Q6 Review (Ans)

Embed Size (px)

Citation preview

  • 8/4/2019 Q6 Review (Ans)

    1/25

    Q6 Review Question

    1/ You are the system administrator at BlueMoon Computers. You establish the internal networkof a new branch of the organization by configuring the computers using NetBIOS names. Theorganization is working on various projects. The team members involved in the projects complainthat they face difficulty in accessing the files related to their projects because of different locations

    at which they are stored. Also, they do not get timely access to the files because of congestion onthe server. The employees want that the request for accessing the files should be handledseparately so that they can access the files when they need. What should you do to solve thisproblem?a. Assign the NetBIOS name Computer1 [00h] to the computer that you want to use as Fileserver.b. Assign the NetBIOS name Computer2 [03h] to the computer that you want to use as Fileserver.c. Assign the NetBIOS name Computer3 [06h] to the computer that you want to use as Fileserver.d. Assign the NetBIOS name Computer4 [20h] to the computer that you want to use as Fileserver.Correct Answer: -> d

    2/ Which component of WINS service resolves NetBIOS names for computers that are not WINS-enabled clients?a. WINS Serverb. WINS Clientc. WINS Proxyd. WINS DatabaseCorrect Answer: -> c

    3/ You are the system administrator at BlueMoon Computers. You establish an internal networkthat connects all the computers in the organization. You have set one computer as a DHCPserver with Windows Server 2003 installed on it. The DHCP server is configured with two scopes.One scope is used for the Sales department and other for the Accounts department. Computersof both departments receive their IP addresses from the DHCP server. The DHCP server had ahardware failure problem and lost its DHCP data. However, you restored the backup data. Afterrestoring the DHCP data, you find that information of some clients for both scopes is notdisplayed correctly when viewed in the list of active leases. What steps will you follow to make theinformation correct?a. Select the DHCP scope in the DHCP console tree.Select the Reconcile command from the Action menu.Click the Verify button in the Reconcile dialog box.Click the OK button in the DHCP dialog box.b. Select the DHCP scope in the DHCP console tree.Select the Reconcile command from the Action menu.Click the OK button in the DHCP dialog box.Click the Verify button in the Reconcile dialog box.c. Select the DHCP server in the DHCP console tree.

    Select the Reconcile All Scopes command from the Action menu.Click the Verify button in the Reconcile dialog box.Click the OK button in the DHCP dialog box.d. Select the DHCP server in the DHCP console tree.Select the Reconcile command from the Action menu.Click the Verify button in the Reconcile dialog box.Click the OK button in the DHCP dialog box.Correct Answer: -> c

  • 8/4/2019 Q6 Review (Ans)

    2/25

    4/ Global Systems Inc. provides dynamic IP addresses to ten thousand DHCP clients usingDHCP server in Windows Server 2003 environment. The computer on which the DHCP server isconfigured is outdated, and therefore, the computer crashes frequently. The system administratorhas to reconfigure the DHCP server each time. The clients have to face problems regardingconnectivity with the newly configured DHCP server. What should the system administrator do toresolve this problem?a. Save the DHCP server configuration settings on a remote machine.b. Save the DHCP server configuration settings on a local machine.c. Prepare a hard copy of the DHCP configuration settings.d. Restart the DHCP services using the administrative tools.Correct Answer: -> a

    5/ You are the system administrator at WorldAd, Inc. The organization provides current stockinformation to the client companies. All the clients access the organization's database by remotenetwork access to retrieve stock details. The database is mounted on a server running WindowsServer 2003. Some clients complain about the inconsistent remote access because of failure inpoint-to-point connection with the server. How will you identify the cause of the problem?a. Examine the Audit log and verify IPSec policy change events.b. Examine the PPP log on the server and identify the cause of connection failure.c. Examine the RADIUS-Based Authentication and Account log to analyze the number of users

    remotely accessing the server.d. Examine Event log and analyze the errors occurring within RAS server.Correct Answer: -> b

    6/ You are the system administrator at BlueMoon Computers. The internal network of theorganization is divided into subnetworks that are distantly located. The employees usingcomputers of different subnetworks need to coordinate with each other by sending and receivingmessages to each other. The network of the organization contains routers for transferring themessages from one subnetwork to the other using the shortest path. The employees of theorganization using the networks complain that the rate of data transfer over the network is low.Which parameter of the routing algorithm should you change to solve the problem?a. Hopsb. Load

    c. Bandwidthd. DelayCorrect Answer: -> c

    7/ WorldAd, Inc. provides defense related services to the U.S. government. The U.S. governmentneeds to disseminate (ph bin/truyn b) a large volume of data to the various defenseheadquarters across the country. The U.S. government has strictly (hon ton) instructedWorldAd, Inc. to make sure that the data reaches its destination as quickly as possible. All thecomputers at WorldAd, Inc. have Windows Server 2003 installed. John Barrett, the systemadministrator of WorldAd, Inc., has been assigned the task of disseminating the data as requiredby the government. Which routing protocol should John use?a. Open Shortest Path First (OSPF)b. Border Gateway Protocol (BGP)

    c. Internet Group Multicast Protocol (IGMP)d. Routing Information Protocol (RIP)Correct Answer: -> a

    8/ Consider the following statements:Statement A: Dial-in properties are elements of remote access policies, which are used forauthorizing a user connection.Statement B: An authenticated user is authorized to establish a remote connection by RemoteAccess Policy Profile.

  • 8/4/2019 Q6 Review (Ans)

    3/25

    Which of the following is true with respect to the above statements?a. Both statement A and statement B are false.b. Both statement A and statement B are true.c. Statement A is true and statement B is false.d. Statement A is false and statement B is true.Correct Answer: -> b

    9/ The database of Blue Moon Computers contains confidential information. The informationneeds to be secured from any unauthorized access. The organization works in coordination withRed Sky Inc. The employees working on a project need to send confidential information using anexternal network. You are the system administrator at Blue Moon Computers. The projectmanager tells you that if any unauthorized person accesses the information while it is transferredfrom their computer to the client's computer, it can cause a heavy financial loss to theorganization. How can you make sure that such a loss does not occur?a. Use Dial-in constraint parameter of Remote Access Policy component, Profile, to restrictremote access to the database.b. Use IP properties parameter of Remote Access Policy component, Profile, to restrict remoteaccess to the database.c. Use Multilink parameter of Remote Access Policy component, Profile, to restrict remote accessto the database.

    d. Use Encryption parameter of Remote Access Policy component, Profile, to restrict remoteaccess to the database.Correct Answer: -> d

    10/ You are the system administrator at BlueMoon Computers. The organization has variousdepartments. Each department has its separate internal network. The departments are connectedto each other using network connectivity components, such as routers, hubs, and switches. Theorganization undertakes a new project for which the configuration of some of the networkconnectivity components is changed. An employee of the production department complains thathe is unable to transmit messages to and from the development department. What do you think isthe reason of the problem?a. Duplicate IP addressing,b. Changed configuration of the network connectivity component, such as a hub, a router, or a

    switch,c. Excessive network collision,d. Improper configuration of the software used in the network,Correct Answer: -> b

    11/ You are the system administrator at BlueMoon Computers. The internal network of theorganization connects all the computers together. The employees of the organization use theinternal network to communicate with each other. The employees complain about the slow speedof the network because of which the time taken in communicating a message and transferringfiles from one computer to another is more than expected. As a result, the employees are facingproblems in coordinating with each other and doing their project work properly. What should youdo to ensure better coordination among the employees working in a project?a. Use Network Connection Repair Link utility to remove expired entries from NetBIOS cache and

    resolve communication problems.b. Use address resolution utility to remove expired entries from NetBIOS cache and resolvecommunication problems.c. Use ping utility to remove expired entries from NetBIOS cache and resolve communicationproblems.d. Use Network Diagnostics utility to remove expired entries from NetBIOS cache and resolvecommunication problems.Correct Answer: -> a

    12/ Consider the following statements:

  • 8/4/2019 Q6 Review (Ans)

    4/25

    Statement A: An SRV resource record resolves service names to host names and port names.Statement B: An SOA resource record resolves a domain name to a host name.

