MCSE 70-293 Exam Quiz Test 2

50 Questions  I  By Saurabhsingh878
Please take the quiz to rate it.

MCSE Quizzes & Trivia
Hello FriendThis practice test helps you prepare for Microsoft certification exam 70-293, which counts toward MCSE certification. This practice test contains 50 questions, provided by Saurabh Singh.

   or Create Online Exam
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Which of the following failover policies provides the best compensation for multiple node failures?
A.
B.
C.
D.
2.  Which of the following backup job types does not reset the archive bits on the files that it copies to the backup medium?
A.
B.
C.
D.
3.  After the initial deployment of the PKI, which of the CAs can safely be taken offline? (Choose all correct answers.)
A.
B.
C.
D.
4.  Which of the following procedures can you use to ensure that only the employees in the R&D department receive certificates for smart card logons, EFS, and IPSec?
A.
B.
C.
D.
5.  Which of the following pieces of information is not included as part of a digital certificate?
A.
B.
C.
D.
6.  Using the information in Table 6-1, which type of magnetic tape drive would best be suited for this network, assuming that you want to use only a single tape for your daily incremental backups?
A.
B.
C.
D.
7.  Which of the following Nlb.exe commands do you use to shut down NLB operations on a cluster server without interrupting transactions currently in progress?
A.
B.
C.
D.
8.  Which of the following must a user have to receive certificates from an enterprise CA using auto-enrollment? (Choose all correct answers.)
A.
B.
C.
D.
9.  Although Windows Server 2003 creates a GPO for the Domain Controllers container with default role-specific policy settings in it, you have other policy settings that you want to apply to your domain controllers. Which of the following methods can you use to apply these settings? (Choose all correct answers.)
A.
B.
C.
D.
10.  When creating a GPO for an organizational unit called Servers, you define a particular audit policy and configure it to audit successes only. When creating a GPO for an organizational unit called Infrastructure, which is a child of the Servers organizational unit, you configure the same policy to audit failures only. What is the effective value of that policy for a computer object in the Infrastructure container?
A.
B.
C.
D.
11.  In an effort to cooperate with your company’s new emphasis on security, you have used GPOs to enable all the available audit policies on the computers that are running Windows Server 2003. A few days after making these changes, you unlock the data center to find that your domain controller has shut down during the night. Which of the following modifications might prevent this from happening again? (Choose all correct answers.)
A.
B.
C.
D.
12.  Which of the following tools does an administrator use to manually issue certificates to clients of a stand-alone CA?
A.
B.
C.
D.
13.  Which of the following server roles require superior network performance?
A.
B.
C.
D.
14.  For the domain controllers, you want to capture as much auditing information as possible, and you have decided to configure all the audit policies in the Domain Controllers container’s GPO to audit both successes and failures. Which of the following policies should you also configure to accomplish this goal? (Choose all correct answers.)
A.
B.
C.
D.
15.  What is the approximate total amount of volatile data that you might have to back up each day?
A.
B.
C.
D.
16.  Which of the following audit policies enables you to tell what applications were running when a security event occurred?
A.
B.
C.
D.
17.  In which of the following folders on a Windows Server 2003 NTFS system drive with default permissions can a member of the Users group create a new file? (Choose all correct answers.)
A.
B.
C.
D.
18.  Which of the following tasks can users not perform when you enable the Security Options policy, Microsoft Network Server: Digitally Sign Communications (Always) on a computer running Windows Server 2003?
A.
B.
C.
D.
19.  You have decided to partition your database server application to spread the load among the servers in the cluster. Which of the following failover policies will ensure that the entire database is constantly available without any server running multiple partitions, even if two servers fail? Explain your answer.
A.
B.
C.
D.
20.  To deploy the security templates, you begin by creating an organizational unit object for each server role in your Active Directory tree. Which of the following procedures can you use to apply the security templates to the organizational units?  
A.
B.
C.
D.
21.  Which of the following Windows Server 2003 features can you use to ensure that users supply passwords of a specified length?
A.
B.
C.
D.
22.  A user calls your company’s network help desk to report that she has just sent a large print job to her departmental print server by mistake and wants to delete it from the print queue. However, when she tries to access the queue, she receives the error message “Unable to connect. Access denied.” You log on from your workstation with the user’s account and are able to access the print queue in the normal manner. Which of the following could be the problem?
A.
B.
C.
D.
23.  Which of the following policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?
A.
B.
C.
D.
24.  Based on this information, which of the following statements is true?
A.
B.
C.
D.
