MCSE 70-291: Microsoft 70 291 Practice Exam Quiz

36 Questions

Settings
MCSE Quizzes & Trivia

MCSE 70-291: Implementing, Managing, and Maintaining a Server 2003 Network Infrastructure. Microsoft 70 291 Practice Exam. This is a full-length practice exam that you can take to know if you are prepared for the real test. Time yourself to 120 minutes for this practice exam. Ensure that you take all MCSE 70-291 practice exams available and pass each with a good margin. In order to pass the real exam, you must achieve a 700 out of 1000. All the best!


Related Topics
Questions and Answers
  • 1. 
    You are the administrator of Metro Tech World. Your company currently has 6 major subnets with dedicated DHCP servers in each. All subnets use contiguous IP addresses. Your company is in the process of acquiring two small companies. These companies will still continue to use their own domain controllers. They need to be a part of the dynamic IP environment. There are about 25 computers in each of these companies and will connect to the main network using a router each. Requirements: 1. The DHCP servers in the main network need fault tolerance 2. The clients in the small networks need to access the DHCP servers in the location closest to them for IP address assignment What should you do? Each of the choices represents a part of the solution. Choose two solutions that will form a complete solution.
    • A. 

      Use DHCP servers with contiguous scope to divide scope between the main offices on 80-20 rule

    • B. 

      Use DHCP servers in the main offices for load balancing

    • C. 

      Use DHCP relay agents in the small subnets.

    • D. 

      Use a lesser configuration computer in the small subnets as the DHCP servers.

  • 2. 
    • A. 

      Audit the DHCP server and generate reports for the same

    • B. 

      Use a performance monitoring tool that can record the DHCP performance for at least a week.

    • C. 

      Audit the entire network transactions for at least a day.

    • D. 

      Use a performance monitoring tool that can record the DHCP performance for just the peak time of the day.

    • E. 

      Print the DHCP log file. That will suffice.

  • 3. 
    View the exhibit shown below. The scope shows a red icon. What does it indicate and what is the solution? Each choice represents a part of the desired response. Choose two to complete the required response.
    • A. 

      It means that the scope is not correctly configured.

    • B. 

      It means that the scope is not activated.

    • C. 

      It means that the scope is waiting deletion

    • D. 

      Reconfigure the scope.

    • E. 

      Activate the scope

  • 4. 
    You are planning on setting up a DHCP server that not only acts as a DHCP relay agent for the stub network but also has a scope configured to load-balance the DHCP server on the main network. This DHCP server will be a perimeter resource. View the exhibit given below. Which of the given choices must be selected for the DHCP to deliver the services stated in the scenario?
    • A. 

      DHCP only

    • B. 

      BootP only

    • C. 

      Both

    • D. 

      Not any option stated in the exhibit

  • 5. 
    . You have one single DNS server and a UNIX based mail server for the entire network and the one default gateway for each scope in the network. You need to configure this information for each scope accordingly. What should you do? Each choice represents a part of the solution. Choose all that apply to complete the solution.
    • A. 

      Choose server option to configure the DNS server and the Mail server

    • B. 

      Choose scope option for each scope to assign IP address for the router in that scope

    • C. 

      Choose the scope option and assign the IP address for the DNS, mail server and the router for each scope

    • D. 

      Choose the server option and assign IP address for DNS, mail server and router.

    • E. 

      Choose server option to configure mail server IP address and scope option to configure DNS and the router for each scope.

  • 6. 
    You are the administrator for Metro Tech World. The company has a Windows 2003 network. Your network has several servers and one printer configured with static IP addresses. You must configure the scope for your DHCP server. You expect to add 25 new client computers within the next month. How should you configure the DHCP scope? (Choose three options. Each answer is a part of the solution.)
    • A. 

      Consider static IP addresses too when designing subnet mask

    • B. 

      Static IP addresses can be excluded when planning subnet mask

    • C. 

      Just the number of existing scopes must be considered

    • D. 

      Consider later additions to the network when designing scope

    • E. 

