11
HCL CDC JAMSHEDPUR Windows Server 2003 290 1. You are responsible for managing accounts and access to resources for members of your group. A user in your group leaves the company, and you expect a replacement for that employee in a few days. What should you do with the previous user's account? a. Delete the old user account, and create an account for the new user. b. Change the password for the account, and give the new password to the new user. c. Disable the old user account, rename the user account by using the replacement's name, and configure the account to require a new password the next time the user logs on. Then, enable the account when the replacement arrives. d. Lock the old user account, rename the user account by using the replacement's name, and configure the account to require a new password the next time the user logs on. Then, enable the account when the replacement arrives. Answer 2. A user in your group must create a test lab with 24 computers that will be joined to the domain. What is the best way to do this and maintain the computer accounts separately in Active Directory ® directory service? a. Let the user create the computer accounts in Active Directory during the installation process. b. Let the user create the computer accounts in Active Directory before the installation process. c. Give the user the logon name and password of an administrator and have the user use that account to create the computer accounts in Active Directory. d. Have the systems administrator create the computer accounts in Active Directory before the installation process. Answer

290

Embed Size (px)

Citation preview

Page 1: 290

HCL CDC JAMSHEDPUR

Windows Server 2003290

1. You are responsible for managing accounts and access to resources for members of your group. A user in your group leaves the company, and you expect a replacement for that employee in a few days. What should you do with the previous user's account?

a. Delete the old user account, and create an account for the new user.

b. Change the password for the account, and give the new password to the new user.

c.Disable the old user account, rename the user account by using the replacement's name, and configure the account to require a new password the next time the user logs on. Then, enable the account when the replacement arrives.

d. Lock the old user account, rename the user account by using the replacement's name, and configure the account to require a new password the next time the user logs on. Then, enable the account when the replacement arrives.

Answer

2. A user in your group must create a test lab with 24 computers that will be joined to the domain. What is the best way to do this and maintain the computer accounts separately in Active Directory® directory service?

a. Let the user create the computer accounts in Active Directory during the installation process.

b. Let the user create the computer accounts in Active Directory before the installation process.

c.Give the user the logon name and password of an administrator and have the user use that account to create the computer accounts in Active Directory.

d. Have the systems administrator create the computer accounts in Active Directory before the installation process.

Answer

3. You are responsible for maintaining the servers in your organization. You want to enable other administrators in the organization to determine the physical location of each server without adding any additional administrative tasks or creating any additional documents. How can you do this?

Page 2: 290

HCL CDC JAMSHEDPURa. Modify the Managed by property for the computer account of each server

to display you as the manager.

b. Modify the Location property for the computer account of each server to display the server's location.

c.Modify the Managed by property for the computer account of each server to display the server's address information.

d. Modify the Location property for the computer account of each server to display the server's asset information.

Answer

4. To accelerate the process of creating new accounts when new employees enter your group, you create a series of account templates that you use to create new user accounts and groups. You are notified that a user with an account that was created by using one of the non-manager account templates has been accessing files that are restricted to the Managers group. What should you do?

a. Ensure that you set a strong password on each account created from your template.

b. Ensure that you gave the correct group membership to each account created from your template.

c.Ensure that you disabled all accounts created from your template.

d. Ensure that each manager account created from your template has a unique logon name.

Answer

5. You are responsible for managing computer accounts for your group. Which of the following computer accounts do you need to reset?

a. An account that can no longer authenticate with the domain

b. An account that you will use as a computer account template

c.An account for a computer that an employee on temporary leave uses

d. An account for which the user has forgotten the password

Answer

6. You have determined the best ways to search for Active Directory objects and documented your recommended search criteria. However, the administrators tell you that it is taking too long to create and then run the search. After further research, you determine that most of the systems administrators are searching for the same information. What can you do to accelerate the search process?

a. Specify multiple criteria in a custom search

Page 3: 290

HCL CDC JAMSHEDPURb. Standardize search procedures

c.Create saved queries for common searches performed by the systems administrators

d. Create saved queries for every search that you or the systems administrators perform

7. Which of the following statements are true about moving a user object from one organizational unit called London to another organizational unit called San Francisco? Choose all that apply.

a. Explicit permissions remain the same for the user object.

b. Inherited permissions on the user object may change based on the configuration of the San Francisco organizational unit.

c.Inherited permissions on the user object may change based on the configuration of the London organizational unit.

d. You must set new permissions for the moved user object.

e. You do not need to change permissions for either organizational unit based on the user object being moved.

Answer

8. You are given the task of assigning permissions to a set of organizational units. You must determine the appropriate delegation of authority if each organizational unit requires the following:

Security Group A must be able to create user accounts in the OU1 organizational unit.

Security Group B must be able to update user account properties in the OU2 organizational unit.

