MCSA 70-290 Exam Questions

173 Questions

Settings
MCSA Quizzes & Trivia

Are you aspiring to be an information technology expert and are now working towards being a Microsoft certified solutions associate? The quick test below is set to help you better prepare for the final exam towards getting the certification. Give it a try and all the best in the exams.


Questions and Answers
  • 1. 
    • A. 

      Standard Edition

    • B. 

      Enterprise Edition

    • C. 

      Web Edition

    • D. 

      Datacenter Edition

  • 2. 
    You are planning the deployment of Windows Server 2003 computers for a newActive Directory domain in a large corporation that includes multiple separateActive Directories maintained by each of the corporation’s subsidiaries. The companyhas decided to roll out Exchange Server 2003 as a unified messaging platformfor all the subsidiaries, and plans to use Microsoft Metadirectory Services(MMS) to synchronize appropriate properties of objects throughout the organization.Which edition of Windows Server 2003 will provide the most cost-effectivesolution for this deployment?
    • A. 

      Standard Edition

    • B. 

      Enterprise Edition

    • C. 

      Web Edition

    • D. 

      Datacenter Edition

  • 3. 
    • A. 

      Standard Edition

    • B. 

      Enterprise Edition

    • C. 

      Web Edition

    • D. 

      Datacenter Edition

  • 4. 
    Which of the following is true about setup in Windows Server 2003? (Select all thatapply.)
    • A. 

      Setup can be launched by booting to the CD-ROM.

    • B. 

      Setup can be launched by booting to setup floppies.

    • C. 

      Setup requires a non-blank password to meet complexity requirements.

    • D. 

      Setup will allow you to enter all 1’s for the Product ID.

  • 5. 
    What credentials are required for administration of a remote computer using theMMC?
    • A. 

      Administrative

    • B. 

      Guest

    • C. 

      Print operator

  • 6. 
    Can an existing MMC snap-in be changed from local to remote context, or must asnap-in of the same type be loaded into the MMC for remote connection?
    • A. 

      Yes

    • B. 

      No

  • 7. 
    Are all functions within a snap-in used on a local computer usable when connectedremotely?
    • A. 

      Yes

    • B. 

      No

  • 8. 
    How many simultaneous connections are possible to a Terminal Server running inRemote Administration mode?
    • A. 

      0

    • B. 

      1

    • C. 

      2

    • D. 

      3

    • E. 

      4

  • 9. 
    What would be the best way to give administrators the ability to administer aserver remotely through Terminal Services?
    • A. 

      Don’t do anything; they already have access because they are administrators.

    • B. 

      Remove the Administrators from the permission list on the Terminal Server connection, and put their administrator account in the Remote Desktop for Administration Group

    • C. 

      Create a separate, lower-authorization user account for Administrators to use daily, and place that account in the Remote Desktop for Administration Group.

  • 10. 
    What tool is used to enable Remote Desktop on a server?
    • A. 

      Terminal Services Manager

    • B. 

      Terminal Services Configuration

    • C. 

      System properties in Control Panel

    • D. 

      Terminal Services Licensing

  • 11. 
    Which of the following are firewall-related constraints relating to Remote Assistance?
    • A. 

      Port 3389 must be open.

    • B. 

      NAT cannot be used.

    • C. 

      Internet Connection Sharing is not possible.

    • D. 

      You cannot use Remote Assistance across a Virtual Private Network (VPN).

  • 12. 
    Which of the following properties and administrative tasks can be configured orperformed simultaneously on more than one user object?
    • A. 

      Last Name

    • B. 

      User Logon Name

    • C. 

      Disable Account

    • D. 

      Enable Account

    • E. 

      Reset Password

  • 13. 
    What option will be most useful to generate 100 new user objects, each of whichhave identical profile path, home folder path, Title, Web Page, Company, Department,and Manager settings?
    • A. 

      DSADD

    • B. 

      DSGET

    • C. 

      DSMOD

    • D. 

      DSRM

    • E. 

      DSQUERY

  • 14. 
    Which tool will allow you to identify accounts that have not been used for twomonths?
    • A. 

      DSADD

    • B. 

      DSGET

    • C. 

      DSMOD

    • D. 

      DSRM

    • E. 

      DSQUERY

  • 15. 
    What variable can be used with the DSMOD and DSADD commands to createuser-specific home folders and profile folders?
    • A. 

      %Username%

    • B. 

      $Username$

    • C. 

      CN=Username

    • D. 

  • 16. 
    Which tools allow you to output the telephone numbers for all users in an OU?
    • A. 

      DSADD

    • B. 

      DSGET

    • C. 

      DSMOD

    • D. 

      DSRM

    • E. 

      DSQUERY

  • 17. 
    How do you make a profile mandatory?
    • A. 

      Configure the permissions on the folder’s Security property sheet to deny write permission.

    • B. 

      Configure the permissions on the folders Sharing property sheet to allow only read permission.

    • C. 

      Modify the attributes of the profile folder to specify the Read Only attribute

    • D. 

      Rename Ntuser.dat to Ntuser.man.

  • 18. 
    You enable the password complexity policy for your domain. Describe therequirements for passwords, and when those requirements will take effect.
    • A. 

      The password must not be based on the user’s account name

    • B. 

      Must contain at least six characters, with at least one character from three of the four categories: uppercase, lowercase, Arabic numerals, and nonalphanumeric characters

    • C. 

      Requirements will take effect immediately for all new accounts

    • D. 

      Existing accounts will be affected when they next change their password

    • E. 

      All of the above

  • 19. 
    To monitor potential dictionary attacks against user passwords in your enterprise,what is the single best auditing policy to configure, and what log or logs will youevaluate?
    • A. 

      Account Logon Successes

    • B. 

      Account Logon Failures

    • C. 

      Application Successes

    • D. 

      Application Failures

  • 20. 
    A user has forgotten his or her password and attempts to log on several times withan incorrect password. Eventually, the user receives a logon message indicatingthat the account is either disabled or locked out. The message suggests that theuser contact an administrator. What must you do?
    • A. 

      Delete the user object and recreate it.

    • B. 

      Rename the user object.

    • C. 

      Enable the user object.

    • D. 

      Unlock the user object.

    • E. 

      Reset the password for the user object.

  • 21. 
    If you are using universal groups in your domain or forest, and you need to givepermission-based access to the members of the universal group, what configurationmust be true of the universal group?
    • A. 

      The global group has to be of the type distribution

    • B. 

      The domain functional level must be Windows 2000 native or Windows Server 2003

    • C. 

      The universal group must be of the type distribution

    • D. 

      The global group has to be type security

    • E. 

      The universal group must be of the type security

  • 22. 
    In a domain running in Windows Server 2003 domain functional level, what securityprincipals can be a member of a global group?
    • A. 

      Users

    • B. 

      Computers

    • C. 

      Universal groups

    • D. 

      Global groups

    • E. 

      All of the the above

  • 23. 
    In the properties of a group, which tab will you access to add users to the group?
    • A. 

      General

    • B. 

      Members

    • C. 

      Member of

    • D. 

      Managed by

    • E. 

      Security

  • 24. 
    You want to nest the IT Administrators group responsible for the Sales groupinside the Sales group so that its members will have access to the same resources(set by permissions in an ACL) as the Sales group. From the Properties page of theIT Administrators group, what tab will you access to make this setting?
    • A. 

      General

    • B. 

      Members

    • C. 

      Member of

    • D. 

      Managed by

    • E. 

      Security

  • 25. 
    If your environment consists of two domains, one Windows Server 2003 and oneWindows NT 4, what group scopes can you use for assigning permissions on anyresource on any domain-member computer?
    • A. 

      Domain Local Group

    • B. 

      Global Group

    • C. 

      Universal Group

    • D. 

      Security Group

    • E. 

      Distribution Group

  • 26. 
    Which of the following LDIFDE commands changes the function of LDIFDE fromexport to import?
    • A. 

      -i

    • B. 

      -t

    • C. 

      -f

    • D. 

      -s

  • 27. 
    You have a database of users that is capable of exporting CSV files, select statements that are true.
    • A. 

      You must create an *.ldf file manually for importing

    • B. 

      You can use a .csv file

  • 28. 
    What are the minimum credentials necessary to create a Windows Server 2003computer account in an OU in a domain? Consider all steps of the process.Assume Active Directory does not yet have an account for the computer.
    • A. 

      Administrators on the server

    • B. 

      Domain Admins

    • C. 

      Enterprise Admins

    • D. 

      Account Operators on a domain controller

    • E. 

      None of the above

  • 29. 
    • A. 

      The properties of My Computer

    • B. 

      Control Panel’s System application

    • C. 

      Active Directory Users and Computers

    • D. 

      The Network Connections folder

    • E. 

      The Users application in Control Panel

  • 30. 
    What command-line tools will create a domain computer account in Active Directory?
    • A. 

      NETDOM

    • B. 

      DSADD

    • C. 

      DSGET

    • D. 

      NETSH

    • E. 

      NSLOOKUP

  • 31. 
    What platforms are capable of joining a domain?
    • A. 

      Windows NT 4

    • B. 

      Windows 2000

    • C. 

      Windows XP

    • D. 

      Windows 95

    • E. 

      Windows Server 2003

  • 32. 
    You open a computer object and, on the Operating System tab, discover that noproperties are displayed. What causes these properties to be absent?
    • A. 

      The account is disabled

    • B. 

      The user entered wrong credentials

    • C. 

      A computer has not joined the domain using that account

  • 33. 
    An executive has a laptop running Windows XP, with a machine name of “TopDog.”You want to allow the executive’s laptop to join the domain, and you want to besure that the computer is configured by the group policies linked to the DesktopsOU immediately. How can you achieve this goal?
    • A. 

      Create a computer object in the Desktops OU

    • B. 

      Create a user account in the Desktops OU

    • C. 

      Select the executive’s user account for the property The Following User Or Group Can Join This Computer To A Domain

    • D. 

      Create a computer account in the Desktops Group

    • E. 

      None of the above

  • 34. 
    • A. 

      If an account is not created in advance, one will be generated automatically when the computer joins the domain, and that account will be located in the default Computers container

    • B. 

      Computer policies, which are typically linked to specific OUs, will not apply to the newly joined computer

    • C. 

      Because most organizations do have specific OUs for computers, you are left with an extra step to remember: moving the computer object to the correct OU after joining the domain

    • D. 

      By creating a computer object in advance, you can specify which groups (or users) are allowed to join a system to the domain with that account

    • E. 

      All of the above

  • 35. 
    After a period of expansion, your company created a second domain. Last weekend,a number of machines that had been in your domain were moved to the newdomain. When you open Active Directory Users And Computers, the objects forthose machines are still in your domain, and are displayed with a red “X” icon.What is the most appropriate course of action?
    • A. 

      Enable the accounts

    • B. 

      Disable the accounts

    • C. 

      Reset the accounts

    • D. 

      Delete the accounts

    • E. 

      None of the above

  • 36. 
    Which of the following tools allows you to administer a share on a remote server?Select all that apply.
    • A. 

      The Shared Folders snap-in

    • B. 

      Windows Explorer running on the local machine, connected to the remote server’s share or hidden drive share

    • C. 

      Windows Explorer running on the remote machine in a Terminal Services or Remote Desktop session.

    • D. 

      The File Server Management console.

  • 37. 
    A folder is shared on a FAT32 volume. The Project Managers group is given AllowFull Control permission. The Project Engineers group is given Allow Read permission. Julie belongs to the Project Engineers group. She is promoted and is addedto the Project Managers group. What are her effective permissions to the folder?
    • A. 

      Full Control

    • B. 

      Read

    • C. 

      Rear and Write

    • D. 

      Read and Execute

    • E. 

      None of the above

  • 38. 
    A folder is shared on a NTFS volume, with the default share permissions. TheProject Managers group is given Allow Full Control NTFS permission. Julie, whobelongs to the Project Managers group, calls to report problems creating files inthe folder. Why can’t Julie create files?
    • A. 

      The default share permission in Windows Server 2003 is Everyone: List Folder Contents.

    • B. 

      The default share permission in Windows Server 2003 is Everyone: Deny Access.

    • C. 

      The default share permission in Windows Server 2003 is Everyone: Allow Read.

    • D. 

      All of the above

    • E. 

      None of the above

  • 39. 
    What are the minimum NTFS permissions required to allow users to open documents and run programs stored in a shared folder?
    • A. 

      Full Control

    • B. 

      Modify

    • C. 

      Write

    • D. 

      Read & Execute

    • E. 

      List Folder Contents

  • 40. 
    Bill complains that he is unable to access the department plan. You open the Security tab for the plan and you find that all permissions on the document are inherited from the plan’s parent folder. There is a Deny Read permission assigned to agroup to which Bill belongs. Which of the following methods would enable Bill toaccess the plan?
    • A. 

      Modify the permissions on the parent folder by adding the permission Bill:Allow Full Control.

    • B. 

      Modify the permissions on the parent folder by adding the permission Bill:Allow Read

    • C. 

      Modify the permissions on the plan by adding the permission: Bill:Allow Read.

    • D. 

      Modify the permissions on the plan by deselecting Allow Inheritable Permis sions, choosing Copy, and removing the Deny permission.

    • E. 

      Remove Bill from the group that is assigned the Deny permission.

  • 41. 
    Bill calls again to indicate that he still cannot access the departmental plan. Youuse the Effective Permissions tool, select Bill’s account, and the tool indicates thatBill is, in fact, allowed sufficient permissions. What might explain the discrepancybetween the results of the Effective Permissions tool and the issue Bill is reporting?
    • A. 

      It is possible that a permission entry is assigned to a logon-related account, such as Interactive or Network, that could be denying accessIt is possible that a permission entry is assigned to a logon-related account, such as Interactive or Network, that could be denying accessIt is possible that a permission entry is assigned to a logon-related account, such as Interactive or Network, that could be denying accessIt is possible that a permission entry is assigned to a logon-related account, such as Interactive or Network, that could be denying access

    • B. 

      If you are not logged on as a Domain Admin, you may not be able to read all group memberships, which might skew the resulting permissions report.

    • C. 

      Effective Permissions tool is only an approximation of a user’s access

    • D. 

      All of the above

    • E. 

      None of the above

  • 42. 
    Which of the following are valid criteria for a security log filter to identify specificfile and folder access events? Select all that apply.
    • A. 

      The date of the event

    • B. 

      The user that generated the event

    • C. 

      The type of object access that generated the event

    • D. 

      Success or failure audit

    • E. 