    Which of the following is true with respect to the above statements?a. Both statement A and statement B are true.b. Statement A is true and statement B is false.c. Statement A is false and statement B is true.d. Both statement A and statement B are false.Correct Answer: -> a

    13/ You are the system administrator at Red Sky IT Systems. The organization currently has anetwork setup with two servers and 100 clients. The servers have MS Windows Server 2003installed on them, 50 clients have Windows XP Professional, and the rest of the clients haveWindows 98 installed. The network contains two routed subnets, subnet A and subnet B. Eachsubnet contains a server installed with Windows Server 2003. You assign static addresses to theservers. However, to reduce the configuration errors caused by manual configuration of IPaddresses, you install DHCP service on the servers. In addition, you install DNS service in thesubnets to resolve the IP addresses to client names and vice-versa. After some time, 50 clientsand one more DHCP server are added to subnet A. After the new DHCP server is added tosubnet A, clients start facing conflict problems in network settings. What according to you is the

    reason of the conflict in network settings?a. Presence of DNS servers in subnets.b. Addition of another DHCP server in subnet A that already has an active DHCP server.c. Servers on which DHCP service is installed have a static IP address.d. Presence of only one DNS server in subnet A.Correct Answer: -> b

    14/ What is the function of Kerberos protocol?a. Specifies the type of action performed on data packets on the network.b. Ensures secure information transmission over network.c. Authenticates systems in the same domain.d. Implements password security between two IPSec hosts.Correct Answer: -> c

    15/ What does the Issue name attribute of a CA certificate specify?a. Name of the entity requesting a CA certificate.b. Name of the certificate issuing CA.c. X.509 standard version for certificate formatting.d. Value used to assign a unique identity to a certificate.Correct Answer: -> b

    16/ Consider the following statements:Statement A: A RADIUS client using RADIUS protocol sends accounting and authenticationrequests to the RADIUS server.Statement B: A RADIUS client provides authorization and authentication services.

    Which of the following is true with respect to the above statements?a. Both Statement A and Statement B are False.b. Both Statement A and Statement B are True.c. Statement A is True and Statement B is False.d. Statement B is False and Statement B is True.Correct Answer: -> c

    17/ Which authentication protocol for dial-up networking provides additional authentication withinPoint-to-Point Protocol (PPP)?a. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2).

  • 8/4/2019 Q6 Review (Ans)

    5/25

    b. Extensible Authentication Protocol-Transport Layer Security (EAP-TLS).c. Shiva Password Authentication Protocol (SPAP).d. Protected Extensible Authentication Protocol (PEAP).Correct Answer: -> b

    18/ Which switch is used with the Ipconfig command to display all the TCP/IP configurationvalues of the host?a. /renewb. /releasec. /displaydnsd. /allCorrect Answer: -> d

    19/ You are the system administrator at BlueMoon Computers. The organization has undertakena new project for which it has to open many new branches at different locations. Each branch isexpected to incorporate 500 to 1000 computers. At least 10 branches need to be opened tohandle the project work. The managing director of the organization wants you to plan a networkinfrastructure such that in future there does not arise any difficulty in locating any computer overthe network. Each computer should have a unique IP address in the network. What should you doto meet the requirements?

    a. Assign each computer a Class A IP address.b. Assign each computer a Class B IP address.c. Assign each computer a Class C IP address.d. Assign each computer a Class D IP address.Correct Answer: -> b

    20/ You are the system administrator at WorldAd, Inc. Peter is a marketing executive in theorganization and has to make frequent outstation business tours. Peter has to access the salesand product database available on the central server in the head office. Peter accesses thedatabase on office network as well as from remote location using his laptop. To avoid networksetting overhead you configure an alternate IP address for Peter's system. How will you verify thecorrectness of the assigned alternate IP address?a. Run ipconfig command from command prompt. Check whether the value of IP address field

    and the assigned alternate IP address for the system are the same.b. Run ipconfig /renew command from command prompt. Check whether the value of IP addressfield and the assigned alternate IP address for the system are the same.c. Run ipconfig /all command from command prompt. Check whether the value of IP address fieldand the assigned alternate IP address for the system are the same.d. Run ipconfig /release command from command prompt. Check whether the value of IPaddress field and the assigned alternate IP address for the system are the same.Correct Answer: -> c

    21/ Which database file in DHCP records the existing transactions if the system runs out of diskspace?a. Res1.logb. J50.log

    c. Tmp.edbd. Dhcp.mdbCorrect Answer: -> b

    22/ You are the system administrator at the branch office in Houston of BlueMoon Computers.The organization has one DHCP server and eight DHCP clients. You configure two scopes on theDHCP server for the clients. You check the DHCP statistics at server level and monitor theperformance of the DHCP server for both the scopes. The DHCP statistics provides a view ofdata, such as number of packets transferred and number of IP addresses leased. Some of theusers of the network complain that the rate of transfer of data over the network is reduced

  • 8/4/2019 Q6 Review (Ans)

    6/25

    considerably. You also notice an increase in IP lease release and renew events. As a systemadministrator, what should you do to resolve this problem?a. Identify the computer that is causing network traffic by checking the DHCP audit log file.b. Identify the computer that is causing network traffic by viewing the performance using Systemmonitor.c. Identify the computer that is causing network traffic by creating the DHCP release and renewalert settings.d. Identify the computer that is causing network traffic by starting audit logging.Correct Answer: -> c

    23/ You are the system administrator at Technology Systems. You are examining the NetBTNodes. Which NetBT node type should you examine to use the Lmhosts file for resolving andregistering names?a. B-nodeb. P-nodec. M-noded. Microsoft enhanced B-nodeCorrect Answer: -> d

    24/ Which of the following NetBIOS computers provides file server services?

    a. Computer1 [00h]b. Computer2 [03h]c. Computer2 [06h]d. Computer4 [20h]Correct Answer: -> d

    25/ You are the system administrator at BlueMoon Computers. The internal network of theorganization connects all the computers of the organization. Most of the computers in the networkare Windows 95 and Windows 98 computers. A remote client wants to connect to a computerover the internal network. The client sends the NetBIOS name of the computer to be resolved bythe NetBIOS cache. What happens when the name is not found in the NetBIOS cache and WINSserver?a. The request is dropped.

    b. No acknowledgement is given to the client, and the client is left waiting.c. The NetBIOS name is broadcast to all the computers over the network.d. An error is raised about non-existence of such a computer.Correct Answer: -> c

    26/ You are the system administrator at BlueMoon Computers. The organization uses a WINSserver to implement NetBIOS name resolution service. You find that the requests made by theWINS clients are not fulfilled in the expected time. You also notice that the time interval betweenthe time at which a WINS client is marked as released and the time at which it is indicated asextinct is unnecessarily large. Which scavenging parameter do you set to decrease this time sothat the WINS database is not over crowded by unused WINS clients names and theperformance of the database is increased?a. Renewal interval

    b. Extinction intervalc. Extinction timeoutd. Verification intervalCorrect Answer: -> b

    27/ You are the system administrator at BlueMoon Computers. The internal network of theorganization contains a DNS server. Whenever the DNS database is changed or updated, youneed to manually update the changes. The size of the DNS database is large. Therefore, youwant to automate the system of updating the DNS database. The DNS database containsconfidential data related to the projects going on in the organization, and therefore, data must be

  • 8/4/2019 Q6 Review (Ans)

    7/25

    secure. What should you do to reduce your burden of updating the database and keep thesecurity of the DNS database?a. Create a new zone with Allow both secure and nonsecure dynamic updates option selected.b. Create a new zone with Do not allow dynamic updates option selected.c. Create a new zone with Allow only secure dynamic updates option selected.d. Configure zone to allow transfer from specified IP addresses.Correct Answer: -> c

