MCSA 70-290 Exam Questions

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lexx_vnl
L
Lexx_vnl
Community Contributor
Quizzes Created: 1 | Total Attempts: 493
| Attempts: 493
SettingsSettings
Please wait...
  • 1/173 Questions

    What are the minimum NTFS permissions required to allow users to open documents and run programs stored in a shared folder?

    • Full Control
    • Modify
    • Write
    • Read & Execute
    • List Folder Contents
Please wait...
MCSA 70-290 Exam Questions - Quiz
About This Quiz

Are you aspiring to be an information technology expert and are now working towards being a Microsoft certified solutions associate? The quick test below is set to help you better prepare for the final exam towards getting the certification. Give it a try and all the best in the exams.


Quiz Preview

  • 2. 

    You have a database of users that is capable of exporting CSV files, select statements that are true.

    • You must create an *.ldf file manually for importing

    • You can use a .csv file

    Correct Answer
    A. You can use a .csv file
    Explanation
    You can use a CSV file for importing user data into Active Directory. Windows Server 2003 will
    fill in missing values with default values where possible, but if a mandatory item is missing from the file, then errors will occur during importing and the object will not be created.

    Rate this question:

  • 3. 

    What credentials are required for administration of a remote computer using theMMC?

    • Administrative

    • Guest

    • Print operator

    Correct Answer
    A. Administrative
    Explanation
    To administer a remote computer using the MMC (Microsoft Management Console), administrative credentials are required. Administrative credentials provide the necessary privileges and permissions to perform administrative tasks on the remote computer. These credentials give the user the authority to make changes, configure settings, and manage various aspects of the remote computer's operations. Without administrative credentials, the user would not have the necessary access and permissions to perform these administrative tasks.

    Rate this question:

  • 4. 

    To monitor potential dictionary attacks against user passwords in your enterprise,what is the single best auditing policy to configure, and what log or logs will youevaluate?

    • Account Logon Successes

    • Account Logon Failures

    • Application Successes

    • Application Failures

    Correct Answer
    A. Account Logon Failures
    Explanation
    The Audit Policy to audit Account Logon failures is the most effective policy to specify under
    these circumstances. Failed logons will generate events in the Security logs of all domain controllers.

    Rate this question:

  • 5. 

    A user, John, reports that his profile settings are not roaming properly when he logs onto various computers on the network. John can log on to any computer in the environmentsuccessfully, but his desktop wallpaper, shortcuts, and other preferential settingsare different on each computer.You check the profile path in the user account properties, and see that it is set to“D:\profiles\John”. You confirm that there is a folder named John in the profiles folderon the D: drive of Server01, which is the server that contains the user profiles for thenetwork. The shared folder hosted off the profiles folder is also called Profiles.Other users’ profiles are roaming correctly.What should you do to fix the problem?

    • Reset John’s password.

    • Set the home directory for John to D:\Profiles\%Username%.

    • Set the profile path for John to \\Server01\Profiles\%Username%.

    • Copy the profile that John wants to use to D:\Profiles\John on the profile server.

    Correct Answer
    A. Set the profile path for John to \\Server01\Profiles\%Username%.
    Explanation
    The correct answer is to set the profile path for John to \\Server01\Profiles\%Username%. This will ensure that John's profile settings are properly roaming when he logs onto various computers on the network. By setting the profile path to the correct network location, John's desktop wallpaper, shortcuts, and other preferential settings will be consistent across all computers. Resetting John's password, setting the home directory, or copying the profile will not address the issue of his profile settings not roaming properly.

    Rate this question:

  • 6. 

    Which of the following LDIFDE commands changes the function of LDIFDE fromexport to import?

    • -i

    • -t

    • -f

    • -s

    Correct Answer
    A. -i
    Explanation
    The LDIFDE command is used to import and export data from Active Directory. The "-i" option is used to change the function of LDIFDE from export to import. This means that when the command is executed with the "-i" option, it will import data into Active Directory instead of exporting it.

    Rate this question:

  • 7. 

    A folder is shared on a FAT32 volume. The Project Managers group is given AllowFull Control permission. The Project Engineers group is given Allow Read permission. Julie belongs to the Project Engineers group. She is promoted and is addedto the Project Managers group. What are her effective permissions to the folder?

    • Full Control

    • Read

    • Rear and Write

    • Read and Execute

    • None of the above

    Correct Answer
    A. Full Control
    Explanation
    When Julie is promoted and added to the Project Managers group, her effective permissions to the folder would be Full Control. This is because the Project Managers group has been given Allow Full Control permission to the folder. As Julie now belongs to this group, she inherits the same permissions as the group, which means she also has Full Control over the folder.

    Rate this question:

  • 8. 

    Can an existing MMC snap-in be changed from local to remote context, or must asnap-in of the same type be loaded into the MMC for remote connection?

