to the Finance group so that its members canadminister the Finance OU. What should you?

A. Enable the option to view the Security tab under Advanced Features in the Active Directory Users and Computers snap-in. Add the Finance Admins group to the Managed by tab of the Finance OU. B. Use the Delegation of Control wizard to assign permissions to the Finance OU. C. Enable the Users, Groups and Computers as Containers option in the view menu of the Active Directory Users and Answer: ComputersB Question: 127 snap-in. Add the Finance Admins for Company.com. The network contains the server that runsMicrosoft Windows You are the network administrator group to the Finance OU container. NT Server 4.0. D. Log in to the network by using a user account that has Domain Administrator permissions for the domain in which You want to migrate the server to Microsoft Windows Server 2003 Standard Edition. You nee to identify potential Finance OU is hardware and A. Run the winnt32/debug/4:Setuo.log command from the Microsoft Windows Server 2003 Standard Edition software migration issues. What should you? installation CDlocated. ROM. B. Run the listsvc command on the Windows NT Server 4.0 computer. C. Run the winnt32 /checkupgradeonly command from the Microsoft Windows Server 2003 Standard Edition installation CDROM. Answer: CApplication Compatibility Toolkit to check for any issues. D. Use the Question: 128 You are the network administrator for Company.com. A company has a main office with 20employees and three branch offices with 5 employees each. The branch offices are connected to the main office through WAN lines. The functional level of the domain is Windows 2003 native. In each branch office, you install a member server that runs Microsoft Windows Server 2003. A. Install You need toWINS service on each member server. B. Enable logon caching branch member authenticate to the domain regardless of the availability of the WAN link. ensure that employees in a on each office canserver. C. Make each member server a domain controller. Which three D. Install a DNS perform? each correct server. actions should you service on (Eachmember answer presents part of the solution. Choose three.) E. Install the global catalog service on each member server. Answer: C, D, E Question: 129 You are the network administrator for Contoso, Ltd. Company has a main office and one branch office. The network consists of the single Active Directory domain named contoso.com. The network contains the server that runs Microsoft Windows Small Business A. Install Microsoft Windows Small Business Server 2003 Standard will host the company web site. the server to Server 2003. You install a new server at the branch office. This server Edition on the new server. Add This server will the domain also perform as userthe domain controller. authentication. You need to ensure install an operating system on the new server..What should you? B. Install Microsoft Windows Server 2003 Standard Edition on the new server. Add the server to the domain as the domain controller. C. Install Microsoft Windows Server 2003 Web Edition on the new server.

D. Install Microsoft Windows Small Business Server 2003 Premium Edition the new server. Answer: B Question: 130 You are the network administrator for Company.com. The network contains the server that runs Microsoft Windows Small Business Server 2003 Standard Edition and Microsoft Exchange Server 2003 for messaging. You need to migrate Exchange Server 2003 and A. user data to a new Microsoft Exchange Server 2003. Install it on the new server, You also want user data this goal all Purchase a copy of server by using the minimum amount of administrative effort.and migrate all to achieve to the new server by while using the costs. What should you? minimizing Exchange Task wizard. B. Purchase a copy of Microsoft Exchange Server 2003. Install it on the new server, and migrate all user data to the new server by using the pfMigrate tool. C. Purchase the Microsoft Transition Pack. Move Microsoft Exchange Server 2003 to the new server, and migrate all user data to the new server by using the Exchange Task wizard. Answer: C D. Purchase the Microsoft Transition Pack. Move Microsoft Exchange Server 2003 to the new server, and migrate all Question: to user data 131 You are a server byconsultantpfMigrate tool. The network contains a server that runs Microsoft Windows Small the new network using the for a company. Business Server 2003 Standard Edition. You want to enable users to configure VPN clients. You configure Routing and Remote Access on the server A. Run VPN connections. wizard on the server. Instruct users their own VPN Remote Web Workplace. to enablethe Remote Access You need to enable users to establishto connect to theconnection.You need to achieve this B. Create a by using the remote connection disk. Run the disk on the server and push the settings to client computers that need to connect amount of administrative effort. What should you do? minimumto the VPN. Update the disk with the VPN configuration asneeded. C. Create a script file that has the required settings for client computers. Run this script on the server and push the settings to Answer: A client computers that require a VPN connection. D. Create a script file that has the required settings for client computers. Run this script on client computers that require a VPN connection.

1 / sau Consider the statements: Statement A: The BSD interface provides a freeware tool that helps to handle the network load. This is Achieved by using the robust network services provides rng BSD interface through one of its distribution. Statement B: The System V Interface is a command-line interface that lc you to use the print services. Which of the sau is true, with Respect to the above statements? a. Statement A statement is true and B is false. b. Statement A statement is false and B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c 2 / While Configuring a NIS client you need to configure the ypbind service. Which of the theo files you will modify to Perform this task? a. / Etc / passwd b. / Etc / sysconfig / network c. / Etc / yp.conf d. / Etc / nsswitch.conf Correct Answer: -> c 3 / Consider the statements: Statement A: The range of IP addresses c be Assigned to a computer are known as a dotted quad notation. Statement B: The number of octets that represent the network ID and host ID in the IP addresses varies with the size of the network. Which of the sau is true, with Respect to the above statements? a. Statement A statement is true and B is false. b. Statement A statement is false and B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b 4 / Steve Irvin is working as system administrator at Mountain Marketing Inc. He needs to assign dynamic IP addresses to all the computers in the organization. For this, he Decides to configure eth1 as the DHCP client. The DHCP server is already present on the network and the host name is Mountain Marketing. How nn Steve Proceed to perform the task?

a. After setting the value of the networking parameter equal to yes in the / etc / sysconfig / network file, he needs to edit the contents of the / etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE = eth1 Onboot = no

BOOTPROTO = dhcp b. After setting the value of the networking parameter equal to yes in the / etc / sysconfig / network file, he needs to edit the contents of the / etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE = eth1 Onboot = yes BOOTPROTO = dhcp c. After setting the value of the networking parameter equal to it in the / etc / sysconfig / network file, he needs to edit the contents of the / etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE = eth1 Onboot = yes BOOTPROTO = dhcp d. After setting the value of the networking parameter equal to it in the / etc / sysconfig / network file, he needs to edit the contents of the / etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE = eth1 Onboot = no BOOTPROTO = dhcp Correct Answer: -> b 5 / Pat Wilkins is working as system administrator at Global Systems Inc. Donna is working as software developer with the company. She needs to Develop some applications on the Linux platform using Qt 3 and GTK + 2 graphical toolkits. Therefore, Donna Pat needs to add fonts to her system. She wants the font to be added for gotten that chng smooth-edged. How will Pat perform the given task? a. To add the fonts, sau Pat needs to perform the steps: Copy the new fonts to the directory, / usr / share / fonts / local. Run the command for updating the sau font information cache: # Fc-cache / usr / share / fonts / local b. To add the fonts, sau Pat needs to perform the steps: Copy the new fonts to the directory. Fonts /, present in the user's home directory. Run the command for updating the sau font information cache: # Fc-cache / usr / share / fonts / local c. To add the fonts, sau Pat needs to perform the steps: Copy the new fonts to the Fontconfig configuration file. Run the command for updating the sau font information cache: # Fc-cache / usr / share / fonts / local d. To add the fonts, sau Pat needs to perform the steps: Copy the new fonts to the XFree86 configuration file.

Run the command for updating the sau font information cache: # Fc-cache / usr / share / fonts / local Correct Answer: -> b 6 / AB Corp. is an advertising company, working on Linux platform m. Steve, the system administrator, Creates a directory, / extrauser. After creating this directory, Steve needs to create a user named john in the / extrauser directory. Which command nn Steve use to perform the above task? a. useradd-d / extrauser john b. useradd-f / extrauser john c. useradd-g / extrauser john d. useradd-c / extrauser john Correct Answer: -> a 7 / Steve Irving is the system administrator in Mastery Mechanics. He needs to install a Linux server on the network of the organization. He is required to attach a printer cng to the Linux server real number all the employees of various departments can share the network printer. For this, Steve needs to install Linux on a computer and configure it as a print server using the CUPS daemon. Tuy nhin, one week after some of the employees start complaining to Steve that They are not Able to access the printer. The employees cng They report that when try to access the printer from remote Linux system h They receive an error message, m rng permission to access states the printer is denied. What could be the problem and how nn Steve resolve it? a. Modify the server configuration file / etc / cups / cupsd.conf, m contains the information required to access the printer. b. Modify the server configuration file / etc / cups / printers.conf, m contains the information required to access the printer. c. Modify the server configuration file / etc / cups / classes.conf, m contains the information required to access the printer. d. Modify the server configuration file / etc / cups / client.conf, m contains the information required to access the printer. Correct Answer: -> a 8 / Which of the sau command performs the same task as the mkfs.ext3 / dev/hdc8 command? a. mke2fs-l / dev/hdc8 b. mke2fs-j / dev/hdc8 c. ext3 mkfs-c / dev/hdc8 d. mke2fs-i / dev/hdc8 Correct Answer: -> b 9 / You are working as system administrator at Red Sky IT Systems. The organization has Windows installed on the network server. You have been Assigned the task of installing Linux on all the computers in the network. Which type of installation method can you use to install Linux in the given scenario? a. Use an FTP Server b. Use an NFS Server

c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> a 10 / Mike Womack is working as a project manager with Smart Software Developers. The network setup of the organization is based on Linux. The organization has a remote server, where the employees h save files. Don Allen, the system administrator of the organization has created user accounts for all the employees of the organization. Mike is working on a project and Creates a file, teamproject.txt. Mike wants to assign read permissions to all the other users, for the file, teamproject.txt. Tuy nhin, Mike wants to remove all the permissions from the other users, for any other actual files Creates Summer. Also Mike wants to read and write Assign the permissions to His team members, who are working in His project, for all the files that he will create.Which set of commands will enable Mike Womack to set the file access permissions theo His requirement? a. chmod a + r teamproject.txt umask 037 b. chmod a + r teamproject.txt umask 017 c. chmod o + r teamproject.txt umask 017 d. chmod o + r teamproject.txt umask 037 Correct Answer: -> c 11 / Ken Burton, the system administrator at Global Systems Inc. has joined the organization after a long leave. During the leave period, Bill was using Ken's computer. Bill had thay th the hard disk of Ken's computer with a new hard disk for personal use. Ken had installed GRUB on the network server in order to boot the Linux operating system. His computer while booting, Ken receives an error at Stage 1 of the loading process and the booting process stops. Which of the sau error has caused the booting process to stop? a. Floppy Error b. Hard Disk Error c. Geom Error d. Read Error Correct Answer: -> c 12 / The software department at Supersoft2000 requires Windows 2000 platform to Develop software. Chris, the system administrator wants to install the Windows 2000 Server on one of the six partitions of an existing Linux server. To install Windows 2000 Server on this partition, Chris Deletes this partition.Tuy nhin, he does not delete the entry of this partition in the / etc / fstab file and Restarts the computer. The error message is displayed sau: checking file systems fsck.ext3/dev/hdc6: The superblock could not be read or does not describe a correct ext2 filesystem. If the device is valid and it really contains an ext2 filesystem (and not swap or ufs or something else), then the superblock is corrupt, and you might try running e2fsck with an alternate superblock:

e2fsck-b 8193 <device> : Bad magic number in super-block while Trying to open / dev/hdc6 [FAILED] *** An error occurred during three days the file system check. *** Dropping you to a shell; the system will reboot *** When you leave the shell. Give root password for maintenance (Or type Control-D to Continue): Chris How can troubleshoot the problem? a. Start the system in the rescue mode and delete the entry of the deleted partition in the / etc / fstab file. b. Start the system in the single-user mode and change the root password. c. Start the system in the single-user mode and delete the entry of the deleted partition in the / etc / fstab file. d. Start the system in the rescue mode and change the root password. Correct Answer: -> a 13 / What is the configuration requirements of the enterprise desktops used for financial services a. Following are the configuration requirements of the desktops used in Call Centres and Help Desks: Thin-client computers Voice Over IP integration Computer telephony integration b. Following are the configuration requirements of the desktops used in banks and help Desks: High storage High security requirement c. Following are the configuration requirements of the desktops used in banks and help Desks: Thick client computers Office applications Superior quality printing device d. Following are the configuration requirements of the desktops used in banks and help Desks: High storage capacity Fast processing Capabilities Correct Answer: -> b 14 / Tom Davidson is working, as a system administrator at Mountain Marketing Inc. Tom has been Assigned the task of sending the first printing for high priority jobs. Which command will execute to perform the task Tom? a. lpc

b. lpstat c. lp d. lpadmin Correct Answer: -> c 15 / Steve is a system administrator at Deez Inc. He needs to load a module into the kernel. He wants to ch cng That A kernel module name nn explicitly provided in the command. Which option of the insmod command will use to perform the task Steve? a. insmod-o b. insmod-s c. insmod-p d. insmod-f Correct Answer: -> a 16 / Jim Lewis, the system administrator at Deez Inc., has installed Linux on a computer. Jim wants to collect the information about the parameters passed to the kernel That Are During the start up of the kernel. Which file in the / proc / directory of should Jim use to Perform this task? a. / Proc / apm b. / Proc / cmdline c. / Proc / cpuinfo d. / Proc / dma Correct Answer: -> b 17 / You are the system administrator at Deez Inc. You need to transfer the data from a source computer to the destination over a computer network over another network. For this, packet routing is required from one network to the other. Which feature of the Linux kernel of should you use for the above task? a. Router b. Routing table c. Default route d. IP forwarding Correct Answer: -> d 18 / Pat configures the dhcpcd daemon and starts His computer. He notices rng IP address to His computer is not Assigned. Pat verifies dhcpcd daemon is running rng. Which command Pat nn use for the IP address assignment? a. Pat needs to execute the ifconfig command. b. Pat needs to execute the dhcpcd command with the-f option. c. Pat needs to check all the DHCP servers on the network d. Pat needs to execute the route command. Correct Answer: -> b

19 / Steve Irvin is working as system administrator at Super Software2002. The domain administrator of the organization wants Steve to nhp fonts to the X clients. He wants Steve to add fonts cng word such that by not nhp chng support for advanced anti-aliasing feature. Identify the correct sequence of steps that Steve needs to accomplish the given task to Perform? a. To add fonts, Steve needs to perform the sau steps: Create a directory, / usr / share / fonts / local /, if it does not already exist. Change to the / usr / share / fonts / local directory. Update the font information of the system. Copy the new font files to the / usr / share / fonts / local directory. Execute the command to add the chkfontpath directory, / usr / share / fonts / local / to the xfs FontPath directory as root. Restart XFS compared rng X clients can use the new fonts. b. To add fonts, Steve needs to perform the sau steps: Create a directory, / usr / share / fonts / local /, if it does not already exist. Add the directory created in the first step to the xfs FontPath directory as root. Copy the new font files to the / usr / share / fonts / local directory. Update the font information of the system. Change to the / usr / share / fonts / local directory. Restart XFS compared rng X clients can use the new fonts. c. To add fonts, Steve needs to perform the sau steps: Create a directory, / usr / share / fonts / local /, if it does not already exist. Copy the new font files to the / usr / share / fonts / local directory. Change to the / usr / share / fonts / local directory. Update the font information of the system. Execute the command to add the chkfontpath directory, / usr / share / fonts / local / to the xfs FontPath directory as root. Restart XFS compared rng X clients can use the new fonts. d. To add fonts, Steve needs to perform the sau steps: Create a directory, / usr / share / fonts / local /, if it does not already exist. Add the directory created in the first step to the xfs FontPath directory as root. Change to the / usr / share / fonts / local directory. Copy the new font files to the / usr / share / fonts / local directory. Update the font information of the system. Restart XFS compared rng X clients can use the new fonts.

Correct Answer: -> c 20 / Steve is working as a system administrator at the Smart Software Developers. The company has 50 client computers and one Linux server on the network. Steve regularly updates the Linux server by installing Linux patches. He checks the boot directory each time, to Obtain the kernel information and to make sure rng patches are compatible with the Linux kernel version. To avoid searching the directory for obtaining the kernel boot information, Steve wants to display this information at the login prompt. How Steve of should display the information on the login prompt? a. Edit the rc.sysinit file to reflect the kernel information at the login prompt b. Edit the kernel rc.serial to reflect the information at the login prompt c. Edit the rc.local to reflect the kernel information at the login prompt d. Edit the kernel rc.news to reflect the information at the login prompt Correct Answer: -> c 21 / Jim Lewis, a system administrator at Deez Inc. is working on Linux platform. All the employees of the application development department are working on critical projects. Therefore, regular backups is required to save the data of the developers. Jim is Assigned the task of taking weekly backups of data.After taking the backup of files, Jim wants to display the list of files, m have been backed up. Which of the sau execute command to display the Jim nn list of files? a. Execute the tar-x command b. Execute the command tar-c c. Execute the command tar-v d. Execute the command tar-p Correct Answer: -> c 22 / Steve installs kernel of version 2.2 on His Computer. After the installation, he notices That One of the devices is not supported by this version of the kernel. Steve upgrades the kernel from version 2.2 to 2.4 to get support for that device. Tuy nhin, after installation of the kernel of version 2.d. Steve is unable reboot the computer. Why is not Jim Able to boot the computer and how of should he solve the problem? a. The kernel of version 2.4 has not overwritten the kernel of version 2.2. Jim needs to boot the system in the single-user mode by using a floppy disk or a CD-ROM to resolve the problem. b. The kernel of version 2.4 has not overwritten the kernel of version 2.b. but it is copied in the / root directory. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem. c. The kernel of version 2.4 has overwritten the kernel of version 2.2 and the boot loader configuration file is not updated accordingly. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem. d. The kernel of version 2.4 has not overwritten the kernel of version 2.2 and the newly compiled kernel, bzImage, is copied in the / boot directory and the boot loader configuration file is updated accordingly. Jim needs to boot the system in the multiuser mode by using a floppy disk or a CD-ROM to resolve the problem. Correct Answer: -> c 23 / Jim Lewis wants to create a filesystem other real number he can access from a remote computer containing filesystems Linux operating system. Which type of filesystem create nn Jim?

a. ReiserFS b. Journaled File System c. NFS d. Smbfs Correct Answer: -> c 24 / Steve Irving is working as a system administrator at Super Graphics. A new user, Michael joins as a software developer Super Graphics. Steve needs to share a filesystem to enable Michael to access data from His computer. Steve has to opt for the type of filesystem, which-would enable Michael to access the filesystem from a remote computer running on Windows NT Server operating system. Which type of filesystem can create Steve? a. Smbfs b. NFS c. JFS d. ReiserFS Correct Answer: -> a 25 / David Johnson is working as a system administrator with Super Graphics. The employees of the organization OpenOffice.Draw use graphical package of Linux to create designs. Jerry Smith, working as an audio-visual expert observes that His computer does not Produce good quality sound. Therefore, she asks David to change the soundcard of her computer. David Inserts a new sound card on Jerry's computer and downloads the module for the sound card, through the Internet from the vendor's Web site. Now, David wants to install the module for the sound card in the kernel of Jerry's computer. Tuy nhin, David wants to load the module for the sound card in the kernel 'even if the current kernel version installed in the computer and the version of the kernel module is created for m are not the same. Which command nn David use to perform the given task? a. insmod-o [module_name] b. insmod-s [module_name] c. insmod-f [module_name] d. insmod-p [module_name] Correct Answer: -> c 26 / John requires some data from a file stored in a directory on a floppy disk. His computer has Linux operating system. After finishing His work, John unmounts the floppy disk. For this, he executes the umount command as shown below: # Umount / dev/fd0 Tuy nhin, the system displays an error message, "Device is busy". Which of the sau steps will help Identify and solve the problem John? a. Quyt the current directory. If the current directory is located on the floppy disk, change to a directory That is not located on the floppy disk. Unmount the floppy disk b. Quyt the current directory. Execute the rm-r command to delete the directory on the floppy. Unmount the floppy disk c. Quyt the current directory. Delete the file on the floppy. Unmount the floppy disk. d. Quyt the current directory. Execute the rm - r command to delete the directory on the floppy. Unmount the floppy

disk Correct Answer: -> a 27 / Debbie Howe, an employee of SuperGraphics needs to access the file containing the daily schedule information of the project he is working on m. This file is located on the computer of Ken Bruton, the team leader at the company. Ken had the dual operating system, Windows 2000 and Linux installed on His Computer. The file was created on Windows 2000. As the Windows 2000 Server has crashed on Ken's computer, he boots the computer using Linux. Ken tries to mount the file from Windows 2000 to Linux using the mount command. The system generates an error displaying, 'Virtual File Allocation Table (VFAT) file system is not supported'. Ken informs the system administrator about the problem. What could be the cause of the error? a. Ken does not have the read permissions for the files, which-he wants to access. b. Linux does not have the Necessary modules required to support the Windows filesystems. c. The actual files th access is Ken is not exported by the system in which-it is stored. d. Another filesystem is mounted on the same mount point as that of the filesystem, m Ken wants to access. Correct Answer: -> b 28 / You are working as a system administrator at Global Systems Inc. You need to create an alternate hierarchy file in the / etc / sysconfig / networking directory on the server, using ISDN network interface m. Which command will you run to Perform this task? a. ifconfig b. neat c. mii-tool d. netconfig Correct Answer: -> b 29 / Chris is working as an assistant system administrator at Multi Store Inc. Chris finds that Sendmail and IMAP services are not functioning properly. Which of the theo log files of should check to find out Chris That Are the errors logged? a. Check the entries in the / var / log / message log file. b. Check the entries in the / var / log / maillog log file. c. Check the entries in the / var / log / htpd log file. d. Check the entries in the / var / log / samba log file. Correct Answer: -> b 30 / Which of the theo files contain the information about the system currently in use That is memory? a. / System / meminfo b. / Proc / memoryinfo c. / Proc / cpuinfo d. / Proc / meminfo Correct Answer: -> d

31 / Pat Greene is working as system administrator at Safest Software Inc. Pat is required to monitor the systems of the company to Administer the network resources efficiently in the Linux environment. For this, Pat needs information about the processes, memory, paging, block IO, traps, and CPU activity of the computers. In addition, he needs to display an updated cng report on the virtual memory statistics. How accomplish the given task nn Pat? a. He needs to run the command sau: # Vmstat <delay> b. He needs to run the command sau: # Iostat-v c. He needs to run the command sau: # Iostat-d d. He needs to run the command sau: # Vmstat-n Correct Answer: -> a 32 / Ken Burton is working as system administrator at indestructible Boxes Inc. Peter, an employee of the company complains to Ken about the slow processing speed of the His computer. For this, Ken Decides to create a swap space named / dev/hdc9 On His Computer to Increase the amount of RAM available. After creating and Activating the swap space, Ken Restarts the computer. Ken notices that processing speed of the computer has still not Increased. What Ken task of should solve the given problem to Perform? a. Ken needs to edit the / etc / fstab file, and add the entry to activate the sau swap space, as follows: / Dev/hdc9 swap swap defaults 00

b. Ken needs to edit the / Etc / fstab file, and the sau entry to activate the swap space, as follows: / Dev/hdc9 swap ext3 defaults 00

c. Ken needs to edit the / Etc / fstab file, and add the entry to activate the sau swap space, as follows: / Dev/hdc9 swap ext3 defaults 11

d. Ken needs to edit the / Etc / fstab file, and add the entry to activate the sau swap space, as follows: / Dev/hdc9 swap swap defaults 11

Correct Answer: -> a 33 / Steve is working as a system administrator at Smart Software Developers. The company has 50 client computers and one Linux server on the network.The company has opened a new branch at Houston for the Finance department. The management asks Steve to create a file system that prevents the data loss in case of a power failure or a system breakdown. Therefore, the ext3 filesystem on Steve Creates the / dev/hdc8 partition of the Linux server. After a few months, Steve Decides to resize the partition due to some disk space constraints. Steve uses the resize2fs to resize the disk partition utility. Tuy nhin, Steve fails to resize the partition. What could be the cause of the problem? a. Steve has not updated the / etc / fstab file to change the ext3 filesystem to the ext2 filesystem. b. The ext3 filesystem can not be converted into ext2 filesystem resize2fs utility so can not be used. c. The tune2fs command only supports ext3 to resize the partition. d. The ext3 file system does not support the resize2fs utility disk.