    28/ You are the system administrator at Red Sky Inc. Organization's employees can access filesfrom another computer on the network by using its domain name. A DNS server resolves thedomain name of a host with the respective IP address. Employees are complaining about theconflict in domain name resolution since last week. What can be the cause of the domain nameconflict?a. DNS server is using outdated information to answer client's queries.b. DNS server has heavy DNS traffic.c. DNS server is low on disk space.d. DNS server is having small response time.Correct Answer: -> a

    29/ You are system administrator at the WorldAd, Inc. The organization has a network of systems

    which has two domains: greatdomain and smalldomain. The greatdomain domain has a DNSserver to resolve host name requests. You are working in the smalldomain domain. You haveaccess rights to modify the DNS server settings of DNS server in greatdomain domain. You wantto modify the settings of greatdomain's DNS server to perform the following tasks: Check the registration of DNS resource records Secure the DNS updates to the greatdomain's DNS server.How will you meet the requirements?a. Use dnscmd command and omit the DNS server name from the command.b. Use dnscmd command and specify the DNS server name of the greatdomain domain.c. Specify more than one nslookup subcommands in the command line of NSlookup commandused for DNS server in the smalldomain domain.d. Create a batch file, which includes the dnscmd command and send it to a DNS server toexecute it remotely.

    Correct Answer: -> d

    30/ You are the system administrator at WorldAd, Inc. The organization's network consists of 500computers and the network has two domains. You are asked to implement some predefinedIPSec policy on the computers so that only secured IP packets can be transmitted over thenetwork. This policy should ensure that only the computers secured with IPSec policy should beable to take part in communication. In addition, it should ensure that all outgoing packets from acomputer are secured before transmission. How will you meet the requirements?a. By implementing Client policyb. By implementing Sever policyc. By implementing Secure Server policyd. By implementing Client and Sever policiesCorrect Answer: -> b

    31/ Which Remote Access Policy parameter applies the maximum number of ports that can beused to combine the bandwidth of various modem connections into a single connection?a. Multilinkb. Dial-in constraintsc. Authenticationd. IP propertiesCorrect Answer: -> a

    32/ Consider the following statements:

  • 8/4/2019 Q6 Review (Ans)

    8/25

    Statement A: System Monitor tool enables you to collect real-time performance data.Statement B: Performance Logs and Alerts tool enables you to collect data for specific servicesfor a particular period of time.Which of the following is true with respect to above statements?a. Both statement A and statement B are false.b. Both statement A and statement B are true.c. Statement A is false and statement B is true.d. Statement A is true and statement B is false.Correct Answer: -> b

    33/ You are the system administrator at WorldAd Inc. The organization has five branch offices indifferent cities. All information about organization's business details, products, and services isstored in a database at the head office in New York. Users from branch offices access thisinformation through the organization network. You want to monitor the network access forauthorized access. In addition you want to meet the following requirements: Make a record of errors and warning messages occurring within remote access server. Keep track of start and stop time of remote access services. Maintain a record of failed access events with the respective user information.How will you meet the requirements?a. Configure RADIUS-Based authentication and Account logging.b. Configure Local Authentication and Accounting logging.c. Configure Event logging and maintain an Event log.d. Configure Point-to-Point logging.Correct Answer: -> c

    34/ You are the system administrator at the Houston branch of BlueMoon Computers. Theorganization is hiring people at all levels and needs to be in constant touch with the HR Managerat the head office at Atlanta. In this case, as the administrator at Houston, you choose toconfigure RRAS on the server of HR department and connect it to the head office through adedicated phone line. The server is currently installed with Windows Server 2000. Theorganization is facing financial loss because of the connections between the two offices. Themanaging director of the organization wants you to find out some way of reducing this financialloss. What action should you take to fulfill the requirements of the managing director and to allow

    all tasks to be performed as required?a. Connect the head office and the branch offices using temporary connections instead ofdedicated phone lines by upgrading the server with Windows Server 2003 and using its Unicastrouting feature.b. Connect the head office and the branch offices using temporary connections instead ofdedicated phone lines by upgrading the server with Windows Server 2003 and using its Demand-dial routing feature.c. Connect the head office and the branch offices using temporary connections instead ofdedicated phone lines by upgrading the server with Windows Server 2003 and by using itsNetwork Address Translation feature.d. Connect the head office and the branch offices using temporary connections instead ofdedicated phone lines by upgrading the server with Windows Server 2003 and by using itsMulticast routing feature.

    Correct Answer: -> b

    35/ You are the system administrator at BlueMoon Computers. A user of the network tries toaccess resources over the network but is unable to do so. The user complains to you about it.You plan to troubleshoot the problem. Which step should you perform before implementing thesolution?a. Restore the data and system settings.b. Take backup of the data and system settings.c. Conduct tests on the solution.d. Make a record of the effect of the changes made to the system.

  • 8/4/2019 Q6 Review (Ans)

    9/25

    Correct Answer: -> b

    36/ You are the system administrator at BlueValley Steel Manufacturers, Inc. The head office ofthis organization is located at Los Angeles. The head office has 14000 employees. The headoffice has implemented TCP/IP network infrastructure with class B addressing structure. Theorganization now plans to open a new branch office at Chicago. The new branch office will havearound 12000 employees and will be connected to the head office using wireless LAN. Identifythe addressing structure that would be best suited for the new branch office.a. Classless-based class B addressing structureb. Class-based class B addressing structurec. Classless-based class C addressing structured. Class-based class C addressing structureCorrect Answer: -> a

    37/ What is the maximum number of WINS servers that can be attached to a Windows Server2003 computer to provide NetBIOS resources to multiple mobile WINS clients?a. 12b. 10c. 6d. 20

    Correct Answer: -> a

    38/ You are the system administrator at BlueMoon Computers. You have established the internalnetwork of the organization. You have set one computer as a DHCP server with Windows Server2003 installed on it. All other computers receive their IP addresses from the DHCP server. Youwant to maintain and save the DHCP database so that if DHCP server has a hardware failurethen service can be restarted using the saved DHCP database. To perform manual backup ofDHCP database, you need to perform the following steps:1. Select a folder other than %Systemroot%\System32\Dhcp\Backup\New to place the backupfiles in the Browse For Folder dialog box.2. Right-click the server option in the left pane of DHCP console window and select the Backupcommand from the shortcut menu.3. Click the OK button to place the backup files in the selected folder and to close the Browse For

    Folder dialog box.What is the correct sequence of steps to configure the manual backup of the database?a. 1, 2, 3b. 1, 3, 2c. 2, 3, 1d. 2, 1, 3Correct Answer: -> d

    39/ Global Systems Inc. provides IP addresses dynamically to a large number of clients usingDHCP server in Windows Server 2003 environment. Recently, the clients have been complainingthat they are not getting proper service from the DHCP server. The system administrator, DavidWong, has identified that some DHCP administrator is employing denial-of-service attack on theDHCP server. So, the authorized clients are facing problems. David needs to solve the problem,

    but first he must restrict administration of the DHCP service. Which of the following guidelinesshould he follow?a. Change the default permissions of the DHCP folder.b. Enable audit logging for each DHCP server on his network.c. Add users to the DHCP Users group instead of DHCP Administrators group if users need read-only access to the DHCP console.d. Provide read permissions to users who analyze the DHCP server log files.Correct Answer: -> c

    40/ You are the system administrator at Red Sky Inc. The organization has a network of 300

  • 8/4/2019 Q6 Review (Ans)

    10/25

    systems. The RAS on the network is running on Windows Server 2003. Some files on the RASare corrupted because of a virus attack and you need to repair this fault. To repair the fault youdecide to shut down the system at 6 PM. You want to notify all the clients about the unavailabilityof server after 6 PM. To notify all the clients you need to perform the following steps:1. Open Routing Remote Access console.2. Select the Send to All command to display the Send Message dialog box.3. Select Remote Access Clients and right-click to display the shortcut menu.4. Type the message in the Message text area that the RAS server will not be available after 6PM.What is the correct sequence of steps you should follow to meet the requirements?a. 1, 2, 3, 4b. 1, 2, 4, 3c. 1, 3, 2, 4d. 1, 3, 4, 2Correct Answer: -> c

    41/ Blue Moon Computers has various departments located at different locations. All thedepartments are connected to the head office and to each other through the corporate network.The research and development department of the organization receives and generates a lot ofnetwork traffic. This network traffic slows down the entire network processing. What should you,

    as the system administrator at Blue Moon Computers do to troubleshoot this problem?a. Configure packet filters.b. Increase the number of routers in the network.c. Change the routing protocol used.d. Increase the RAM of the server.Correct Answer: -> a

    42/ Consider the following statements:Statement A: Profile is the setting that defines various parameters for accessing an organizationsprivate network.Statement B: Conditions are a collection of settings that are applied to a specific connection.