      All of the above

  • 43. 
    Users at Contoso Ltd. use Microsoft Office applications to access resources onServer01. Your job is to monitor Server01 to ensure that permissions are not toorestrictive, so that users are not prevented from achieving their assignments.Which log, and which type of event, will provide the information you require?
    • A. 

      Application log; Success Event

    • B. 

      Application log; Failure Event

    • C. 

      Security log; Success Event

    • D. 

      Security log; Failure Event

    • E. 

      System log; Success Event

  • 44. 
    You’re setting up a Web site in IIS on Server01. The site’s Internet domain name isadatum.com, and the site’s home directory is C:\Web\Adatum. Which URL shouldInternet users use to access files in the home directory of the site?
    • A. 

      Http://server01.web.adatum

    • B. 

      Http://web.adatum.com/server01

    • C. 

      Http://server01.adatum/home

    • D. 

      Http://server01.adatum.com

    • E. 

      None of the above

  • 45. 
    You want to ensure the highest level of security for your corporate intranet withoutthe infrastructure of certificate services. The goal is to provide authenticationthat is transparent to users, and to allow you to secure intranet resources with thegroup accounts existing in Active Directory. All users are within the corporate firewall.What authentication method should you choose?
    • A. 

      Anonymous Access

    • B. 

      Basic Authentication

    • C. 

      Digest Authentication

    • D. 

      Integrated Windows Authentication

    • E. 

      None of teh above

  • 46. 
    You are to back up a Windows Server 2003 file server every evening. You performa manual, normal backup. You will then schedule a backup job to run everyevening for the next two weeks. Which backup type will complete the fastest?
    • A. 

      Normal

    • B. 

      Differential

    • C. 

      Incremental

    • D. 

      Copy

  • 47. 
    You are to back up a Windows Server 2003 file server every evening. You performa manual, normal backup. You will then schedule a backup job to run everyevening for the next two weeks. Which backup type will provide the simplestrecovery of lost data?
    • A. 

      Normal

    • B. 

      Differential

    • C. 

      Incremental

    • D. 

      Daily

  • 48. 
    A user has accidentally deleted the data in a Microsoft Word document and savedthe document, thereby permanently altering the original file. A normal backupoperation was performed on the server the previous evening. Which restoreoption should you select?
    • A. 

      Do Not Replace The File On My Computer

    • B. 

      Replace The File On Disk Only If The File On Disk Is Older

    • C. 

      Always Replace The File On My Computer

  • 49. 
    An executive has returned from a business trip. Before the trip, she copied filesfrom a network folder to her hard drive. The folder is shared with other executives, who modified their files in the folder while she was away. When shereturned, she moved her copy of the files to the network share, thereby updatingher files with the changes she made while away, but also overwriting all the filesthat had been changed by other executives. The other executives are unhappythat their files have been replaced with the versions that were active when she leftfor her trip. Luckily, you performed a normal backup operation on the folder theprevious evening. What restore option should you choose?
    • A. 

      Do Not Replace The File On My Computer

    • B. 

      Replace The File On Disk Only If The File On Disk Is Older

    • C. 

      Always Replace The File On My Computer.

  • 50. 
    You would like to test the restore procedures on your server, but would also liketo avoid affecting the production copies of the backed-up data. What is the bestrestore location to use?
    • A. 

      Original location

    • B. 

      Alternate location

    • C. 

      Single folder

  • 51. 
    Scott Bishop is a power user at a remote site that includes 20 users. The site has aWindows Server 2003 system providing file and print servers. There is a tape driveinstalled on the system. Because there is no local, full-time administrator at thesite, you want to allow Scott to back up and restore the server. However, you wantto minimize the power and the privileges that Scott obtains, limiting his capabilities strictly to backup and restore. What is the best practice to provide Scott theminimum necessary credentials to achieve his task?
    • A. 

      Backup Operators group

    • B. 

      Print Operators

    • C. 

      Administrators

    • D. 

      Account Operators

    • E. 

      Network Configuration Operators

  • 52. 
    User has deleted a file in a shared folder on a server. The user opens the properties of the folder and does not see a Previous Versions tab. Which of the following may be true? (Choose all that apply.)
    • A. 

      The folder is not enabled for Shadow Copy

    • B. 

      The volume on the server is not enabled for Shadow Copy.

    • C. 

      The user doesn’t have permission to view the Shadow Copy cache.

    • D. 

      The Shadow Copy client is not installed on the user’s machine

    • E. 

      The folder is on a FAT volume.

  • 53. 
    You’re installing a printer on a client computer. The printer will connect to a logicalprinter installed on a Windows Server 2003 print server. What type or types ofinformation could you provide to set up the printer? (Choose all that apply.)
    • A. 

      TCP/IP printer port

    • B. 

      Model of the print device

    • C. 

      URL to printer on print server

    • D. 

      UNC path to print share

    • E. 

      Printer driver

  • 54. 
    You’re administering a Windows Server 2003 computer configured as a printserver. You want to perform maintenance on a print device connected to the printserver. There are several documents in the print queue. You want to prevent thedocuments from being printed to the printer, but you don’t want users to have toresubmit the documents to the printer. What is the best way to do this?
    • A. 

      Open the printer’s Properties dialog box, select the Sharing tab, and then select the Do Not Share This Printer option

    • B. 

      Open the printer’s Properties dialog box and select a port that is not associated with a print device

    • C. 

      Open the printer’s queue window, select the first document, and then select Pause from the Document window. Repeat the process for each document.

    • D. 

      Open the printer’s queue window, and select the Pause Printing option from the Printer menu.

  • 55. 
    You’re administering a Windows Server 2003 computer configured as a printserver. Users in the Marketing group complain that they cannot print documentsusing a printer on the server. You view the permissions in the printer’s properties.The Marketing group is allowed Manage Documents permission. Why can’t theusers print to the printer?
    • A. 

      The Everyone group must be granted the Manage Documents permission.

    • B. 

      The Administrators group must be granted the Manage Printers permission

    • C. 

      The Marketing group must be granted the Print permission.

    • D. 

      The Marketing group must be granted the Manage Printers permission

  • 56. 
    You’re setting up a printer pool on a Windows Server 2003 computer. The printerpool contains three print devices, all identical. You open the properties for theprinter and select the Enable Printer Pooling option on the Ports tab. What mustyou do next?
    • A. 

      Configure the LPT1 port to support three printers

    • B. 

      Select or create the ports mapped to the three printers.

    • C. 

      On the Device Settings tab, configure the installable options to support two additional print devices

    • D. 

      On the Device Settings tab, configure the installable options to support two additional print devices

  • 57. 
    You’re the administrator of the Windows Server 2003 computer that is configuredas a print server, and you want to administer the print services from a Webbrowser on a client computer. The server is named Mktg1, but you don’t know theshare name of the printer. Which URL should you use to connect to the printer?
    • A. 

      Http://mktg1/printers

    • B. 

      Http://printers/mktg1

    • C. 

      Http://windows/web/printers

    • D. 

      Http://windows/mktg1

  • 58. 
    You want to configure a logical printer so that large, low-priority documents willbe printed overnight. Which of the following options will you configure in theprinter’s Properties dialog box?
    • A. 

      Priority

    • B. 

      Available From / To

    • C. 

      Start Printing After Last Page Is Spooled

    • D. 

      Print Directly To The Printer

    • E. 

      Keep Printed Documents

  • 59. 
    A Windows 2003 Server is configured as a print server. In the middle of the workday,the printer fuse fails, and must be replaced. Users have already submitted jobs tothe printer, which uses IP address 192.168.1.81. An identical printer uses address192.168.1.217, and is supported by other logical printers on the server. Whatactions should you take so that users’ jobs can be printed without resubmission?
    • A. 

      In the failed printer’s Properties dialog box, select Enable Printer Pooling

    • B. 

      At the command prompt, type Net Stop Spooler.

    • C. 

      At the command prompt, type Net Start Spooler.

    • D. 

      In the failed printer’s Properties dialog box, select the port 192.168.1.217.

    • E. 

      In the failed printer’s Properties dialog box, click Add Port.

  • 60. 
    You’re setting up printing on a Windows Server 2003 computer. You attach aprinter, configure a logical printer, and submit documents for printing, but thedocuments do not print completely and sometimes come out garbled. What is themost likely cause of the problem?
    • A. 

      There’s insufficient hard disk space for spooling

    • B. 

      You’re using an incorrect printer driver.

    • C. 

      The selected port is not correct.

    • D. 

      The device settings for the printer are using an incorrect font substitutio

  • 61. 
    Which of the following options will give you the clearest picture of printer utilization—allowing you to understand the consumption of printer toner and paper?
    • A. 

      Configure auditing for a logical printer and audit for successful use of the Print permission by the Everyone system group.

    • B. 

      Export the System log to a comma-delimited text file and use Excel to analyze spooler events.

    • C. 

      Configure a performance log and monitor the Total Pages Printed counter for each logical printer.

    • D. 

      Configure a performance log and monitor the Jobs counter for each logical counter.

  • 62. 
    You are configuring SUS for a group of Web servers. You want the Web servers toupdate themselves nightly based on a list of approved updates on your SUS server.However, once in a while an administrator is logged on, performing late-nightmaintenance on a Web server, and you do not want update installation and potentialrestart to interfere with those tasks. What Windows Update policy configurationshould you use in this scenario?
    • A. 

      Notify For Download And Notify For Install

    • B. 

      Auto Download And Notify For Install

    • C. 

      Auto Download And Schedule The Install

  • 63. 
    What command should you use to unpack the single file download of a servicepack?
    • A. 

      Setup.exe -u

    • B. 

      Update.exe -x

    • C. 

      Update.msi

    • D. 

      .exe -x

  • 64. 
    What type of Group Policy software deployment should be used to distribute aservice pack?
    • A. 

      Published in the Computer Configuration Software Settings

    • B. 

      Assigned in the Computer Configuration Software Settings

    • C. 

      Published in the User Configuration Software Settings

    • D. 

      Assigned in the User Configuration Software Settings

  • 65. 
    What are the valid licensing modes in Windows Server 2003? Select all that apply.
    • A. 

      Per User

    • B. 

      Per Server

    • C. 

      Per Seat

    • D. 

      Per Device or Per User

  • 66. 
    You are hiring a team to tackle a software development project. There will bethree shifts of programmers, and each shift will include six programmers. Eachprogrammer uses four devices to develop and test the software, which authenticatesagainst a Windows Server 2003 computer. What is the minimum number ofCALs required if the servers involved are in Per Device or Per User licensingmode?
    • A. 

      6

    • B. 

      4

    • C. 

      8

    • D. 

      18

    • E. 

      24

  • 67. 
    What tool will allow you to identify the site license server for your site?
    • A. 

      Active Directory Domains And Trusts

    • B. 

      The Licensing tool in Control Panel

    • C. 

      Active Directory Sites And Services

    • D. 

      DNS

  • 68. 
    You manage the network for a team of 500 telephone sales representatives. Youhave 550 licenses configured in Per Device or Per User licensing mode. A newcampaign is launched and you will hire another shift of 500 reps. What do youneed to do to most effectively manage license tracking and compliance?
    • A. 

      Revoke the licenses from the existing clients

    • B. 

      Delete the existing licenses, then add 500 licenses

    • C. 

      Create license groups

    • D. 

      Convert to Per Server licensing

  • 69. 
    You need to remove a PnP device from a configuration temporarily, but want toleave it physically connected to the computer. You want to minimize the amountof work required to use the device later. Which of the following is the best optionto accomplish your goal?
    • A. 

      From the Properties page of the device, choose Do Not Use this Device (Disable).

    • B. 

      From the Properties page of the device, choose Uninstall.

    • C. 

      Using the Safely Remove Hardware utility, choose to remove the device.

  • 70. 
    You have finished configuring a new display driver, and are prompted to restartthe computer for the changes to take effect. Shortly after logging on, the computerscreen goes blank, making working on the computer impossible. Which troubleshootingtechniques or tools will allow you to recover most easily from the problemwith the display driver?
    • A. 

      Last Known Good Configuration

    • B. 

      Driver Rollback

    • C. 

      Safe mode

    • D. 

      Recovery Console

  • 71. 
    Which of the following provide the ability to recover from the failure of a singlehard drive?
    • A. 

      Primary partition

    • B. 

      Extended partition

    • C. 

      Mirrored volume

    • D. 

      Spanned volume

    • E. 

      RAID-5 volume

  • 72. 
    What type of disk region supports logical drives?
    • A. 

      Primary partitions

    • B. 

      Simple volumes

    • C. 

      Spanned volumes

    • D. 

      Extended partitions

    • E. 

      Unallocated space

  • 73. 
    You recently added a disk to a computer. The disk had previously been used in aWindows 2000 Server. The disk appears in Device Manager, but is not appearingcorrectly in Disk Management. What task must you apply?
    • A. 

      Import Foreign Disk

    • B. 

      Format volume

    • C. 

      Rescan

    • D. 

      Change Drive Letter or Path

    • E. 

      Convert to Dynamic Disk

  • 74. 
    You’re the administrator of a Windows Server 2003 computer. You want to fix anyfile system errors and recover any bad sectors on your computer’s hard disk.Which tool should you use?
    • A. 

      Check Disk

    • B. 

      Disk Defragmenter

    • C. 

      DISKPART

    • D. 

      Disk quotas

  • 75. 
    You’re the administrator of a Windows Server 2003 computer. The computer’shard disk contains two data volumes: D and E. You enable disk quotas on volumeD and E that limit all users to 20 MB of total storage. However, you want to limitstorage in the users’ home folders, stored in D:\Users, to 10 MB per user. Is thispossible? Why or why not? Where can you implement quotas?
    • A. 

      On any server for all disks

    • B. 

      On any physical disk for all volumes

    • C. 

      On any volume for all folders

    • D. 

      On any folder

  • 76. 
    What is the required amount of free disk space on a volume in order to providefor complete defragmentation?
    • A. 

      5 percent

    • B. 

      10 percent

    • C. 

      15 percent

    • D. 

      25 percent

    • E. 

      50 percent

  • 77. 
    You’re implementing software RAID on your Windows Server 2003 computer. Youwant to provide fault tolerance to the system and boot partitions. Which version ofRAID should you use?
    • A. 

      RAID-0

    • B. 

      RAID-1

    • C. 

      RAID-5

    • D. 

      You cannot use software RAID to protect a boot partition

  • 78. 
    You’re setting up a Windows Server 2003 computer and you want to protect thedata on the hard disk. You want to implement a solution that provides the fastestdisk I/O possible and supports the hot swapping of hard disks. Which RAID solutionshould you use?
    • A. 