Correct Answer: -> d 34 / Debbie Howe is working as a system administrator with True Travel Services. The organization uses a network printer across all departments. Tuy nhin, recently the printer is not working properly. Debbie has been communicated reports that on accessing the printer, it displays an error message: bash: / dev/lp0: Permission denied. How nn Debbie troubleshoot the problem? a. Debbie needs to nhp access control to enable the users of the remote hosts to print to the printer by performing the sau steps: Open the / etc / hosts file. Add the IP addresses of the remote hosts. Stop and restart the print service. b. Debbie needs to nhp access control to enable the users of the remote hosts to print to the printer by performing the sau steps: Open the / etc / host.deny file. Add the IP addresses of the remote hosts. Stop and restart the print service. c. Debbie needs to nhp access control to enable the users of the remote hosts to print to the printer by performing the sau steps: Open the / etc / printcap file. Add the IP addresses of the remote hosts. Stop and restart the print service. d. Debbie needs to nhp access control to enable the users of the remote hosts to print to the printer by performing the sau steps: Open the / etc / hosts.equiv file. Add the IP addresses of the remote hosts. Stop and restart the print service. Correct Answer: -> d 35 / Tom Wilkins is the system administrator at Red Sky IT h thng business uses Linux for all Unlock. Tom has implemented a Linux based LAN in the organization and has installed a print server on the LAN. He has installed the lprng cng service on the print server. The employees of all the departments use the print server to print documents h. They submit print jobs using the lpr h command. Tuy nhin, the employees complain of the Accounts department is taking rng printer a long time to print the documents. The employees request Tom to restrict the print commands given by the other departments until the Accounts have been printed documents. How nn Tom resolve the problem? a. Execute the command lpc-disable. b. Edit the / etc / lpd.conf file. c. Execute the lpc - abort command d. Edit the / etc / printcap file.

Correct Answer: -> c 36 / Steve is Assigned the task of installing Linux on a computer on Windows 98 is already installed m. He does not have the bootable Linux CD-ROM.Which type of installation method to install Linux would prefer Steve? a. Use an FTP Server b. Use the Hard Drive c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> b 37 / John is recently recruited as a software developer in Smart Software Developers. He has been Assigned the task of Developing an accounting application. For this, John requires accounting software package for His computer. Chris, the system administrator at Smart Software Developers, has been Assigned the task for installing the software on Chris's computer. For this, Chris wants information about the directory that contains initialization scripts related to the installed software packages. Which directory will use Chris to Perform this task? a. / Etc / profile.d b. / Etc / bashrc c. ~ /. Bash_profile d. / Etc / profile Correct Answer: -> a

38 / Jim Lewis is working as a system administrator with New Tech Books. The network setup of the organization is based on Linux. Jim has recently installed and configured a Linux server at a remote location. Also He has created user accounts for all the employees of the organization on the remote server. Diane Frye, the head of the Sales department is creating the Annual report of the sales organization. Diane has created a folder, Sales_Report, in her home directory and placed all the files related to the Annual report of the sales organization in that folder. Diane has cng gn all the access permissions to the files that she has created and asked the members of her department to access the files from the Sales_Report folder. After one week, Diane finds that someone has removed some files from the Sales_Report folder. Tuy nhin, Diane does not want to change the access permissions on the files. Therefore, Diane reports the matter to Jim and asks Jim to set word such permissions on the folder Sales_Report real number except her no other users or system administrator, can remove any files from the folder. What should Jim due to perform the task? a. Set the setuid bit permissions on the directory by using the command Sales_Report, chown u + s Sales_Report. b. Enable sticky bit permission on the directory by using the command Sales_Report, chmod + t Sales_Report. c. Setgid bit set permissions on the directory by using the command Sales_Report, chown g + s Sales_Report. d. Remove the setuid bit permissions on the directory by using the command Sales_Report, chmod u-s Sales_Report. Correct Answer: -> b 39 / Tom Wilkins works as a network administrator at Supersoft2000. The employees of the organization use the Linux platform to work on h projects. Tom installs DHCP server on the network to assign IP addresses to the client computers. Jim Lewis, an employee of Supersoft2000 needs to check the IP addresses to His gn computer. For this, Jim executes the ifconfig command. Tuy nhin, the command does not show the IP addresses of His computer. Jim informs Tom about the problem and asks him to resolve it. How can Tom troubleshoot the problem? a. Configure the / etc / dhcpd.conf file and restart dhcpcd daemon.

b. Execute the command, route add-host dev eth0 255 255 255 255 c. Execute the dhcpcd command with the-f option. d. Check all the DHCP servers on the network, Microsoft Windows DHCP server gm any that might have gn the IP addresses to Jim's computers. Correct Answer: -> a 40 / Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that requires organization at every level of business servers to implement IT infrastructure operations. Therefore, the task of organization planning gn Corrine server solutions for business operations, caching v.d. services and proxy services. The organization asks Corrine cng to plan server solutions for domain naming, directory, firewall and security services. In addition, the organization asks Corrine to effectively implement servers c nhp services to end users in spite of the heavy load on it. Which servers need to implement Corrine to perform the task? a. Corrine needs to implement web servers and infrastructure. In addition, Corrine needs to implement high-end servers, OLTP v.d. Med and BI servers. b. Corrine needs to implement workgroup and infrastructure servers. c. Corrine needs to implement web and workgroup servers. d. Corrine needs to implement web and infrastructure servers. Correct Answer: -> a

41/ Pat Wilkins is working as an assistant system administrator at New Tech Bookstore. Pat wants to check whether IP forwarding is disabled or enabled on the Linux server. Which command will Pat execute to perform the given task? a. # ls /proc/sys/net/ipv4 b. # vi /etc/sysctl.conf c. # echo "1" > /proc/sys/net/ipv4/ip_forward d. # cat /proc/sys/net/ipv4/ip_forward Correct Answer: -> d 42/ Lee is a system administrator at Countrywide Markets. John a software developer wants a package to be installed on his computer. John asks Lee to install the required package on his computer. However, when Lee starts installing the package, the system displays a message that the package is already installed. Which command can Lee use to upgrade the package? a. rpm -e b. rpm -h c. rpm -I d. rpm -F Correct Answer: -> d 43/ Bob is working, as an assistant system administrator at Global Systems Inc. Bob wants to invoke the services that a kernel provides for various processes running on a computer, such as reading the contents of a file. Which kernel module, Bob should use to perform the above task?

a. Device driver b. System call c. Network Driver d. Executable Interpreter Correct Answer: -> b 44/ Larry Williams is working as network administrator at Smart Software Developers. Recently, the organization has been facing frequent power failures. To protect the data, the domain administrator of the organization wants Larry to backups all the servers of the company daily at 6:00 PM The domain administrator wants Larry to automate the process. How should Larry automate the process of backing up? a. Use /etc/at.allow configuration file b. Use /etc/crontab file configuration file c. Use /etc/cron.daily configuration file d. Use /etc/at.deny files configuration file Correct Answer: -> b 45/ Donna Johnson is working as system administrator at New Tech Books. The employees of the New Tech Books have the ext2 filesystem implemented on the partition /dev/hdc8 on their systems. They need to access NFS server for sharing and storing their data. However, NFS server has the ext3 filesystem configured on it. Therefore, Steve needs to make the ext2 filesystem compatible with the ext3 fileystem. How should Donna troubleshoot the given problem? a. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: A. Two. 3. # /sbin/tune2fs -j /dev/hdc8 ( # /sbin/e2fsck -y /dev/hdc8 ( Mount the ext3 filesystem if there are no errors by using _ # mount t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ restarted. automount the filesystem after the system is the following command:

b. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: A. Two. 3. # /sbin/e2fsck -y /dev/hdc8 ( # /sbin/tune2fs -j /dev/hdc8 ( Mount the ext3 filesystem if there are no errors by using _ # mount t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ restarted. automount the filesystem after the system is the following command:

c. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: A. Two. # /sbin/e2fsck -y /dev/hdc8 ( # /sbin/tune2fs -j /dev/hdc8 ( automount the filesystem after the system is

3. Update the filesystem type option in the /etc/fstab file to _

restarted. 4. Log on as the root user and mount the partition, which _ # mount /dev/hdc8 ( d. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: A. # /sbin/e2fsck -y /dev/hdc8 ( Two. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ restarted. 4. Log on as the root user and unmount the partition, which _ # umount /dev/hdc8 ( Correct Answer: -> a 46/ Safest Software Inc. is a leading software export organization that has opened a new branch office at Singapore to expand their business in Asia Pacific. The branch office has 150 client computers and three servers on their network based on Linux operating system. Steve is appointed as a system administrator at the branch office. All the clients are working in the desired runlevel to support the applications used by the organization. The organization has to export software that requires the multimedia-enabled computers. The software needs to be tested on Linux computers before exporting it. John, a testing engineer is assigned the task of testing the multimedia application, but he is unable to open that application. John asks Steve to solve the problem. How should Steve solve the problem? a. Steve should set the default runlevel to 1 to start the Linux server in graphical mode. b. Steve should set the default runlevel to 5 to start the Linux server in graphical mode. c. Steve should set the default runlevel to 6 to start the Linux server in graphical mode. d. Steve should set the default runlevel to 4 to start the Linux server in graphical mode. Correct Answer: -> b 47/ Christine Turner needs to send an important file to Mary Peterson, who is working at the head office. For this, the system administrator needs to configure a route so that the file can be transferred to Mary's computer, with the IP address 192.165.0.150 However, on executing the command, the computer displays an error stating gbroadcast: Unknown host. How should the system administrator troubleshoot the error? a. The system administrator needs to add the name of the host in the /etc/hosts file: 192.168.0.130 gbroadcast Next, Christine needs to execute the following command: # route add net gbroadcast dev eth0 b. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 gbroadcast Next, Christine needs to execute the following command: # route add net gbroadcast dev eth0 automount the filesystem after the system is contains the ext2 filesystem as follows: contains the ext2 filesystem as follows:

c. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 broadcast Next, Christine needs to execute the following command: # route add host gbroadcast dev eth0 d. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 gbroadcast Next, Christine needs to execute the following command again: # route add host gbroadcast dev eth0 ( Correct Answer: -> d 48/ Jim Lewis is the system administrator with Desktop Computers. He has configured a Linux based LAN in the organization and has installed a print server on the network. Jim has configured both LPRng and CUPS services on the print server to manage multiple packages that provide the same service. He needs to add a group of alternatives to the system and specify the name of a master link. For this, Jim executes the alternatives link --set command, and observes that the command is not working. What could be the problem and what should Jim do to resolve the problem? a. The set option is used only to set alternatives and its links. Jim needs to execute the alternatives name --install command to perform the required tasks. b. The set option is used only to set alternatives and its links. Jim needs to execute the alternatives link --install command to perform the required tasks. c. The link option is incorrect. Jim needs to execute the alternatives name set command to perform the required tasks. d. The specified command is incorrect. Jim needs to execute the alternatives name --display command to perform the required tasks. Correct Answer: -> a 49/ Pat Greene is working as a system administrator at IBG Inc. Pat has created a partition in his system to develop and save the application. The maximum file size of 2 GB is sufficient for Pat to perform his work. The filesystem that he will be using, stores the state of the filesystem in the superblock, and uses this state to verify whether the filesystem contains any errors. Pat needs journaling feature in the filesystem to ensure no data is lost due to system failure. Therefore, Pat wants to create the filesystem that supports the above features. Which filesystem can Pat use to develop the application? a. ext2Fs b. ext3 c. JFS d. SMBFS Correct Answer: -> b 50/ Smart Solutions Corp is recruiting new employees to expand their customer base. A new employee, Michael joins the organization and is assigned a project that was earlier being handled by Susan. Steve, the system administrator, has changed the ownership of files that contains the required information and set the particular option so that no error message is displayed, if the specified file does not exist at user end. Which command should Steve use for the task?