    Which of the following is true with respect to the above statements?

    a. Both statement A and statement B are false.b. Both statement A and statement B are true.c. Statement A is true and statement B is false.d. Statement B is false and statement B is true.Correct Answer: -> a

    43/ You are the system administrator at BlueMoon Computers. Two marketing executives, Jamesand Suzan, work at Houston and Denver respectively. You configure VPN support for the twomarketing executives. The organizations head office is situated in Atlanta. James accesses theinternal network of the organization from Houston and Suzan from Denver. The managingdirector suspects that James is trying to leak out some financial information related to theorganization projects. The managing director wants you to make sure that each user accessesthe database of the organization according to access permissions specified by him. What should

    you do to fulfill the requirements of the managing director?a. Configure Remote Access Policy, user accounts for remote access, and Remote Access PolicyProfile.b. Configure Remote Access Policy and Remote Access Policy Profile.c. Configure user accounts for remote access and Remote Access Policy Profile.d. Configure Remote Access Policy and user accounts for remote access.Correct Answer: -> a

    44/ You are the system administrator at BlueMoon Computers. The internal network of theorganization connects all the computers together. A DNS server is installed in the network of the

  • 8/4/2019 Q6 Review (Ans)

    11/25

    organization to resolve host names to their corresponding IP addresses. Various projects aregoing on in the organization. The information related to the projects is confidential. A projectmanager complains that somebody modified the data related to his project. He also suspects thatsomebody else is also receiving the data he sends to his team members. He is afraid that if theinformation related to the project is leaked out to the competitors of the organization, theorganization might face heavy financial loss. What should you do to make sure that theorganization does not face any such financial loss?a. Use network monitoring utility, Domain Controller Diagnostic Tool (Dcdiag), to check the IPaddress corresponding to the DNS name.b. Use network monitoring utility, Nslookup, to check the IP address corresponding to the DNSname.c. Use network monitoring utility, Hostname, to check the IP address corresponding to the DNSname.d. Use network monitoring utility, Ipconfig, to check the IP address corresponding to the DNSname.Correct Answer: -> b

    45/ Consider the following statements:Statement A: A DNS server resolving a recursive query responds with the IP address of theauthoritative server.

    Statement B: A DNS server resolving an iterative query responds with the exact IP address of theclient whose name is to be resolved.

    Which of the following is true with respect to the above statements?a. Both statement A and statement B are true.b. Statement A is true and statement B is false.c. Statement A is false and statement B is true.d. Both statement A and statement B are false.Correct Answer: -> d

    46/ You are the system administrator at Red Sky IT Systems. The organization has variousdepartments, such as Accounts, Sales, and IT and a setup with one server and 50 clientcomputers. The server has Windows Server 2003 installed on it and the clients have Windows 98

    installed on them. DHCP service is installed on the server to assign IP addresses automatically tothe clients. Each department is in a different subnet. Now, you want to add a new computer to thenetwork and the computer does not have any IP address. In addition, no DHCP server isavailable to assign IP address to the new computer. The new computer is trying to locate theDHCP server by sending a message known as DHCPDISCOVER but the DHCP server is notresponding. In such a situation what should be configured on the Windows Server 2003 computerso that the new computer can be a part of the network?a. User configured Alternate Configuration.b. Automatic Private IP Addressing.c. Boot Threshold.d. DHCP Relay Agent.Correct Answer: -> b

    47/ Which certificate attribute defines the data regarding the entity that requests certificates fromthe CA?a. Version.b. Serial number.c. Validity period.d. Subject name.Correct Answer: -> d

    48/ Which component of network access infrastructure enables an Internet Service Provider (ISP)to connect remote users to an enterprise network or the Internet?

  • 8/4/2019 Q6 Review (Ans)

    12/25

    a. Network Access Server.b. Network Access Clients.c. Authentication Service.d. Active Directory.Correct Answer: -> a

    49/ Which class of IP addresses is used for very large networks?a. Class A.b. Class B.c. Class C.d. Class D.Correct Answer: -> a

    50/ You are the system administrator at BlueMoon Computers. The organization is a mediumsized organization having 500 computers at a single location. The organization has six differentdepartments performing different tasks. The database administrator of the organization complainsto you that managing data of all computers using a single network is difficult. The networkperformance also degrades because of the traffic over the network. He also complains thathaving all the computers in a single network makes it difficult to locate a computer over thenetwork. Changing the configuration of the computers according to needs of the new projects is

    also a tedious task. What should you do to help the database administrator solve the problem?a. Divide the network of the organization into six subnets, one for each department.b. Install six different servers one for each department.c. Increase the total storage space on the main server.d. Increase the processing speed of the existing server.Correct Answer: -> a

    51/ You are the system administrator at Blue Moon Inc. The organization's network has 200computers. You have installed a DHCP server on the network to dynamically assign IP addressesto the clients. The computer used by James is not available on the network even after it isproperly connected. You want to check the computer's Host name, Physical Address, IP address,Subnet Mask, and Default Gateway. How will you obtain this information?a. Run Ipconfig command with /renew option on the computer's command prompt.

    b. Run Ipconfig command with /all option on the computer's command prompt.c. Run Ipconfig command on the computer's command prompt.d. Run Ipconfig command with /release option on the computer's command prompt.Correct Answer: -> b

    52/ Which database file is used by the DHCP database as a swap file during databasemaintenance?a. Dhcp.mdbb. Res1.logc. Tmp.edbd. J50.chkCorrect Answer: -> c

    53/ You are the system administrator at Red Sky IT Systems. The organization currently has aset up with two servers and 50 clients. The servers have MS Windows Server 2003 installed on itand the 50 clients have either Windows XP Professional or Windows 98 installed. The networkcontains two routed subnets: Subnet A and Subnet B. Each subnet contains a Windows Server2003 system configured as a DHCP server. The clients on Subnet A and Subnet B receive IPaddresses from their DHCP servers. The machine on which server of subnet A is configured isoutdated and crashes frequently. The users of subnet A communicate with the users of subnet Busing the DHCP network. The employees of subnet A complain that they are unable tocommunicate with either each other or the users of subnet B due to which their project work isdelayed. However, the users of the subnet B are able to communicate with each other as before.