    • Yes

    • No

    Correct Answer
    A. Yes
    Explanation
    A snap-in’s context might be changed by accessing the properties of the snap-in. A snap-in does
    not have to be reloaded to change its configuration

    Rate this question:

  • 9. 

    Which of the following are firewall-related constraints relating to Remote Assistance?

    • Port 3389 must be open.

    • NAT cannot be used.

    • Internet Connection Sharing is not possible.

    • You cannot use Remote Assistance across a Virtual Private Network (VPN).

    Correct Answer
    A. Port 3389 must be open.
    Explanation
    Port 3389 must be open in order to establish a Remote Assistance connection. This port is used by the Remote Desktop Protocol (RDP) to allow communication between the two devices. By opening this port, the firewall allows incoming RDP traffic, which is necessary for Remote Assistance to function properly.

    Rate this question:

  • 10. 

    Scott Bishop is a power user at a remote site that includes 20 users. The site has aWindows Server 2003 system providing file and print servers. There is a tape driveinstalled on the system. Because there is no local, full-time administrator at thesite, you want to allow Scott to back up and restore the server. However, you wantto minimize the power and the privileges that Scott obtains, limiting his capabilities strictly to backup and restore. What is the best practice to provide Scott theminimum necessary credentials to achieve his task?

    • Backup Operators group

    • Print Operators

    • Administrators

    • Account Operators

    • Network Configuration Operators

    Correct Answer
    A. Backup Operators group
    Explanation
    The Backup Operators group is
    assigned, by default, the privilege to back up and restore files and folders.

    Rate this question:

  • 11. 

    An executive has returned from a business trip. Before the trip, she copied filesfrom a network folder to her hard drive. The folder is shared with other executives, who modified their files in the folder while she was away. When shereturned, she moved her copy of the files to the network share, thereby updatingher files with the changes she made while away, but also overwriting all the filesthat had been changed by other executives. The other executives are unhappythat their files have been replaced with the versions that were active when she leftfor her trip. Luckily, you performed a normal backup operation on the folder theprevious evening. What restore option should you choose?

    • Do Not Replace The File On My Computer

    • Replace The File On Disk Only If The File On Disk Is Older

    • Always Replace The File On My Computer.

    Correct Answer
    A. Replace The File On Disk Only If The File On Disk Is Older
    Explanation
    This option will not overwrite files that were changed by the executive
    while she was away. Those files will have a date more recent than the backup. It will, however, restore the other executives’ files over the older versions she uploaded to the network.

    Rate this question:

  • 12. 

    You install a scanner on a computer running Windows Server 2003. When you tryto restart your computer, the operating system will not start. Which of the followingwould be the least invasive recovery method to try first to restore the systemto operation?

    • Automated System Recovery

    • Recovery Console

    • Safe mode

    • Directory Services Restore mode

    Correct Answer
    A. Safe mode
    Explanation
    Safe mode would be the least invasive recovery method to try first to restore the system to operation. Safe mode starts Windows with a minimal set of drivers and services, allowing you to troubleshoot and fix any issues that may be preventing the operating system from starting normally. It disables unnecessary startup programs and only loads essential drivers, making it easier to identify and resolve any conflicts or errors. By starting in safe mode, you can potentially fix the problem without causing further damage or data loss.

    Rate this question:

  • 13. 

    You are concerned that the CPU on a print server that hosts 10 shared printers is notable to process spool files quickly enough. Which of the following ways will you beable to check whether your supposition is correct?

    • In the shared printer properties, check the spooler processor usage statistic.

    • Configure the Performance console to track the processor usage of the print spool (Process\%Processor Time\spoolsv) on the Print Server over the period of a normal working day and configure the display to show the maximum value

    • Configure the Performance console to track the processor usage of the print spool (Process\%Processor Time\spoolsv) on the print server over the period of a normal working day and configure the display to show the average value.

    • Configure the Performance console to the processor usage of the print spool (Process\% Processor Time\spoolsv) on his workstation over the period of a normal working day and configure the display to show the average value.

    Correct Answer
    A. Configure the Performance console to track the processor usage of the print spool (Process\%Processor Time\spoolsv) on the print server over the period of a normal working day and configure the display to show the average value.
    Explanation
    To determine if the CPU on the print server is able to process spool files quickly enough, it is necessary to monitor the processor usage of the print spool over a normal working day. By configuring the Performance console to track the processor usage of the print spool (Process\%Processor Time\spoolsv) on the print server and displaying the average value, it will provide an accurate measurement of the CPU's performance. This will help determine if the CPU is able to handle the workload efficiently or if there is a need for optimization or upgrades.

    Rate this question:

  • 14. 

    What option will be most useful to generate 100 new user objects, each of whichhave identical profile path, home folder path, Title, Web Page, Company, Department,and Manager settings?