a. chown R b. chown -f c. chown -v d. chown -c Correct Answer: -> b 51/ Martina is working as a system administrator in PQR Corp. Martina finds that some of the computers are displaying an error message, lp: error no default destination available, while giving the command for printing the documents. Which task should Martina perform to troubleshoot this problem? a. Remove the paper that is stuck in the printer. b. Insert fresh paper in the tray. c. Switch on the power supply after checking that the plug is in the socket. d. Install and configure the printer. Correct Answer: -> d 52/ Donna Bard, a system administrator with Countryside Markets, uses Linux as the operating system. She wants to view the group ID of a customer named Mike Womack. When Donna executes the command, grep Mike Womack /etc/passwd, the system raises an error stating grep: Wall: no such file or directory before displaying the required information. How should Donna troubleshoot the problem? a. # grep 'Mike Womack' /etc/passwd b. # grep MikeWommack /etc/passwd c. # grep "Mike Womack" /etc/passwd d. # grep `Mike Womack` /etc/passwd Correct Answer: -> c 53/ Donna Bard works as a network administrator at Countryside Markets. All the employees of the organization work on Linux platform. Various DHCP servers, which assign IP addresses to the computers, are installed on the network. Donna configures the dhcpcd daemon, which broadcasts the request to the DHCP servers to get an IP address. After configuring the daemon, Donna starts her computer. However, Donna notices that the IP address is not assigned to her computer. Donna verifies whether the dhcpcd daemon is running properly or not. She finds that the dhcpcd daemon is running fine. How can Donna troubleshoot the problem? a. Execute the command: route add host 255.255.255.255 dev eth0 b. Check whether the information in the /etc/dhcpd.conf file is correct. c. Execute the dhcpcd command with the r option. d. Execute the dhcpcd command with the f option. Correct Answer: -> d

54/ Nancy Jones is working as a system administrator with Red Sky IT Systems. The network setup of the organization is based on Linux. All employees of the organization save data in their respective home directory on the Linux server. The management of the organization has assigned Nancy the task of taking the backup. Therefore, Nancy configures a central backup server with multiple backup tape drives. Nancy also wants to create the backup from all the disks

listed in the disklist file in the backup server using a single command. In addition, Nancy wants the backup server to send an e-mail message reporting the files that failed to be backed up and the files that were successfully backed up after creating the backup. Which backup utility should Nancy implement to perform the required task? a. Nancy should use the Amanda utility. b. Nancy should use the Veritas utility. c. Nancy should use the dump/restore utilities. d. Nancy should use the cpio utility. Correct Answer: -> a 55/ Donna is an in-house network administrator at Multi Marketing Inc. Donna needs to store the print queue definitions manually, instead of using the redhat-config-printer tool. Which configuration file will Donna use to perform this task? a. /etc/printcap b. /etc/lpd.conf c. /etc/lpd.perms d. /etc/printcap.local Correct Answer: -> d 56/ Consider the following statements: Statement A: You can assign more then one IP address to an NIC. Statement B: You need to create a new configuration file for each NIC that is installed on your computer. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c 57/ Consider the statements: Statement A: The passwords should be easy to decipher. Statement B: The passwords should be of adequate length. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b

58/ You are the assistant system administrator at Deez Inc. and are required to set a default printer, HP DeskJet on the Sales Manager's computer. The printer should be configured to queue the print jobs. Which command should you use for the above task? a. lpadmin b. lpstat c. lp d. lpr Correct Answer: -> a 59/ Peter Irvin is the domain administrator at Mountain Marketing Inc. He has scheduled tasks such as, executing scripts, backing up data and executing the echo command on his computer, such that they are performed automatically at different timings in a day. During the day, how should Peter view the list of the jobs that are yet to be executed? a. atq command b. at command c. cron command d. atrm command Correct Answer: -> a 60/ Larry Williams is working as domain administrator at Technology Systems. To automate the installation process, Larry has installed Linux on his computer with the help of the kickstart file. Larry needs to install three group packages ServerSystem, WindowsSystem, and WindowsSoftware and two individual packages ClientSystem and MasterSystem on his computer. How should Larry perform the task? a. Larry needs to make the following entries in the kickstart file: ### Package Installation %package @ServerSystem @WindowsSystem @WindowsSoftware ClientSystem MasterSystem b. Larry needs to make the following entries in the kickstart file: ### Package Installation %package @ ServerSystem WindowsSystem WindowsSoftware ClientSystem

MasterSystem c. He needs to make the following entries in the kickstart file: ### Package Installation %package @ ClientSystem @ MasterSystem ServerSystem WindowsSystem WindowsSoftware d. He needs to make the following entries in the kickstart file: ### Package Installation %package @ ServerSystem @ WindowsSystem @ WindowsSoftware ClientSystem MasterSystem Correct Answer: -> d

61/ Steve Irving is working as the system administrator at Global Systems Inc., which uses Linux for all business purposes. The organization is working on a project, which requires the team leaders to frequently communicate with each other and with the client. The e-mail utility is not supported efficiently by the existing operating system. Therefore, the management has asked Steve to upgrade the operating system installed on the computers of all the team leaders. Steve has decided to perform this task automatically using a kickstart file. Steve logs on to Jim, a team leader's system and executes the command cp anaconda ks.cfg ks.cfg to create a kickstart file. However, the command is not working. What is the problem and how can Steve solve it? a. The specified root directory is incorrect. Steve should use the name, ethereal, as the root directory. b. The kickstart command can be created only by a root user. Steve needs to log on as the root user and execute the specified command. c. The command executed is incorrect. Steve needs to use the Kickstart Configurator utility to create the kickstart file. d. The order of specifying the kickstart sections is incorrect. The order of kickstart sections should be command, %pre, %package, and %post. Correct Answer: -> b 62/ The project team of the Software Development department is not able to save their work on the server. When they try to save their work on the server, it shows an error message that there is no space on the hard disk. Therefore, David, the system administrator resizes a partition on the hard disk of the server, which has been allocated for user data. After resizing the partition, when David tries to boot the server he finds that the boot partition fails to mount the boot partition.

What is the reason that the boot partition, on the server, fails to mount the boot partition and how should David resolve the error? a. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the single-user mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. b. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the emergency mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. c. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to reboot the system in a runlevel and change the entry corresponding to the path of the / partition in the /etc/fstab file. d. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to boot the system in the rescue mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. Correct Answer: -> d 63/ Steve is the system administrator with Red Sky IT Systems. The management of the organization has assigned Steve the task of providing print service to some of the employees of the organization. The employees of the IT department and the Accounts department, at Red Sky IT Systems, want to install printers, locally. Steve decides to install the various printers and configure them using the CUPS daemon to fulfill the requirements of both the departments. Steve also wants to record the information about all the local available printers in both the departments and the new jobs given to the printers. How can Steve perform these tasks? a. Steve can record the information by using the lpstat command, editing the /etc/printcap.local file and then executing the lpadmin command. b. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/printers.conf file. c. Steve can record the information by using the lpstat command and configuring the LPRng service. d. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/cupsd.conf file. Correct Answer: -> b 64/ Consider the statements: Statement A: A parallel port sends one bit of information at a time. Statement B: A serial port sends eight bits of information at a time. Which of the following statements is correct? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> d

65/ Steve works, as a system administrator at Global Systems Inc. Steve needs to store the data of all the employees centrally at the Linux server. He also wants to ensure that no data is duplicated across the hard disks. For this, Steve decides to divide the data into strips to store the data across all the hard disks in an array. Which RAID configuration does Steve use for the preceding requirements? a. Linear RAID b. Level 0 c. Level 1 d. Level 5 Correct Answer: -> b 66/ Chris, the system administrator of the company adds a route from his computer to John's computer by executing the route add host 192.168.16.66 dev eth0 command. Chris's computer raises an error, 192.168.16.66: Unknown host. Which of the following task should Chris perform to solve this problem? a. Add the name of the host in the /etc/hosts file of the computer. b. Check all the DHCP servers in the network. c. Add the dhcpcd daemon to the boot-up script, (/etc/sysconfig/network-scripts/ifup) d. Execute the dhcpcd command with the f option. Correct Answer: -> a 67/ Ronald Billing works as a system administrator at Mastery Mechanics. The organization has installed a network printer, which is used by various systems over the network for printing the documents related to various projects. The printer is not working properly since last couple of days. Therefore, Ronald replaces the printer with a new one, configures it and starts the print service. However, when John, an employee of the organization uses the printer, a problem occurs. The printer shows a staircase effect. John informs Ronald about the problem. How can Ronald troubleshoot the problem that occurs while printing the documents? a. A. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. Two. Stop and restart the print service. b. A. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. Two. Add the IP addresses of the remote hosts. 3. Stop and restart the print service. c. A. In the printtool utility, edit printer entry and click on Select _ Two. Select the correct driver for your printer. d. A. In the printtool utility, edit printer entry and click on select _ Two. Select the Fix stair-stepping text option under the Printing _ Correct Answer: -> d 68/ Jim Wilkins is working as a storage administrator at Blue Moon Computers. Jim implements Integrated Device Electronics (IDE) to determine the physical limits of the storage scalability in the organization. However, the organization wants Jim to extend a system's local storage beyond the limitations of IDE. Which of the following Jim can implement to perform the task? a. Fibre Channelbased storage button to open the Configure Filter dialog box. Options section. button to open the Configure Filter dialog box.