  • 8/4/2019 Q6 Review (Ans)

    13/25

    What should you do to enable the users of subnet A also communicate as before and completetheir projects in time?a. Take backup of the scope and configuration settings of users of subnet A using Tmp.edb file ofDHCP database backup, and then restore the settings.b. Take backup of the scope and configuration settings of users of subnet A using J50.log file ofDHCP database backup, and then restore the settings.c. Take backup of the scope and configuration settings of users of subnet A using J50.chk file ofDHCP database backup, and then restore the settings.d. Take backup of the scope and configuration settings of users of subnet A using Dhcp.mdb fileof DHCP database backup, and then restore the settings.Correct Answer: -> d

    54/ James is the system administrator at Smart Software Development. James is using the ARPcommand. Which parameter of ARP command should he use to display the current entries in theARP cache for all interfaces?a. -db. -Nc. -ad. -gCorrect Answer: -> c

    55/ What is the maximum number of characters that the host name of a computer can have?a. 255b. 250c. 200d. 300Correct Answer: -> a

    56/ You are the system administrator at BlueMoon Computers. The organization uses a WINSserver to implement NetBIOS name resolution service. You find that the requests made by theWINS clients are not fulfilled in the expected time. You also notice that the WINS clients arefacing difficulty in retrieving data from the WINS database. This is because the records of thenames that are no longer in use overcrowd the WINS database. The names are marked as

    extinct but are not scavenged from the database. Which scavenging parameter will you set toautomatically scavenge the entries from the database after they are marked as extinct?a. Renewal interval.b. Extinction interval.c. Extinction timeout.d. Verification interval.Correct Answer: -> c

    57/ You are the system administrator at BlueMoon Computers. The internal network of theorganization contains a DNS server to process the queries of the client computers over thenetwork. The employees using the DNS server complain about the slow processing speed of theDNS server. The DNS server of the network stores the entire project related data, the queriessubmitted to the server, and the results of the queries. The employees have to wait for a

    considerably long period to get the results of the queries they submit to the DNS server. This isdelaying the projects they are working on and degrading their overall performance. What shouldyou do to solve the problem?a. Configure DNS server as Authoritative Server so that it stores only the results of the queries.b. Configure DNS server as Primary Server so that it stores only the results of the queries.c. Configure DNS server as Caching-only server so that it stores only the results of the queries.d. Configure DNS server as Secondary Server so that it stores only the results of the queries.Correct Answer: -> c

    58/ You are the system administrator at WorldAd, Inc. The organization has a network of 5000

  • 8/4/2019 Q6 Review (Ans)

    14/25

    systems. The network has a DNS server that provides host name resolution services on thenetwork. The DNS server maintains a database of resource records to provide host nameresolution service. When a large number of expired records accumulate on the DNS server, itsdisks run out of space. You have to clean the disks every time manually by deleting expiredresource records. How will you overcome this problem?a. Increase the TTL value for the resource records.b. Remove the outdated records from the DNS server's disk.c. Configure the entire client computers for dynamic updates to the DNS database.d. Configure aging and scavenging on the DNS server.Correct Answer: -> d

    59/ Which characteristic of IAS enables you to use it in various network configurations of varyingsize?a. Easy administrationb. Scalabilityc. Centralized user authenticationd. Centralized user authorizationCorrect Answer: -> b

    60/ Consider the following statements:

    Statement A: Performance of network access services needs to be periodically monitored torecord remote network access details.Statement B: Periodic performance monitoring of network access services is not useful fortracking inefficient use of network access services.Which of the following is true with respect to above statements?a. Both statement A and statement B are false.b. Both statement A and statement B are true.c. Statement A is false and statement B is true.d. Statement A is true and statement B is false.Correct Answer: -> d

    61/ You are the system administrator at Red Sky Inc. the organization's network consists of 500systems with Windows Server 2003 servers. An authorized remote user can access the shared

    files available on servers. You are asked to keep track of network access activities using routingand remote access logging characteristics provided by RRAS. In addition, you are asked toperform the following activities:Maintain a detailed record of all remote access requests.Log names of remote access policies for all the connection attempts.You want to use the information available in the above logs for judicial enforcement of remoteaccess policies. How will you meet the requirements?a. Configure the server to allow Local Authentication and Account logging.b. Configure the server to allow Point-to-Point logging.c. Configure the server to allow Event logging.d. Configure the server to allow Audit logging.Correct Answer: -> a

    62/ You are the system administrator at the Houston branch of BlueMoon Computers. Theorganization is hiring people at all levels and needs to be in constant touch with the HR Managerat the head office in Atlanta. In this case, you choose to configure RRAS on the server of HRdepartment and connect it to the head office through a dedicated phone line. So you areessentially connecting two distant network segments using RRAS. The server is currentlyinstalled with Windows Server 2000. The computers in the network need to send the data packetsto each computer separately even if the packets are dedicated for all the computers over thenetwork. This wastes valuable time, which could otherwise be used in serving other requests ofthe clients. What should you do so that the valuable time of the server could be utilized in servingmost of the requests of the clients, and why?

  • 8/4/2019 Q6 Review (Ans)

    15/25

    a. Upgrade the server with Windows Server 2003 because Unicast routing feature of WindowsServer 2003 allows a computer to send packets addressed for the entire network.b. Upgrade the server with Windows Server 2003 because Demand-dial routing feature ofWindows Server 2003 allows a computer to send packets addressed for the entire network.c. Upgrade the server with Windows Server 2003 because Network Address Translation featureof Windows Server 2003 allows a computer to send packets addressed for the entire network.d. Upgrade the server with Windows Server 2003 because Multicast routing feature of WindowsServer 2003 allows a computer to send packets addressed for the entire network.Correct Answer: -> d

    63/ You are the system administrator at the Houston branch office of BlueMoon Computers. Thehead office is located at Atlanta. The users at the branch office are unable to access thecomputers at head office. You need to check the communication link between the local clientcomputer and the remote host computer. What will you do to verify the same?a. Ping loopback address.b. Ping local client IP address.c. Ping default gateway.d. Ping IP address of remote host.Correct Answer: -> d

    64/ You are the system administrator at BlueMoon Computers. You configure the internal networkof a new branch of the organization. You configure the computers on the network by assigningNetBIOS names to them. The project managers of different projects complain about the difficultythey are facing because of mismanagement of network resources. The project managers areunable to locate the network resources, such as files and printers. The team members alsocomplain of the same difficulty. Due to these problems, the project work is delayed most of thetime. What arrangements should you make to resolve this problem?a. Assign unique NetBIOS names to all network resources.b. Assign group NetBIOS names to all network resources.c. Assign Multihomed NetBIOS names to all network resources.d. Assign Internet Group NetBIOS names to all network resources.Correct Answer: -> d

    65/ Jim Lewis is working as the system administrator in Global Systems Inc. The organizationuses DHCP server in Windows Server 2003 environment to provide IP addresses dynamically toa large number of clients. Jim needs to monitor the performance of the DHCP server consistentlyto ensure that the clients remain satisfied. He uses the Performance console utility to monitor theDHCP server performance. While monitoring the server performance, Jim finds that the value of aperformance counter, requests/second, has increased suddenly. What does this indicate?a. There is heavy DHCP related message traffic to and from the DHCP server.b. A large number of clients are trying to renew their leases with the DHCP server.c. The DHCP server is not being able to handle the load of requests.d. The DHCP server is not responding fast enough.Correct Answer: -> b

    66/ The internal network of Blue Moon Computers has a computer with Windows Server 2003

    installed on it. The organization has its head office located at Atlanta and the productiondepartment is located at Houston. You are the system administrator at Blue Moon Computers.The Managing Director of the organization wants you to connect the production department atHouston to the corporate network. What is the correct sequence of steps that you should follow toaccomplish the task?a. Configure Routing and Remote Access Service (RRAS).Add routing protocol.Add routing interface.b. Add routing protocol.Configure Routing and Remote Access Service (RRAS).

  • 8/4/2019 Q6 Review (Ans)

    16/25

    Add routing interface.c. Add routing protocol.Add routing interface.Configure Routing and Remote Access Service (RRAS).d. Configure Routing and Remote Access Service (RRAS).Add routing interface.Add routing protocol.Correct Answer: -> a

    67/ Global Systems Inc, a Business Process Outsourcing (BPO) based organization, providesinsurance related services to its clients. It needs to transfer large number of files and generates alot of network traffic. The organization works on Windows Server 2003 environment and hasasked the network administrator John Barrett to deal with the problem of excessive traffic. Johnknows that he can solve the problem by implementing packet filtering technique. To implementpacket filtering technique following steps need to be performed initially:1. Click Start-> Settings-> Control Panel to open the Control Panel window.2. Select Administrative Tools icon to open the Administrative Tools window.3. Click Routing and Remote Access icon to open the Routing and Remote Access window.4. Expand TESTDOMAIN(local) server and then expand the IP Routing folder. Click on Generaland then in the pane right-click Local Area Connection.