What are the minimum permissions required by each group? Choose all that apply.

a. Create, Delete User accounts

b. Modify User accounts

c. Full Control

d. Read All Properties

Answer

9. You have a Web server that is not a domain member. You need to configure security and lock down the user configuration. What is the best way to accomplish this?

Page 4: 290

HCL CDC JAMSHEDPURa. Manually edit the HKEY_Local_Machine and HKEY_Current_User hives of

the local registry

b. Create a custom MMC and configure a local Group Policy

c.Put the Web server in an organizational unit and assign a GPO

d. Use the Local Security Policy to configure Group Policy

Answer

10.As the systems administrator for your department's organizational units, you are responsible for ensuring that the proper Group Policy settings are applied to each user and computer in your department. You must ensure that the administrative policies that are applied to a group of users are always inherited from parent objects. To ensure this, you decide to apply the Enabled setting. To which of the following do you apply this setting?

a. The GPO in the Group Policy Objects container

b. The organizational unit that contains the users

c.The link associated with the GPO

d. The domain

Answer

11.You are the systems administrator responsible for creating, configuring, and managing Group Policy objects (GPOs) for your organization. Before you can determine which Group Policy settings you should apply to each GPO, you must determine what types of Group Policy settings you can configure. Which of the following types of Group Policy settings can you configure in an Active Directory® directory service environment? Choose all that apply.

a. Desktop settings

b. Network connections

c.The location of computers

d. Inventory-installed software

e. Who can log on to a computer and when

Answer

12.You are the systems administrator for a support call center. You have configured GPOs for security settings, Folder Redirection, and scripts assignment. All the appropriate settings are being applied, but the users say that performance is slower during startup, logon and shutdown. Which of the following can you do to improve performance during these times? Choose all that apply.

a. Ensure that only the required scripts are configured to run.

b. Avoid cross-domain GPO assignments.

c.Use the Block Policy inheritance and Enabled features sparingly.

Page 5: 290

HCL CDC JAMSHEDPURd. Filter Group Policy based on security group membership.

Answer

13.You want to give a user named Jane the right to back up and restore files on your file servers only. Jane's user account resides in an organizational unit named IT Admin. The file server computer accounts reside in an organizational unit named Servers. How would you configure a GPO to accomplish this?

a. Create a Restricted Groups policy that places Jane's user account in the Backup Operators group and link the GPO to the Domain Controllers container.

b. Create a Restricted Groups policy that places Jane's user account in the Backup Operators group and link the GPO to the IT Admin organizational unit.

c.Create a Restricted Groups policy that places Jane's user account in the Backup Operators group and link the GPO to the Servers organizational unit.

d. Create a Restricted Groups policy that places Jane's user account in the Backup Operators group and link the GPO to the domain.

Answer

14.You are the systems administrator responsible for client data availability. You want to configure Folder Redirection of the My Documents folder to the user's existing home directory for all users. You also are required to have the My Documents folder secured to just the owner. Which of the following options best fulfills this requirement? Each option is a part of the solution.

a. Configure a GPO to set the Folder Redirection policy to Redirect to the user's home directory setting, and link it to the appropriate organizational unit.

b. Configure a GPO to set the Grant the user exclusive rights to My Documents setting to Disabled, and link it to the appropriate organizational unit.

c.Configure a GPO to set the Folder Redirection policy to redirect special folders to a specific path setting, and link it to the appropriate organizational unit.

d. Configure a GPO to set the Grant the user exclusive rights to My Documents setting to Enabled, and link it to the appropriate organizational unit.

Answer

15.You are responsible for managing Group Policy settings for your organization. You must ensure that all Group Policy settings are being correctly applied to users and computers. You have decided that you will use

Page 6: 290

HCL CDC JAMSHEDPURResultant Set of Policy (RSoP) to evaluate the Group Policy settings to ensure that the appropriate settings are applied to the computers and user that are logged on. Which RSoP mode should you use?

a. Planning Mode

b. Logging Mode

Answer

16.you are working at the Los Angeles office of your organization and must access a folder that is located on a remote file server in the London office. This folder is not currently shared. The time in London is eight hours ahead of the time in Los Angeles, and there is no one at the London office to share the folder locally. The link speed between these two locations is either slow or intermittent. Choose the best way to administer this folder.

a. Remote Desktop, Account Operators group

b. Manage Your Server, local Administrators group

c.Computer Management tool, Server Operators group

d. Active Directory® Users and Computers snap-in, domain Administrator group

Answer

17.You are the administrator for three print servers, but a new print server was recently installed. You cannot connect to the new print server by using Remote Desktop. You need to gain access to the new print server by using Remote Desktop. You also want to retrieve usage information by running a custom application every time Remote Desktop is used to gain access to the server.