      Be precise about the exclusion range information

  • 7. 
    You are in the process of planning a DNS environment for the network that you have just upgraded. You are now using the Windows Server 2003 environment. The requirements for the same are as follows: 1. Each child level company needs a unique identity under the main company name. 2. Replication of DNS information must be completely automated and maintenance free. 3. Reverse resolution for the zones must be permitted. You have the following proposed solutions: 1. You have created forward lookup zones for each of the child level companies 2. Each of the zones uses one of the best configuration member servers as their DNS server respectively. Which of the following choices correctly indicate which of the requirements have been met? Choose all that apply.
    • A. 

      Unique identities for the child level companies have not been proposed in the solution.

    • B. 

      Only forward lookup will be possible according to the solution.

    • C. 

      Replication will not be completely automated and maintenance free according to the solution suggested.

    • D. 

      Replication will be completely automated and maintenance free according to the solution suggested.

    • E. 

      Reverse lookup as well as forward lookup is possible according to the solution.

  • 8. 
    Which of the following is attached with a stub zone?
    • A. 

      PTR record

    • B. 

      NS record

    • C. 

      SOA record

    • D. 

      Host (A) record

  • 9. 
    You have set up a Primary DNS for your network which is not able to handle the resolution load lately. You require another DNS server that will allow the creation of zones when the existing server is unavailable along with help it load balance when it is overloaded. What should you do? Each choice is a complete solution in itself. Choose the best answer.
    • A. 

      Implement a Secondary DNS server

    • B. 

      Implement another DNS server and configure round robin for load balance

    • C. 

      Use on of the DNS servers on the zone level to act as a forwarder.

    • D. 

      Create more reverse lookup zones on the Primary DNS rather than the usual forward lookup zones.

  • 10. 
    When should you allow a DNS server to accept Secure as well as non-secure updates?
    • A. 

      When it is incapable of dynamic updates

    • B. 

      When the zones created are a part of Active Directory

    • C. 

      When the update information being received from Active Directory integrated zones as well as zones that are otherwise.

    • D. 

      When the zone information being replicated is from non-Active Directory integrated zones.

  • 11. 
    View the exhibit below: What does the exhibit indicate?
    • A. 

      The DNS server you are troubleshooting is responding after a delay

    • B. 

      The DNS server is responding correctly

    • C. 

      The server you are troubleshooting is responding but is not completely configured yet

    • D. 

      The server has failed the test

  • 12. 
    You have implemented a File replication service on your network that requires all the File servers containing identical data to be recognized by identical names by the users on the network. You have 2 DNS servers on your network one Primary and one Secondary and each on a different subnet. To avoid network congestion and fault tolerance it is preferred that the users on each subnet connect to their respective file servers.
    • A. 

      Create a host file on each of the clients to map to their respective file servers

    • B. 

      Create A record respectively on each of the DNS to point to the file server in that subnet

    • C. 

      Do nothing.

    • D. 

      Create a forward lookup record for the file server on that subnet.

  • 13. 
    You notice that one of the secondary DNS servers on your network is continually failing to receive updates when the rest of the secondary servers are succeeding in doing so. How would you verify the problem?
    • A. 

      Use NS Lookup and then the trace command

    • B. 

      Verify the servers listed on the Notification list of the Primary servers

    • C. 

      Capture packets using Network monitor on the Secondary server

    • D. 

      Restart the secondary server

  • 14. 
    You have just completed configuring a DNS server and forced replication on the network. You wish to backup the database and secure it. Which of the following will help you complete the task? Each choice represents a complete solution. Choose two solutions that are possible in this situation.
    • A. 

      Manually copy the DNS database and store it with proper security in place

    • B. 

      Use Jetpack utility

    • C. 

      Use WinZip

    • D. 

      Manually store the DNS database on the Secondary server.

  • 15. 
    View the exhibit shown below: You have created a Primary zone but are unable to configure Secure updates for the same. What could the reason be?
    • A. 

      DNS server is infected with virus

    • B. 

      DNS database has been corrupted

    • C. 

      The zone is not Active Directory integrated

    • D. 

      The zone has to be a stub zone if it has to be configured with secure update.