    • DSADD

    • DSGET

    • DSMOD

    • DSRM

    • DSQUERY

    Correct Answer
    A. DSADD
    Explanation
    DSADD will be the most useful option. You can enter one command line that includes all the parameters. By leaving the UserDN parameter empty, you can enter the users’ distinguished
    names one at a time in the command console. A user object template does not allow you to configure
    options including Title, Telephone Number and Web Page. Generating a comma-delimited text file would be time-consuming, by comparison, and would be overkill, particularly when so many parameters are identical.

    Rate this question:

  • 15. 

    A user reports that he or she cannot access the network by dialing in. The user can logon successfully to a local computer in the office.You confirm that the default Remote Access policies are in place on the Routing andRemote Access Server computer. All modem devices pass diagnostic tests successfully.What is likely the cause of the problem?

    • The user does not have Terminal Server access enabled in his or her user account properties.

    • The user does not have dial-in permission enabled in his or her user account properties.

    • The user does not have a computer account in the domain for his or her remote computer

    • The user is not supplying the correct credentials when dialing in.

    Correct Answer
    A. The user does not have dial-in permission enabled in his or her user account properties.
    Explanation
    The user does not have dial-in permission enabled in his or her user account properties. This means that even though the user can log on successfully to a local computer in the office, they do not have the necessary permissions to access the network by dialing in. The other options - Terminal Server access, computer account in the domain, and supplying correct credentials - are not relevant to this specific issue of dial-in access.

    Rate this question:

  • 16. 

    You are to back up a Windows Server 2003 file server every evening. You performa manual, normal backup. You will then schedule a backup job to run everyevening for the next two weeks. Which backup type will complete the fastest?

    • Normal

    • Differential

    • Incremental

    • Copy

    Correct Answer
    A. Incremental
    Explanation
    The incremental backup type will complete the fastest. This is because an incremental backup only backs up the files that have changed since the last backup, whereas a normal backup backs up all selected files regardless of whether they have changed or not. Therefore, the incremental backup will have less data to process and transfer, resulting in a faster completion time.

    Rate this question:

  • 17. 

    You’re the administrator of the Windows Server 2003 computer that is configuredas a print server, and you want to administer the print services from a Webbrowser on a client computer. The server is named Mktg1, but you don’t know theshare name of the printer. Which URL should you use to connect to the printer?

    • Http://mktg1/printers

    • Http://printers/mktg1

    • Http://windows/web/printers

    • Http://windows/mktg1

    Correct Answer
    A. Http://mktg1/printers
    Explanation
    To gain access to all printers on a print server by using a Web browser,
    open the Web browser and connect to http://printserver/printers to view a list of printers. From
    there you can access a specific printer. If you want to gain access to a specific printer without
    first viewing a list of all printers, use http://printserver/printersharename.

    Rate this question:

  • 18. 

    You are configuring the permissions for a shared folder, Finance, on your file server,Server01. You need to configure permissions for the Accounting and AccountingExecgroups on the folder to achieve the following objectives:The Accounting group should have Read access to content in the Finance folder.The AccountingExec group should have Change control over content in the Financefolder.All users need Read access to a file named Summary.rpt in the Finance folder. Usersshould have access to no other files in the folder.How will you configure share and NTFS permissions on the Finance folder?

    • Share: Accounting–Read; AccountingExec–Read; Users–Read NTFS: Accounting–Read; AccountingExec–Modify; Users–Read

    • Share: Accounting–Full Control; AccountingExec–Full Control; Users–Read NTFS: Accounting–Read; AccountingExec–Modify; Users–List, Read access on Summary.rpt

    • Share: Accounting–Read; AccountingExec–Modify; Users–Read NTFS: Accounting–Read; AccountingExec–Full Control; Users–Read

    • Share: Accounting–Full Control; AccountingExec–Full Control; Users–Deny Read NTFS: Accounting–Read; AccountingExec–Read; Users–List, Read access on Summary.rpt

    Correct Answer
    A. Share: Accounting–Full Control; AccountingExec–Full Control; Users–Read NTFS: Accounting–Read; AccountingExec–Modify; Users–List, Read access on Summary.rpt
    Explanation
    The correct answer is to set the share permissions for the Accounting and AccountingExec groups to Full Control, and the share permissions for the Users group to Read. This allows the Accounting and AccountingExec groups to have full control over the folder, while the Users group only has Read access. The NTFS permissions should be set to allow the Accounting group Read access, the AccountingExec group Modify access, and the Users group should have List and Read access on the Summary.rpt file. This ensures that all users have Read access to the Summary.rpt file, but no other files in the folder.

    Rate this question:

  • 19. 

    You are planning the deployment of Windows Server 2003 computers for a newActive Directory domain in a large corporation that includes multiple separateActive Directories maintained by each of the corporation’s subsidiaries. The companyhas decided to roll out Exchange Server 2003 as a unified messaging platformfor all the subsidiaries, and plans to use Microsoft Metadirectory Services(MMS) to synchronize appropriate properties of objects throughout the organization.Which edition of Windows Server 2003 will provide the most cost-effectivesolution for this deployment?