25.  Which of the following tools can you use to compare the templates supplied by the consultant with the security configurations you have already created on your servers? (Choose all answers that are correct.)
A.
B.
C.
D.
26.  Which of the following System Monitor performance counters can you use to determine whether the DNS server is the target of a DoS attack?
A.
B.
C.
D.
E.
27.  Which of the following tape drive devices has the greatest capacity?
A.
B.
C.
D.
28.  For which of the following account policies should you modify the default setting to prevent brute force attempts at password penetration?
A.
B.
C.
D.
29.  Which of the following are correct reasons that it is more critical to monitor DNS performance than DHCP or WINS performance?
A.
B.
C.
D.
30.  In System Monitor, which performance object would you select to monitor the number of TCP/IP error messages transmitted and received by a computer?
A.
B.
C.
D.
31.  Which of the following policy modifications would make it harder for intruders to penetrate user passwords by trial and error? (Choose all correct answers.)
A.
B.
C.
D.
32.  You have discovered that some users are bypassing your security requirements by changing their passwords as required, and then immediately changing them back again. Which of the following policy changes would prevent this practice? (Choose all correct answers.)
A.
B.
C.
D.
33.  You are the new administrator for an Active Directory network, and while it is clear that someone has changed the security configuration of the network’s domain controllers, your predecessor left no records of the exact changes he made. Which of the following security templates should you apply to the domain controllers to restore their default security settings, and then implement the highest possible level of security?
A.
B.
C.
D.
E.
34.  On which of the RRAS configurations should you enable demand-dial routing?
A.
B.
C.
D.
35.  Each file and print server has one printer and two hard drives for user data storage in addition to the system drive. You want users to be able to access the data drives on all the servers using a single directory structure and you want all users on the network to be able to send jobs to the printer on every server. Which of the following policy settings should you include in the FilePrint container’s GPO? (Choose all correct answers.)
A.
B.
C.
D.
36.  Which of the following modifications to a certificate configuration does not increase the burden on the CA’s processor?
A.
B.
C.
D.
37.  After installing several member servers running Windows Server 2003 on your Active Directory network, you want to deploy a baseline security configuration that you have designed for the member servers only, using group policies. Which of the following tasks must you perform to accomplish this objective? (Choose all correct answers.)
A.
B.
C.
D.
E.
38.  When you use the Security Configuration And Analysis snap-in to export a template, where do the settings in the new template come from?
A.
B.
C.
D.
39.  You want to be able to use Network Load Balancing Manager, running on one of the Web servers, to configure all the servers in the NLB cluster. Other than this, very little noncluster communication between the Web servers is required. Which of the following communication models should you use to make this possible with the greatest economy? Explain your answer.
A.
B.
C.
D.
40.  Enabling which of the following audit policies is likely to require changing the Maximum Security Log Size value as well?
A.
B.
C.
D.
41.  Does the PKI design described here satisfy all the specified goals?
A.
B.
C.
D.
42.  Which of the following Windows Server 2003 versions cannot function as a domain controller?
A.
B.
C.
D.
43.  Where does a root CA obtain its own certificate?
A.
B.
C.
D.
44.  Which of the following system service policies should you set in the Domain Controllers container’s GPO with a startup type of Automatic? (Choose all correct answers.)
A.
B.
C.
D.
E.
45.  Which of the following policy changes can you configure in the GPO for the Web- Svrs container to add protection from Internet intruders?
A.
B.
C.
D.
46.  With which of the following Active Directory object types can you associate a GPO? (Choose all correct answers.)
A.
B.
C.
D.
E.
47.  Which of the following storage hardware configurations should you use for the 4-node database server cluster? Explain your answer.
A.
B.
C.
D.
48.  After receiving the security templates from the consultant, you examine one of them by creating a new database in the Security Configuration And Analysis snapin on one of your Web servers, importing the new security template into the database, and performing an analysis. While examining the results of the analysis, you notice that there are quite a few discrepancies between the security settings you have configured on the computer and the settings in the template. You decide that you want to use a combination of the settings in the template and the settings you have already configured on the computer. Which of the following procedures should you use to create a composite security configuration and implement it on all your Web servers?
A.
B.
C.
D.
49.  Which of the following types of certificates can be issued only by an enterprise certification authority?
A.
B.
C.
D.
50.  Which of the following methods can you use to reduce the amount of RIP traffic passing over the T-1 link to the home office?
A.
B.
C.
D.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.