      RAID-0

    • B. 

      RAID-1

    • C. 

      RAID-5

    • D. 

      Hardware RAID

  • 79. 
    You’re setting up RAID-5 on your Windows Server 2003 computer. You plan to usefive hard disks, which are each 20 GB in size. What percentage of redundancy canyou anticipate with this configuration?
    • A. 

      20

    • B. 

      25

    • C. 

      33

    • D. 

      50

  • 80. 
    You’re setting up software RAID on your Windows Server 2003 computer to providefault tolerance to the data stored on that system. The computer is used as adatabase server. The server performs many read operations but relatively fewwrite operations. As a result, you want a fault-tolerant solution that provides excellentread performance. Which RAID solution should you use?
    • A. 

      RAID-0

    • B. 

      RAID-1

    • C. 

      RAID-5

  • 81. 
    A computer where you want to implement RAID-5 contains three disks, each with2 GB of unallocated space. Using the Disk Management snap-in, you start the NewVolume Wizard by right-clicking one of the regions of unallocated space. Whenyou reach the Select Volume Type screen, the RAID-5 option is not available. Whatis the most likely reason for this behavior?
    • A. 

      RAID-5 is already implemented in hardware.

    • B. 

      One or two of the disks are configured with the basic storage type

    • C. 

      All three disks are configured with the dynamic storage type

    • D. 

      All three disks are configured with the basic storage type.

    • E. 

      RAID-5 is already implemented in software.

  • 82. 
    You’re setting up a backup job on a computer running Windows Server 2003. Youwant to back up the registry, startup files, and th
    • A. 

      %Windir %

    • B. 

      %Systemroot%

    • C. 

      System State

    • D. 

      None of the above. You cannot back up the registry

  • 83. 
    You install a scanner on a computer running Windows Server 2003. When you tryto restart your computer, the operating system will not start. Which of the followingwould be the least invasive recovery method to try first to restore the systemto operation?
    • A. 

      Automated System Recovery

    • B. 

      Recovery Console

    • C. 

      Safe mode

    • D. 

      Directory Services Restore mode

  • 84. 
    A hard disk on a server running Windows Server 2003 has failed. You replace thedisk, boot the system, initialize the disk, and create an NTFS volume on the newdisk. You now want to restore that data from the last backup job from the old disk.How should you restore the data?
    • A. 

      Use the Recovery Console to copy data to the disk.

    • B. 

      Use the Backup utility to launch the Restore Wizard

    • C. 

      Use the ASR backup to restore the data.

    • D. 

      Use the Last Known Good Configuration option in Safe mode to set up the new disk.

  • 85. 
    A file server on your network will not start. After exhausting all other options, youhave decided to use Automated System Recovery (ASR) to recover the system. Youcreated an ASR backup immediately after you installed Microsoft Windows Server2003 and another one two months ago after you installed a device driver. You performa full backup of data files once a week. What will ASR restore? (Choose allthat apply.)
    • A. 

      Data files two months ago

    • B. 

      Data files at the last full backup

    • C. 

      Disk configuration

    • D. 

      Operating system

    • E. 

      System State two months ago

  • 86. 
    Rooslan is a systems administrator at a medium-sized organization that has a singleWindows Server 2003 domain. His team is responsible for installing and maintainingsix Windows Server 2003 systems. Each server has been configured as a stand-aloneserver and is not a member of the 2003 domain. Twelve new disk drives have arrivedand two each are to be installed in each of these member servers. Rooslan delegatesthis task to an intern named Alex that is visiting the organization this month. Rooslanhas configured Alex a simple user account that has been granted local logon rights oneach of the servers via the local Group Policy Object (GPO). Organizational policy dictatesthat under no circumstances should Alex’s user account be made a member of theAdministrators group on any of the Windows Server 2003 servers. Rooslan then asksAlex to convert each of the newly installed disks from basic to dynamic. Alex tries thisbut finds that he is unable to perform this task. Which of the following can Rooslan dowithout making Alex’s user account a member of the Administrators group on each ofthese Windows Server 2003 stand-alone servers?
    • A. 

      Rooslan should add Alex’s account to the Backup Operators group on each server

    • B. 

      Rooslan should add Alex’s account to the Backup Operators group in the domain

    • C. 

      Rooslan should add Alex’s account to the Power Users group in the domain.

    • D. 

      Rooslan should modify the local GPO on each Windows Server 2003 to give Alex’s account the Perform Volume Maintenance Tasks user right.

    • E. 

      Rooslan should modify the local GPO on each Windows Server 2003 to give Alex’s account the Take Ownership Of Files And Other Objects user right.

  • 87. 
    Rooslan is the systems administrator of a Windows Server 2003 file server. The servercurrently has two disk drives. The first disk, which is 30 gigabytes (GB) in size, hostsall the operating system files. The second disk drive, which is 80 GB in size, hosts userdata on five separate shares. Each share corresponds to a specific department atRooslan’s organization. Each share is distributed into three separate folders. The firstfolder is a departmental documents folder, the second is a collaboration folder, and thethird is an individual user data folder.Users have read access to the departmental documents folder, read and write access tothe collaboration folder, and each individual user has full control over his or her uniquedata folder. Only the individual user can access his or her data folder; other users cannotread or write to the contents of that folder. The five-share system works well andall employees in the organization understand where to store and find documents.A problem has developed in that the user data sections of each of the five departmentalshares are expanding so quickly that soon the disk that hosts the user data will be filledto capacity. It is important to the managers of the organization that any solution doesnot increase the number of shares that an employee must access.Rooslan has the following goals:Primary Goal: Add more space to each share so that the disk hosting the shared foldersdoes not become full.Secondary Goals:Retain only five shares and keep the user data directory as a folder off each departmentalshare.Provide fault tolerance for the file share.Retain the security scheme currently in use so that individual users have full controlover their own directories and other users cannot access them.Rooslan performs the following actions. During a scheduled period after midnightwhen no users are connected to the server, Rooslan shuts down the server and installsfive 100 GB hard disk drives on the server. He then formats each drive as a single volumewith the NTFS file system. He then creates a new folder called Temp under eachof the folders hosting each department’s share. One by one, he then mounts the fivedisks to each of the Temp folders so that each Temp folder now points to its own individualmounted hard disk. Rooslan then copies the entire contents of the user datafolder into the Temp folder under each share, and then deletes the original user datafolder. Finally he renames the Temp folder with the name of the user data folder.How many of his goals has Rooslan achieved?
    • A. 

      Rooslan did not achieve any primary goals. All of Rooslan’s secondary goals were achieved.

    • B. 

      Rooslan has achieved the primary goal and one secondary goal.

    • C. 

      Rooslan has achieved the primary goal and two secondary goals

    • D. 

      Rooslan has achieved all primary and secondary goals.

    • E. 

      Rooslan has achieved none of the primary and secondary goals.

  • 88. 
    • A. 

      The contents of the Compress directory will be compressed.

    • B. 

      The contents of the Compress directory will be uncompressed

    • C. 

      The contents of the Encrypt directory will be encrypted.

    • D. 

      The contents of the Encrypt directory will be unencrypted

    • E. 

      The contents of the Indiperf directory will not retain their individually tailored NTFS permissions.

  • 89. 
    Lee has two 100 GB SCSI hard disk drives connected to a Windows Server 2003 serverthat he is responsible for administering. The server also has a single hardware RAIDcontroller that supports RAID-0, RAID-1 and RAID-5. Currently 70 GB on the first driveis used and the second drive is empty. Lee is concerned that the hard disk drive of theserver might fail and he would lose all the information on the first disk drive. Lee hasconsidered regular backups but does not have the equipment with which to back up70 GB on a regular basis. Lee would like to configure a solution that provides fault tolerancefor the first drive. Which of the following should he consider, given the currentconfiguration of his Windows Server 2003 server?
    • A. 

      Lee should configure Volume Shadow Copy services on the second hard disk drive by using disk properties

    • B. 

      Lee should configure Volume Shadow Copy services on the first hard disk drive by using disk properties

    • C. 

      Lee should configure the disks in a RAID-5 configuration using the hardware RAID controller’s configuration utility.

    • D. 

      Lee should configure the disks in a RAID-0 configuration using the hardware RAID controller’s configuration utility.

    • E. 

      Lee should configure the disks in a RAID-1 configuration using the hardware RAID controller’s configuration utility.

  • 90. 
    You have just installed a SCSI controller and three attached 100 GB SCSI disk drives toyour Windows Server 2003 system. You start the server after installing the hardware,log on with an account that has administrative privileges and run the Disk Managementconsole. As soon as the console comes up, you are confronted by the Initialize AndConvert Disk Wizard. Which of the following can be done to the newly installed SCSIdisks by using this wizard? (Select all that apply.)
    • A. 

      Initialize new disks.

    • B. 

      Convert dynamic disks to basic disks.

    • C. 

      Convert basic disks to dynamic disks.

    • D. 

      Create mirrored disk pairs.

    • E. 

      Create striped sets.

  • 91. 
    You are working on a Windows Server 2003 system that has been upgraded fromWindows 2000 server. This server has a legacy SCSI RAID controller that is not Plugand Play. The device appears to be working perfectly but you cannot see it within theDevice Manager. How can this device be viewed in the Device Manager?
    • A. 

      Only Plug and Play devices can be viewed in the Device Manager.

    • B. 

      You must upgrade the driver for this device to one that supports Plug and Play.

    • C. 

      Disk drive and RAID controllers are not visible in the Device Manager.

    • D. 

      You must go to the View menu in Device Manager and select Show Hidden Devices.

  • 92. 
    Rooslan is using several external universal serial bus (USB) hard disk drives as an extrastorage option on a Windows Server 2003 system that he administers. He is also usingan external USB CD-Writer and a Microsoft USB IntelliMouse and a USB keyboard.Recently, Rooslan has noticed that the performance of some of the USB hard diskdrives has become erratic. He wants to generate a report on the current bandwidth andpower consumptions of various USB devices attached to the Windows Server 2003 system.Which of the following will allow him to do this? (Select all that apply.)
    • A. 

      Rooslan needs to open the USB devices utility located in Control Panel. This utility lists the bandwidth and power consumptions of all USB devices attached to the system.

    • B. 

      Rooslan needs to open the Power utility located in Control Panel. From here he can navigate to the USB tab to discover the power consumption profiles of various devices attached to the system.

    • C. 

      Rooslan needs to open the Device Manager and navigate to the USB Root Hub, right-click and select Properties. He then needs to click the Power tab, which lists the power consumption by attached device

    • D. 

      Rooslan needs to open the Device Manager and navigate to the USB Universal Host Controller, right-click and select Properties. He then needs to click the Advanced tab, which lists the bandwidth-consuming devices and the bandwidth they use.

    • E. 

      Rooslan needs to open the Bandwidth utility located in Control Panel. From here he can navigate to the USB tab to discover the bandwidth consumption profiles of various devices attached to the system.

  • 93. 
    Orin’s company is auditing all the devices that are attached to its Windows Server 2003systems. The auditors have demanded that printouts be generated listing a summary ofall devices that are installed on the system. This summary should include product versionnumbers, bus type, and resource information.Orin has the following goals:Primary Goal: Provide a printout that contains a summary of all devices installed on thesystem.Secondary Goals:Ensure that interrupt request (IRQ) resource information is included in this report.Output the report to a file rather than a printer.Orin proceeds as follows: From Computer Management in the Administrative Toolsprogram group, he opens the Device Manager, selects the Windows Server 2003 systemand, from the Action menu, selects Print. He then sets the report type to All DevicesAnd System Summary and clicks Print.Which of the following goals has Orin achieved?
    • A. 

      Orin has achieved the primary goal and all secondary goals.

    • B. 

      Orin has achieved the primary goal and one secondary goal.

    • C. 

      Orin has achieved the primary goal and no secondary goals.

    • D. 

      Orin has not achieved the primary goal and has achieved all secondary goals.

    • E. 

      Orin has not achieved the primary goal and has achieved one secondary goal.

  • 94. 
    You are the systems administrator for a set of Windows Server 2003 systems that areused as Web servers for a medium-sized Internet service provider (ISP). You must preparea report for your manager on the network adapters that are installed in each of theservers. This report should include the adapter type, and the hardware resources ituses such as IRQ. Because they experience sustained traffic load serving Web pages tothe Internet, there are several network adapters in each server. To make matters morecomplex, these adapters have generally been added on an ad hoc basis so they are ofvarious make and manufacture. Which of the following methods can you use to generatethis report for your manager? (Select all that apply.)
    • A. 

      Run the Device Manager on each Windows Server 2003 system. Select Network Adapters, and then from the Action menu, select Print. Choose Selected Class or Device and then click Print.

    • B. 

      Select Network Connections in Control Panel on each Windows Server 2003 system. From the Advanced Tab select Network Hardware, and then click Generate Report.

    • C. 

      Run WINMSD from the command prompt. From the Components node, select the Network node and then the Adapters node. From the File menu, select Print.

    • D. 

      Run Winipcfg from the Run menu. From the Adapters tab, select Generate Hardware Report, and then click Print.

    • E. 

      Run the Ipconfig/Adapter command from the command prompt. Copy the resulting information into a text file in Notepad and then print it.

  • 95. 
    Rooslan is the senior systems administrator for a medium-sized organization. Severalmonths ago he purchased and installed three Windows Server 2003 systems and configuredthem as domain controllers. After a week of successful testing in Rooslan’s lab,each server was shipped to a remote location in the organizational network as part ofthe Windows Server 2003 rollout. Rooslan has just received a telephone call from a junioradministrator at one of the sites to which these domain controllers was shipped. Thejunior administrator has noticed that when the domain controller starts an error reportappears that states that a device driver was unable to load during the boot process. Thejunior administrator reports to Rooslan that he examined the Device Manager to see ifthere is anything that indicates that a device is experiencing a fault, but there is no indicationthat this is the case. Rooslan asks the junior administrator if he checked the hiddendevices and the junior administrator replied that he was unaware of how toperform this task. Of the last 20 starts, the error has appeared three times. The errorappeared again this morning prompting the phone call to Rooslan. Before telephoning,however, the junior administrator restarted the server and the error did not appear.Rooslan initiates a remote desktop connection to the server to examine it. Which of thefollowing represents the path that Rooslan should follow to diagnose this fault?
    • A. 

      When connected to the remote domain controller, Rooslan should open the Device Manager and, on the View menu, select Show Hidden Devices.

    • B. 

      When connected to the remote domain controller Rooslan should examine the system log for any entries created by failing device drivers.