    • Standard Edition

    • Enterprise Edition

    • Web Edition

    • Datacenter Edition

    Correct Answer
    A. Enterprise Edition
    Explanation
    Windows Server 2003, Enterprise Edition, is the most cost-effective solution that supports
    MMS. Standard and Web editions do not support MMS.

    Rate this question:

  • 20. 

    You are planning the deployment of Windows server 2003 computers for a department of 250 employees. The server will host the shared directories and shared folders for the department, and it will serve several printers to which departmental documents are sent. Which edition of Windows Server 2003 will provide the most cost-effective solution for the department?

    • Standard Edition

    • Enterprise Edition

    • Web Edition

    • Datacenter Edition

    Correct Answer
    A. Standard Edition
    Explanation
    Windows Server 2003, Standard Edition is a robust platform for file and print services in a small- to medium-sized enterprise or department

    Rate this question:

  • 21. 

    What tool is used to enable Remote Desktop on a server?

    • Terminal Services Manager

    • Terminal Services Configuration

    • System properties in Control Panel

    • Terminal Services Licensing

    Correct Answer
    A. System properties in Control Panel
    Explanation
    The correct answer is System properties in Control Panel. In order to enable Remote Desktop on a server, the System properties in Control Panel can be used. This tool allows users to configure various settings related to the system, including enabling Remote Desktop. By accessing the System properties, users can navigate to the Remote tab and enable Remote Desktop, allowing remote access to the server.

    Rate this question:

  • 22. 

    Which tool will allow you to identify accounts that have not been used for twomonths?

    • DSADD

    • DSGET

    • DSMOD

    • DSRM

    • DSQUERY

    Correct Answer
    A. DSQUERY
    Explanation
    DSQUERY is the correct answer because it is a command-line tool in Windows Server that allows you to query the Active Directory for various information, including identifying accounts that have not been used for a specified period of time. By using the appropriate parameters and filters with DSQUERY, you can easily retrieve a list of accounts that have not been used for two months.

    Rate this question:

  • 23. 

    You want to ensure the highest level of security for your corporate intranet withoutthe infrastructure of certificate services. The goal is to provide authenticationthat is transparent to users, and to allow you to secure intranet resources with thegroup accounts existing in Active Directory. All users are within the corporate firewall.What authentication method should you choose?

    • Anonymous Access

    • Basic Authentication

    • Digest Authentication

    • Integrated Windows Authentication

    • None of teh above

    Correct Answer
    A. Integrated Windows Authentication
    Explanation
    Integrated Windows Authentication should be chosen as the authentication method in this scenario. This method allows users to authenticate using their Windows credentials, providing a seamless and transparent authentication experience. It leverages the existing group accounts in Active Directory, allowing for easy management and securing of intranet resources. Since all users are within the corporate firewall, this method can provide a high level of security without the need for additional infrastructure such as certificate services.

    Rate this question:

  • 24. 

    You’re setting up a printer pool on a Windows Server 2003 computer. The printerpool contains three print devices, all identical. You open the properties for theprinter and select the Enable Printer Pooling option on the Ports tab. What mustyou do next?

    • Configure the LPT1 port to support three printers

    • Select or create the ports mapped to the three printers.

    • On the Device Settings tab, configure the installable options to support two additional print devices

    • On the Device Settings tab, configure the installable options to support two additional print devices

    Correct Answer
    A. Select or create the ports mapped to the three printers.
    Explanation
    Printer pooling is configured from the Ports tab of the printer’s properties
    dialog box. To set up printer pooling, select the Enable Printer Pooling check box, and then
    select or create the ports corresponding to printers that will be part of the pool.

    Rate this question:

  • 25. 

    The License Logging service tracks Per Device or Per User licenses by user name. Acompany uses shift work with a total of 30 shift workers working 10 people to an8-hour shift. Throughout a 24-hour period, three different users will use the sameWindows XP Professional workstation. Each of the 30 shift workers has an individuallogon account. What is the name of the method by which the usernames can begrouped into lots of three so that only one Per Device license is recorded on theLicense Logging server rather than 30 Per User devices?

    • License Groups

    • License Revocation

    • License Clustering

    • License Aggregation

    Correct Answer
    A. License Groups
    Explanation
    The method by which the usernames can be grouped into lots of three so that only one Per Device license is recorded on the License Logging server rather than 30 Per User devices is called License Groups. This allows multiple users to share a single device license, reducing the number of licenses required.

    Rate this question:

  • 26. 

    You want to nest the IT Administrators group responsible for the Sales groupinside the Sales group so that its members will have access to the same resources(set by permissions in an ACL) as the Sales group. From the Properties page of theIT Administrators group, what tab will you access to make this setting?

    • General

    • Members

    • Member of

    • Managed by

    • Security

    Correct Answer
    A. Member of
    Explanation
    To nest the IT Administrators group responsible for the Sales group inside the Sales group, you would access the "Member of" tab from the Properties page of the IT Administrators group. This tab allows you to specify the groups that the IT Administrators group is a member of, thereby giving its members access to the same resources as the Sales group.