    What should be the order of above steps so that the packet filtering technique can beimplemented successfully?a. 1, 2, 3, 4b. 1, 3, 2, 4c. 1, 3, 4, 2d. 1, 2, 4, 3Correct Answer: -> a

    68/ Consider the following statements:Statement A: Assign a Static IP Address dial-in property allocates a specific IP address to anauthenticated user.Statement B: Apply Static Routes dial-in property specifies the static IP routes assigned to aremote user and are added to the routing table of the server.

    Which of the following is true with respect to the above statements?a. Both statement A and statement B are false.b. Both statement A and statement B are true.c. Statement A is true and statement B is false.d. Statement B is false and statement B is true.Correct Answer: -> b

    69/ The database of Blue Moon Computers contains confidential information. The informationneeds to be secured from any unauthorized access. The organization works in coordination withRed Sky Inc. The employees of Red Sky Inc. need to remotely access the database to get projectrelated data. You are the system administrator at BlueMoon Computers. The databaseadministrator tells you that the he can keep a watch on the type of the data being remotely

    accessed from the database only between 8 A.M. to 11 A.M. The project manager of yourorganization wants that the employees of Red Sky Inc. should not be allowed to modify the datain the database. What should you do to satisfy the needs of both the database administrator andthe project manager?a. Use Remote Access Policy component, Conditions, to restrict remote access to the database.b. Use IP properties parameter of Remote Access Policy component, Profile, to restrict remoteaccess to the database.c. Use Multilink parameter of Remote Access Policy component, Profile, to restrict remote accessto the database.d. Use Encryption parameter of Remote Access Policy component, Profile, to restrict remote

  • 8/4/2019 Q6 Review (Ans)

    17/25

    access to the database.Correct Answer: -> a

    70/ You are the system administrator at BlueMoon Computers. All the computers in theorganization are connected using an internal network. An employee transfers a file containing thedetails of the development plans. The size of the file is 300 MB. The employee complains that thetime taken to transfer the file is much more than expected. Sometimes, the computer hangs whiletransferring the file. Why is this problem arising?a. Incorrect network cable connections.b. Malfunctioning of a network connectivity component, such as a hub, a router, or a switch.c. Excessive network collision.d. Improper configuration of the software used in the network.Correct Answer: -> c

    71/ Which of the following are predefined IPSec policies in Windows Server 2003?a. Server only.b. Client and Server only.c. Client, Server, and Secure Server only.d. Server and Secure Server only.Correct Answer: -> c

    72/ Which switch is used with the Ipconfig command to release and reset the content of theclients DNS cache?a. /flushdnsb. /releasec. /displaydnsd. /renewCorrect Answer: -> a

    73/ You are the system administrator at BlueMoon Computers. The organization has its headoffice at Atlanta and two branch offices at Denver and Houston. The branch offices are connectedto the head office at Atlanta. The employees at the head office and the two branch offices need tocommunicate with each other. The employees also use the network to send confidential

    information related to their projects to each other. For this, data should be transmitted over thenetwork without any errors. What should you do to ensure the confidentiality of the data andproper coordination among the employees at different offices?a. Use the statistics generated by Network Monitor to analyze and resolve the data transmissionissues in the network by performing the following steps:1. Install Network Monitor.2. Set filter for capturing ICMP frames.3. Capture ICMP frames.4. Examine packets.b. Use the statistics generated by Network Monitor to analyze and resolve the data transmissionissues in the network by performing the following steps:1. Set filter for capturing ICMP frames.2. Install Network Monitor.

    3. Capture ICMP frames.4. Examine packets.c. Use the statistics generated by Network Monitor to analyze and resolve the data transmissionissues in the network by performing the following steps:1. Install Network Monitor.2. Set filter for capturing ICMP frames.3. Examine packets.4. Capture ICMP frames.d. Use the statistics generated by Network Monitor to analyze and resolve the data transmissionissues in the network by performing the following steps:

  • 8/4/2019 Q6 Review (Ans)

    18/25

    1. Install Network Monitor.2. Capture ICMP frames.3. Set filter for capturing ICMP frames.4. Examine packets.Correct Answer: -> a

    74/ You are the system administrator at Blue Moon Inc. James is a programmer in theorganization. All the employees, including James, use laptops for their work. The new projectneeds to be developed in very stringent timelines. So the employees need to work from home aswell. Whenever James uses the laptop at home, its network configuration has to be changed. Toconfigure an alternate IP address for James' computer you perform the following steps:1. Click the Properties button on the Local Area Connection Status dialog box. Check the InternetProtocol (TCP/IP) check box, and click the Properties button.2. Open Network Connections window from the Control Panel click the Local Area Connectionicon to open Local Area Connection dialog box.3. Click the Alternate Configuration tab in the Internet Protocol (TCP/IP) Properties dialog box.4. Select the User Configured option and enter appropriate IP address and subnet mask.What is the correct sequence of steps to configure an alternate IP address for James' computer?a. 1, 2, 3, 4b. 2, 1, 3, 4

    c. 3, 1, 2, 4d. 2, 3, 1, 4Correct Answer: -> b

    75/ You are the system administrator at BlueMoon Computers. You have established the internalnetwork of the organization, which connects all the computers. You assign host names andNetBIOS names to the computers on the network. Different applications run on differentcomputers. An application running on a computer needs to communicate with another computeron the network to request for some information. The application sends a host name to the DNSclient service. The following steps are performed:1. DNS server sends the request to the NetBIOS name resolution process.2. DNS client service seeks the required host name in the client resolver cache.3. DNS client service seeks the host name query to the DNS server.

    4. The corresponding IP address is returned to the application on success.What is the correct sequence of steps that is followed when the DNS client service resolves thehost name to the corresponding IP address?a. 3, 2, 1, 4b. 2, 3, 1, 4c. 1, 2, 3, 4d. 2, 1, 3, 4Correct Answer: -> b

    76/ You are the system administrator at Blue Moon Computers. The organization uses a WINSserver to implement NetBIOS name resolution service. You want to know the IP addresses of theWINS clients on the WINS server and their corresponding owner name. Which file of the Jetdatabase used by the WINS server will you check to get the desired information?

    a. J50.chkb. Wins.mdbc. J50.log and J50#####.logd. Winstmp.mdbCorrect Answer: -> b

    77/ You are the system administrator at Red Sky Corp. The organization has a DNS server at thehead office in Luxemburg. The DNS server provides host name resolution to the remote clientcomputers. The client requesting the DNS server for the host's IP address complains aboutoutdated resource records. What can be the cause of the problem?