  • 16. 
    You are the network administrator for Metro Tech World. The company has four branch offices and one main office, which are connected to the main office via T1 lines. A DNS server named DNS1 that hosts one standard primary zone for each of the zones is located in the main office. Problem: Network response times for DNS queries are very slow. Required Solution: 1. Improvement in response time 2. Reduce congestion over the T1 links. 3. Install DNS on the domain controllers What should you do?
    • A. 

      Let DNS1 be the master for the Root and the zone servers be the cache only server.

    • B. 

      Let the DNS1 be the cache only server and the zone DNS servers be the secondary DNS servers

    • C. 

      Let the DNS1 be the master for all zones and the respective zone DNS have the secondary zones

    • D. 

      Create an Active Directory--integrated zone on each of the branch DNS servers for the local domain only. Ensure these are master zones instead of the DNS1 having the master zones. Ensure DNS1 is the forwarder for the DNS in that respective zone.

  • 17. 
    You have created certain security templates that comply with the company�s written policies for all 30 servers on your network. These are Windows Server 2003 computers. You also need to apply certain security templates on these servers, based on the specific services running on each of them. How would you achieve this with least administrative efforts?
    • A. 

      Create a GPO linking it to the Server OU. Import the template that applies to all servers to this new GPO. Group all servers running specific service under one OU. Create a GPO for each service based server linking it to its respective OU and import that specific template to its respective GPO.

    • B. 

      Create a GPO linking it to the Server OU. Group all servers running specific service under one OU. Create a GPO for each service based server and import that specific template to its respective GPO.

    • C. 

      Create a GPO linking it to the Server OU. Import the template that applies to all servers to this new GPO. Group all servers running specific service under one OU.

    • D. 

      Create a GPO linking it to the Server OU. Import the template that applies to all servers to this new GPO. Create a GPO for each service based server and import that specific template to its respective GPO.

  • 18. 
    Your network consists of 25 Domain Controllers and 100 servers all spread across departments and locations. You are required to apply strict encryption rules for communication on all servers in the network. You design an IPSec policy that will be applied to all services that need it. Your concern is that some of the member servers located in the remote locations that are rarely accessed by network-wide clients may be missed out and defeat the security policy that is being implemented. What should you do?
    • A. 

      Apply IPSec Require security on all servers and clients in the network

    • B. 

      Apply IPSec Request security on all servers in the network

    • C. 

      Apply the Secure Server IPSec policy to all servers excluding domain controllers

    • D. 

      Apply Secure Server IPSec policy to all the domain controllers.

  • 19. 
    You are the administrator for Metro Tech world. For maintenance purpose, the Datacenter is temporarily inaccessible to you. You need to deploy a newly designed security template on the file server on priority, but the only computer available on hand to you right now is a domain users� computer who does not have administrative privileges. What should you do?
    • A. 

      Go ahead and try performing the task with the users� privileges itself

    • B. 

      Request the user to log off so you can log in

    • C. 

      Perform the task using the Run As command

    • D. 

      Wait till the data center is available once again.

  • 20. 
    You are keen to verify all the applications that have been recently pushed to the clients from the SUS server. Which of the following should you check?
    • A. 

      Event Viewer

    • B. 

      Approval log in the MSUS console

    • C. 

      Synchronization log in the MSUS console

    • D. 

      Any screen of the MSUS console

  • 21. 
    Which of the following requirements to be configured to use NTLM v2 to authenticate to Windows Server 2003 Network?
    • A. 

      Windows 95 client computers

    • B. 

      Windows 98 client computers

    • C. 

      Windows XP Professional client computers

    • D. 

      Windows 2000 Professional client computers

    • E. 

      Windows NT 4.0 Workstation client computers

  • 22. 
    You are hosting a Web server on the network. As per company policies you are required to encrypt all communication with this web server and also allow users to connect to the Web server and request for Certificates. What should you do?
    • A. 

      Configure SSL and Web based enrollment

    • B. 

      Configure Digital signature and Web based enrollment

    • C. 

      Configure Digital signature and Web based enrollment

    • D. 

      Configure Web based enrollment only and do nothing

  • 23. 
    Which of the following will ensure that the configuration changes of an active IPSec policy be affected immediately and with least manual intervention?
    • A. 