    Rate this question:

  • 27. 

    You’re administering a Windows Server 2003 computer configured as a printserver. Users in the Marketing group complain that they cannot print documentsusing a printer on the server. You view the permissions in the printer’s properties.The Marketing group is allowed Manage Documents permission. Why can’t theusers print to the printer?

    • The Everyone group must be granted the Manage Documents permission.

    • The Administrators group must be granted the Manage Printers permission

    • The Marketing group must be granted the Print permission.

    • The Marketing group must be granted the Manage Printers permission

    Correct Answer
    A. The Marketing group must be granted the Print permission.
    Explanation
    The Print permission allows users to send documents to the printer.

    Rate this question:

  • 28. 

    You need to remove a PnP device from a configuration temporarily, but want toleave it physically connected to the computer. You want to minimize the amountof work required to use the device later. Which of the following is the best optionto accomplish your goal?

    • From the Properties page of the device, choose Do Not Use this Device (Disable).

    • From the Properties page of the device, choose Uninstall.

    • Using the Safely Remove Hardware utility, choose to remove the device.

    Correct Answer
    A. From the Properties page of the device, choose Do Not Use this Device (Disable).
    Explanation
    This method will allow for the temporary disabling of the device. All that
    needs to be done for the device to be usable again is to Enable it. Other options require either
    a reinstallation or rescanning of the computer to reactivate the device.

    Rate this question:

  • 29. 

    A user has sent you a request, by e-mail, for a Remote Assistance session. You attemptto connect to the user’s computer to establish the Remote Desktop session, but cannotestablish the network connection.You are able to connect to the user’s computer to access the file system through theC$ share.What is the most likely cause of the problem?

    • Your user account is not a member of the local Administrators group on the user’s computer

    • You do not have the Terminal Services client installed on your computer.

    • Port 3389 is not open on the firewall between your network segment and the network segment that the user’s computer is on.

    • The user’s account in Active Directory is configured so as not to allow Remote Control.

    Correct Answer
    A. Port 3389 is not open on the firewall between your network segment and the network segment that the user’s computer is on.
    Explanation
    The most likely cause of the problem is that Port 3389 is not open on the firewall between your network segment and the network segment that the user's computer is on. This port is used for Remote Desktop Protocol (RDP) connections, and if it is closed on the firewall, you will not be able to establish a network connection for the Remote Assistance session.

    Rate this question:

  • 30. 

    Foley works as the systems administrator for a law firm. There is a group of 20 legalsecretaries who provide administrative support to the lawyers. All the secretaries use asingle high-speed laser printer shared on a Windows Server 2003 system. The secretariesmust print large documents on a regular basis. Although the high-speed laserprinter is fast, it is running almost constantly, printing documents. Some of the secretarieshave found that when they submit a job to the high-speed laser printer, it cantake almost 20 minutes for other jobs in the queue to be processed before their ownjob is output. None of the secretaries want to scroll through a list of available printersto check which one has the fewest jobs before submitting their documents. Which ofthe following options should Foley consider to minimize the amount of time that printerstake to finish printing documents for all the secretaries?

    • Foley should order a second high-speed laser printer of the same make and model and institute a printer pool.

    • Foley should set different printer priorities for each legal secretary based on a list generated by the head of the group. The most important secretary should be set a priority of 1 and the least important a priority of 99.

    • Foley should set different printer priorities for each legal secretary based on a list generated by the head of the group. The most important secretary should be set a priority of 99 and the least important a priority of 1.

    • Foley should purchase three more high-speed laser printers and install them with their own individual printer shares on the print server. Secretaries can select the printer share that has the fewest jobs in the queue.

    Correct Answer
    A. Foley should order a second high-speed laser printer of the same make and model and institute a printer pool.
    Explanation
    Ordering a second high-speed laser printer and creating a printer pool would allow the secretaries to print their documents more efficiently. With a printer pool, multiple printers can be connected to the print server, and the print jobs can be distributed across the available printers. This would reduce the wait time for each secretary as their jobs would be distributed among the printers in the pool, rather than waiting for their turn on a single printer.

    Rate this question:

  • 31. 

    Rooslan is the systems administrator for an organization that has four print servers. Heis currently trying to determine which of the four servers prints the most jobs each dayand which of the four servers prints the least jobs each day. He is considering creatingthree new shared printers and needs to select the print server with the lowest numberof jobs printed. He also wants to check how many pages have been printed since thelast restart. Which of the following will enable him to do this?

    • From the Printer Properties on each shared printer on each print server, check the Total Pages Printed Since Last Restart and Total Jobs Printed Since Last Restart statistics.

    • Run the Performance console on his Windows XP workstation. Add the Total Pages Printed counter object for each of the four print servers.