    • C. 

      When connected to the remote domain controller, Rooslan should examine the security log for any entries created by failing device drivers

    • D. 

      When connected to the remote domain controller, Rooslan should examine the device log for any entries created by failing device drivers.

    • E. 

      When connected to the remote domain controller, Rooslan should examine the application log for any entries created by failing device drivers.

  • 96. 
    Rooslan is a consultant who has been approached by a medium-sized organization forhis advice on the best way to optimize disk performance for three newly purchasedWindows Server 2003 systems. There are three different systems in question, all withidentical hardware. Each server has six 120 GB SCSI hard disk drives and no hardwareRAID controller. Rooslan has been presented with the following specifications from theteams that will be using each Windows Server 2003 System.The team that will use the first server has one goal. The team would like a second largevolume of approximately 600 GB that will contain all the data. The first volume of 120 GBshould contain the operating system files and the program files. Speed and fault toleranceare not important to this team.The team that will use the second server has three goals. The first goal is that the primaryvolume be 120 GB in size, fault-tolerant, and host the operating system and programfiles. The second goal is that the secondary volume be 120 GB in size, faulttolerant,and store program data. The third goal is that the tertiary volume be 240 GBin size and provide the fastest possible read/write speeds.The team that will use the third server has two goals. The first goal is that the primaryvolume must be approximately 120 GB in size, host the operating system and the programfiles, and be fault-tolerant. The second goal is that the secondary volume must beapproximately 480 GB in size and have the best read/write performance possible.Rooslan installs Windows Server 2003 on the first team’s server, using a full disk partitionon which he installs the operating system and the program files. Once he is inWindows Server 2003 he converts the five other disks to dynamic and spans a singlevolume across all these disks.On the second team’s server, Rooslan installs Windows Server 2003 using the entire 120 GBavailable on the disk. When he has Windows Server 2003 configured, he mirrors this120 GB disk onto the second 120 GB disk. He then installs the relevant program filesonto this volume. He then creates two more mirrored pairs with the third and fourthand the fifth and sixth 120 GB disks.On the third team’s server, Rooslan installs Windows using the entire 120 GB availableon the first disk. When he has Windows configured he mirrors the 120 GB disk ontothe second 120 GB disk. He then installs the relevant program files onto this volume.Rooslan then creates a RAID-5 volume using the final four 120 GB disks.Which of the following statements accurately summarizes the number of team goalsthat Rooslan accomplished?
    • A. 

      Rooslan achieved the first team’s goal, as well as all goals of the second team and all goals of the third team

    • B. 

      Rooslan achieved the first team’s goal, two of the second team’s goals, and all the third team’s goals.

    • C. 

      Rooslan achieved the first team’s goal, all the second team’s goals, and one of the third team’s goals

    • D. 

      Rooslan did not achieve the first team’s goal, achieved all the second team’s goals, and achieved one of the third team’s goals

    • E. 

      Rooslan achieved the first team’s goal, achieved two of the second team’s goals, and achieved one of the third team’s goals.

  • 97. 
    Oksana is looking at a report generated by the disk defragmenter of her system. Hersystem contains two volumes. The first volume is 100 GB and is mirrored on a second100 GB disk. The second volume is 400 GB and uses RAID-5 over five 100 GB disks.The report that Oksana is examining was an analysis performed on the second volumerather than the first.Oksana is puzzled because there seems to be several sections on the second volumethat are colored green. Green in a defragmenter analysis represents unmovable files.Oksana is puzzled because she believed that the only files that were unmovable for thedisk defragmenter are located on the system or boot volumes. What is the cause of theunmovable files listed on the defragmenter analysis of the second volume? (Select allthat apply.)
    • A. 

      Oksana has mistakenly analyzed the first volume, which contains the boot and system files.

    • B. 

      The page file has been located on the second volume.

    • C. 

      Oksana has stored encrypted files on the second volume

    • D. 

      Oksana has stored compressed files on the second volume

    • E. 

      The NTFS change journal, stored on all NTFS volumes, is an unmovable file.

  • 98. 
    Oksana has scheduled a command-line disk defragmentation job to take place at 2 A.M.every Sunday on all Windows Server 2003 systems at her site. This represents a perfecttime to perform such a task because the amount of activity on any of the servers at thistime is minimal. Checking through the logs on a Monday morning, Oksana finds thatthe Sunday morning defragmentation did not occur on one of the volumes on one ofthe Windows Server 2003 servers. Oksana logs onto the server from a remote desktopconnection and checks the Disk Defragmenter in the Computer Management Console.Oksana decides to wait until the end of business that day and try to run the defragmentationprocess again on this volume. At 6:30 P.M. she logs on from the remote desktopagain and attempts to initiate a defragmentation of the problematic volume. The processfails again. What could be causing the failure, and which of the following stepsshould Oksana take to defragment this volume?
    • A. 

      The volume is failing to defragment because it is close to capacity. A volume must have at least 15 percent of space free for the defragmentation process to begin.

    • B. 

      The volume has been marked as dirty. Oksana needs to run Chkdsk from the command line before she can defragment the volume successfully.

    • C. 

      Oksana must take the volume offline manually to perform the defragmentation. Once this is done, the disk will defragment normally

    • D. 

      Oksana needs to dismount the disk hosting the volume to perform a defragmentation. Once this is done, the disk will defragment normally.

  • 99. 
    You are the systems administrator for several small businesses. One of the small businessesthat you work for has reported that the performance of its server appears to bedegrading. The server is configured as follows:Volume Type File System Fault Tolerance FragmentationDrive C Dynamic NTFS Mirrored 9%Drive D Basic NTFS None 13%Drive E Dynamic NTFS Striped 23%Drive F Dynamic NTFS RAID-5 32%Drive G Dynamic NTFS RAID-5 41%On which of the Windows Server 2003 system volumes will Windows recommend thatyou run the defragmenter? (Select all that apply.)
    • A. 

      Drive C

    • B. 

      Drive D

    • C. 

      Drive E

    • D. 

      Drive F

    • E. 

      Drive C

  • 100. 
    Oksana has recently replaced Rooslan as the systems administrator of six WindowsServer 2003 systems. These six servers are stand-alone systems and not members ofany domain. Several weeks into her tenure, Oksana receives the go-ahead to buy aDigital Audio Tape (DAT) backup drive for each of the Windows Server 2003 systems.At a prescheduled time she brings the servers down and installs the new hardware.When all the servers have been brought up, Oksana logs on to each and is confrontedby the Add New Hardware Wizard. She begins the process of installing the software forthe new hardware but finds that the process fails because the driver cannot beinstalled. Oksana then investigates the driver signing setting in the System Properties.The driver signing option is set to Block with the other options dimmed. Although thedrivers have not been digitally signed by Microsoft, Oksana has decided that she wantsto use them and that they will pose no problems to the stability of the servers that sheadministers. Which of the following actions can Oksana take to allow the installation ofunsigned drivers on all six of these Windows Server 2003 systems? (Select all thatapply.)
    • A. 

      Oksana should reconfigure the domain GPO and set the Unsigned Driver Installation Behavior policy to Warn But Allow Installation.

    • B. 

      Oksana should reconfigure the local GPO and set the Unsigned Driver Installation Behavior policy to Warn But Allow Installation

    • C. 

      Oksana should check the Administrator Option / Make This Action The System Default check box in the Driver Signing Options dialog box, accessible from the System Properties. This will enable her to switch the option from Block to Warn.

    • D. 

      Oksana should reconfigure the GPO assigned to the site that the servers are set up in and set the Unsigned Driver Installation Behavior policy to Warn But Allow Installation

    • E. 

      Oksana should reconfigure the GPO applied to the OU that the servers are members of and set the Unsigned Driver Installation Behavior policy to Warn But Allow Installation

  • 101. 
    You are a systems administrator at a medium-sized organization. You maintain a testlab of five Windows Server 2003 systems that are all members of your organization’ssingle domain. Because the organization has had trouble in the past with some userswith sufficient privileges installing unsigned drivers on the system the default domainGPO has been configured to block the installation of all unsigned drivers on computersthat are members of the domain. The domain GPO also blocks access for all users tothe System Properties and hides all icons on the desktop. Until recently this wasunproblematic; however you have just received a new batch of high-performance networkcards that you wish to test on your lab servers. These high performance networkcards ship with drivers that have not been digitally signed by Microsoft. Because youcannot access the System Properties you cannot override the default domain GPO settingthat blocks the installation of unsigned drivers. Which of the following methodsallows you to override the default domain GPO and change the setting on your labservers to Warn but not change the overall setting for other computers in your domain?
    • A. 

      Edit the local GPO on each server and set the Unsigned Driver Installation Behavior policy to Warn But Allow Installation

    • B. 

      Edit the GPO applied to the site in which the servers in your lab reside and set the Unsigned Driver Installation Behavior policy to Warn But Allow Installation.

    • C. 

      Create a new organizational unit called Mylab. Move the computer accounts for the Windows Server 2003 systems in to the Mylab OU. Create a GPO that sets the Unsigned Driver Installation Behavior policy to Warn But Allow Installation and apply it to the Mylab OU

    • D. 

      Edit the Domain GPO and set the Unsigned Driver Installation Behavior policy to Warn But Allow Installation

    • E. 

      Create a group and put your user account in this group. Create a GPO that sets the Unsigned Driver Installation Behavior policy to Warn But Allow Installation and apply this GPO to the newly created group.

  • 102. 
    You are the part-time systems administrator for a small desktop publishing business.There is a Windows Server 2003 stand alone at your office. You have recently comeinto possession of a legacy fax board, a device that allows multiple faxes to be sent andreceived at the same time. You install the board on the Windows Server 2003 systembut discover that it does not work. You examine the Device Manager and notice that ayellow warning with a black exclamation mark sits beside the fax board icon. You suspectthat there is an IRQ conflict with another device on this same system, a legacyRAID controller. Which of the following describes the correct method of altering thefax board’s configuration so that there is no IRQ conflict between the legacy fax boardand the legacy RAID controller?
    • A. 

      Select the RAID controller in the Device Manager. From the Action menu, select Properties. Select the Resources Tab, and then clear the Use Automatic Settings check box. Select the IRQ and click Change Settings. Scroll through the IRQs until you find one that does not conflict with any others. Click OK and then restart the server.

    • B. 

      Select the fax board in the Device Manager. From the Action menu, select Properties. Select the Resources tab, and then clear the Use Automatic Settings check box. Select the IRQ and click Change Settings Scroll through the IRQs until you find one that does not conflict with any others. Click OK and then restart the server

    • C. 

      Select the RAID controller in the Device Manager. From the Action menu, select Properties. Select the Resources tab, and then clear the Use Automatic Settings check box. Select the I/O Range and click Change Settings button. Scroll through the I/O Range until you find one that does not conflict with any others. Click OK and then restart the server.

    • D. 

      Select the fax board in the Device Manager. From the Action menu, select Properties. Select the Resources tab, and then clear the Use Automatic Settings check box. Select the I/O Range and click Change Settings. Scroll through the I/O Range until you find one that does not conflict with any others. Click OK and then restart the server.

    • E. 

      Select the RAID controller in the Device Manager. From the Action menu, select Properties. In the Device Usage drop-down list on the General tab, select Do Not Use This Device (Disable).

  • 103. 
    You have recently installed three legacy network cards on a Windows Server 2003member server. Two of the network cards are working properly, but a third appears tobe conflicting with another device on your system. How can you determine whichother device on the system is conflicting with the third network card?
    • A. 

      Run the Device Manager and look for another device with a yellow and black exclamation mark beside it.

    • B. 

      View the application log and look for an entry that describes the device with which the network card conflicts.

    • C. 

      Run the Device Manager and select the network card that has the yellow and black exclamation mark beside it. From the Action menu, select Properties. On the Resources tab, clear the Use Automatic Settings check box. A conflicting device list will be displayed with the resources that conflict

    • D. 

      Run the Hardware Troubleshooting Wizard and select Resolve All Device Conflicts

    • E. 

      Run the Hardware Troubleshooting Wizard and select Report On All Device Conflicts.

  • 104. 
    You would like to view a list of devices connected to your Windows Server 2003 systemlisted numerically by IRQ. Which of the following methods could you use to dothis? (Select all that apply.)
    • A. 

      Use the Device Manager and from the View menu, select Resources By Connection

    • B. 

      Use the Device Manager and from the View menu, select Resources By Type

    • C. 

      Use the Device Manager and from the View menu, select Devices By Connection

    • D. 

      Use the Device Manager and, from the View menu, select Devices By Type

    • E. 

      This cannot be done.

  • 105. 
    You have two modems connected to a Windows Server 2003 system that are used tocreate a multilink connection to a remote site using on-demand routing. You havefound that the line quality to the remote site is not particularly high and you want tomodify the port speed of both modems. Which of the following administrative toolswould you use to do this?
    • A. 

      Use the Device Manager to find the modems and select their properties

    • B. 

      Use the Phone And Modem Options in Control Panel to adjust the modem speeds.

    • C. 

      Use the Routing And Remote Access console to adjust the modem speed

    • D. 

      Right-click on My Network Places and select Properties. Edit the properties of the multilink connection to the remote site and reduce the connection speed

  • 106. 
    Your company has placed 35 computers in various locations throughout the building toallow access to company information when an employee is away from his or her desktopcomputer. These computers are used to check e-mail, to read corporate news andaccess policy information on the company’s intranet.You want to make it possible for a user at one of these shared computers to change hisor her desktop settings, and to have these desktop settings apply to any of the othershared computers.What should you do?
    • A. 

      Configure a mandatory profile and assign it to each user in the domain

    • B. 

      Configure a mandatory profile and assign it to each shared computer.

    • C. 

      Configure a roaming profile and assign it to each user in the domain.

    • D. 

      Configure a roaming profile and assign it to each shared computer

  • 107. 
    Ou have been given the responsibility for maintaining user accounts, user profiles,and user access to resources on your network. Currently, all users share a single profileon the network, which allows for easy addition and deletion of objects to the users’desktops, but also allows for desktop changes to be made and saved by the users. Youwant to retain the ability to centrally manage user’s desktops, but want to prohibitchanges to desktop settings by the users.What should you do?
    • A. 

      Configure the permissions on the profile folder’s Security property sheet to deny write permission

    • B. 

      Configure the permissions on the profile folder’s Sharing property sheet to allow only read permission.

    • C. 

      Modify the attributes of the profile folder to specify the Read Only attribute.

    • D. 

      Modify the file name of Ntuser.dat in the profile folder to Ntuser.man.