      Netsh static command

    • B. 

      Netsh dynamic command

    • C. 

      Restart the IPSec policy

    • D. 

      Restart the server on which IPSec policy has been created

  • 24. 
    As an expansion plan for your company, you have been asked to configure the RAS server to accept dial-in connections from remote users who will be dialling-in from various OS platforms across the globe. You have created a policy that grants remote access permission to Domain User group members and have deployed the same. You test the implementation and see that the remote users are not able to access resources of the network. What should you do?
    • A. 

      Issue certificates for authenticating these users

    • B. 

      Re-apply the policy

    • C. 

      Grant dial-in permissions

    • D. 

      Reconfigure all shared resources on the network

  • 25. 
    As an upgrade plan for security, your company has implemented smart cards for authenticating all the network clients. All the network clients have been configured accordingly except for Windows 98 clients. According to the company�s written policies, all clients must be on track with smart cards within the next three days. What should you do? Choose two options that present a complete solution to the problem.
    • A. 

      Install service pack 1 for all Windows 98 clients and configure MS-CHAP v2

    • B. 

      Upgrade all Windows 98 clients to Windows XP professional

    • C. 

      Configure EAP properties to implement smart cards for Windows 98 computers

    • D. 

      Configure triple DES

  • 26. 
    You are the administrator for Metro Tech World, an IT consulting services company. You have been assigned certain company written policies to implement. According to the policies, the home users will be using laptops that should only be configured for remote use . When these home users visit office, they should not be allowed to use the company network through their laptops and will instead be assigned designated computers on the networks. These users must be accessing the remote servers through very secure channel and their authentication with the servers must be equally secure. What should you do?
    • A. 

      Disable networking interfaces on their laptops and implement IPSec Require security on Servers as well as the laptops

    • B. 

      Configure home user laptops with Windows XP Home edition and implement IPSec certificates for VPN connections of the home users with the network as well as authentication

    • C. 

      Ensure the security check at the premises entrance will not allow home users to bring in their laptops. Implement IPSec certificates for VPN security

    • D. 

      Configure home user laptops with Windows XP professional and implement hardware profiles to disable network connection on these laptops

  • 27. 
    As per the expansion plans of your company, you are required to accommodate new remote access clients on the network. You have assigned these users the default remote access policy whereas it is required that the remote access permission must be set to allow access. What should you do?
    • A. 

      Change settings from Control Access to default

    • B. 

      Change setting from Deny access to Allow access

    • C. 

      Change setting from Deny to Default access

    • D. 

      Change setting from Control access to allow access

  • 28. 
    You have configured two Database servers complying to the same front end application these servers need to exchange data once in 8 hours to ensure a synchronization of the database. It is required that a dedicated link is set between the two servers but only when required for the synchronization to take place. No other communication should use this link on the network. What should you do? Choose two statements
    • A. 

      Setup a two-way demand dial connection between servers

    • B. 

      Set up 2 one-way demand dial connection between the two servers

    • C. 

      Setup one one-way demand dial connection between the servers

    • D. 

      Setup filters to monitor for any other traffic on this link

    • E. 

      Ensure the link is setup physically between the server on a on-to-one basis

  • 29. 
    You had sometime back implemented a RAS server for receiving requests from the dial-in connections. Lately, you have been receiving complaints that some connections are getting rejected for no reason and connections are very slow. You implement another RAS server but this does not help the situation to a great extent although the number of complaints has reduced by 25%. What should you do?
    • A. 

      Implement 2 RAS s servers instead of just one

    • B. 

      Since the complaints have reduce 25% with addition of one RAS server you need 4 servers totally to reduce complaint by 100%

    • C. 

      Implement a RADIUS server that takes over the responsibility of authentication from the RAS server

    • D. 

      Implement IIS server

  • 30. 
    You are required to secure dial-in connections on the remote network. The remote clients can be dialling in from any geographical location including the EPABX of a hotel where they would be put up for that assignment. The dial-in the client should be challenged by the RAS server before allowing the connection to be complete and then ensure that the connection is secure. What should you do?
    • A. 

      Configure dial-back option on the RAS server and implement VPN with IPSec certificates

    • B. 