    • Run the Performance console on his Windows XP workstation. Add the Total Jobs Printed counter object for each of the four print servers

    • Run the Performance console on his Windows XP workstation. Add the Total Jobs Printed counter object and the Total Pages Printed counter object for each of the four print servers that he wants to monitor

    Correct Answer
    A. Run the Performance console on his Windows XP workstation. Add the Total Jobs Printed counter object and the Total Pages Printed counter object for each of the four print servers that he wants to monitor
    Explanation
    The correct answer is to run the Performance console on his Windows XP workstation and add the Total Jobs Printed counter object and the Total Pages Printed counter object for each of the four print servers that he wants to monitor. This will allow Rooslan to track the number of jobs and pages printed on each print server and determine which server has the lowest number of jobs printed.

    Rate this question:

  • 32. 

    What platforms are capable of joining a domain?

    • Windows NT 4

    • Windows 2000

    • Windows XP

    • Windows 95

    • Windows Server 2003

    Correct Answer(s)
    A. Windows NT 4
    A. Windows 2000
    A. Windows XP
    A. Windows Server 2003
    Explanation
    The platforms that are capable of joining a domain are Windows NT 4, Windows 2000, Windows XP, and Windows Server 2003. These operating systems have the necessary features and functionalities to join a domain network, allowing users to authenticate and access resources within the domain. Windows 95, on the other hand, does not have the capability to join a domain.

    Rate this question:

  • 33. 

    A folder is shared on a NTFS volume, with the default share permissions. TheProject Managers group is given Allow Full Control NTFS permission. Julie, whobelongs to the Project Managers group, calls to report problems creating files inthe folder. Why can’t Julie create files?

    • The default share permission in Windows Server 2003 is Everyone: List Folder Contents.

    • The default share permission in Windows Server 2003 is Everyone: Deny Access.

    • The default share permission in Windows Server 2003 is Everyone: Allow Read.

    • All of the above

    • None of the above

    Correct Answer
    A. The default share permission in Windows Server 2003 is Everyone: Allow Read.
    Explanation
    The default share permission in Windows Server 2003 is Everyone: Allow Read. Share permissions define the maximum effective permissions for files and folders in the share. The share permissions restrict the NTFS full control permission. To correct the problem, you would need to modify the share permissions to allow, at a minimum, the Project Managers group Change permission.

    Rate this question:

  • 34. 

    You are in the process of adding users, computers, and groups to your new WindowsServer 2003 domain. After several hundred objects have been added through batchimporting, you begin to add the last 24 computers that must be entered manually. Afterentering three computer accounts successfully, you receive error messages and areunable to add more computers to the domain.All other network connectivity and server functions appear to be functioning normally.What is the most likely cause of the problem?

    • The RID Master role is unavailable.

    • The PDC Emulator role is unavailable

    • The domain infrastructure role is unavailable

    • The schema master role is unavailable

    Correct Answer
    A. The RID Master role is unavailable.
    Explanation
    The most likely cause of the problem is that the RID Master role is unavailable. The RID Master role is responsible for assigning unique relative identifiers (RIDs) to each object created in the domain. When adding new computer accounts, the RID Master role is needed to assign unique RIDs to these accounts. If the RID Master role is unavailable, it would prevent the addition of new computer accounts, resulting in the error messages encountered after successfully adding three computer accounts manually.

    Rate this question:

  • 35. 

    You’re setting up printing on a Windows Server 2003 computer. You attach aprinter, configure a logical printer, and submit documents for printing, but thedocuments do not print completely and sometimes come out garbled. What is themost likely cause of the problem?

    • There’s insufficient hard disk space for spooling

    • You’re using an incorrect printer driver.

    • The selected port is not correct.

    • The device settings for the printer are using an incorrect font substitutio

    Correct Answer
    A. You’re using an incorrect printer driver.
    Explanation
    An incorrect printer driver can yield documents that are garbled or
    incompletely printed. Install the correct printer driver.

    Rate this question:

  • 36. 

    A folder called Reports on Server01 resides in the Marketing\Summary folder. The Marketingfolder is shared on the network with the name MKTG.Users should not be able to read, modify, or add any files in the Marketing or Summaryfolders, but need to have access to the files in the Reports folder.What is the minimum NTFS permission that these users need on the Marketing andSummary folders to access the files in the Reports folder from across the network?

    • List Folder/Read Data

    • Traverse Folder/Execute Files

    • Read Extended Attributes

    • Read Attributes

    Correct Answer
    A. Traverse Folder/Execute Files
    Explanation
    The minimum NTFS permission that these users need on the Marketing and Summary folders to access the files in the Reports folder from across the network is "Traverse Folder/Execute Files". This permission allows the users to navigate through the folders and execute files, but does not grant them the ability to read, modify, or add any files in the Marketing or Summary folders.

    Rate this question:

  • 37. 

    You enable the password complexity policy for your domain. Describe therequirements for passwords, and when those requirements will take effect.

