Microsoft MCSE: 70-293 Practice Exam - 1

34 Questions

Settings
MCSE Quizzes & Trivia

This is a Practice test on Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. Take this practice exam at the end of your studies to verify that you are prepared for the real exam. This certification exam is timed. Make sure you are able to pass the Microsoft MCSE 70-293 practice exam by a substantial margin before you take the real exam. So, let's try out the quiz. All the best!


Related Topics
Questions and Answers
  • 1. 
    Which of the following Operations Masters is mainly responsible for the creation of Active Directory objects?
    • A. 

      Global Catalog Server

    • B. 

      Schema Master

    • C. 

      Infrastructure Master

    • D. 

      None of the above

  • 2. 
    You are required to bring one of the DC (Domain Controllers) out of the network for the maintenance task. It is required that you shift the database and the log files to one of the new DCs with better resources in the domain. What should you do?
    • A. 

      Restart the DC using Advanced Options and Choose DS Restore mode

    • B. 

      Restart the DC in DS Restore mode

    • C. 

      Choose the move DB option of the ntdsutil

    • D. 

      Choose the shift DB option of the ntdsutil

  • 3. 
    Which of the following will help to defragment the hard disk on a DC in the Windows Server 2003?
    • A. 

      Running Scandisk on the DC

    • B. 

      Running a defragment tool on the DC

    • C. 

      Restarting the DC in DS Restore mode and using compact db.

    • D. 

      Restarting the DC in DS Restore mode and using zip db.

  • 4. 
    • A. 

      \\MetroTech.com\DFSR

    • B. 

      \\MetroTech.MSFT\DFSR

    • C. 

      \\MetroTech\DFSR

    • D. 

      \\DFSR\{share name}

  • 5. 
    Given the address 172.16.10.5 255.255.128.0, what would be the Subnet Id for this network?
    • A. 

      Subnet Id is 172.16.10.0

    • B. 

      Subnet Id is 172.16.0.1

    • C. 

      Subnet Id is 172.16.0.2

    • D. 

      Subnet Id is 172.16.10.3

  • 6. 
    Which of the following is referred to as an APIPA by the Microsoft Operating systems such as Windows XP, Windows 2000 and Windows Server 2003?
    • A. 

      10.0.0.0/30

    • B. 

      169.254.0.0/16

    • C. 

      172.16.0.0/30

    • D. 

      192.168.0.0/30

  • 7. 
    Lately, you received complaints from many of your network users that their computers no longer have an IP address. When you restart some of the clients when most of the computers are shut down, you are successful in getting the clients to be assigned with IP addresses. You decide to capture relevant data on the DHCP server to help you analyze if the DHCP is processing the request as efficiently as it should. Which of the following is the correct information to be captured?
    • A. 

      DHCP replication notification

    • B. 

      DHCP requests

    • C. 

      DHCP acknowledgements

    • D. 

      DHCP negative acknowledgements

    • E. 

      DHCP lease duration

  • 8. 
    After adding a new server to Dept1 of your network, you have been receiving too many calls relating to resource access from the users. The new server will be accessed by three departments Dept1, Dept2 and Dept3. The network performance has drastically reduced after this latest addition. You decide to analyze the entire situation and collect the following data: � Old Server shows 80 percent utilization. � 45% of the network utilization is due to the new server � New hosts a database that is used extensively by all the Dept1, Dept2 and the Dept3. What should you do? Each choice represents a part of the solution. Choose all that apply.
    • A. 

      Old server does not need any action

    • B. 

      Add a replica of the new server in the other two departments

    • C. 

      Move all the servers to switch ports rather than hubs

    • D. 

      Add more hubs in the network

  • 9. 
    • A. 

      Implement NAT in the perimeter network

    • B. 

      Configure your routers with access lists

    • C. 

      Configure your routers with relevant routing protocols

    • D. 

      Implement proxy service in the perimeter network

  • 10. 
    A VLAN is also referred to as an isolated LAN. T/F?
    • A. 

      True

    • B. 

      False

  • 11. 
    • A. 