  • 108. 
    Your company has been using roaming profiles for members of the Sales and InformationTechnology departments for the last 10 months. The profile data is stored on amember-server running Microsoft Windows Server 2003. The file system in use on thevolume on the server hosting the profiles is FAT32. The share hosting the profiles iscalled Profshare. Profile paths are correctly configured in each user’s properties.Recently you have found that some users are able to access the data located in other’sprofiles. You want to secure the roaming user profiles on your network such that onlythe user logging on to the profile will have access to the data contained within it.What should you do? (Choose two; each answer is part of the complete solution.)
    • A. 

      Assign Read and Write permission on the folder where the profiles are stored to only those users who store roaming profiles.

    • B. 

      Configure Server Message Block (SMB) signing on the server where the profiles are stored

    • C. 

      Configure Server Message Block (SMB) signing on each computer that uses roaming profiles

    • D. 

      Convert the volume where the profiles are stored to NTFS

    • E. 

      Configure Encrypting Files System (EFS) to encrypt the folder where the profiles are stored

  • 109. 
    You are the administrator of a company that has decided to place computers in thelobby for access to public company information. Members of the Sales departmentneed to be able to log on to these computers with their Domain user credentials for clientdemonstrations, and public users will use the Guest account.Members of the Sales department, whose desktop computers and user accounts arecontained in the Sales Organizational Unit (OU), are configured to use roaming profiles.The shared computers in the lobby are contained in the Lobby OU.You do not want the Sales users’ desktop computer profiles to be used when they logon to one of the shared, lobby computers. All users of the lobby computers shouldhave the same desktop without the ability to save changes.What configuration changes must you make? (Choose three; each answer represents apartial solution.)
    • A. 

      Configure a local profile after logging on as Guest on one of the computers in the lobby. Copy it to the Default User folder. Repeat this process on each computer in the lobby.

    • B. 

      Configure a local profile on one of the computers in the lobby. Copy it to the Default User folder in the directory on the server that contains the roaming profiles.

    • C. 

      Create a Group Policy Object (GPO) linked to the Sales OU. Enable the Only Allow Local User Profiles Computer Configuration policy.

    • D. 

      Create a GPO linked to the Lobby OU. Enable the Only Allow Local User Profiles Computer Configuration policy.

    • E. 

      Change the file name of Ntuser.dat to Ntuser.man in the Default User folder on each computer in the lobby.

  • 110. 
    In your Windows Server 2003 domain contoso.com, in the Pservers (Print Servers) OUyou have member server computer named Pserver01. This server has been offline fora lengthy period, and is not communicating with other computers in the domain toaccept print jobs. You have determined that the password on this computer’s accountwithin the domain needs to be reset.Which command can you issue to correctly reset the computer account?
    • A. 

      Dsmod CN=pserver01,CN=PSERVERS,DC=contoso,DC=com -reset

    • B. 

      Dsmod computer pserver01.contoso.com -reset

    • C. 

      Dsmod contoso\pserver01 -reset

    • D. 

      Dsmod computer CN=pserver01,CN=PSERVERS,DC=contoso,DC=com -reset

  • 111. 
    A domain controller running Windows Server 2003 is failing to replicate with the otherdomain controllers in the contoso.com domain. In Event Viewer, you note messagesthat access has been denied to this domain controller. You suspect that the domaincontroller’s password is not synchronized properly with the other domain controllers,and should be reset.What should you do?
    • A. 

      In Active Directory Users And Computers, right-click the computer object and choose Reset Account

    • B. 

      On the domain controller, use the Dsmod command-line tool to reset the computer password

    • C. 

      On the domain controller, use the Netdom command-line tool to reset the computer password

    • D. 

      Restart the server in the recovery console and use the console to reset the computer account

  • 112. 
    You are a network administrator managing a Windows Server 2003 domain, contoso.com.As part of a network restructuring, new child domains of west.contoso.com andeast.contoso.com have been added to the forest. You need to move three computeraccounts for file server computers from the contoso.com domain to the west.contoso.comdomain. All servers to be moved are Windows Server 2003 member servers.What should you do?
    • A. 

      Use Active Directory Domains And Trusts to move the computer accounts.

    • B. 

      Use Active Directory Users And Computers to move the computer accounts

    • C. 

      Use the Movetree command-line tool to move the computer accounts.

    • D. 

      Use the Dsmove utility to move the computer accounts.

  • 113. 
    You need to create a batch file to automate the setting of the attributes for computerswithin your Windows Server 2003 Active Directory domain, contoso.com. You want thebatch file to modify all computers in a specific OU within the domain. Your manualinput to the batch file will be the OU, the attribute, and the new value for the attribute.All other input and output from the batch file should be automated.Which Windows Server 2003 commands will you need to include in the batch file?(Choose all that apply; each correct answer represents a partial solution.)
    • A. 

      Dsget computer

    • B. 

      Dsmod computer

    • C. 

      Dsquery computer

    • D. 

      Dsadd computer

    • E. 

      Dsrm computer

  • 114. 
    You have just raised the domain functional level of your single-domain forest,contoso.com, to Windows Server 2003. You want to take advantage of the securitygroup nesting possibilities available to you.What Security group nesting is possible at this domain functional level? (Choose all thatapply.)
    • A. 

      Domain Local in Domain Local

    • B. 

      Global in Domain Local

    • C. 

      Universal in Domain Local

    • D. 

      Domain Local in Global

    • E. 

      Global in Global

  • 115. 
    You have just raised the domain functional level of your single-domain forest,contoso.com, to Windows Server 2003. You want to take advantage of the securitygroup conversion possibilities available to you.What security group conversion is possible at this domain functional level? (Choose allthat apply.)
    • A. 

      Domain local with user members; convert to global

    • B. 

      Global with user members; convert to universal

    • C. 

      Global with global group members; convert to universal

    • D. 

      Universal group with universal group members; convert to domain local

    • E. 

      Universal group with universal group members; convert to global

  • 116. 
    You are the administrator of a Windows Server 2003 domain, contoso.com, that is set todomain functional Level Windows 2000 mixed during a migration of your network.You are planning your use of groups during this transitional period, and want to determinewhat group types you can create and what scopes those groups may have.What group type and scope possibilities exist at this functional level? (Choose all thatapply.)
    • A. 

      Domain Local Group: Security Type

    • B. 

      Domain Local Group: Distribution Type

    • C. 

      Global group: Security Type

    • D. 

      Global group: Distribution Type

    • E. 

      Universal group: Security Type

  • 117. 
    Which of the following tools allow for the creation of Active Directory security principals(user, computer, and group accounts) based on user or file input? (Choose all thatapply.)
    • A. 

      Active Directory Users And Computers

    • B. 

      Active Directory Domains And Trusts

    • C. 

      Ntdsutil

    • D. 

      Ldifde

    • E. 

      Csvde

  • 118. 
    You are the administrator of the Windows Server 2003 domain contoso.com. Your companyemploys many temporary workers. Some of these workers are employed onlyonce, others are employed periodically on a recurring basis.Your goal is to automate a process that will determine which accounts have not beenused within the last month and then disable them. If the accounts are needed again,you will re-enable them at that time.Which Directory Service command-line tool is the appropriate one to achieve yourgoal?
    • A. 

      Dsquery user domainroot -inactive 4 -disabled yes

    • B. 

      Dsquery user domainroot -inactive 4|dsmod user -disabled yes

    • C. 

      Dsquery user domainroot -inactive 4|dsrm -q

    • D. 

      Dsquery user domainroot -inactive 4|dsmove –newparent OU=disabled,DC=contoso, DC=com -q

  • 119. 
    You have been given an administrative task related to user accounts in the contoso.comActive Directory. You need to move all accounts in the East group located in the SalesOU into the newly created East Sales OU.Which procedure will accomplish this task?
    • A. 

      Use Active Directory Users And Computers to move the East group to the East Sales OU

    • B. 

      Use Dsquery to get the members of the group, and then pipe (stdin) the output to the Dsmod command with the East Sales OU as the target.

    • C. 

      Use Dsquery to get the members of the group, and then pipe (stdin) the output to the Dsmove command with the East Sales OU as the target.

    • D. 

      Use Dsquery to get the members of the group, and then pipe (stdin) the output to the Dsadd command with the East Sales OU as the target.

  • 120. 
    You are configuring the properties of user accounts in the Sales OU of the contoso.comdomain. You wish their home directories to be stored on the network server computernamed Server01. The home directories are to be stored in a shared folder, namedHome, on the server’s D: drive. The share name is Homedir.In the Home Folder property for each user, how will you set the home directories?
    • A. 

      D:\Home\%Username%

    • B. 

      \\Server01\d$\Home\%Username%

    • C. 

      \\Server01\%Homedir%\%Username%

    • D. 

      \\Server01\Homedir\%Username%

  • 121. 
    A user, returning from an extended leave of absence powers on his or her computer,Desk249, and attempts to log on to the domain but cannot do so. You attempt to logon to the user’s computer, as a Domain Administrator, but cannot do so.You return to your computer and search the Active Directory for the Desk249 computer,but find that no computer with that name exists in the directory. You log on witha local administrator account to the Desk249 computer and discover that the computerstill believes it is a part of the domain. After consideration, you determine that youmust re-create the computer account. You want to enable the user to log on at theircomputer as soon as possible, and with the least amount of administrative effort.What should you do?
    • A. 

      Log on to the Desk249 computer with the local administrator account. In the System control panel, in the Computer Name tab click on the “To rename this computer or join a domain, Click change” change button. Join Desk249 to a workgroup named TEST and restart. Log on again with the local administrator account. Navigate back to the workgroup/domain membership page. Using an account with domain administrator privileges, rejoin the Desk249 computer to the Active Directory domain, and then restart Desk249.

    • B. 

      Use Active Directory Users And Computers to create a new computer account with the computer name Desk249 in the Computers container. Restart Desk249.

    • C. 

      Use Dsadd to create a new computer account with the computer name Desk249 in the Computers container. Restart Desk249.

    • D. 

      Use Ntdsutil to restore the computer account from a backup of Active Directory that contains the Desk249 account

  • 122. 
    You are deploying several Windows Server 2003 computers into your Windows NT 4environment using the Sysprep utility. After deploying the image to all the servers, youtest network connections to each to ensure that the deployment has gone properly.When you try to log on to Server03 remotely, a message indicating that the “Trust relationshiphas failed” is displayed, and you are unable to connect.What should you do to solve the problem? (Choose all that apply.)
    • A. 

      Create an account for Server03 in the domain.

    • B. 

      Use Active Directory Users And Computers to reset the password for Server03.

    • C. 

      Join Server03 to a workgroup.

    • D. 

      Join Server03 to the domain.

    • E. 

      Delete the Server03 account from the domain.

  • 123. 
    You are in the process of adding users, computers, and groups to your new WindowsServer 2003 domain. After several hundred objects have been added through batchimporting, you begin to add the last 24 computers that must be entered manually. Afterentering three computer accounts successfully, you receive error messages and areunable to add more computers to the domain.All other network connectivity and server functions appear to be functioning normally.What is the most likely cause of the problem?
    • A. 

      The RID Master role is unavailable.

    • B. 

      The PDC Emulator role is unavailable

    • C. 

      The domain infrastructure role is unavailable

    • D. 

      The schema master role is unavailable

  • 124. 
    A user reports that he or she cannot log on to the network from a laptop runningWindows 98. The user can log on from a desktop computer that is running Windows XP.Your environment is controlled by a Windows Server 2003 Active Directory domain.The Windows 98 computer does not have the Active Directory Client installed.What is the most likely cause of the problem?
    • A. 

      A computer account in the domain needs to be reset.

    • B. 

      The user’s password is longer than 14 characters

    • C. 

      The user’s account needs to be configured to allow logon to all workstations.

    • D. 

      The user’s home directory is corrupted

  • 125. 
    A user, John, reports that his profile settings are not roaming properly when he logs onto various computers on the network. John can log on to any computer in the environmentsuccessfully, but his desktop wallpaper, shortcuts, and other preferential settingsare different on each computer.You check the profile path in the user account properties, and see that it is set to“D:\profiles\John”. You confirm that there is a folder named John in the profiles folderon the D: drive of Server01, which is the server that contains the user profiles for thenetwork. The shared folder hosted off the profiles folder is also called Profiles.Other users’ profiles are roaming correctly.What should you do to fix the problem?
    • A. 

      Reset John’s password.

    • B. 

      Set the home directory for John to D:\Profiles\%Username%.

    • C. 

      Set the profile path for John to \\Server01\Profiles\%Username%.

    • D. 

      Copy the profile that John wants to use to D:\Profiles\John on the profile server.

  • 126. 
    A user reports that he or she cannot access the network by dialing in. The user can logon successfully to a local computer in the office.You confirm that the default Remote Access policies are in place on the Routing andRemote Access Server computer. All modem devices pass diagnostic tests successfully.What is likely the cause of the problem?
    • A. 

      The user does not have Terminal Server access enabled in his or her user account properties.

    • B. 

      The user does not have dial-in permission enabled in his or her user account properties.

    • C. 

      The user does not have a computer account in the domain for his or her remote computer

    • D. 

      The user is not supplying the correct credentials when dialing in.

  • 127. 
    A traveling user has been away from the office for several months. The laptop computerwith which the user travels is not configured for dial-in access to the corporatenetwork because it is used mostly for presentations and client documentation.Upon returning to the office and connecting to the corporate network, the user isunable to log on to his or her computer using a local account, and is presented withthe “Log on Failed” dialog box.What should you do?
    • A. 

      Reset the user’s password in Active Directory

    • B. 

      Reset the user’s computer account in Active Directory

    • C. 

      Use the password reset disk for that user to reset the password on the local computer.

    • D. 

      Disconnect the computer from the network, and then restart the computer.

  • 128. 
    A user has returned from an extended business trip, and reconnects his or her computerto the network. The user is able to log on, but is not able to connect to any networkresources.You examine the accounts associated with the user in Active Directory Users And Computers,and note that the computer account for the user’s laptop is marked with a red“X” icon.What should you do to solve the problem?
    • A. 

      Reset the user’s password in Active Directory.

    • B. 

      Reset the laptop computer account in Active Directory

    • C. 

      Delete the laptop computer account from the domain, join the laptop to a workgroup, then rejoin the laptop to the domain.

    • D. 

      Delete and recreate the laptop computer account.