    • The password must not be based on the user’s account name

    • Must contain at least six characters, with at least one character from three of the four categories: uppercase, lowercase, Arabic numerals, and nonalphanumeric characters

    • Requirements will take effect immediately for all new accounts

    • Existing accounts will be affected when they next change their password

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    The correct answer is "All of the above" because enabling the password complexity policy for the domain means that the requirements for passwords will include not being based on the user's account name, having at least six characters, and containing at least one character from three of the four specified categories. These requirements will take effect immediately for all new accounts, and existing accounts will be affected when they next change their password.

    Rate this question:

  • 38. 

    Why is it a best practice to create a computer account in the domain prior to joininga machine to the domain?

    • If an account is not created in advance, one will be generated automatically when the computer joins the domain, and that account will be located in the default Computers container

    • Computer policies, which are typically linked to specific OUs, will not apply to the newly joined computer

    • Because most organizations do have specific OUs for computers, you are left with an extra step to remember: moving the computer object to the correct OU after joining the domain

    • By creating a computer object in advance, you can specify which groups (or users) are allowed to join a system to the domain with that account

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    It is a best practice to create a computer account in the domain prior to joining a machine to the domain because if an account is not created in advance, one will be generated automatically when the computer joins the domain, and that account will be located in the default Computers container. This means that computer policies, which are typically linked to specific OUs, will not apply to the newly joined computer. Additionally, most organizations have specific OUs for computers, so by not creating the computer object in advance, an extra step is required to move the computer object to the correct OU after joining the domain. By creating a computer object in advance, you can also specify which groups or users are allowed to join a system to the domain with that account.

    Rate this question:

  • 39. 

    You would like to test the restore procedures on your server, but would also liketo avoid affecting the production copies of the backed-up data. What is the bestrestore location to use?

    • Original location

    • Alternate location

    • Single folder

    Correct Answer
    A. Alternate location
    Explanation
    Restoring to an alternate location will restore the folder structure and
    files that were backed up. You can then compare the contents of the target location with the original backed-up files to verify the success of the restore procedure.

    Rate this question:

  • 40. 

    You’re administering a Windows Server 2003 computer configured as a printserver. You want to perform maintenance on a print device connected to the printserver. There are several documents in the print queue. You want to prevent thedocuments from being printed to the printer, but you don’t want users to have toresubmit the documents to the printer. What is the best way to do this?

    • Open the printer’s Properties dialog box, select the Sharing tab, and then select the Do Not Share This Printer option

    • Open the printer’s Properties dialog box and select a port that is not associated with a print device

    • Open the printer’s queue window, select the first document, and then select Pause from the Document window. Repeat the process for each document.

    • Open the printer’s queue window, and select the Pause Printing option from the Printer menu.

    Correct Answer
    A. Open the printer’s queue window, and select the Pause Printing option from the Printer menu.
    Explanation
    When you select the Pause Printing option, the documents will remain in the print queue until you resume printing. This option applies to all documents in the queue.

    Rate this question:

  • 41. 

    A Windows 2003 Server is configured as a print server. In the middle of the workday,the printer fuse fails, and must be replaced. Users have already submitted jobs tothe printer, which uses IP address 192.168.1.81. An identical printer uses address192.168.1.217, and is supported by other logical printers on the server. Whatactions should you take so that users’ jobs can be printed without resubmission?

    • In the failed printer’s Properties dialog box, select Enable Printer Pooling

    • At the command prompt, type Net Stop Spooler.

    • At the command prompt, type Net Start Spooler.

    • In the failed printer’s Properties dialog box, select the port 192.168.1.217.

    • In the failed printer’s Properties dialog box, click Add Port.

    Correct Answer
    A. In the failed printer’s Properties dialog box, select the port 192.168.1.217.
    Explanation
    Because the other printer is already supported by logical printers on
    the server, there is no need to add a new port. Simply select the existing port.

    Rate this question:

  • 42. 

    Which of the following options will give you the clearest picture of printer utilization—allowing you to understand the consumption of printer toner and paper?

    • Configure auditing for a logical printer and audit for successful use of the Print permission by the Everyone system group.

    • Export the System log to a comma-delimited text file and use Excel to analyze spooler events.

    • Configure a performance log and monitor the Total Pages Printed counter for each logical printer.

    • Configure a performance log and monitor the Jobs counter for each logical counter.

    Correct Answer
    A. Configure a performance log and monitor the Total Pages Printed counter for each logical printer.
    Explanation
    The Total Pages Printed counter gives the clearest picture of printer
    toner and paper consumption, as such consumption is most closely associated with the number
    of pages, not the number of jobs, printed. The spooler and object access events logged in the System and Security logs will be cumbersome at best and, most likely, completely unhelpful in this task.

    Rate this question:

  • 43. 

    What type of Group Policy software deployment should be used to distribute aservice pack?