      The Finance and the Sales department need more switches than hubs

    • B. 

      The Finance and the Sales department need to be split from the rest of the network using routers with relevant access list on the router and permissions attached to the resources

    • C. 

      Avoid additional servers and accommodate the new services on the existing ones

    • D. 

      Design a server farm with a Layer 3 switch connecting the rest of the network to the server farm

    • E. 

      Design a server farm with a router connecting the rest of the network to the server farm

  • 12. 
    Which of the following features are supported by the IAS server?
    • A. 

      Proxy service

    • B. 

      Enterprise Firewall

    • C. 

      Web Server cache

    • D. 

      SNMP

  • 13. 
    View the exhibit. You are configuring a RADIUS client and in the process creating a dial-in profile for the purpose of testing the connectivity alone. Which of the option given in the choices section would you choose for authentication type here?
    • A. 

      MS-CHAP v2

    • B. 

      MS-CHAP

    • C. 

      CHAP

    • D. 

      SPAP

    • E. 

      Unauthenticated access

  • 14. 
    Network load balancing service requires the quorum for successful operation. T/F?
    • A. 

      True

    • B. 

      False

  • 15. 
    Which of the following is maintained by the quorum service?
    • A. 

      Configuration information

    • B. 

      State information

    • C. 

      Cluster information

    • D. 

      None of the above

  • 16. 
    The existing file servers on your network are not uniformly distributed with lead, one of it has more data stored in it than the others. You fear that it is near failure and intend to do something about its fault tolerance. All servers have the state of art hardware configuration and have uniform hardware resources. There are 3 such servers. What should you do?
    • A. 

      Nothing, just redistribute the data between the servers.

    • B. 

      Configure Server cluster using the local hard disk of the overly loaded server.

    • C. 

      Use a shared network volume and implement a Cluster service for the servers

    • D. 

      Implement a standard cluster

    • E. 

      Ensure the quorum is configured on a RAID system

  • 17. 
    The CHKDSK command results can be viewed using the event viewer. T/F?
    • A. 

      True

    • B. 

      False

  • 18. 
    You are the administrator for MetroTech World. Yours is an enterprise network. You are responsible for all the domain controllers, member servers, routers and switches on your network. You perform maintenance of routers in remote locations too. Lately, you have deployed IPSec policies that strictly prohibit network traffic that is not either linked to any particular application or is not secured or accounted for. All applications required even rarely on the network have been audited for and IPSec policies were designed accordingly. You are now logging into a remote router and are unsuccessful in doing so. You suspect connectivity problem and try using commands such as Ping and Trace. You are unable to do so. What should you do?
    • A. 

      Re-deploy all IPSec policies and this time test thoroughly before deploying them.

    • B. 

      Review the IPSec policies required for the network once again

    • C. 

      Exempt all ICMP related traffic from IPSec policies

    • D. 

      Request for the router on the other end to be restarted

  • 19. 
    Which of the following should be used to protect corporate Wireless LAN?
    • A. 

      IPSec transport mode

    • B. 

      Wired Equivalent Privacy (WEP) encryption

    • C. 

      IEEE 802.1X authentication

    • D. 

      IPSec tunnel mode

  • 20. 
    IPSec policies cannot negotiate security for which of the following type of communication?
    • A. 

      Wireless

    • B. 

      Wired - Unicast

    • C. 

      Multicast

    • D. 

      Broadcast

  • 21. 
    Which of the following authentications methods used by IPSec is/are most secure?
    • A. 

      Kerberos V5

    • B. 

      Certification

    • C. 

      Preshared key

    • D. 

      Token

  • 22. 
    Your company has just gone in for a merger with the competitor company. Both the companies have been totally upgraded to Windows Server 2003 single domains respectively. You are required to enable sharing of resources between the two networks in a way such that the resources are protected from unauthorized access on both sides of the network. Authentication rules from both ends must be very strict. What would you suggest? Each solution forms a part of the total solution. Choose all that apply.
    • A. 

      Establish a two-way trust between the two networks. Audit resource access

    • B. 

      Establish a two-way trust between the child level domains.