b. SCSI c. iSCSI a. a and b both b. Only a c. Only b d. a and c both Correct Answer: -> d 69/ Steve Irvin is working as an IT consultant at Red Eye Experts. The organization consists of 5000 desktops running on multiple platforms, such as Linux and Windows, and connected through LAN and WAN. Steve needs to identify a tool to automate and centralize the management of desktops in the organization. He also needs to identify a tool that can implement policy-based management of desktops in the organization. Which tool should Steve select for this? a. WebTMA b. Unicenter's Desktop Management Solution c. Radmin d. PMP 6.0 Correct Answer: -> b 70/ Which of the following activity should be performed to manage VPNs in an enterprise? a. Use a secure remote syslog server to make it difficult for the malicious user to manipulate the log. b. Enforce strong authentication based on the volume of remote users and value of the resources that are being accessed. c. Use biometrics mechanisms to protect IT infrastructure from thefts or unauthorized attacks. d. Ensure that all executable files, which you receive in the organization through e-mail, are checked and approved. Correct Answer: -> b 71/ Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software 2000 is a large organization, which is spread across many countries and functions through distributed network system. Donna is getting complaints regarding performance problems in Internet, intranet, and extranet resources of the organization. Which of the following tool or solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. Observer 10.1 d. LANBrowser 1.3 Correct Answer: -> b 72/ Jim Lewis is working as a system administrator at Good Graphics Inc. Jim wants to use a multi-platform security management solution that can provide plug-in-integration between the security tool and the solution to collect the alerts. Which one of the following solution should Jim use to perform the required task? a. HP OpenView Security Management Solution

b. IBM Tivoli Security Compliance Manager c. LANBrowser 1.3 d. WebScout 2.1 Correct Answer: -> a

73/ Red Eye Systems Inc. is a software development company. The company is planning a new software development facility in Arizona. This facility will develop system software in C/C++ on UNIX platform. Because this is a new project the company does not want to invest heavily in computing resources. In addition, the development process does not require too many resource consuming tools, except for C/C++ compilers, CLI debugging and testing tools and UNIX platform. The programmers will not be allowed to share files and folders as the code will be integrated in the next step of the SDLC. Which of the following computing model would you suggest to the company as a networking consultant? a. Centralized network computing model with thin clients b. Centralized network computing model with thick clients c. Distributed network computing model with thick clients d. Collaborative network computing model Correct Answer: -> a 74/ Which of the following can be termed as necessary services? a. Services that must be available at peak load b. Services essential to operation c. Services that must be available, but can be available at reduced performance. d. Services that can be postponed indefinitely Correct Answer: -> c 75/ Consider the following statements: Statement A: Optional services are the services that must be available at peak load. Statement B: Integrity requirements of QoS maintain the definiteness of the interaction between the server and the user. Which of the following is correct? a. Both, statement A and B are true b. Statement A is true and statement B is false c. Statement A is false and statement B is true d. Both, statement A and B are false Correct Answer: -> c 76/ Donna Johnson is working as an IT consultant at Red Eye Experts. The organization needs to implement effective server solutions to increase employee productivity and reduce operating costs. Donna is assigned the task of implementing servers that can handle the services running in the HPC layer of the server deployment architecture of the organization. The organization also asks Donna to implement servers for file and printing services. Which servers Donna will implement to perform the task?

a. Donna needs to implement high-end servers, such as OLTP Med and BI servers. b. Donna needs to implement infrastructure servers. c. Donna needs to implement servers that have large memory, can store very large data sets, and can take load of high transaction volumes, such as ERP Large servers, OLTP Large servers. In addition, Donna needs to implement workgroup servers. d. Donna needs to implement high-end servers, such as HPC servers and OLTP large. Correct Answer: -> c 77/ Which of the following is caused by variations in queue length and the processing time needed to reorder packets arrived out of order due to travelling over different paths? a. Jitter b. Throughput c. Availability d. Packet loss Correct Answer: -> a 78/ Mike Womack is working as a storage administrator at Red Eye Experts. Mike is assigned the task of selecting an efficient storage technology for the organization that suits its requirements. The organization wants Mike to select a storage technology that can enable multiple users to share the same storage space thus minimizing the overall overheads by centrally managing hard disks. Which storage technology Mike should select to perform the assigned task? a. Redundant Array of Inexpensive Disks b. Tape Drives c. Storage Area Networks d. Network-Attached Storage Correct Answer: -> d 79/ Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is assigned the task of selecting an appropriate network technology in the enterprise. Larry needs to set up networks within a building of the enterprise. Therefore, Larry chooses LAN technology to be implemented in the building. Larry observes that there are too many computers, which are required to be attached to LAN. Therefore, Larry needs a technology that reduces the number of data packet collisions and can deliver up to 80 percent of the maximum bandwidth available. In addition, Larry needs to decide the physical media that have multiple pairs of wires to connect the computers and reduces network crosstalk by negating the electro-magnetic field. Which of the following combination should Larry choose to perform the required task? a. Token ring and Coaxial cables b. Ethernet and Coaxial cables c. Token ring and Twisted pair cables d. FDDI and Fiber optic cables Correct Answer: -> c 80/ Global Systems Inc. is a software development organization with its three branch offices in different parts of America. John Wilkins is working as system administrator at the head office of the organization at Los Angeles. The

employees working at the branch offices complain to John about the poor performance of the FTP server placed at the branch office at New York. To solve the problem, John needs to remotely monitor the CPU, disk, and memory usage of the server. Which tool should John implement to perform the task? a. PMP 6.0 b. Radmin c. Symantec ON iPatch d. PCDuo Enterprise Correct Answer: -> a 81/ Which of the following activity should be performed to manage internet access of an enterprise for security? a. Keep track of who has accessed information each time a device connects to the LAN. b. Keep the version of the operating system updated. c. Block the file types such as EXE, COM, BAT, VBS, and SCR that carry virus. Also block any file type with more than one extension such as, ABC.TXT.VBS. d. Ensure that configuration settings should not be accessible to all users. Only designated people should be able to access them. Correct Answer: -> c 82/ Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional offices of Global System Inc. are spread across north, east, south, and west regions. There are 1000 workstations in each office, which run on Windows platform. Steve needs an enterprise-level network management solution, which includes report scheduler for generating deliver reports, packet capture scheduling, and monitor for network delay. Which of the following tool or solution should Steve consider, which contains all these features? a. Unicenter Network Management Solution b. LANBrowser 1.3 c. OpManager 5.5 d. Observer 10.1 Correct Answer: -> d 83/ Steve Irwin is working as a security administrator at Red Eye Experts. Steve has configured Symantec Client Security tool to protect the enterprise client systems from security risks and threats. Steve needs to use the tool to enhance intrusion prevention solutions reducing the time and cost. Which of the following features will enable Steve to perform the required task? a. Optimized out-of-the-box firewall b. Generic Exploit Blocking c. Side effect repairing d. Centralized configuration Correct Answer: -> b 84/ Which of the following requirements represents the degree of being capable of maintaining the service and service quality by a server?

a. Performance b. Integrity c. Accessibility d. Reliability Correct Answer: -> d 85/ Lee Johnson is a IT consultant at Red Sky IT system. Lee is assigned the task to plan desktop solutions for the organization. Lee wants to implement the devices that have word processors, spreadsheet applications, calendars, and E-mail clients installed on them. Which type of device should Lee implement to perform the above task? a. Java-based mobile devices b. PALM-based mobile devices c. Windows CE-based mobile devices d. Linux based mobile devices Correct Answer: -> a 86/ SuperSoftware Inc is planning to implement IT infrastructure in the organization. As a part of planning IT infrastructure, SuperSoftware Inc needs to plan for effective desktop solutions to help users to perform day-to-day operations, increase user productivity, and improve business processes. For this, the organization asks Anne Johnson, an IT consultant to analyze the business and technical requirements for planning desktop solutions and identify an appropriate desktop technology on the basis of the requirements. On analyzing the requirements, Donna notices that he needs to select desktop technologies for the desktop users who need to work on packages involving heavy graphics. In addition, Donna needs to select a technology having more storage capacity than phone handsets for the mobile users of the organization. Identify the desktop and mobile technologies that Donna need to select to perform the task? a. Macintosh clients and Java-based mobile devices b. Linux clients and PALM-based mobile devices c. Macintosh clients and PALM-based mobile devices d. Linux clients and Java-based mobile devices Correct Answer: -> c 87/ Which of the following questions you need not answer while finalizing internal access security? a. What are the processes to deal with change in access permissions granted to an employee?

b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it? d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c 88/ Tom Wilkins is the member of the team planning for an effective storage solution in Red Eye Experts. Red Eye Experts is a very big enterprise spanned across different areas of world, therefore, Tom needs to plan for the storage solution that can be accessed over a network and minimize the overall overheads by centrally managing hard disks. Keeping in mind all these considerations, Tom plans to use NAS in the enterprise that enables multiple users to share the same storage space. Which of the following feature will help Tom to accomplish his task? a. Server attached approach to data storage

b. Access to storage pool c. 100 MB/s full duplex data transfer rates d. Data regenerating hard disks Correct Answer: -> a 89/ Steve Irvin is the IT consultant at Red Eye Experts. Steve needs to identify an asset management solution that would enable the IT staff of the organization to access the asset management and maintenance information of the desktops from any location and at any time through the Internet. In addition, Steve needs to identify a scalable asset management solution in which additional modules can be added in future if the organization expands. Identify an appropriate asset management solution. a. Radmin b. Altiris Asset Management Suite c. WebTMA d. ManageEngine ServiceDesk Plus Correct Answer: -> c 90/ Which of following network management tool can be used to secure the network from internal attacks by monitoring event logs? a. Observer 10.1 b. OpManager 5.5 c. Unicenter Network Management d. LANBrowser 1.3 Correct Answer: -> b 91/ Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a large and complex organization spread across many countries. Pat wants to remove all kinds of complexities that are associated with network management for effective and efficient working of the organization. Donna Johnson is the IT consultant in Red Eye Experts. Pat assigns Donna the task of finding a multi-platform solution that discovers the entire network and can automate several network monitoring tasks. To perform this task, Donna wants a solution that includes WAN monitoring, server monitoring, URL monitoring, and switch monitoring. Which of the following tool or solution is appropriate to include all these features? a. OpManager 5.5 b. HP OpenView Network Management Solution c. LANBrowser 1.3 d. Unicenter Network Management Solution Correct Answer: -> a 92/ Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs to use a Windows-based tool that monitors and filters Internet access for Web sites and Internet applications. Jim wants that the tool should record the bandwidth and time each user or workstation has spent in accessing Internet on periodic basis. Which of the following tool should Jim use to perform the required task? a. OpManager5.5

b. Observer10.1 c. WebScout 2.1 d. Symantec Client Security Correct Answer: -> c 93/ The management at Bluemoon Computers Inc. wants to secure its network from external intrusions. The computers on the network are running on a number of different operating systems, such as Windows, Solaris, Linux, and Macintosh and have software firewalls installed on them. The management is very cost conscious and also apprehensive that the level of security might not affect the network performance. Therefore, it has been decided that only one extra level of security will be implemented. Which of the following security measures will you suggest as a networking consultant? a. Host-based Intrusion Detection System (HIDS) b. Network-based Intrusion Detection System (NIDS) c. Combination of NIDS and HIDS d. No IDS is required as the computers have firewalls installed on them Correct Answer: -> b 94/ Which of the following business factors enables you to determine the technologies that can be used to establish network connections between different branch offices of an organization? a. Business processes b. Organization structure c. Geographical scope d. Business applications Correct Answer: -> c 95/ Which of the following can be termed as strategic services? a. Services that must be available at peak load b. Services essential to operation. c. Services that can be postponed indefinitely. d. Services provided by servers that must be available, but can be available at reduced performance Correct Answer: -> b 96/ Pat Wilkins is working as an IT Consultant at Global Softwares. Pat is assigned the task to plan desktop solutions for the organization. Pat needs to implement devices that have more storage capacity than phone handsets. The devices should also have the capability to run java-based dynamic applications. Which of the following devices Pat should implement to perform the task? a. Windows CE-based mobile devices b. PALM-based mobile devices c. Java-based mobile devices d. Linux based mobile devices