  • 129. 
    You are the systems administrator for a medium-sized organization that runs a singleWindows Server 2003 domain. The Default Domain Group Policy object has the followingpassword policy settings:10 Passwords Remembered.Maximum Password Age 10 daysMinimum Password Age 2 daysMinimum Password Length 10 charactersA group of 40 developers who work in a department in your organization has lobbiedmanagement for a separate set of password policies specific to its members. The developerswant the minimum password age set to 0 days and the maximum password ageset to 28 days. Which of the following methods will allow you to alter the passwordpolicy for this group of developers?
    • A. 

      Create a child domain of the current domain and move the developers’ accounts to this domain. Edit the Default Domain GPO of the child domain and implement the separate password policy requested by the developers.

    • B. 

      Create a separate OU and move the 40 developers’ user accounts into this OU. Create and edit a new GPO, implementing the separate password policy requested by the developers via this GPO. Apply the GPO to the newly created OU hosting the developers’ accounts.

    • C. 

      Resubnet the network and create a new site within Active Directory. Place all the 40 developers’ workstations onto this new subnet. Create and edit a new GPO, implementing the separate password policy requested by the developers via this GPO. Apply the GPO to the newly created site hosting the developers’ computer accounts

    • D. 

      Edit the Local GPO on each of the developer’s workstations, implementing the separate password policy requested by the developers via this GPO.

  • 130. 
    You are configuring share permissions for a shared folder on a file server. You want allAuthenticated Users to be able to save files to the folder, read all files in the folder, andmodify or delete files that they own.What are the correct permissions that you need to set on the shared folder to achieveyour objective? (Select all that apply.)
    • A. 

      Authenticated Users–Full Control

    • B. 

      Authenticated Users–Change

    • C. 

      Authenticated Users–Read

    • D. 

      Creator/Owner–Full Control

    • E. 

      Reator/Owner–Change

  • 131. 
    You are configuring permissions for a shared folder on your network. You want allAuthenticated Users to have read access to the files when attaching to the folder acrossthe network from their computers, but only members of the Managers group should beable to read the files when logged on locally to the computer containing the files. Managersalso need the ability to change the files when logged on locally.All users are able to log on locally to the computer.What permissions do you need to set on the shared folder? (Select all that apply.)
    • A. 

      NTFS–Interactive–Change

    • B. 

      NTFS–Interactive–Read

    • C. 

      NTFS–Authenticated Users–Change

    • D. 

      NTFS–Managers–Change

    • E. 

      Share Permission–Network–Read

  • 132. 
    A folder, Documents, on Server01 is shared as Docs$. The permissions on the sharedfolder are set as follows:■ Docs$ Shared Folder Permissions: Everyone–Full Control■ Documents Folder NTFS Permissions: Authenticated Users–Read, Write; Managers–Modify; Administrators–Full ControlWhich of the following statements regarding access to the resource are true? (Select allthat apply.)
    • A. 

      Only Administrators can access the shared folder from the network.

    • B. 

      All Users can access the shared folder from the network.

    • C. 

      Authenticated Users can delete files in the folder

    • D. 

      Managers can delete files in the folder.

    • E. 

      Authenticated Users can write files in the folder

  • 133. 
    You have configured several users to be able to connect to Server01 through TerminalServices, and have modified the default configuration with the Terminal Services Configurationconsole to allow for redirection of client printers. The goal is for all users ofthe Terminal Server to be able to print to print devices configured on their local computerfrom their Terminal Server session.The users, however, report that they are unable to print to their locally configured printdevices.What should you do to correct the problem?
    • A. 

      Enable the Client/Server data redirection setting in Group Policy for each Terminal Server client computer

    • B. 

      Enable the Client/Server data redirection setting in Group Policy for the Terminal Server computer

    • C. 

      Instruct the user to install the local printer from within their Terminal Server session

    • D. 

      Use a logon script for the users’ Terminal Server session to add the printer.

  • 134. 
    You have configured several client computers with the Terminal Service client, RemoteDesktop Connection, and have configured a Terminal Server in Remote Desktop forAdministration (default) mode. When the users attempt to connect to the TerminalServer, they receive an error message stating that the local policy of this system doesnot permit them to log on interactively.What should you do to correct the problem?
    • A. 

      Add the users to the Remote Desktop Users group.

    • B. 

      Configure the User Right to Log on locally on the Terminal Server for each user

    • C. 

      Enable the Group Policy setting for Client/Server data redirection.

    • D. 

      Enable the Terminal Services Remote Control setting for each user.

  • 135. 
    A user has sent you a request, by e-mail, for a Remote Assistance session. You attemptto connect to the user’s computer to establish the Remote Desktop session, but cannotestablish the network connection.You are able to connect to the user’s computer to access the file system through theC$ share.What is the most likely cause of the problem?
    • A. 

      Your user account is not a member of the local Administrators group on the user’s computer

    • B. 

      You do not have the Terminal Services client installed on your computer.

    • C. 

      Port 3389 is not open on the firewall between your network segment and the network segment that the user’s computer is on.

    • D. 

      The user’s account in Active Directory is configured so as not to allow Remote Control.

  • 136. 
    All computer users in your company access several applications through a single TerminalServer, Server01, located on the same Local Area Network segment. You are runninga Windows Server 2003 Active Directory and DNS, and the Terminal Server is aWindows Server 2003 server.At the end of business on the previous day, you renamed the Terminal Server to App1.You verified that the server was reachable using its new name through Terminal Servicesboth as administrator and as a regular user, and through Windows Explorer.This morning, all users report that they cannot connect to the Terminal Server. You verifythat connection to the Terminal Server is possible through Windows Explorer, butthat user connection through Terminal Services is not possible. You are able to connectto the Terminal Server as Administrator.What is the most likely cause of the problem?
    • A. 

      The Terminal Server entry in DNS needs to be refreshed

    • B. 

      The Terminal Server connection permissions need to be refreshed.

    • C. 

      The Terminal Server connection permissions need to be refreshed.

    • D. 

      The Terminal Server needs to be restarted

  • 137. 
    You attempt to connect to Server01 through the Remote Desktop for Administration client,but receive a message that you cannot connect because the number of concurrentconnections has been exceeded.You can connect with the Remote Desktop for Administration client to Server02,Server03, and Server04, which are member servers in the same domain. You haveadministrator privileges on each of these servers.Server01 is not physically accessible to you, as it is in a remote location.What steps should you take to resolve the problem? (Select all that apply.)
    • A. 

      Connect to Server02 with the Remote Desktop for Administration client.

    • B. 

      Connect to Server01 from the Terminal Services session on Server02 with the Terminal Services Manager. Disconnect one of the Remote sessions.

    • C. 

      Connect to Server01 from the Terminal Services session on Server02 with the Remote Desktop for Administration client. Disconnect one of the Remote sessions

    • D. 

      Open the Server01 Properties dialog box from Active Directory Users And Computers. Configure Server01 to deny Terminal Services connections, and then reconfigure Server01 to allow Terminal Services connections.

    • E. 

      Connect to Server01 from the Terminal Services session on Server02 with the Remote Desktop for Administration client. Open the System properties page for Server01 and configure Server01 to deny Remote Desktop Connections, and then reconfigure Server01 to allow Remote Desktop Connections.

  • 138. 
    You are configuring the permissions for a shared folder, Finance, on your file server,Server01. You need to configure permissions for the Accounting and AccountingExecgroups on the folder to achieve the following objectives:The Accounting group should have Read access to content in the Finance folder.The AccountingExec group should have Change control over content in the Financefolder.All users need Read access to a file named Summary.rpt in the Finance folder. Usersshould have access to no other files in the folder.How will you configure share and NTFS permissions on the Finance folder?
    • A. 

      Share: Accounting–Read; AccountingExec–Read; Users–Read NTFS: Accounting–Read; AccountingExec–Modify; Users–Read

    • B. 

      Share: Accounting–Full Control; AccountingExec–Full Control; Users–Read NTFS: Accounting–Read; AccountingExec–Modify; Users–List, Read access on Summary.rpt

    • C. 

      Share: Accounting–Read; AccountingExec–Modify; Users–Read NTFS: Accounting–Read; AccountingExec–Full Control; Users–Read

    • D. 

      Share: Accounting–Full Control; AccountingExec–Full Control; Users–Deny Read NTFS: Accounting–Read; AccountingExec–Read; Users–List, Read access on Summary.rpt

  • 139. 
    A folder called Reports on Server01 resides in the Marketing\Summary folder. The Marketingfolder is shared on the network with the name MKTG.Users should not be able to read, modify, or add any files in the Marketing or Summaryfolders, but need to have access to the files in the Reports folder.What is the minimum NTFS permission that these users need on the Marketing andSummary folders to access the files in the Reports folder from across the network?
    • A. 

      List Folder/Read Data

    • B. 

      Traverse Folder/Execute Files

    • C. 

      Read Extended Attributes

    • D. 

      Read Attributes

  • 140. 
    A user calls the help desk and states that he or she cannot log on to the network. UsingActive Directory Users And Computers, you examine the Active Directory and determinethat the user account does not exist. Further investigation into the Directory ServiceEvent logs indicates that the account was deleted.You re-create the user account in Active Directory Users And Computers. What elsewill you need to do to complete the restoration of the user’s access to resources?(Select all that apply.)
    • A. 

      Place the user’s account in the appropriate groups.

    • B. 

      Reset the computer account.

    • C. 

      Reassign and apply any appropriate Group Policies to the user account.

    • D. 

      Re-permission resources to which permission was given or denied based on the user account.

    • E. 

      Re-permission resources to which permission was given or denied based on group membership.

  • 141. 
    A user, Joe, is taking on additional network administrative responsibility for his department,Finance. From Joe’s computer, logged on as Joe, you use the Run As commandwith your administrative credentials to load the Active Directory Users And Computerssnap-in, and then you add Joe to the Department’s Itadmin3 group, which has delegatedadministrative permissions for the user accounts in the Finance OU. You thenclose the Active Directory Users And Computers snap-in.When Joe attempts to reset a user’s password in the Finance OU, he is denied access.What additional step do you need to take in order for the user to be able to performthe delegated administrative duties?
    • A. 

      Add Joe’s user account to the Built-in Account Operators group for the domain.

    • B. 

      Add Joe’s user account to the Itadmin3 OU

    • C. 

      Reset Joe’s computer account.

    • D. 

      Instruct Joe to log off, and then log on to his computer.

  • 142. 
    You are interested in viewing Information and Warning events in the Application loggenerated by disk quotas. You only wish to view these types of events, not informationand warning events from other sources. Which of the following steps should you taketo do this?
    • A. 

      From the Event Viewer, edit the properties of the System log. In the Filter tab make sure that the Information and Warning events check boxes are selected and that the Error, Success Audit and Failure Audit check boxes are clear.

    • B. 

      From the Event Viewer, edit the properties of the Application log. In the Filter tab, make sure that the Information and Warning event check boxes are selected and that the Error, Success Audit and Failure Audit check boxes are clear.

    • C. 

      From the Event Viewer, edit the properties of the Application log. In the Filter tab, make sure that the Information and Warning Events check boxes are clear and that the Error, Success Audit and Failure Audit check boxes are selected. Set the Event Source to Disk Quota.

    • D. 

      From the Event Viewer, edit the properties of the Application log. In the Filter tab, make sure that the Information and Warning Events check boxes are selected and that the Error, Success Audit and Failure Audit check boxes are clear. Set the Event Source to Chkdsk

    • E. 

      From the Event Viewer, edit the properties of the Application log. In the Filter tab, make sure that the Information and Warning Events check boxes are selected and that the Error, Success Audit and Failure Audit check boxes are unchecked. Set the Event Source to Disk Quota.

  • 143. 
    Rooslan is working with a Windows Server 2003 system that has been behaving erratically.The System log is set to a maximum log size of 50 MB and to overwrite eventsas needed. Rooslan wants to view Error events in the System log that have occurredover the last week. How can he do this?
    • A. 

      Run the Event Viewer Wizard and select the Display Errors check box. Set the display date to the last seven days.

    • B. 

      In the Event Viewer, Rooslan should edit the properties of the System log. In the Filters tab, he should make sure that only the Error check box is selected.

    • C. 

      In the Event Viewer, Rooslan should edit the properties if the Application log. In the Filters tab, he should make sure that only the Error check box is selected andthat the first event date is set to the date seven days previously and the last event is set to today’s date.

    • D. 

      In the Event Viewer, Rooslan should edit the properties of the System log. In the Filters tab, Rooslan should make sure that only the Error check box is selected and that the first event date is set to the date seven days previously and the last event is set to today’s date.

    • E. 

      In the Event Viewer, Rooslan should edit the properties of the System log. In the Filters tab, Rooslan should make sure that only the Information check box is selected and that the first event date is set to the date seven days previously and the last event is set to today’s date.

  • 144. 
    Rooslan has been instructed by senior management to generate a report on the logonactivities of a particular user named Agim over the last two months. Management is tryingto use Agim’s logon activity to determine which days Agim came to work becausehis attendance has been erratic. Logon events have been audited within the WindowsServer 2003 domain for the last six months. The size of all Event log files is set to190,240 KB. No Event log has yet to be filled and data from the last six months is available.Which of the following represents the best way to display the data relevant toRooslan’s task?
    • A. 

      Create a filter on the Security log. Look only for success audits and set the Event Source to Security. Set the User setting to Agim’s account name. Set the Event ID to 538. Set the First Event to a date two months ago and the Last Event to today.

    • B. 

      Create a filter on the System log. Look only for success audits and set the Event Source to Security. Set the User setting to Agim’s account name. Set the First Event to a date two months ago and the Last Event to today.

    • C. 

      Create a filter on the System log. Look only for success audits and set the Event Source to Security Account Manager. Set the User setting to Agim’s account name. Set the Event ID to 538. Set the First Event to a date two months ago and the Last Event to today.

    • D. 

      Create a filter on the Security log. Look only for success audits and set the Event Source to Security. Set the First Event to a date two months ago and the Last Event to today. Set the Event ID to 538.

    • E. 

      Create a filter on the Security log. Look only for success audits and set the Event Source to Security Account Manager. Set the User setting to Agim’s account name. Set the Event ID to 538. Set the First Event to a date two months ago and the Last Event to today.

  • 145. 
    Lee is concerned that another user in the office is attempting to log on to his workstationusing his account. He does not believe that this has yet occurred, but he wouldlike you to display a report of all the times that his account has experienced a logonfailure in the past month. As a way of testing his hypothesis, Lee placed a note near hismonitor with the words “Password = Gillian1948.” Gillian1948 is not his password. Heassumes that if someone had tried to log on to his workstation illicitly, then the dummypassword has been tried. Only Logon Events are being audited for both success andfailure in the domain. How can you generate a view in the Event Viewer to determineif there have been failed attempts to log on using Lee’s user account?
    • A. 