    • Published in the Computer Configuration Software Settings

    • Assigned in the Computer Configuration Software Settings

    • Published in the User Configuration Software Settings

    • Assigned in the User Configuration Software Settings

    Correct Answer
    A. Assigned in the Computer Configuration Software Settings
    Explanation
    The correct answer is "Assigned in the Computer Configuration Software Settings." This is because when distributing a service pack, it is typically installed on the computer level rather than the user level. Assigning the software in the Computer Configuration Software Settings ensures that the service pack is deployed to all computers within the specified group policy scope.

    Rate this question:

  • 44. 

    Rooslan is responsible for licensing at a medium-sized organization that has three WindowsServer 2003 systems. These systems are named Server Alpha, Server Beta, and ServerGamma. Server Alpha is licensed in Per Server mode and is configured with 500 CALs.Server Beta is licensed in Per Server mode and is configured with 700 CALs. ServerGamma is licensed in Per Server mode and is configured with 600 CALs. If there are550 Windows XP Professional workstations at Rooslan’s company and 500 of thoseaccess Server Alpha, 525 of them access Server Beta and 540 access Server Gammaconcurrently, how many per-server CALS are required at the organization?

    • 500

    • 540

    • 1,565

    • 1,800

    Correct Answer
    A. 1,565
    Explanation
    The number of CALs required for each server is determined by the maximum number of concurrent connections to that server. In this case, the maximum number of concurrent connections to Server Alpha is 500, to Server Beta is 525, and to Server Gamma is 540. Therefore, the total number of CALs required at the organization is the sum of these three numbers, which is 500 + 525 + 540 = 1,565.

    Rate this question:

  • 45. 

    You’re the administrator of a Windows Server 2003 computer. You want to fix anyfile system errors and recover any bad sectors on your computer’s hard disk.Which tool should you use?

    • Check Disk

    • Disk Defragmenter

    • DISKPART

    • Disk quotas

    Correct Answer
    A. Check Disk
    Explanation
    Check Disk is the correct tool to use in order to fix any file system errors and recover any bad sectors on a Windows Server 2003 computer's hard disk. Check Disk, also known as chkdsk, is a command-line utility that scans the file system and checks for errors. It can fix any errors it finds and also recover data from any bad sectors on the hard disk.

    Rate this question:

  • 46. 

    You’re setting up software RAID on your Windows Server 2003 computer to providefault tolerance to the data stored on that system. The computer is used as adatabase server. The server performs many read operations but relatively fewwrite operations. As a result, you want a fault-tolerant solution that provides excellentread performance. Which RAID solution should you use?

    • RAID-0

    • RAID-1

    • RAID-5

    Correct Answer
    A. RAID-5
    Explanation
    Although RAID-5 has moderate write performance, it has excellent read
    performance. RAID-1 has good read and write performance, but the read performance is not as
    good as with RAID-5

    Rate this question:

  • 47. 

    You open a computer object and, on the Operating System tab, discover that noproperties are displayed. What causes these properties to be absent?

    • The account is disabled

    • The user entered wrong credentials

    • A computer has not joined the domain using that account

    Correct Answer
    A. A computer has not joined the domain using that account
    Explanation
    When a system joins the domain, by default it populates the properties shown on the Operating System tab.

    Rate this question:

  • 48. 

    What type of disk region supports logical drives?

    • Primary partitions

    • Simple volumes

    • Spanned volumes

    • Extended partitions

    • Unallocated space

    Correct Answer
    A. Extended partitions
    Explanation
    Extended partitions support logical drives. An extended partition is a type of disk partition that can be divided into multiple logical drives. It allows for the creation of more than four partitions on a basic disk, which is the maximum limit for primary partitions. Logical drives are created within the extended partition and can be used to organize and store data separately from the primary partitions.

    Rate this question:

  • 49. 

    In your Windows Server 2003 domain contoso.com, in the Pservers (Print Servers) OUyou have member server computer named Pserver01. This server has been offline fora lengthy period, and is not communicating with other computers in the domain toaccept print jobs. You have determined that the password on this computer’s accountwithin the domain needs to be reset.Which command can you issue to correctly reset the computer account?

    • Dsmod CN=pserver01,CN=PSERVERS,DC=contoso,DC=com -reset

    • Dsmod computer pserver01.contoso.com -reset

    • Dsmod contoso\pserver01 -reset

    • Dsmod computer CN=pserver01,CN=PSERVERS,DC=contoso,DC=com -reset

    Correct Answer
    A. Dsmod computer CN=pserver01,CN=PSERVERS,DC=contoso,DC=com -reset
    Explanation
    The correct command to reset the computer account for Pserver01 in the Pservers OU of the contoso.com domain is "dsmod computer CN=pserver01,CN=PSERVERS,DC=contoso,DC=com -reset". This command uses the "dsmod" tool to modify the computer object with the specified distinguished name (DN) and reset its account.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 20, 2008
    Quiz Created by
    Lexx_vnl
Back to Top Back to top
Advertisement