Correct Answer: -> b 97/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that organization requires servers at entry level of business operations to implement IT infrastructure. Therefore, organization assigns Corrine the task of planning server solutions for business operations, such as caching services and proxy services. In addition, the organization is required to provide file and print services. Which servers Corrine will implement to fulfil the requirement of the organization? a. Web servers and Workgroup servers b. Infrastructure servers and Mail servers c. HPC servers and Infrastructure servers d. Workgroup and HPC servers Correct Answer: -> a 98/ Which of the following questions you need to answer while planning security for external access? a. What are the processes to deal with change in access permissions granted to an employee?

b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it? d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c 99/ Pat Wilkins is working as an IT consultant at Safest Software Inc. The organization is planning for network solutions to facilitate faster information sharing. Pat is assigned the task to determine the number and the type of hardware and software resources required on a network. Pat needs to size the network to perform the task. Which of the following factors Pat needs to consider to perform network sizing: a. Number of Remote Users b. Proactive Fault Management c. Number of People Using the Network d. Software Specifications e. Application Performance a. a, b, c, and e b. a, c, and d c. a, b, c, and d d. b, c, d, and e Correct Answer: -> b 100/ Pat Wilkins is working as a network administrator in Super Software Inc, which is spread over a vast geographical area. Pat needs to use WAN communication service to create an inter-network of networks. Pat needs to use a technology that can support very high-speed data transfers to the tune of 640 kbps in both directions and carries high-speed data and multimedia over telephone lines. In addition, Pat wants another technology, which is used for Point-to-Point networks and for backup for another type of link. Which of the following combination of WAN technologies should Pat use to complete the required task?

a. ISDN and Frame Relay b. ADSL and Leased lines c. SMDS and X.25 d. ADSL and Analog modems Correct Answer: -> d 101/ Consider the following statements: Statement A: WebTMA and ManageEngine ServiceDesk Plus are Web-based asset management solutions. Statement B: The Altiris Asset Management Suite has a snap-in modular design. Which of the following is correct about the above statements? a. Statement A is false and Statement B is true. b. Statement A is True and False Statement B is. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False. Correct Answer: -> c 102/ Consider the following statements: Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management solution. Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting desktop-related problems. Which of the following is correct about the above statements? a. Statement A is false and Statement B is true. b. Statement A is True and False Statement B is. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False. Correct Answer: -> c 103/ Which of the following tool can be used as a network monitor and protocol analyzer for Ethernet, wireless 802.11b/a/g, token ring, and FDDI networks? a. Observer 10.1 b. LANBrowser 1.3 c. HP OpenView Network Management d. Unicenter Network Management Correct Answer: -> a 104/ Steve Irwin is an IT consultant in Blue Moon Computers. Steve wants an enterprise-level tool for network management that helps in scanning the entire network by searching and configuring properties of all the devices of Windows NT/2000 enterprise. The tool should search for errors, audit information, connected users, and share permissions. Which of the following tool do u think is appropriate to perform this task?

a. OpManager 5.5 b. Observer 10.1 c. LANBrowser d. HP OpenView Network Management Solution Correct Answer: -> c 105/ Corrine Wallace is working as a storage administrator at Technology Systems. The workstations in Technology Systems are running on multi-platform systems. Corrine finds that to manage storage devices effectively, he needs to use a tool or solution that manages the backup and recovery tools centrally and can monitor the storage environment remotely. Which of the following tool should Corrine use to perform the task? a. Storix System Backup Administrator b. BrightStor ARCserve Backup for Laptops & Desktops Release 11 c. VERITAS Backup Exec10 d. BrightStor Storage Resource Manager Correct Answer: -> d 106/ The management at Bluemoon Computers Inc. has decided to connect it corporate office to all of its regional offices. The local networks at regional offices are to be identified by the different subnets of the same IP address class 172.16.0.1. The regional offices are using different platforms for their networks, such as Windows, Linux, Macintosh, and Solaris. Because the corporate network will be connected to all these regional offices round the clock, it will be very essential to restrict the broadcast produced by all the networks and filter in the ones that are specifically meant for the corporate office. Which of the following network devices will you suggest to facilitate this connectivity as a networking consultant? a. Hub b. Switch c. Router d. Layer 2 Switch Correct Answer: -> c 107/ What is the configuration requirements of the desktops used in help desks? a. Following are the configuration requirements of the desktops used in help desks High quality printers Voice Over IP integration Computer telephony integration b. Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Computer telephony integration c. Following are the configuration requirements of the desktops used in help desks

Thin-client computers Voice Over IP integration Fast processing capabilities d. Following are the configuration requirements of the desktops used in help desks Thick-client computers Voice Over IP integration Computer telephony integration Correct Answer: -> b 108/ Corrine Wallace is working as IT consultant at Blue Moon Computers. Corrine is assigned the task of determining the service usability and utility of servers in the organization. For this, Corrine needs to determine the time it takes to repair a service that has failed on the servers. Which of the following requirements Corrine needs to analyze to perform the task? a. Accessibility b. Availability c. Integrity d. Performance Correct Answer: -> b 109/ Safest Software wants to ensure uninterrupted execution of business activities and increase productivity and profitability of an enterprise. For this, the organization decides to implement server solutions in the organization to handle its routine and critical business applications. The management of the organization notices that organization requires servers at every level of business operations. Therefore, organization hires Pat Wilkins, an IT consultant to analyze the business processes and requirements that needs to be considered for planning server solutions and implement servers in the organization. After analyzing the requirements Pat realizes that he needs to implement servers for the following: File and print services Firewall and security services Provide clustered computing system Handling complex interactions Which server Pat needs to implement to perform the task? a. Workgroup server only b. Web servers. c. Workgroup and Infrastructure servers d. Workgroup, Infrastructure, HPC, and high-end servers, such as ERP and Application Tier servers. Correct Answer: -> d 110/ Which of the following is not included in the security policy of an IT infrastructure? a. Roles and responsibilities for various employees.

b. Establishment of trust among clients and employees to gain their confidence c. Rules regarding the use of various organizational resources, such as computers, the Internet, or e-mail. d. Geographical Scope of the organization Correct Answer: -> d 111/ Donna Johnson, a network administrator is planning for the network solutions for the Mountain Marketing Inc. Donna needs to avoid network congestion by managing data flows. For this _donna needs to determine QoS of the organization's network. Which of the following factors cannot help Donna determine QOS of the network: a. Throughput b. Business applications c. Availability d. Jitter e. Size and Geographical Scope a. b and e b. d and b c. d and e d. d, e, and b Correct Answer: -> a 112/ Donna Bard is working as a security administrator in Safest Software Inc. Donna needs to deploy a security method in the enterprise that can protect IT infrastructure from both external as well as internal attacks. Donna receives complaints that unnecessary data, such as video and graphic files are entering the network from outside. Therefore, Donna wants that the security method should filter out the incoming traffic to stop the unnecessary data consuming the network bandwidth. Donna also wants to use another software that provides encryption technologies, digital certificates, and certificate to protect the security of their communications and business transactions on the Internet. Which of the following combinations of security methods should Donna use to provide enterprise-wide network security? a. PKI and VPNs b. VPNs and IDS c. IDS and Firewalls d. Firewalls and PKI Correct Answer: -> d 113/ Which of the following tool can be used to build reports to identify the under-utilized storage space? a. BrightStor Storage Resource Manager b. HP OpenView Storage Area Manager c. BrightStor ARCserve Backup for Laptops & Desktops d. Storix System Backup Administrator Correct Answer: -> b

114/ Corrine Wallace is working as an IT consultant in the head office of Safest Software. Safest Software is a large enterprise with distributed network in six branches across four countries. The workstations in each office are running on multi-platform, such as Linux and Windows. Steve Irwin is the system administrator of the head office. Steve assigns Corrine the task of providing a network management solution, which combines the software, services, support, and training to manage the network proactively by optimizing performance and availability of the distributed network system of Blue Moon Computers. Which of the following tool or solution should Corrine choose to perform this task? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. OpManager 5.5 d. LANBrowser 1.3 Correct Answer: -> a 115/ Pat Greene is working as a storage administrator at Blue Moon Computers. Pat is assigned the task of managing archives in an enterprise. Pat needs to protect the data stored in archived media from mishandling or natural disasters. Which of the following activity should Pat perform to complete the task? a. Ensuring that archive media does not exceed the safe limits b. Storing the data with the same retention period c. Maintaining a record of the archival media, files, and folders d. Maintaining the duplicate copy of the archived data Correct Answer: -> d 116/ Red Eye Systems Inc. wants a plan for security implementation at a new software development facility in New York. The company wants the facility to have at least five levels of authentications for any data that is accessed from a remote location as well as for the data sent to a remote location. The management wants to implement both host-based and network-based IDS and wants to put a firewall after each VPN gateway that will be used for connecting remote users. In addition, the management has a very stringent administrative policy, which requires even a single change in user permissions to be approved by a hierarchy of officials. In addition, the management has decided to conduct weekly security audits during which the network at the facility would be non-operational. As a networking consultant, according to you which of the following business or technical requirements will be affected because the security requirements? a. Availability, geographical scope, and business applications b. QoS, Performance, and availability c. User and resource distribution d. Security policies Correct Answer: -> b 117/ New tech book is multinational organization with various bookstores in various parts of USA. To expand its customer base globally and to automate its business process the organization launches an e-commerce site on the Internet. To protect its business processes from disruption, the organization asks Anne Donaldson to plan for the availability of the website. Identify the considerations Anne needs to keep track of to plan for the availability of the website. To protect data losses in the event of disasters, the organization also asks Anne to plan tasks for maintaining availability and backing up critical data of the website. What should Anne do to perform the task? a. Anne needs to keep track of the following considerations while planning for the availability of the website:

Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. b. Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability c. Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. d. Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability Correct Answer: -> a 118/ _______ management enables you to manage the leased assets in an enterprise by informing you about the end of the lease period. a. Asset b. Event c. Remote d. Desktop configuration Correct Answer: -> a 119/ Identify the tasks performed by the help desk in an enterprise. a. Create security policies for securing the desktops. b. Provide an online knowledge base that provides solutions to problems.

c. Log and monitor the problems of desktop users. d. Provide centralized support for troubleshooting problems of desktop users. Select the correct option. a. a, c, and d b. a, b, and d c. b, c, and d d. c and d Correct Answer: -> c 120/ Steve Irvin works in the Helpdesk department of Global Systems Inc. Currently, the organization uses a decentralized and manual method for managing and maintaining IT resources. The CIO of the organization notices that the decentralized and manual method for managing and maintaining IT resources is prone to errors and requires a huge amount of time, and effort. To solve the problem, the CIO asks Steve to identify a tool that can keep track of the IT resources and enable the IT staff to perform the following tasks in the organization: Determine which IT resources are to be upgraded or replaced Keep track of the end of the lease period of the IT resources Keep track of the software having expired licenses Determine which users have particular software packages installed Centrally manage the implementation of software patches across the enterprise Centrally manage the distributed IT resources Identify the tool that is most appropriate to perform the preceding tasks. a. Remote management tool b. Event management tool c. Asset management tool d. Desktop standardization tool Correct Answer: -> c Q8 Linux Review (77 questions) Question Which of the following group is used to assign rights and permissions to members who perform similar operations and access similar resources in any domain in the forest? 1,Universal group 2,Domain local group 3,Security group 4,Distribution group Ans

No.