      Configure known IP address option for the RAS server and implement VPN with IPSec certificates

    • C. 

      Configure dial-back option with SSL option for connection

    • D. 

      Configure dial-back option on the RAS server and configure simple dial-up connections from a client end

  • 31. 
    Your network is undergoing expansion. You have delegated the task of adding 400 Windows XP professional computers to 5 of your junior administrators. There are 5 RIS s servers that contain images for this deployment across the network. Your company will be engaging in such deployments time and again in the near future as a part of their expansion plans. Your administrators begin the task and 2 hours down the line you receive a complaint from your administrators that the process is taking much longer than it should. You analyze the Utilization of CPU and the Disk performance of the RIS servers. The result of the same is shown below: CPU Utilization: 85% Disk %Disk Time\ Logical disk: 84% Current Disk Queue length: 12 What is the solution to this problem?
    • A. 

      Install the new systems directly from a CD media, one computer at a time

    • B. 

      Increase the hard disk capacity on the RIS servers

    • C. 

      Increase the number of RIS servers on the network

    • D. 

      Use diskless nodes

  • 32. 
    You are the administrator for Metro Tech World. Your network consists of Windows 2000 as well as Windows 2003 servers and the clients are running Windows 2000 professional. Your company has received a new Web-based software development project from their client. They have also recruited a set of developers who will be working on this project. For this team of new developers, you are required to 1. Assign an exclusive scope of IP addresses from the DHCP server that will be limited only to this team. 2. You are to ensure the Internet service will be secure and that the access and speed will be moderately effective. Which of the following must you do?
    • A. 

      Implement RADIUS server and ensure this team will be RADIUS clients

    • B. 

      Implement IIS server

    • C. 

      Implement IAS server in integrated mode and configure the new scope as Secure NAT clients

    • D. 

      Implement IAS server in integrated mode and configure the entire domain to be Secure NAT clients

  • 33. 
    As a security measure, you are required to encrypt all Internet communication that leaves and enters the tour network. To deploy this you implement the Secure Server IPSec policy for the entire domain. Users immediately begin complaining that they cannot access any resources on the Internet. How would you set right the existing problem?
    • A. 

      Require Security for TCP ports 25 and 110 and all other traffic

    • B. 

      IPSec policy, Requests security for TCP ports 20, 21, and 80 and all other traffic

    • C. 

      IPSec policy Require Security for TCP ports 25, 110, and 443 and IPSec Request Security for all other traffic

    • D. 

      IPSec policy Requests Security for TCP ports 20, 21, 80, and 443 and IPSec Require Security for all other traffic

  • 34. 
    Your previous system administrator has created a few baselines for mentoring the network. Lately, lots of users have been complaining that resource access is very slow and generally the network is much more congested than before. You intend to monitor the network to capture fresh real-time data and use the same for comparing with earlier set baseline. Which of the following counters should you choose? (Choose all that apply.)
    • A. 

      PhysicalDisk\ Avg. Disk Queue Length and Server\ Bytes Total/sec

    • B. 

      PhysicalDisk\ % Disk Time and % Idle Time and Network Interface\ Bytes Total/sec

    • C. 

      PhysicalDisk\ Disk Reads/sec and Disk Writes/sec and Server\ Bytes Total/sec

    • D. 

      Server\ Bytes Total/sec, Bytes Received/sec, and Bytes Sent/sec

    • E. 

      Network Interface\ Bytes Total/sec, Bytes Sent/sec, and Bytes Received/sec

  • 35. 
    Which of the following actions would ease bottle neck on congested HDD?
    • A. 

      Defragment the hard disk

    • B. 

      Implement RAID

    • C. 

      Format it with NTFS 5.0

    • D. 

      Combine volumes to get larger disk space

  • 36. 
    You are testing Software Update Services (SUS) server implementation on your network. Which of the following services must be enabled on the test computer to ensure that the updates will successfully be received from the Windows Update site?
    • A. 

      Automatic Update feature

    • B. 

      Remote Procedure Call service

    • C. 

      Background Intelligent Transfer Service (BITS)

    • D. 

      File Replication Service (FRS)