Microsoft MCSE: 70-293 Practice Exam - 1

34 Questions | Total Attempts: 1054

SettingsSettingsSettings
MCSE Quizzes & Trivia

This is a Practice test on Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. Take this practice exam at the end of your studies to verify that you are prepared for the real exam. This certification exam is timed. Make sure you are able to pass the Microsoft MCSE 70-293 practice exam by a substantial margin before you take the real exam. So, let's try out the quiz. All the best!


Related Topics
Questions and Answers
  • 1. 
    Which of the following Operations Masters is mainly responsible for the creation of Active Directory objects?
    • A. 

      Global Catalog Server

    • B. 

      Schema Master

    • C. 

      Infrastructure Master

    • D. 

      None of the above

  • 2. 
    You are required to bring one of the DC (Domain Controllers) out of the network for the maintenance task. It is required that you shift the database and the log files to one of the new DCs with better resources in the domain. What should you do?
    • A. 

      Restart the DC using Advanced Options and Choose DS Restore mode

    • B. 

      Restart the DC in DS Restore mode

    • C. 

      Choose the move DB option of the ntdsutil

    • D. 

      Choose the shift DB option of the ntdsutil

  • 3. 
    Which of the following will help to defragment the hard disk on a DC in the Windows Server 2003?
    • A. 

      Running Scandisk on the DC

    • B. 

      Running a defragment tool on the DC

    • C. 

      Restarting the DC in DS Restore mode and using compact db.

    • D. 

      Restarting the DC in DS Restore mode and using zip db.

  • 4. 
    Presuming the domain name for your organization is MetroTech and that you have at a new DFS root by name DFSR, which of the path will you choose while linking a new share to this root during the process of publishing?
    • A. 

      \\MetroTech.com\DFSR

    • B. 

      \\MetroTech.MSFT\DFSR

    • C. 

      \\MetroTech\DFSR

    • D. 

      \\DFSR\{share name}

  • 5. 
    Given the address 172.16.10.5 255.255.128.0, what would be the Subnet Id for this network?
    • A. 

      Subnet Id is 172.16.10.0

    • B. 

      Subnet Id is 172.16.0.1

    • C. 

      Subnet Id is 172.16.0.2

    • D. 

      Subnet Id is 172.16.10.3

  • 6. 
    Which of the following is referred to as an APIPA by the Microsoft Operating systems such as Windows XP, Windows 2000 and Windows Server 2003?
    • A. 

      10.0.0.0/30

    • B. 

      169.254.0.0/16

    • C. 

      172.16.0.0/30

    • D. 

      192.168.0.0/30

  • 7. 
    Lately, you received complaints from many of your network users that their computers no longer have an IP address. When you restart some of the clients when most of the computers are shut down, you are successful in getting the clients to be assigned with IP addresses. You decide to capture relevant data on the DHCP server to help you analyze if the DHCP is processing the request as efficiently as it should. Which of the following is the correct information to be captured?
    • A. 

      DHCP replication notification

    • B. 

      DHCP requests

    • C. 

      DHCP acknowledgements

    • D. 

      DHCP negative acknowledgements

    • E. 

      DHCP lease duration

  • 8. 
    After adding a new server to Dept1 of your network, you have been receiving too many calls relating to resource access from the users. The new server will be accessed by three departments Dept1, Dept2 and Dept3. The network performance has drastically reduced after this latest addition. You decide to analyze the entire situation and collect the following data: � Old Server shows 80 percent utilization. � 45% of the network utilization is due to the new server � New hosts a database that is used extensively by all the Dept1, Dept2 and the Dept3. What should you do? Each choice represents a part of the solution. Choose all that apply.
    • A. 

      Old server does not need any action

    • B. 

      Add a replica of the new server in the other two departments

    • C. 

      Move all the servers to switch ports rather than hubs

    • D. 

      Add more hubs in the network

  • 9. 
    You are concerned about the security of your servers within the network even though you are constantly taking care of the vulnerabilities. You need to secure them from external attacks. You have implemented a perimeter network and have also implemented firewall services on the border of your internal network. What more can you do to ensure your perimeter network will secure your internal network against external attacks?
    • A. 

      Implement NAT in the perimeter network

    • B. 

      Configure your routers with access lists

    • C. 

      Configure your routers with relevant routing protocols

    • D. 

      Implement proxy service in the perimeter network

  • 10. 
    A VLAN is also referred to as an isolated LAN. T/F?
    • A. 

      True

    • B. 

      False

  • 11. 
    • A. 

      The Finance and the Sales department need more switches than hubs

    • B. 

      The Finance and the Sales department need to be split from the rest of the network using routers with relevant access list on the router and permissions attached to the resources

    • C. 

      Avoid additional servers and accommodate the new services on the existing ones

    • D. 