Which of the following options are used with the DSMOD and DSADD commands to create userspecific profile folders? 1,$Username$ 2,CN=Username 3,%Username% 4,#Username# Which command-line tool enables you to identify user and group accounts that have not been used for the past 3 months? 1,DSMOD 2,DSQUERY 3,DSADD 4,DSGET You are the system administrator of CellGo. You want to hide one of the file server drives from the domain end users. How will you achieve it with minimum administrative cost? 1,Disable the view option from the registry of each machine. 2,Open Active Directory and remove the Share from the snap-in. 3,Share the drive with a name ending with $. 4,Share the drive with the name Admin$. James has been appointed as a junior system administrator and his boss has assigned him the responsibility of managing performance logs, counters, and alerts. When James tries to open the Performance console, an Access Denied error message is generated. Which of the following options is a possible solution to this problem? 1,James should be included in the Performance Users group. 2,James should be included in the Log and Alert Users group. 3,James should be included in the Performance Log Users group. 4,James should be included in the Performance Alert Users group.

Consider the following two statements:

Statement A: In stand-alone DFS, a server stores and administers the DFS tree structure from a central location. Statement B: A domain-based DFS is hosted on several domain controllers or member servers.

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. Which tab of the Advanced Security Settings dialog box enables you to view user or group permissions on files and folders? 1,Permissions 2,Auditing 3,Owner 4,Effective Permissions You are the system administrator of Fresh Juices Inc. You want that only the employees of the sales department should be able to use the laser printer. Which of the following options will enable you to ensure that only the sales department has access to the printer? 1,Create a Security group for the sales department. 2,Create a Global group for the sales department. 3,Create a Universal group for the sales department. 4,Create a Domain local group for the sales department. Which of the following options distinguishes between a user account and a user template? 1,Password never expires. 2,Account is disabled. 3,Password is disabled. 4,Account never expires.

You are the system administrator of your organization. You want to create a customized console containing the following administrative tools:

Active Directory Users and Computers Computer Management Event Viewer

10

Which of the following options will enable you to perform this task with the least administrative effort? 1,Create consoles for each tool on the desktop. 2,Create a console containing the required tools using the DSMOD command-line utility. 3,Create a console containing the required tools using MMC. 4,Create a console containing the required tools using the Active Directory Users and Computers tool. Which file system provides file and folder level security? 1,FAT 2,FAT 16 3,FAT 32 4,NTFS As a system administrator, you need to assign permissions to James so that he is able to modify the settings of GPOs. Which permissions do you need to give to James? 1,Write 2,Read and Write 3,Write and Execute 4,Apply Group Policy You are the system administrator of your organization. You are currently logged on to your computer and you want to determine the policies applied to your computer. Which of the following options will enable you to do so? 1,Run the Active Directory Users and Computers wizard.

11

12 13

2 2

2,Run the gpresult.exe utility from the command prompt. 3,Run Group Policy Object Editor. 4,Run the gpupdate.exe utility from the command prompt. Consider the following statements:

Statement A: Local GPO is stored in the %Systemroot%\System\GroupPolicy folder. Statement B: Default Domain Controllers Policy GPO is linked to the domain controllers organizational units and affects only the domain controllers. Statement C: The Default Domain Policy GPO is available only for the users in an organizations domain.

14

Which of the following options is correct about the above statements? 1,Only Statement C is True. 2,Only Statement B is True. 3,Only Statement A is True. 4,Statements A, B, and C are False. Which GPO is linked to the domain and affects all the users and computers included in the domain as well as the domain controller? 1,Default Domain Controllers policy 2,Default Domain policy 3,Default GPO based policy 4,Default Domain GPO based policy Which of the following parameters of the Gpupdate command enables you to specify any one of the user or computer Group Policy that needs to be refreshed? 1,/Target 2,/Boot 3,/Logoff 4,/Force

15

16

17

You are a system administrator in Blue Sky IT Systems. As a security measure, you want to ensure that users do not add new programs and applications from the network. Which Group Policy should you configure so that you can prevent users from installing new programs over the network? 1,Configure the Hide programs from your network option. 2,Configure the Hide applications from your network option. 3,Configure the Hide programs/applications from your network option. 4,Configure the Hide programs from your network page. Consider the following statements:

Statement A: The User Configuration node specifies Group Policies that can be applied to users, regardless of which computer they have logged on to. Statement B: GPOs can be applied to Windows 95, Windows 98, and Windows XP Professional computers.

18

Which of the following options is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. Which of the following options specifies whether a GPO is enabled or disabled? 1,Version Information 2,Status Information 3,List of extensions 4,List of GPO Which component of the Administrative Template node includes User Profiles, Scripts, Logon, Ctrl+Alt+Del Options, Group Policy, and Power Management? 1,Network 2,System

19 20

2 2

3,Windows Components 4,Computer Consider the following statements:

Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.

21

Which of the following options is correct about the above statements? 1,Statement A is True and Statement B is False. 2,Both, Statement A and Statement B are True. 3,Both, Statement A and Statement B are False. 4,Statement A is False and Statement B is True. Consider the following statements:

Statement A: Group Policy Management Console is an in-built feature of Windows Server 2003 operating system. Statement B: Group Policy Object Editor can be downloaded from www.microsoft.com.

22

Which of the following options is correct about the above statements? 1,Statement A is True and Statement B is False. 2,Both, Statement A and Statement B are True. 3,Both, Statement A and Statement B are False. 4,Statement A is False and Statement B is True.

23

For security and performance reasons, you want that any user who has remained idle for 15 minutes should be disconnected from the Terminal Services server. In addition, you want that if the disconnected user does not reconnect within 15 minutes, his session should be terminated. Which of the following options will enable you to perform this task with least administrative effort? 1,Specify appropriate session-related settings for each user account. 2,Create a security group and specify appropriate session-related settings for the group. 3,Configure session-related settings for the Terminal Services connection. 4,Configure an alert in System Monitor that sends you a notification each time a user reaches the specified limit. You observe that each time you run the program, escape.exe, the computer slows down significantly. You decide to set the priority of the program to low. Which of the following options will enable you to perform this task? 1,Task Manager 2,System Monitor 3,Performance Console 4,Service Manager When James runs the application, uinstall.exe, he observes that the computer slows down and the application hangs. James is unable to close the application by using the Close button. Which of the following options should James use to exit the application? 1,System Monitor 2,Performance Logs and Alerts 3,Task Manager 4,Performance Console You are installing Windows Server 2003 on a computer with the following configuration:

24

25 26

3 4

Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk

During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH.

What does this error message indicate? 1,The Windows Installer service has failed to start. 2,The data entered is invalid. 3,One of the parameters entered is invalid. 4,The data entered is of incorrect type. Consider the following statements:

Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003. Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003.

27

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. Which component of Active Directory needs to be installed on an NTFS partition? 1,Active Directory log files 2,SYSVOL folder 3,Windows Server 2003 operating system 4,Active Directory database You are the system administrator of Blue Sky Systems. You have created separate organizational units for each department and applied different Group Polices to the employees of each department. Depending on the designation and experience of employees, you have granted rights and permissions to the employees. Susan who was working as a Project Manager in the IT department has resigned and John has joined in her place. What is the best method to provide John the same access and privileges that Susan has? 1,Use Active Directory Users and Computers to create a new user account in the name of John and

28 29

2 2

assign the same rights and privileges as assigned to Susan. Delete Susans user account. 2,Use Active Directory Users and Computers to rename Susans user account and reset the password. 3,Use Computer Management to add John as a new user and put him in the same group as Susan. Delete Susans user account. 4,Use Computer Management to add John as a new user and apply all the policies, rights and permissions that were applied on the user account of Susan to John one by one. Which of the following enables you to centrally administer files and applications over a network? 1,Group Policy 2,User Accounts 3,NTFS 4,Shared folder Which of the following NTFS file permissions enables you to grant permissions and take ownership of a file? 1,Write 2,Read and Execute 3,Full Control 4,Modify Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of Windows Server 2003 computer from the client computer? 1,Admin$ 2,Print$ 3,C$ 4,D$ Identify the NTFS folder permission that enables users to only view the names of files and subfolders contained within a folder? 1,List folder contents 2,Full Control 3,Modify 4,Read and Execute Which command-line tool enables you to create domain computer accounts in Active Directory? 1,DSGET 2,DSADD 3,NETSH

30

31

32

33 34

1 2

4,DSRM Which group has the right to create computer accounts in an organizational unit? 1,Enterprise Admins on a server 2,Server Operators on a domain controller 3,Server Operators on a server 4,Account Operators on a domain controller Which of the following is the minimum NTFS permission required to open documents and run programs stored in a shared folder? 1,Read and Execute 2,Full Control 3,Modify 4,Write Consider the following statements:

35

36

Statement A: Security group is a group on which rights and permissions can be applied to access network resources. Statement B: Distribution group is a group created to define distribution lists for directory-enabled email applications.

37 38

Which of the following options is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Statement A is False and Statement B is True. 3,Statement A is True and Statement B is False. 4,Both, Statement A and Statement B are True. As a system administrator, you want to apply enhanced security settings on the computers of the Sales department of your organization in addition to the security settings already applied. You want that the new security settings should define security settings for auditing of events. However, you do not want that the new security settings should interfere with the applications running on the computers of the Sales department. Which of the following

4 3

security templates will enable you to perform these tasks? 1,Rootsec.inf 2,DC Secure.inf 3,Secure*.inf 4,hisec.inf You want to promote a member server as an additional domain controller in your domain for fault tolerance. For ensuring security for this additional domain controller, you need to apply specific security policies. Which security template will you use to perform this task? 1,Secure DC.inf 2,DC security.inf 3,Secure*.inf 4,Set up DC.inf Your organization has a black-and-white printer and a color laser printer. Only the users in the marketing organizational unit are authorized to use the colour laser printer. The marketing manager complains to you that some unauthorized users are using the colour laser printer. What will you do to track the unauthorized users? 1,Monitor the Jobs object in the Print Queue counter in System Monitor. 2,Configure an audit policy for success of the colour laser printer. 3,Configure an audit policy for failure of the colour laser printer. 4,Configure a new GPO for the Marketing organizational unit and enable the auditing of success and failure of object access. You need to configure a software controlled fault tolerant system by using two hard disks. What level of RAID should you use for this purpose? 1,RAID 0 2,RAID 1 3,RAID 5 4,RAID 6

39

40

41

Consider the following statements:

Statement A: ASR creates a recovery disk that recovers the system and its data. Statement B: ASR creates a backup of system state data, which includes, disk signatures, volumes, and partitions that are required to start a system Statement C: ASR restores a simplified version of the Windows Server 2003 operating system.

42

Which of the following options is correct about the above statements? 1,Only Statement A is True. 2,Only Statement B is True. 3,Statements A, B, and C are True. 4,Statements A, B, and C are False. You are the system administrator in CellGo Corp. All the servers in the organization are running on Windows Server 2003 having one Active Directory Service, CellGo.com. You want to have a comprehensive backup plan to ensure that the system can be restored in case of system failure. You want to backup the system state, system services, and all disks associated with the operating system components. Which recovery type should you use for this purpose? 1,Shadow copies 2,RAID 1 3,Automated system recovery 4,Synchronization tool Consider the following two statements.

43 44

3 2

Statement A: The device driver error code 1 indicates that the device is not configured properly. Statement B: The device driver error code 3 indicates that the driver for the device may be corrupt.

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. After the File Verification Signature utility is used, which of the following default files is created to show the logged results of file signature verification? 1,\windir\sigverif.txt 2,\windir\sigverif.log 3,\windir\filesigs.ncf 4,\windir\filesigs.log Consider the following statements.