      Create a filter on the System log. Look only for failure audits and set the Event Source to Security. Set the User setting to Lee’s account name. Set the First Event to a date one month ago and the Last Event to today.

    • B. 

      Create a filter on the System log. Look only for success audits and set the Event Source to Security. Set the User setting to Lee’s account name. Set the First Event to a date one month ago and the Last Event to today.

    • C. 

      Create a filter on the System log. Look only for success audits and set the Event Source to Security Account Manager. Set the User setting to Lee’s account name. Set the First Event to a date one month ago and the Last Event to today

    • D. 

      Create a filter on the Security log. Look only for success audits and set the Event Source to Security Account Manager. Set the User setting to Lee’s account name. Set the First Event to a date one month ago and the last event to today.

    • E. 

      Create a filter on the Security log. Look only for failure audits and set the Event Source to Security. Set the User setting to Lee’s account name. Set the First Event to a date one month ago and the Last Event to today.

  • 146. 
    You are the systems administrator for a medium-sized organization and you are consideringemploying Software Update Services to manage updates provided byMicrosoft for your Windows XP Professional systems. Your organization currently usesa proxy solution running on another platform that requires username and passwordauthentication. The user and password database for the proxy is different from thatused in your Windows Server 2003 domain. Given this situation, which of the followingoptions is available to you in configuring a software update infrastructure?
    • A. 

      Because SUS cannot be configured to authenticate against a proxy, all updates must be manually downloaded by an administrator and placed on the SUS server. The Windows XP Professional machines should be configured using Group Policy to contact the SUS server for their software updates

    • B. 

      Because SUS cannot be configured to authenticate against a proxy and Windows XP clients can, Windows XP clients should continue to contact Microsoft to download their updates

    • C. 

      SUS can be configured to authenticate against a proxy to download a list of updates for your approval. Windows XP systems should be configured to check the SUS server to find which updates you have approved and then to automatically download those updates from the Microsoft Web site.

    • D. 

      SUS can be configured to authenticate against a proxy to download a list of updates for your approval as well as downloading the updates. Windows XP systems should be configured to check the SUS server to determine which updates are approved and then to retrieve them from the SUS server.

  • 147. 
    You are the systems administrator for a medium-sized organization that is consideringimplementing SUS on all Windows XP Professional workstations and Windows Server2003 systems companywide. Before a companywide rollout is to go ahead, a pilot programis to be implemented. You have been assigned a lab with 10 Windows XP Professionalworkstations, a Windows Server 2003 member server running SUS, aWindows Server 2003 domain controller, and a stand-alone Windows Server 2003 system.You wish to configure all systems except the server running SUS to use the SUSserver to automatically check for, download, and install updates at 7:00 A.M. each day.Which of the following steps should you take to do this? (Select all that apply.)
    • A. 

      Use the Automatic Updates tab in the System console from Control Panel on every Windows XP Professional workstation computer to set the update server to the address of the SUS server. Set the Windows XP workstations to automatically download and install updates at 7:00 A.M. each day.

    • B. 

      Use the Automatic Updates tab in the System console from Control Panel on each Windows Server 2003 system except the SUS server to set the update server to the address of the SUS server. Set these servers to automatically download and install updates at 7:00 A.M. each day.

    • C. 

      Place the Windows XP Professional workstations and the Windows Server 2003 domain controller in a separate OU named Uptest. Edit a GPO’s Windows Update properties for the Uptest OU, specifying the address of the update server as the SUS server in the Specify Intranet Microsoft Update Service Location policy. Set Configure Automatic Updates Policy to automatic download and install and set the scheduled install day to Every Day and the time to 7:00 A.M. Apply this GPO to the Uptest OU.

    • D. 

      On the stand-alone Windows Server 2003 system, edit the local GPO’s Windows Update properties specifying the address of the update server as the SUS server in the Specify Intranet Microsoft Update Service Location policy. Set Configure Automatic Updates Policy to automatic download and install and set the scheduled install day to Every Day and the time to 7:00 A.M. Apply this GPO to the Uptest OU.

    • E. 

      On the SUS server, edit the local GPO’s Windows Update properties specifying the address of the update server as the SUS server in the Specify Intranet Microsoft Update Service Location policy. Set Configure Automatic Updates Policy to automatic download and install and set the scheduled install day to Every Day and the time to 7:00 A.M. Apply this GPO to the Uptest OU.

  • 148. 
    Mick works as the network administrator for an organization that has five branchoffices located across a city. The headquarters office has the only connection to theInternet and also hosts a proxy server. Headquarters has 200 Windows XP Professionalworkstations and several Windows Server 2003 systems. Each of the five branch officeshas 150 Windows XP Professional workstations and several Windows Server 2003 systems.These branch offices are connected by ISDN BRI to the headquarters office. Currentlynone of the Windows systems is able to receive updates from Microsoft’sWindows Update server because they are unable to authenticate against the proxy.Management has asked Mick to implement SUS throughout the organization so thatapproved updates can be installed on workstations and servers. Management alsowants Mick to minimize the amount of update traffic running through the ISDN BRIlines. Which of the following methods will achieve this goal?
    • A. 

      Configure a SUS server in the headquarters location to maintain a list of approved updates and to download and store those updates from the Microsoft Windows Update Servers. Configure a Group Policy that instructs clients to use the SUS server as their update server. Apply this GPO to the headquarters and branchoffice sites.

    • B. 

      Although this will allow updates to be rolled out to all clients within the organization it will also saturate the ISDN BRI lines with update traffic because each client workstation downloads its updates from the central SUS server. Configure a SUS server in the headquarters location to maintain a list of approved updates but maintain those updates on the Microsoft Windows Update Servers. Configure a Group Policy that instructs clients to use the SUS server as their update server. Apply this GPO to the headquarters and branch-office sites.

    • C. 

      Configure a SUS server in the headquarters location to maintain a list of approved updates but maintain those updates on the Microsoft Windows Update Servers. Configure a SUS server in each branch office location to maintain a list of approved updates but maintain those updates on the Microsoft Windows Update Servers. Create a GPO and apply it to each site. The GPO should have a policy that clients are to use their local SUS server as their update server.

    • D. 

      Configure a SUS server in the headquarters location to maintain a list of approved updates and to download and store those approved updates. Configure SUS servers in each branch office to synchronize with the SUS server in the headquarters location. Configure a Group Policy that instructs clients to use the headquarters SUS server as their update server. Apply this GPO to the headquarters and branchoffice sites.

    • E. 

      Configure a SUS server in the headquarters location to maintain a list of approved updates and to download and store those approved updates. Configure SUS servers in each branch office to synchronize with the SUS server in the headquarters location. Create a GPO and apply it at each site. The GPO should have a policy that clients are to use their local SUS server as their update server.

  • 149. 
    What is the difference between a Windows Device CAL and a Windows User CAL?(Select all that apply.)
    • A. 

      A Windows Device CAL allows a device, such as a workstation, to connect to a server regardless of how many users use that device.

    • B. 

      A Windows Device CAL allows a single user to connect to multiple servers so long as they use only a single workstation

    • C. 

      A Windows User CAL allows a single user to access a server from multiple devices, such as workstations.

    • D. 

      A Windows User CAL allows a single user to access a server from a single workstation.

  • 150. 
    Rooslan is responsible for licensing at a medium-sized organization that has three WindowsServer 2003 systems. These systems are named Server Alpha, Server Beta, and ServerGamma. Server Alpha is licensed in Per Server mode and is configured with 500 CALs.Server Beta is licensed in Per Server mode and is configured with 700 CALs. ServerGamma is licensed in Per Server mode and is configured with 600 CALs. If there are550 Windows XP Professional workstations at Rooslan’s company and 500 of thoseaccess Server Alpha, 525 of them access Server Beta and 540 access Server Gammaconcurrently, how many per-server CALS are required at the organization?
    • A. 

      500

    • B. 

      540

    • C. 

      1,565

    • D. 

      1,800

  • 151. 
    You are in charge of licensing at a small organization. Your company has 17 developersand a sales force of 22. A total of 13 developers use two Windows XP Professionalworkstations on their desks. Four of the developers also use Tablet PCs in addition totheir two Windows XP Professional workstations. The sales team works in pairs withone Tablet PC used between a two-member sales team. The file server at the organizationis configured in Per Device or Per User mode. What is the minimum number oflicenses required to comply with licensing responsibilities?
    • A. 

      17 Per Device licenses and 11 Per User licenses.

    • B. 

      22 Per Device licenses and 17 Per User licenses

    • C. 

      38 Per User licenses and 22 Per Device licenses.

    • D. 

      17 Per User licenses and 11 Per Device licenses.

  • 152. 
    The License Logging service tracks Per Device or Per User licenses by user name. Acompany uses shift work with a total of 30 shift workers working 10 people to an8-hour shift. Throughout a 24-hour period, three different users will use the sameWindows XP Professional workstation. Each of the 30 shift workers has an individuallogon account. What is the name of the method by which the usernames can begrouped into lots of three so that only one Per Device license is recorded on theLicense Logging server rather than 30 Per User devices?
    • A. 

      License Groups

    • B. 

      License Revocation

    • C. 

      License Clustering

    • D. 

      License Aggregation

  • 153. 
    Rooslan is the senior systems administrator at a medium-sized organization. His officeis located at the company headquarters in Melbourne, Australia. He has just received atelephone call from Alex, who is responsible for maintaining a server at one of theorganization’s branch sites in Auckland, New Zealand. The two sites are connected bymeans of an ISDN PRI line. Alex is about to modify some registry settings on one of theservers in Auckland and wants Rooslan to watch him remotely so that he can checkthat Alex completes the procedure correctly. Which of the following technologies willallow Rooslan to watch Alex modify the Auckland server’s registry and talk himthrough any parts of the procedure that he does not understand?
    • A. 

      Remote Assistance

    • B. 

      Terminal Services Remote Administration Mode

    • C. 

      HTML Remote Administration Tools

    • D. 

      Computer Management Console

    • E. 

      REGEDT32

  • 154. 
    Rooslan is working from home and is using a dial-up connection to his company’sRRAS server, which allows him access to Windows Server 2003 systems on the corporateLAN. It is 2:15 A.M. and the building that hosts the servers is unoccupied. Rooslanwould like to initiate a disk defragmentation on the hard disk drives of several of theservers located at his office. Rooslan’s home Windows XP Professional workstation isnot a member of the company’s Windows Server 2003 domain. Which of the followingtools can Rooslan use to initiate a remote disk defragmentation?
    • A. 

      He can use the Disk Defragmenter node in his Computer Management console in Windows XP Professional to connect to the remote systems to initiate disk defragmentation.

    • B. 

      Remote Assistance

    • C. 

      Terminal Services Remote Administration mode

    • D. 

      Using Defrag,exe from the command line of his Windows XP Professional Workstation.

  • 155. 
    You want to change the name of a stand-alone Windows Server 2003 system located ata remote site on your organization’s network. The system works as an FTP and WWWserver and does not have a local administrator available. This server is not a memberof your organization’s Windows Server 2003 domain and your Windows XP Professionalworkstation is. Which of the following tools can you use to accomplish this task?(Select all that apply.)
    • A. 

      Local Computer Management Console

    • B. 

      HTML Remote Administration Tools

    • C. 

      Terminal Services Remote Administration mode

    • D. 

      Active Directory Users And Computers Console

  • 156. 
    You are the systems administrator for a small organization that has recently bought outa rival company. Your organization has a Windows Server 2003 domain, of which allcomputers are members. The rival company has six stand-alone Windows Server 2003systems. The two networks have been integrated and there are no firewalls betweenyour Windows XP Professional workstation and the remote servers. Your Windows XPProfessional system is a member of the domain and you have Domain Administratorprivileges. You also have administrator credentials on each of the stand-alone servers.You also have the telephone numbers of staff at each site who currently have administrativeprivileges on each server and are logged on during business hours. Which ofthe following tools can be used to configure the remote stand-alone Windows Server2003 systems to join your organization’s domain? (Select any that apply.)
    • A. 

      The Computer Management Console on your Windows XP Professional System

    • B. 

      Active Directory Users and Computers

    • C. 

      HTML Remote Administration Tools

    • D. 

      Terminal Services Remote Administration mode

    • E. 

      Remote Assistance

  • 157. 
    Alex is the systems administrator of a remote satellite tracking facility located in Outback,Australia. The facility is connected by ISDN line to a central site in Sydney. Alexis having some trouble configuring tracking software on the server and is on a supportcall to an administrator at the central site who is attempting to talk him through it. Theadministrator asks if Alex would be able to send a remote assistance invitation to himso that he can better talk Alex through the procedure. Which of the following methodswill allow the administrator to receive Alex’s remote assistance invitation?
    • A. 

      Alex can send a remote invitation to the administrator by using Windows Messenger and the Remote Assistance Wizard

    • B. 

      Alex can e-mail a remote assistance invitation to the administrator using the Remote Assistance Wizard.

    • C. 

      Alex can create the invitation as a file and place it on an FTP server where the administrator can download it and access it.

    • D. 

      Alex can run the Remote Desktop Connection client and set it to connect to the administrator’s system.

    • E. 

      Alex can create the invitation as a file and place it on a file share where the administrator can access it.

  • 158. 
    Foley works as the systems administrator for a law firm. There is a group of 20 legalsecretaries who provide administrative support to the lawyers. All the secretaries use asingle high-speed laser printer shared on a Windows Server 2003 system. The secretariesmust print large documents on a regular basis. Although the high-speed laserprinter is fast, it is running almost constantly, printing documents. Some of the secretarieshave found that when they submit a job to the high-speed laser printer, it cantake almost 20 minutes for other jobs in the queue to be processed before their ownjob is output. None of the secretaries want to scroll through a list of available printersto check which one has the fewest jobs before submitting their documents. Which ofthe following options should Foley consider to minimize the amount of time that printerstake to finish printing documents for all the secretaries?
    • A. 

      Foley should order a second high-speed laser printer of the same make and model and institute a printer pool.

    • B. 

      Foley should set different printer priorities for each legal secretary based on a list generated by the head of the group. The most important secretary should be set a priority of 1 and the least important a priority of 99.

    • C. 

      Foley should set different printer priorities for each legal secretary based on a list generated by the head of the group. The most important secretary should be set a priority of 99 and the least important a priority of 1.

    • D. 

      Foley should purchase three more high-speed laser printers and install them with their own individual printer shares on the print server. Secretaries can select the printer share that has the fewest jobs in the queue.