    • C. 

      Implement certificates

    • D. 

      Implement Kerberos V5.

    • E. 

      Implement tokens

  • 23. 
    Your company has merged with another company. For the time being until the written company policies for the network merger are in place, you are required to allow limited access to users from the other network to yours. You are unaware of the security implementation of the other network. You are required to implement IPSec policies for allowing access to the users from the other network but the priority is for connection and not security. What should you do?
    • A. 

      Deploy certificates

    • B. 

      Implement Server (Request Security) on your end of the network

    • C. 

      Implement Server (require Security) on your end of the network

    • D. 

      Implement Client (Respond Only) on your end of the network

  • 24. 
    Whenever a Certificate Server gets upgraded the entire pending request will be deleted and will have to be raised freshly by the clients. T/F?
    • A. 

      True

    • B. 

      False

  • 25. 
    Which of the following servers are identical in their role and can replace each other in different scenarios?
    • A. 

      Root CA

    • B. 

      Subordinate CA

    • C. 

      Stand alone CA

    • D. 

      Enterprise CA

  • 26. 
    You have just configured a server as a CA and you are required to introduce it to the network to allow it to start issuing certificates. Which of the groups would you add this CA server too if you have to achieve the said goal?
    • A. 

      Enterprise admin group

    • B. 

      Cert publishers group

    • C. 

      Cert managers group

    • D. 

      None of the above

  • 27. 
    Which of the following statements relating to the upgrade process from Windows NT 4.0 Certificate server to Windows 2003 based Certificate Server is true? Choose all that apply.
    • A. 

      The Certificate Service can automatically upgrade from Windows NT 4.0 to Windows Server 2003.

    • B. 

      Windows 200 Certificate Server cannot be automatically upgraded to Windows Server 2003.

    • C. 

      Windows NT 4.0 Certificate Service cannot be upgraded or migrated directly to Windows Server 2003 Certificate Service.

    • D. 

      If a Windows NT 4.0 based certificate server were to be forcibly upgraded to Windows Server 2003 based Certificate server, the service no longer exists on the upgraded server.

  • 28. 
    You are the administrator for MetroTech World. Metro Tech World uses certificate-based authentication. There already exists a CA in the network that has so far been issuing certificates. You are now trying to issue certificates for users in a child domain and get �Privilege violation� error. What should you do?
    • A. 

      Restart the CA server

    • B. 

      Ensure the CA is not a stand alone server

    • C. 

      Manually add the CA to the cert publishers group

    • D. 

      Reinstall the CA.

  • 29. 
    The certlog-warning level will log messages to the event viewer about the Certificate server in maximum detail. T/F?
    • A. 

      True

    • B. 

      False

  • 30. 
    Which of the following cannot be directly upgraded to a Windows Server 2003 Enterprise Root CA?
    • A. 

      Windows NT 4.0 based CA

    • B. 

      Windows 2000 Root CA

    • C. 

      Windows 2000 Stand-alone CA

    • D. 

      Windows 2003 Stand-alone CA

  • 31. 
    For the purpose of Web enrollment, it is mandatory that the IIS server should be running on the Root DC. T/F?
    • A. 

      True

    • B. 

      False

  • 32. 
    You have just upgraded your CA in the domain. You notice that all clients whose requests are freshly being granted are working all right but all clients whose keys were generated by the old CA are having problems with the new CA and also the new CA has failed to recognize all such clients. What could the problem be?
    • A. 

      The existing key pairs have not been backed up during upgrade..

    • B. 

      The CA database has not been backed up during upgrade.

    • C. 

      The backup procedure was not carried out correctly.

    • D. 

      The CA has not been restarted after upgrade.

  • 33. 
    Which of the following will help to start the Certificate services from the command prompt?
    • A. 

      Net start certsvc

    • B. 

      Net start

    • C. 

      Netstart certsvc

    • D. 

      Service tool in the Administrative tools category

    • E. 

      Service tool in the Control Panel

  • 34. 
    The CA version is the version of the Certificate service running on the OS. T/F?
    • A. 

      True

    • B. 

      False