  • 8/4/2019 Q6 Review (Ans)

    19/25

    a. TTL value for the resource records is very small.b. TTL value for the resource records is not set.c. TTL value for the resource records is very large.d. TTL value for the resource records is set to zero.Correct Answer: -> c

    78/ You are the system administrator at WorldAd, Inc. The organization has its offices at differentcities across the country. The DNS server located at the organization head office providesdomain name resolution for the client system. A client system at the branch office requests theDNS server for the IP address related to a host name. The DNS server keeps resource records incache for a fixed time to provide the domain name resolution to clients. You find that the TTLvalue for the resource records is set to 4000 seconds. The DNS server has been facing a heavyDNS traffic since last week. How will you resolve the problem of heavy DNS traffic?a. Decrease the TTL value for the resource records maintained at the client and DNS server.b. Increase the TTL value so that it is neither too small nor too large for the resource recordsmaintained at the client and DNS server.c. Increase the TTL value to hundreds of times for the resource records maintained at the clientand DNS server.d. Set the TTL value to zero for the resource records maintained at the client and DNS server.Correct Answer: -> b

    79/ You are the system administrator at WorldAd Corp. The organization has a network of 300computers running Windows Server 2003. Peter wants to access a remote Linux server throughTelnet. IP address of Peter's machine is 192.168.7.68. You want to implement an IP securitypolicy so that only Peter can access the Linux server. All other users should be denied access tothe Linux server through Telnet connection. What will you do to meet the requirements?a. Negotiate a Telnet connection from 192.168.7.68 and block the Telnet connection from allother users using a rule.b. Negotiate a Telnet connection from 192.168.7.68 and block the Telnet connection from allother users using a filter of a rule.c. Negotiate a Telnet connection from 192.168.7.68 and block the Telnet connection from allother users using two filters of a rule.d. Negotiate a Telnet connection from 192.168.7.68 using a rule and use another rule to block the

    Telnet connection to all other users.Correct Answer: -> d

    80/ What is specified by the centralized user authentication property of IAS?a. Allows centralized auditing and remote network access accounting of network access servers.b. Allows easy administration of the network using graphical user interface and remotemonitoring.c. Allows an organization to authorize remote users through Remote Access Policy.d. Allows an organization to verify the identity of remote users centrally.Correct Answer: -> d

    81/ You are the system administrator of Red Sky Corp. The domain in the organization networkhas two Windows Server 2003 member server computers named Server 1 and Server 2. Routing

    and Remote Access Service is enabled for remote access on Server 2. IAS is installed on Server1. Server 2 uses Server 1 to authenticate remote access credentials. The remote access policieson Server 1 specify that domain members are allowed remote access to the network. However,users report that they are not allowed to dial in to Server 2. You need to identify the cause of theproblem and suggest a solution to resolve the problem. How will you accomplish the task?a. Server 1 is configured to support only local user accounts. Add a remote access policy thatuses MS-CHAP on Server 1 to resolve the problem.b. Server 1 is configured to support only local user accounts. Configure Routing and RemoteAccess on Server 1 to use RADIUS Authentication to resolve the problem.c. Server 1 is configured to support only local user accounts. Add a realm replacement rule for

  • 8/4/2019 Q6 Review (Ans)

    20/25

    the Windows Server 2003 domain on Server 1 to resolve the problem.d. Server 1 is configured to support only local user accounts. Add Server 1 to the RAS and IASServers group in Active Directory to resolve the problem.Correct Answer: -> d

    82/ You are the system administrator at Red Sky IT Systems, which has many departments, suchas Accounts, Sales, and IT. Each department has its own network. Therefore, connection isrequired between the departmental networks so that devices are able to send messages to eachother within a network or across multiple networks. To make a connection between the differentnetworks of Red Sky IT Systems you are required to make a computer function as a router usingWindows Server 2003 Routing and Remote Access Service. The internal network infrastructure ofthe organization changes from time to time according to the requirements of the new projects.The communication between the various computers should be as fast as possible. As a systemadministrator, what should you do to provide fast and efficient communication between thevarious computers over the network?a. Use static routing on Windows Server 2003.b. Use dynamic routing by implementing Routing Information Protocol V1 (RIP V1) on WindowsServer 2003.c. Use dynamic routing by implementing Routing Information Protocol V2 (RIP V2) on WindowsServer 2003.

    d. Use dynamic routing by implementing Open Shortest Path First (OSPF) on Windows Server2003.Correct Answer: -> d

    83/ You are the system administrator at Red Sky IT Systems. You are responsible for monitoringthe network and troubleshooting network problems. The users of the network complain of slowconnection speed. The cause of the slow connection speed is diagnosed as excessive collision inthe network due to large amount of unauthorized data transfer. Which utility would you use todetect the same?a. Network Monitor.b. Nslookup.c. Ipconfig.d. Netstat.

    Correct Answer: -> a

    84/ You are the system administrator at BlueMoon Computers. You have established the internalnetwork of the organization. You have set one computer as a DHCP server with Windows Server2003 installed on it. All other computers receive their IP addresses from the DHCP server. Whilemonitoring the performance of the DHCP server, you decided to view DHCP statistics. For this,you want to enable DHCP server statistics to refresh automatically. To enable DHCP serverstatistics and to refresh automatically, you need to perform the following steps:1. Select the DHCP server in the DHCP console.2. Select the Automatically update statistics every option and configure Hours and Minutes textboxes appropriately and Click the Ok button.3. Select the Properties option from the Action menu.4. Select the DHCP server in the console tree.

    5. Select the Display Statistics from the Action menu.What is the correct sequence of steps to enable DHCP server statistics to refresh automaticallyand to view the DHCP server statistics?a. 1, 2, 3, 4, 5b. 1, 3, 2, 4, 5c. 1, 4, 3, 2, 5d. 1, 2, 4, 3, 5Correct Answer: -> b

    85/ Global Systems Inc. is a multinational organization and deals with a number of business

  • 8/4/2019 Q6 Review (Ans)

    21/25

    operations. It has separate departments for respective operations. John Barrett, the systemadministrator in Global Systems Inc., has connected a computer in the IT department with acomputer in the manufacturing section using a router. Why has he done this?a. To minimize delayb. To minimize loadc. To optimize use of network bandwidthd. To ensure reliable data flowCorrect Answer: -> c

    86/ The database of Blue Moon Computers contains confidential information. The informationneeds to be secured from any unauthorized access. The organization works in coordination withRed Sky Inc. The employees working on a project need to send confidential information using anexternal network. You are the system administrator at Blue Moon Computers. The projectmanager tells you that if any unauthorized person accesses the information while it is transferredfrom their computer to the client's computer, it can cause a heavy financial loss to theorganization. How can you make sure that such a loss does not occur?a. Use Dial-in constraint parameter of Remote Access Policy component, Profile, to restrictremote access to the database.b. Use IP properties parameter of Remote Access Policy component, Profile, to restrict remoteaccess to the database.

    c. Use Multilink parameter of Remote Access Policy component, Profile, to restrict remote accessto the database.d. Use Encryption parameter of Remote Access Policy component, Profile, to restrict remoteaccess to the database.Correct Answer: -> d

    87/ You are the system administrator at Blue Moon Computers. The organization has variousdepartments. Each department has its separate internal network. Many new air conditioners areinstalled in the production department. The cables providing electric power to the air conditionersrun side-by-side to the cables connecting the various computers in the organization. An employeeof the production department complains that he is unable to send and receive messages from anyother computer over the network. What do you think is the reason of the problem?a. Assignment of same IP address to more than one computer in the network.

    b. Changed configuration of the network connectivity component, such as a hub, a router, or aswitch.c. Changed path of the signals passing through the network cables due to interference betweenthe electric cables and the network cables.d. Effect of the electricity in the electric cables on the wavelength of the signals passing throughthe network cable.Correct Answer: -> c

    88/ You are the system administrator at Red Sky IT Systems. Red Sky IT Systems has variousdepartments, such as Accounts, Sales, and IT and a network setup with one server and 50 clientcomputers. The server has MS Windows Server 2003 installed on it and the clients haveWindows 98 installed on them. You install DHCP service on the server to assign IP addressesautomatically to the clients. Each department is in a different subnet. The Accounts department

    requires a different default gateway. Therefore, DHCP clients of the Accounts department requiresimilar configuration settings. You want to save the effort of specifying the similar TCP/IP settingsmanually for each client computer in the Accounts department. What would you do to configuresimilar TCP/IP settings for the Accounts department?a. Configure DHCP options using Server-level option.b. Configure DHCP options using Scope-level option.c. Configure DHCP options using Reserved Client-level option.d. Configure DHCP options using Class-level option.Correct Answer: -> d

  • 8/4/2019 Q6 Review (Ans)

    22/25

    89/ Which component of a rule in IPSec policy specifies the network traffic on which action needsto be performed?a. Filter Actionb. Filterc. Authentication Methodd. CertificatesCorrect Answer: -> b

    90/ You are the system administrator at Blue Moon Inc. The organization has decided to establisha local area network consisting of 250 computers at its new branch office. You are assigned thetask of configuring all the network settings for this LAN. The LAN has a DNS server with DHCPservices installed. You need to configure DHCP scope for the DNS server. What should beconsidered while configuring DHCP scope for the server?a. Network ID, Subnet mask, Network IP address range, Lease duration, Reservation name, andExclusion range.b. Network ID, MAC address, Reservation name, Lease duration, Router, Scope name, andExclusion range.c. Network ID, Subnet mask, Network IP address range, Lease duration, Router, Scope name,and Exclusion range.d. Network ID, Lease duration, Router, Scope name, and Exclusion range.