45

Statement A: Using the Printer Properties dialog box, you can select the Print permission option that enables a user to pause a printer, restart a printer, share a printer, and change the printer properties. Statement B: Using the Printer Properties dialog box, you can select the Manage Documents option that enables a user to pause, restart, resume, and rearrange the documents submitted by all users.

46

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. Network printer device is connected to the print server using network ______ interface. 1,RJ-40 2,RJ-45 3,RJ-50 4,RJ-55

47

48

Which of the following enables you to monitor the performance of printers? 1,Device Manager 2,Event Viewer 3,Performance Console 4,Task Manager Which of the following tool can be used to build reports to identify the under-utilized storage space? 1,BrightStor Storage Resource Manager 2,HP OpenView Storage Area Manager 3,BrightStor ARCserve Backup for Laptops & Desktops 4,Storix System Backup Administrator Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software 2000 is a large organization, which is spread across many countries and functions through distributed network system. Donna is getting complaints regarding performance problems in Internet, intranet, and extranet resources of the organization. Which of the following tool or solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs? 1,HP OpenView Network Management Solution 2,Unicenter Network Management Solution 3,Observer 10.1 4,LANBrowser 1.3 Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional offices of Global System Inc. are spread across north, east, south, and west regions. There are 1000 workstations in each office, which run on Windows platform. Steve needs an enterprise-level network management solution, which includes report scheduler for generating deliver reports, packet capture scheduling, and monitor for network delay. Which of the following tool or solution should Steve consider, which contains all these features? 1,Unicenter Network Management Solution 2,LANBrowser 1.3 3,OpManager 5.5 4,Observer 10.1

49

50

51

52

Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a large and complex organization spread across many countries. Pat wants to remove all kinds of complexities that are associated with network management for effective and efficient working of the organization. Donna Johnson is the IT consultant in Red Eye Experts. Pat assigns Donna the task of finding a multi-platform solution that discovers the entire network and can automate several network monitoring tasks. To perform this task, Donna wants a solution that includes WAN monitoring, server monitoring, URL monitoring, and switch monitoring. Which of the following tool or solution is appropriate to include all these features? 1,OpManager 5.5 2,HP OpenView Network Management Solution 3,LANBrowser 1.3 4,Unicenter Network Management Solution Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs to use a Windows-based tool that monitors and filters Internet access for Web sites and Internet applications. Jim wants that the tool should record the bandwidth and time each user or workstation has spent in accessing Internet on periodic basis. Which of the following tool should Jim use to perform the required task? 1,OpManager5.5 2,Observer10.1 3,WebScout 2.1 4,Symantec Client Security Corrine Wallace is working as a storage administrator at Technology Systems. The workstations in Technology Systems are running on multi-platform systems. Corrine finds that to manage storage devices effectively, he needs to use a tool or solution that manages the backup and recovery tools centrally and can monitor the storage environment remotely. Which of the following tool should Corrine use to perform the task? 1,Storix System Backup Administrator 2,BrightStor ARCserve Backup for Laptops & Desktops Release 11 3,VERITAS Backup Exec10 4,BrightStor Storage Resource Manager

53

54

55

Which of the following requirements represents the degree of being capable of maintaining the service and service quality by a server? 1,Performance 2,Integrity 3,Accessibility 4,Reliability Which of the following can be termed as strategic services? 1,Services that must be available at peak load 2,Services essential to operation. 3,Services that can be postponed indefinitely. 4,Services provided by servers that must be available, but can be available at reduced performance What is the configuration requirements of the desktops used in help desks? 1,Following are the configuration requirements of the desktops used in help desks High quality printers Voice Over IP integration Computer telephony integration 2,Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Computer telephony integration 3,Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Fast processing capabilities 4,Following are the configuration requirements of the desktops used in help desks Thick-client computers Voice Over IP integration

56 57

2 2

Computer telephony integration Which of the following feature is NOT evaluated when determining the performance requirements of the server? 1,Acceptable response time 2,Projected growth of the enterprise 3,The number of users connected to the server at any given time 4,User activities done during peak hours Which of the following feature is specified by the reliability of the server service? 1,Measuring the number of failures 2,Authenticating the services 3,Maintaining the correctness of the service 4,Measuring throughput Which of the following factor is NOT considered while analyzing scalability requirements of the servers? 1,Projected growth of the servers 2,Type of the servers 3,Speed of the servers 4,Services provided by servers

58

59

60

61

New tech book is multinational organization with various bookstores in various parts of USA. To expand its customer base globally and to automate its business process the organization launches an ecommerce site on the Internet. To protect its business processes from disruption, the organization asks Anne Donaldson to plan for the availability of the website. Identify the considerations Anne needs to keep track of to plan for the availability of the website. To protect data losses in the event of disasters, the organization also asks Anne to plan tasks for maintaining availability and backing up critical data of the website. What should Anne do to perform the task? 1,Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. 2,Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability 3,Anne needs to keep track of the following

considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. 4,Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability 62 Steve Irvin is working as an IT consultant at Global Systems Inc. The organization consists of two units, each unit deals with separate projects and performs tasks, such as accounting, marketing, and quality assurance. The organization decides to automate the accounting tasks of both the departments to reduce large amount of paper work and avoid inconsistencies in accounting data due to human errors. Global Systems Inc. decides to implement accounting software to computerize the accounting tasks. The organization asks Steve to plan for the hardware and software configuration of the client and server computers to implement the accounting software. Which of the following considerations Steve should keep track of to perform the task: 2

a. Location of people working on the accounting software b. Business processes that are not automated by the accounting software c. Technology requirements d. Location of the data of the accounting software

1,a, b, and c 2,a, c, and d 3,a, b, and d 4,b, c, and d Which of the following is measured as a percentage of the original investment over a specific period and it defines whether or not investments met its goal? 1,TCO 2,ROI 3,Indirect costs 4,Direct costs Which of the following formula will you use to analyze the worth of an investment on IT infrastructure? 1,Net Benefit=Total costs Total benefits 2,Net Benefit=Total benefits * 100 percent 3,Net Benefits = Total benefits Total costs 4,Net Benefits = (Total benefits Total costs) / Total benefits * 100 percent Which of the following costs are included in the query resolution time cost? 1,Cost of man-hours spent on the deployment of IT infrastructure. 2,Cost incurred on the functioning of the infrastructure 3,Cost of acquiring and maintaining an asset 4,Cost of effort and time taken by employees to get acquainted to the new software applications or IT infrastructure changes. Which of the following is termed as the ratio of data throughput to transmission overhead? 1,Efficiency 2,Capacity 3,Throughput 4,Accuracy

63

64

65

66

67

Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is assigned the task of selecting an appropriate network technology in the enterprise. Larry needs to set up networks within a building of the enterprise. Therefore, Larry chooses LAN technology to be implemented in the building. Larry observes that there are too many computers, which are required to be attached to LAN. Therefore, Larry needs a technology that reduces the number of data packet collisions and can deliver up to 80 percent of the maximum bandwidth available. In addition, Larry needs to decide the physical media that have multiple pairs of wires to connect the computers and reduces network crosstalk by negating the electro-magnetic field. Which of the following combination should Larry choose to perform the required task? 1,Token ring and Coaxial cables 2,Ethernet and Coaxial cables 3,Token ring and Twisted pair cables 4,FDDI and Fiber optic cables Pat Wilkins is working as a network administrator in Super Software Inc, which is spread over a vast geographical area. Pat needs to use WAN communication service to create an inter-network of networks. Pat needs to use a technology that can support very high-speed data transfers to the tune of 640 kbps in both directions and carries highspeed data and multimedia over telephone lines. In addition, Pat wants another technology, which is used for Point-to-Point networks and for backup for another type of link. Which of the following combination of WAN technologies should Pat use to complete the required task? 1,ISDN and Frame Relay 2,ADSL and Leased lines 3,SMDS and X.25 4,ADSL and Analog modems Steve Irwin is working as a storage administrator in Blue Moon Computers. Steve has been assigned the task of planning a storage solution in the enterprise. Steve needs a high-speed, fault-tolerant access to data for various client, server and host computers. Therefore, he plans to use a storage technology that provides great flexibility in scaling data storage capacity and server processing power. In addition,

68 69

4 1

he wants to use a technology that can reduce network traffic and provide multiple paths to stored data to manage network and data flow redundancy? Which of the following solution would you suggest Steve to implement in the enterprise? 1,SAN 2,NAS 3,Tape drives 4,RAID The management at Bluemoon Computers Inc. wants to secure its network from external intrusions. The computers on the network are running on a number of different operating systems, such as Windows, Solaris, Linux, and Macintosh and have software firewalls installed on them. The management is very cost conscious and also apprehensive that the level of security might not affect the network performance. Therefore, it has been decided that only one extra level of security will be implemented. Which of the following security measures will you suggest as a networking consultant? 1,Host-based Intrusion Detection System (HIDS) 2,Network-based Intrusion Detection System (NIDS) 3,Combination of NIDS and HIDS 4,No IDS is required as the computers have firewalls installed on them The management at Bluemoon Computers Inc. has decided to connect it corporate office to all of its regional offices. The local networks at regional offices are to be identified by the different subnets of the same IP address class 172.16.0.1. The regional offices are using different platforms for their networks, such as Windows, Linux, Macintosh, and Solaris. Because the corporate network will be connected to all these regional offices round the clock, it will be very essential to restrict the broadcast produced by all the networks and filter in the ones that are specifically meant for the corporate office. Which of the following network devices will you suggest to facilitate this connectivity as a networking consultant? 1,Hub 2,Switch 3,Router 4,Layer 2 Switch

70

71

72

Red Eye Systems Inc. is a software development company. The company is planning a new software development facility in Arizona. This facility will develop system software in C/C++ on UNIX platform. Because this is a new project the company does not want to invest heavily in computing resources. In addition, the development process does not require too many resource consuming tools, except for C/C++ compilers, CLI debugging and testing tools and UNIX platform. The programmers will not be allowed to share files and folders as the code will be integrated in the next step of the SDLC. Which of the following computing model would you suggest to the company as a networking consultant? 1,Centralized network computing model with thin clients 2,Centralized network computing model with thick clients 3,Distributed network computing model with thick clients 4,Collaborative network computing model Identify the desktop management strategy that is used to track the software with expired licenses installed on the desktops in the enterprise. 1,Help desk 2,Remote 3,Asset 4,Desktop configuration Which of the following tasks should be performed by the help desk of an enterprise to provide support to desktop users? 1,Determine which assets of the enterprise are to be upgraded or replaced 2,Manage the leased assets in an enterprise 3,Provide an online knowledge base 4,Track the software usage remotely Consider the following statements:

73

74 75

3 3

Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management solution. Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting desktoprelated problems.

Which of the following is correct about the above statements? 1,Statement A is False and Statement B is True. 2,Statement A is True and Statement B is False. 3,Both, Statement A and Statement B are True. 4,Both, Statement A and Statement B are False. Pat Wilkins is the system administrator at Global Systems Inc. Pat is assigned the task of monitoring and improving server performance in the organization. To improve the performance of the servers, Pat needs to determine whether the input and output devices have reached a specific bandwidth limit. What will Pat do to perform the task? 1,Analyze the interface counts and rates 2,Monitor the number of user and system level processes 3,Analyze the number of swap ins and swap outs 4,Analyze the data transfer rates Identify the tasks performed by the help desk in an enterprise.

76

a. Create security policies for securing the desktops. b. Provide an online knowledge base that provides solutions to problems. c. Log and monitor the problems of desktop users. d. Provide centralized support for troubleshooting problems of desktop users.

77

Select the correct option. 1,a, c, and d 2,a, b, and d 3,b, c, and d 4,c and d

You might also like