Which of the following tasks can you use to accomplish these tasks? Choose all that apply.

a. Connect to one of the other print servers as an administrator, and then enable the new server for remote administration.

b. Log on locally to the new print server as a server operator, and then configure the new server for remote administration.

c.Log on locally to the new print server as an administrator, and then configure the new server for remote administration.

d. On the new print server, in the Properties dialog box for Remote Desktop, enable the Redirect local drives when logged on to the Remote computer option.

e. On the new print server, in the Properties dialog box for Remote Desktop, enable the Start the following program on connection option.

Answer

Page 7: 290

HCL CDC JAMSHEDPUR18.You are the administrator for three existing database servers. These servers

are configured to allow only two Remote Desktop connections at a time, and these connections are used for administration of the server and its databases. You are informed by the database administrators that they are denied access when they attempt to connect to the server by using Remote Desktop.

Which of the following situations is a potential cause of this condition? Choose all that apply.

a. Other administrators are already logged on to and are actively using the server.

b. The other administrators are closing the Remote Desktop window rather than logging off the remote desktop.

c.The other administrators are logging off the remote desktop rather than closing the Remote Desktop window.

d. The other administrators are using computers running Microsoft® Windows® XP rather than Microsoft Windows Server™ 2003 for remote administration.

Answer

19.Your company has experienced several high-profile virus infections recently. To ensure that this does not happen again, you are evaluating options for client security upgrades. Internally you have decided to implement Windows Server Update Services (WSUS). However, you have many roaming clients who do not have access to the WSUS server and are not part of the domain.

Which is the best solution for ensuring that the operating systems of roaming clients are properly updated?

a. Use a Group Policy object to configure automatic updates to install updates automatically as they are available.

b. Provide users with instructions on how to download updates from the Microsoft® Windows® Update Web site.

c.Provide users with instructions about how to configure automatic updates to automatically install updates as they are available.

d. Provide users with instructions on how to install and configure their own WSUS server.

Answer

20.You organization consists of four physical locations connected by a wide-area network (WAN). Each site has its own independent Internet connection. If the primary concern about installing WSUS is the impact on WAN links, what is the best way to configure the WSUS servers?

a. All clients download updates from a single WSUS server at the head office.

b. Each location has an independent WSUS server the serves local clients.

c.Each remote location has replica WSUS servers that copy their configuration from the head office WSUS server.

Page 8: 290

HCL CDC JAMSHEDPURd. Each remote location has a disconnected WSUS server and updates are

imported on those servers from DVD.

Answer

21.A hard drive in your WSUS server has failed and the WSUS database has been lost. Unfortunately, there is no backup of the WSUS database. Which of the following is required to restore your WSUS server to full functionality after replacing the failed hard drive? Choose all that apply.

a. Synchronize the database and approve all previously approved updates.

b. Recreate any previously existing computer groups that are used for testing or update deployment.

c.Reinstall WSUS to recreate the database.

d. Recreate the All Computers computer group.

e. Create a Group Policy object configure Automatic Updates on the client computers.

Answer

22.You work as an administrator for a large multinational company and are a member of a local computing professional user group. You have been assigned as a mentor to an administrator working for a small local company. While discussing security implementation with the administrator, you realize that he is subject to very different restraints in his work environment than you are.

Which of the following are security challenges that are more common in smaller companies? Choose all that apply.

a. Servers are performing multiple roles.

b. A high percentage of threats are external.

c.Security expertise is lacking.

d. Physical access to servers negates many security measures.

e. There are legal consequences for security breaches.

Answer

23.You have just applied Service Pack 1 to all computers running Microsoft® Windows Server™ 2003 in your organization. A magazine article you read indicates that the Security Configuration Wizard can be used to secure Windows Server 2003 SP 1 computers.

Page 9: 290

HCL CDC JAMSHEDPURWhich of the following are features of the Security Configuration Wizard? Choose all that apply.

a. Services are enabled and disabled based on server role.

b. Firewall rules are configured based on server role.

c.Security Configuration Wizard settings can be imported into a Group Policy object.

d. Changes can be rolled back if there are problems.

Answer

24.As part of planning a security policy for your organization, you are analyzing the risks to your computers. Your current task is analyzing risks to domain controllers.

Which of the following threats are specific to domain controllers? Choose all that apply.

a. Unauthorized changes to Active Directory® directory service objects

b. Denial-of-service attacks

c.Exploitation of known security issues

d. Password attacks

Answer

25.Your organization has already implemented WSUS for update management. However, you would like to use the Microsoft Baseline Security Analyzer (MBSA) tool in addition to WSUS.

What features or benefits does MBSA provide that WSUS does not? Choose all that apply.

a. Scans for missing Microsoft Office updates

b. Scans for missing Microsoft BizTalk® Server updates

c.Scans for configuration errors in addition to missing updates

d. Scans for missing Microsoft Windows® updates

e. Scans for weak passwords

Answer