      Design a server farm with a Layer 3 switch connecting the rest of the network to the server farm

    • E. 

      Design a server farm with a router connecting the rest of the network to the server farm

  • 12. 
    Which of the following features are supported by the IAS server?
    • A. 

      Proxy service

    • B. 

      Enterprise Firewall

    • C. 

      Web Server cache

    • D. 

      SNMP

  • 13. 
    View the exhibit. You are configuring a RADIUS client and in the process creating a dial-in profile for the purpose of testing the connectivity alone. Which of the option given in the choices section would you choose for authentication type here?
    • A. 

      MS-CHAP v2

    • B. 

      MS-CHAP

    • C. 

      CHAP

    • D. 

      SPAP

    • E. 

      Unauthenticated access

  • 14. 
    Network load balancing service requires the quorum for successful operation. T/F?
    • A. 

      True

    • B. 

      False

  • 15. 
    Which of the following is maintained by the quorum service?
    • A. 

      Configuration information

    • B. 

      State information

    • C. 

      Cluster information

    • D. 

      None of the above

  • 16. 
    The existing file servers on your network are not uniformly distributed with lead, one of it has more data stored in it than the others. You fear that it is near failure and intend to do something about its fault tolerance. All servers have the state of art hardware configuration and have uniform hardware resources. There are 3 such servers. What should you do?
    • A. 

      Nothing, just redistribute the data between the servers.

    • B. 

      Configure Server cluster using the local hard disk of the overly loaded server.

    • C. 

      Use a shared network volume and implement a Cluster service for the servers

    • D. 

      Implement a standard cluster

    • E. 

      Ensure the quorum is configured on a RAID system

  • 17. 
    The CHKDSK command results can be viewed using the event viewer. T/F?
    • A. 

      True

    • B. 

      False

  • 18. 
    You are the administrator for MetroTech World. Yours is an enterprise network. You are responsible for all the domain controllers, member servers, routers and switches on your network. You perform maintenance of routers in remote locations too. Lately, you have deployed IPSec policies that strictly prohibit network traffic that is not either linked to any particular application or is not secured or accounted for. All applications required even rarely on the network have been audited for and IPSec policies were designed accordingly. You are now logging into a remote router and are unsuccessful in doing so. You suspect connectivity problem and try using commands such as Ping and Trace. You are unable to do so. What should you do?
    • A. 

      Re-deploy all IPSec policies and this time test thoroughly before deploying them.

    • B. 

      Review the IPSec policies required for the network once again

    • C. 

      Exempt all ICMP related traffic from IPSec policies

    • D. 

      Request for the router on the other end to be restarted

  • 19. 
    Which of the following should be used to protect corporate Wireless LAN?
    • A. 

      IPSec transport mode

    • B. 

      Wired Equivalent Privacy (WEP) encryption

    • C. 

      IEEE 802.1X authentication

    • D. 

      IPSec tunnel mode

  • 20. 
    IPSec policies cannot negotiate security for which of the following type of communication?
    • A. 

      Wireless

    • B. 

      Wired - Unicast

    • C. 

      Multicast

    • D. 

      Broadcast

  • 21. 
    Which of the following authentications methods used by IPSec is/are most secure?
    • A. 

      Kerberos V5

    • B. 

      Certification

    • C. 

      Preshared key

    • D. 

      Token

  • 22. 
    Your company has just gone in for a merger with the competitor company. Both the companies have been totally upgraded to Windows Server 2003 single domains respectively. You are required to enable sharing of resources between the two networks in a way such that the resources are protected from unauthorized access on both sides of the network. Authentication rules from both ends must be very strict. What would you suggest? Each solution forms a part of the total solution. Choose all that apply.
    • A. 

      Establish a two-way trust between the two networks. Audit resource access

    • B. 

      Establish a two-way trust between the child level domains.

    • C. 

      Implement certificates

    • D. 

      Implement Kerberos V5.

    • E. 

      Implement tokens

  • 23. 
    Your company has merged with another company. For the time being until the written company policies for the network merger are in place, you are required to allow limited access to users from the other network to yours. You are unaware of the security implementation of the other network. You are required to implement IPSec policies for allowing access to the users from the other network but the priority is for connection and not security. What should you do?
    • A. 

      Deploy certificates

    • B. 

      Implement Server (Request Security) on your end of the network

    • C. 

      Implement Server (require Security) on your end of the network

    • D. 

      Implement Client (Respond Only) on your end of the network

  • 24. 
    Whenever a Certificate Server gets upgraded the entire pending request will be deleted and will have to be raised freshly by the clients. T/F?
    • A. 

      True

    • B. 

      False

  • 25. 
    Which of the following servers are identical in their role and can replace each other in different scenarios?
    • A. 

      Root CA

    • B. 

      Subordinate CA

    • C. 

      Stand alone CA

    • D. 

      Enterprise CA