  • 159. 
    You are the systems administrator for a medium-sized organization. You have receivedseveral telephone calls from users at your company reporting that they are unable toprint large 160-page print jobs to a departmental shared printer. If they send jobs to aprinter shared on another server, they print with no trouble. If they break up the jobinto 10-page lots, they are also able to print, although they find this method cumbersome.The server that hosts the departmental shared printer also hosts a file share on thesame volume. Which of the following actions should you take to resolve this problem?
    • A. 

      Alter the shared printer properties and increase the size of the maximum print job to 200 pages.

    • B. 

      Remove the quota set on the printer to allow larger jobs to be printed.

    • C. 

      Create a new printer share on the same server and point it at the same print device

    • D. 

      Clean up the server’s hard disk drive and remove unneeded files from the file share to increase the disk space.

  • 160. 
    You are the systems administrator for a medium-sized organization. You have beeninstructed by management to generate an audit log of all users who attempt to accessa particular folder which stores confidential company financial information. Managementis interested not only in those users that successfully access the folder in questionbut also those users who attempt to access the folder but are stopped because theyhave insufficient NTFS permissions. Which of the following types of auditing shouldyou configure? (Select all that apply.)
    • A. 

      Successful Object Access

    • B. 

      Failed Object Access

    • C. 

      Successful Privilege Use

    • D. 

      Failed Privilege Use

    • E. 

      Successful Directory Service Access

  • 161. 
    Rooslan is the systems administrator for a small company that has fewer than 100 users.One Sunday when he was checking the backup tapes he noticed one of the color laserprinters printing out inappropriate pictures in violation of company policy. No one elsewas in the office that day and he checked the remote access logs and found that 10users were connected to the company network from home. He believes that the personwho printed these pictures would come in later to collect them before they would befound when everyone returned to work on Monday morning. Of the 10 users whowere logged on by remote access at the time, only five had the requisite permissionsto print to that particular color laser printer. Rooslan configures a domain audit policyfor a particular type of audit event and then uses the Shared Printer’s advanced securityfeatures to audit use on the group that has access to the printer. Which type of auditevent should Rooslan have configured in Group Policy to locate who has printed tothis particular printer on Sunday afternoon?
    • A. 

      Audit Successful Privilege Use

    • B. 

      Audit Failed Privilege Use

    • C. 

      Audit Successful System Events

    • D. 

      Audit Failed System Events

    • E. 

      Audit Successful Object Access

  • 162. 
    You are the administrator of a Windows Server 2003 IIS Web server. The Web site hostsa group of discussion forums. There is a secure Web site that can only be accessed byusers entering a user name and password combination. One morning you have discoveredthat the name of one of the accounts that use the secure Web site has been postedmaliciously to the forums. You delete the post, but you want to begin auditing to seeif anyone has tried to guess the password of the account by attempting to log on to thesecure site. The Windows Server 2003 system currently runs on a stand-alone serverthat is not a member of a domain. Which type of event should you audit?
    • A. 

      Audit Successful Logon Events

    • B. 

      Audit Failed Logon Events

    • C. 

      Audit Successful Account Logon Events

    • D. 

      Audit Failed Account Logon Events

    • E. 

      Audit Successful Object Access

  • 163. 
    As a part of your company’s policy, all actions by systems administrators related toaccounts, such as account creation, deletion, renaming, as well as group creation, deletion,and renaming, and account disabling and password changes must be audited.These events are to be stored in the Security log. To comply with this policy you arecurrently editing the default domain GPO. Which audit event should you enable?
    • A. 

      Audit Successful Privilege Use

    • B. 

      Audit Failed Privilege Use

    • C. 

      Audit Successful Account Management

    • D. 

      Audit Failed Account Management

    • E. 

      Audit Successful Account Logon Events

  • 164. 
    You are concerned that the CPU on a print server that hosts 10 shared printers is notable to process spool files quickly enough. Which of the following ways will you beable to check whether your supposition is correct?
    • A. 

      In the shared printer properties, check the spooler processor usage statistic.

    • B. 

      Configure the Performance console to track the processor usage of the print spool (Process\%Processor Time\spoolsv) on the Print Server over the period of a normal working day and configure the display to show the maximum value

    • C. 

      Configure the Performance console to track the processor usage of the print spool (Process\%Processor Time\spoolsv) on the print server over the period of a normal working day and configure the display to show the average value.

    • D. 

      Configure the Performance console to the processor usage of the print spool (Process\% Processor Time\spoolsv) on his workstation over the period of a normal working day and configure the display to show the average value.

  • 165. 
    Rooslan wants to get an idea as to why a particular Windows Server 2003 system is performingpoorly. He is unsure whether the problem is the disk drives, the processor, orthe amount of available memory. Which of the following should he do to get a betteridea about each system’s performance over the course of a day? (Select all that apply.)
    • A. 

      He should use the Performance console to track the values of % Processor Time, Current Disk Queue Length, and Available MBytes. He should configure the view to display maximum values and run the console over the course of a normal operating day.

    • B. 

      He should use the Performance console to track the values of % Processor Time, Current Disk Queue Length, and Available MBytes. He should configure the view to display current values and run the console over the course of a normal operating day.

    • C. 

      He should use the Performance console to track the values of % Processor Time, Current Disk Queue Length, and Available MBytes. He should configure the view to display minimum values and run the console over the course of a normal operating day.

    • D. 

      He should use the Performance console to track the values of % Processor Time, Current Disk Queue Length, and Available MBytes. He should configure the view to display average values and run the console over the course of a normal operating day.

  • 166. 
    Rob is concerned that the network card on a file server he maintains needs to beupgraded from 10 megabits to 100 megabits. He monitors the average Output QueueLength on the network card over a period of a normal working day. Which valuesshould be a cause for concern and indicate that Rob should upgrade the network card?(Select all that apply.)
    • A. 

      0

    • B. 

      1

    • C. 

      2

    • D. 

      3

    • E. 

      4

  • 167. 
    Rob has set up a set of individual quotas for 250 users on a partition of a WindowsServer 2003 file server. Thirty of the users have a 10 MB quota, 45 have a 15 MB quota,100 have a 30 MB quota, 25 have a 60 MB quota, and 50 have a 100 MB quota. Thereare four other Windows Server 2003 systems that require exactly the same quotascheme. Which of the following methods can Rob use to implement this quota schemeon the four other servers?
    • A. 

      Quotas are applied by Group Policy. Rob needs to add the four other servers to the same organizational unit.

    • B. 

      Rob needs to use the Active Directory Users And Computers console to add the four other systems to the quota security group that he created for the original server.

    • C. 

      This is not possible without using a third-party quota management product.

    • D. 

      Quota settings are stored in the registry. Rob needs to export the quota registry key on the initial server to disk and then import it into the registry of the other four servers.

    • E. 

      From the quota entries page Rob needs to select all 250 entries and export them to a file. He can then copy this file to the other server and import it to the quota entries page of each partition to which he wishes to apply this quota scheme.

  • 168. 
    Laherty is the IT consultant for a small graphic design business that has a single volumefile server running Windows Server 2003. This file server also acts as a print server andis connected to a color laser printer that is used to print poster-sized advertising materialas well as a normal black-and-white laser printer for letters and memos. Laherty hasconfigured disk quotas on this server allowing each of the eight users at the office tostore a maximum of 8 GB of files on the server. Laherty is the only one with access tochange permissions on the file server. Laherty visits this small business once a week.When he is visiting this graphic design business on Friday, Rob, one of the users,informs him that he has been unable to print several posters since Wednesday. Robalso informs Laherty that he has been able to print documents to the black-and-whiteprinter. Rob has not tried to print any other large files to the color laser printer. Lahertychecks with other users at the business and finds that they have been able to print normallyto both printers. Laherty gets one of the other users to try to print Rob’s posterfile. The file prints successfully. Rob tries to print it again but cannot. Laherty gets Robto print a very small color picture to the printer and it completes successfully. Which ofthe following reasons best explains why Rob is unable to print?
    • A. 

      The permissions on the shared printer have been altered.

    • B. 

      The quotas applied to the printer have been set too low for Rob.

    • C. 

      There is a fault with the printer driver installed on Rob’s Windows XP workstation.

    • D. 

      Rob is close to his allocated quota of disk space on the serve

    • E. 

      The file that Rob is trying to print is corrupted.

  • 169. 
    Rooslan is the systems administrator for an organization that has four print servers. Heis currently trying to determine which of the four servers prints the most jobs each dayand which of the four servers prints the least jobs each day. He is considering creatingthree new shared printers and needs to select the print server with the lowest numberof jobs printed. He also wants to check how many pages have been printed since thelast restart. Which of the following will enable him to do this?
    • A. 

      From the Printer Properties on each shared printer on each print server, check the Total Pages Printed Since Last Restart and Total Jobs Printed Since Last Restart statistics.

    • B. 

      Run the Performance console on his Windows XP workstation. Add the Total Pages Printed counter object for each of the four print servers.

    • C. 

      Run the Performance console on his Windows XP workstation. Add the Total Jobs Printed counter object for each of the four print servers

    • D. 

      Run the Performance console on his Windows XP workstation. Add the Total Jobs Printed counter object and the Total Pages Printed counter object for each of the four print servers that he wants to monitor

  • 170. 
    Rooslan is the administrator of a Windows Server 2003 system that runs Internet InformationServices. The server hosts a single Web site that contains confidential companyinformation. This information should only be accessible by specific hosts from particularsubnets within the corporate WAN. Rooslan would like to enable hosts to accessthe server only from the following IP address ranges:10.10.10.1 through 10.10.10.12610.10.10.129 through 10.10.10.19010.10.20.225 through 10.10.20.23810.10.30.193 through 10.10.30.254Rooslan edits the default Web site properties, navigates to the Directory Security tab,and clicks Edit in the IP Address And Domain Name Restrictions frame. He selectsDenied Access and then clicks Add to list the exceptions. Which of the following NetworkID and Subnet Masks should he enter to limit access to the IP address rangesspecified above? (Select all that apply.)
    • A. 

      Network ID: 10.10.10.0, Subnet mask: 255.255.255.128

    • B. 

      Network ID: 10.10.10.0, Subnet mask: 255.255.255.0

    • C. 

      Network ID: 10.10.10.128, Subnet mask: 255.255.255.192

    • D. 

      Network ID: 10.10.20.224, Subnet mask: 255.255.255.240

    • E. 

      Network ID: 10.10.30.192, Subnet mask: 255.255.255.192

  • 171. 
    Oksana is concerned that a new Web site that she is about to launch will quickly overloadher company’s connection to the Internet. The Web site will be hosted on a WindowsServer 2003 system running IIS 6.0 and contains streaming media as well as files fordownload. Oksana has talked to the network administrator and he has suggested thatthe Web site can use a maximum of 2 MB per second of the company’s bandwidthwithout causing significant problems. Oksana would also like to limit the maximumnumber of users connecting to the Web site to 200 at a time. Which of the followingshould Oksana do to place these traffic restrictions on her Web site? (Select all thatapply.)
    • A. 

      Oksana should edit the network properties of the Windows Server 2003 system hosting the Web site and change the maximum outgoing speed to 2,048 kilobytes (KB) per second

    • B. 

      Oksana should edit the properties of the Web site. On the Performance tab, she should select the Bandwidth Throttling check box and set the Limit The Network Bandwidth Available To This Web Site: Maximum Bandwidth (in KB per second) to 2

    • C. 

      Oksana should edit the properties of the Web site. In the Performance Tab, she should select the Limit The Network Bandwidth Available To This Web Site check box and set the Maximum Bandwidth (in KB per second) to 2,000,000.

    • D. 

      Oksana should edit the properties of the Web site. In the Performance Tab, she should select the Limit The Network Bandwidth Available To This Web Site check box and set the Limit The Network Bandwidth Available To This Web Site: Maximum Bandwidth (in KB per second) to 2,048.

    • E. 

      Oksana should edit the properties of the Web site. On the Performance tab, she should select and set the Connections Limited To value at 200.

  • 172. 
    You have cleared the Enable Anonymous Access check box in Authentication Methodsof the Directory Security tab of the Default Web Site properties on a stand-alone WindowsServer 2003 system running IIS. Which of the following methods of authenticationare available to you? (Select all that apply.)
    • A. 

      Integrated Windows Authentication

    • B. 

      Digest Authentication

    • C. 

      Basic Authentication

    • D. 

      .NET Passport Authentication

  • 173. 
    You are the Web site administrator of a Windows Server 2003 system hosted by yourISP. You want to host several different Web sites off this server but your ISP is unableto allocate your hosted server more than a single public IP address. The public IPaddress you have been allocated is 207.46.248.234. The sites that you want to host areas follows:www.adatum.comwww.alpineskihouse.comwww.proseware.comwww.tailspintoys.comEach site is to contain completely unique content totally unrelated to the other sites.Which of the following steps should you take to resolve this problem? (Select two; eachselection forms a part of the correct answer.)
    • A. 

      Configure the DNS server hosting the records for www.adatum.com, www.alpineskihouse.com, www.proseware.com, and www.tailspintoys.com to point these hosts’ records at IP address 207.46.248.234

    • B. 

      Configure the DNS server hosting the records for www.adatum.com, www.alpineskihouse.com, www.proseware.com, and www.tailspintoys.com to point these hosts records at IP address 207.46.234.248.

    • C. 

      Create four separate Web sites, www.adatum.com, www.alpineskihouse.com, www.proseware.com, and www.tailspintoys.com. In the Web Site Creation Wizard, set the IP address of each Web site by entering 207.46.248.234. For the host header of each Web site, enter the respective Web site name. In the path to the home directory for each Web site, type c:\inetpub\wwwroot. Disable the Default Web Site.

    • D. 

      Create four separate Web sites, www.adatum.com, www.alpineskihouse.com, www.proseware.com, and www.tailspintoys.com. In the Web Site Creation Wizard, set the IP address of each Web site by entering 207.46.234.248. For the host header of each Web site, enter the respective Web site name. In the path to the home directory for each Web site, enter the particular directory that hosts the corresponding Web site’s unique content. Disable the Default Web Site.

    • E. 

      Create four separate Web sites, www.adatum.com, www.alpineskihouse.com, www.proseware.com, and www.tailspintoys.com. In the Web Site Creation Wizard, set the IP address of each Web site by entering 207.46.248.234 For the host header of each Web site, enter the respective Web site name. In the path to the home directory for each Web site, enter the particular directory that hosts the corresponding Web site’s unique content. Disable the Default Web Site.