    Correct Answer: -> c

    91/ You are the system administrator at Red Sky IT Systems. The organization currently has aset up with two servers and 50 clients. The servers have MS Windows Server 2003 installed onthem and the 50 clients have either Windows XP Professional or Windows 98 installed. Thenetwork contains two routed subnets: Subnet A and Subnet B. Each subnet contains a WindowsServer 2003 system configured as a DHCP server. The clients on Subnet A and Subnet B arereceiving IP addresses from their DHCP servers. The DHCP servers maintain the DHCPdatabase. Therefore you are required to secure the DHCP database from unauthorized users.What arrangements will you make to secure the DHCP database?a. Keep the default permissions of the DHCP folder.b. Provide Write and execute permissions to the users who are responsible for analyzing theDHCP server log files.

    c. Change the permission of System group of DHCP folder to read and execute.d. Remove the Authenticated Users and Power Users to minimize the access of DHCP folder.Correct Answer: -> d

    92/ Which of the following NetBIOS computers provides Routing and Remote Access services?a. Computer1 [00h]b. Computer2 [03h]c. Computer2 [06h]d. Computer4 [20h]Correct Answer: -> c

    93/ You are the system administrator at BlueMoon Computers. You are reviewing the networktraffic and notice that there are a large number of DNS queries for resolving the host name of the

    File server in the network. You also find that the network services are becoming slow because ofthe DNS queries and irrelevant network traffic for the File server. You decide to configure theentry of the File server in the Hosts file on each computer. The Hosts file will be preloaded in theclient resolver cache. You also plan to add name-to-IP address mapping to the Lmhosts file sothat the NetBIOS names in the organization can be resolved. What is the correct sequence ofsteps you should take to accomplish this task?a. View and flush client resolver cache.Preload the client resolver cache.View and release NetBIOS name cache.b. Preload the client resolver cache.

  • 8/4/2019 Q6 Review (Ans)

    23/25

    View and flush client resolver cache.View and release NetBIOS name cache.c. View and flush client resolver cache.View and release NetBIOS name cache.Preload the client resolver cache.d. View and release NetBIOS name cache.Preload the client resolver cache.View and flush client resolver cache.Correct Answer: -> a

    94/ James is the system administrator at Red Sky Inc. The organization has a network of 2000systems and a DNS server provides domain name resolution services to the client systems. Peteris using a client system that is configured for automatic dynamic update. The system registers itshost resource records automatically into the DNS database. Peter's system has a power failureand is not available on the network. What can be its consequence?a. DNS server will not provide host name resolution to any client.b. DNS server will maintain an outdated resource record in the DNS database.c. DNS server will not provide host name resolution for Peter's system.d. DNS server will show an increase in response time.Correct Answer: -> b

    95/ You are the system administrator at the Houston branch of BlueMoon Computers. Theorganization has an internal network. The users of the HR department of the organization accessthe Internet using unique dial-up connections. The organization is facing financial loss due to this.The CEO of the organization wants you to make some arrangements to restrict the access to theInternet so that the financial loss could be minimized. As the system administrator, what actionshould you take to fulfill the requirements of the CEO?a. Upgrade the server with Windows Server 2003 because Unicast routing feature of WindowsServer 2003 allows you to share a single public IP address and Internet connection.b. Upgrade the server with Windows Server 2003 because Demand-dial routing feature ofWindows Server 2003 allows you to share a single public IP address and Internet connection.c. Upgrade the server with Windows Server 2003 because Network Address Translation featureof Windows Server 2003 allows you to share a single public IP address and Internet connection.

    d. Upgrade the server with Windows Server 2003 because Multicast routing feature of WindowsServer 2003 allows you to share a single public IP address and Internet connection.Correct Answer: -> c

    96/ You are the system administrator in Best Paints, Inc. The head office of the organization hasimplemented a class-based class B addressing structure. One of the employees, Chris,complains that he is unable to connect to the file server of the organization and an errormessage, Invalid subnet mask is being displayed on his computer. You check the TCP/IPproperties configured on Chriss computer and find that the subnet mask has been incorrectlyspecified. Identify the correct subnet mask for Chriss computer.a. 255.255.255.0b. 255.255.255.255c. 255.255.0.0

    d. 255.0.0.0Correct Answer: -> c

    97/ You are the system administrator at Best Software Solutions. The head office and the branchoffices of the organization have implemented TCP/IP network infrastructure without Internetaccess. You need to assign IP addresses to the two new workstations assigned to two recruits.However, when you connect to the DHCP server, you find that the DHCP server has beenshutdown for its periodic maintenance. Which of the following methods can you use to assign IPaddresses to the new computers?a. DHCP reserved addressing

  • 8/4/2019 Q6 Review (Ans)

    24/25

    b. Manual addressingc. APIPAd. Dynamic addressingCorrect Answer: -> c

    98/ Consider the following statements:Statement A: Classless-based addressing structures are a 24-bit long stream of zeros and ones.Statement B: The separation bit that separates the network ID and the host ID in a classless-based addressing structure can be between bit 0 and bit 31.Statement C: Classless-based addressing enables you to specify customized subnet masks,according to the num0ber of subnets in the network.Which of the following is correct about the above statements?a. Statements B and C are True.b. Statements A and B are True.c. Only Statement B is True.d. Statements A and C are True.Correct Answer: -> a

    99/ The head office of Skylight, Inc. is located at Mexico City. The network setup of theorganization consists of 50 computers running on Windows Server 2003. The branch office of this

    organization is located at Denver. The network setup of the branch office consists of 25computers running on Windows Server 2003 with one DHCP server to provide automatic IPaddressing. One computer is promoted as a domain controller at each location. Which of thefollowing methods will you use to secure DHCP servers in the network?a. Use Windows Server 2003 usersb. Authorize DHCP servers in Windows Server 2003c. Use Windows Server 2003 groupsd. Authorize DHCP servers in Active DirectoryCorrect Answer: -> d

    100/ You are the system administrator of StarMoon Technologies. The head office of StarMoonTechnologies is located at Boston and the branch office is located at Paris. The head office isconnected to the branch office using slow WAN links. You notice that the DNS server takes a

    long time in resolving names. To troubleshoot this problem, you want to restrict the Internet usersfrom accessing the DNS server of your organization for resolving names. Which of the followingoptions will enable you to accomplish this task?a. Configure a caching-only server at the Paris branch office.b. Configure the DNS server located at the head office as a conditional forwarder.c. Configure the DNS server located at the head office as a forward-only server.d. Configure the DNS server located at the head office as a non-recursive server.Correct Answer: -> b

    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

    d c c a b c a b d b a a b c b c b d b c

    21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40b c d d c b c a d b a b c b b a a d c c

    41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60

    a a a b d b d a a a b c d c a c c d b d

    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80

    a d d d b a a b a c c a a b b b c b d d

  • 8/4/2019 Q6 Review (Ans)

    25/25

    81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100

    d d a b c d c d b c d c a b c c c a d b