This is a Practice test on Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. Take this practice test at the end of your studies to verify that you are prepared for the real exam. The certification exam is timed. Make sure you are able to pass the Microsoft MCSE: 70-293 practice test by a substantial margin before you take the real exam. So, let's try out the quiz. All the best!
True
False
Rate this question:
True
False
Rate this question:
Adprep / forestprep
Adprep / domainprep
Adprep
Forestprep
Rate this question:
True
False
Rate this question:
Ensure there is a dedicated physical WAN link between S1DC1 and S2DC1 only for the purpose of replication.
Configure S1DC1 and S2DC1 as Preferred Bridgehead Servers
Configure S1DC2 and S2DC1 as Preferred Bridgehead Servers Standalone Servers
Configure S1DC2 and S2DC2 as Preferred Bridgehead Servers.
Rate this question:
Remove the DFS feature from your network until it has completely stabilized and share resources ordinarily as it was done in the pre-Windows 2000 era.
Upgrade your root domain to Windows Server 2003 and the DFS also to Windows Server 2003 based DFS
Ensure the resources that have DFS links created do not get relocated.
Make a schedule for mailing users each time a resource gets relocated.
Rate this question:
Point-To-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
L2TP with IPSec (L2TP/IPSEC)
IPSec
Rate this question:
Hisecws.inf
Hisecserver.inf
Client (Respond only)
Server (Request Security)
Rate this question:
Hard Disk Drive (HDD)
Hard Disk Controller (HDC)
Random Access Memory (RAM)
CPU
Rate this question:
IAS Server
IIS Server
RRAS Server
RAS/VPN Server
Rate this question:
The site 3 and new site have duplicated IP address range for assigning to clients
The DHCP relay agent is not correctly configured
The DHCP server in the new site is no longer functioning
The DHCP server in Site 3 is no longer functioning
Rate this question:
Application log of the Event viewer.
Debug.log file.
Dns.log file.
None of the above
Rate this question:
You must not enable port filtering for a network when the Web server is apart of that network.
You must unblock port 443 as well.
You must block port 80 and unblock port 443.
You must block 443 when unblocking port 80.
Rate this question:
Restart the DC
Use the recovery console
Use safe mode restart
Last Known Good Configuration
Rate this question:
The administrator has to just restart the DHCP server one more time.
The administrator has to authorize the new DHCP server
You must authorize the new DHCP server
You must assign a new range of IP address
Rate this question:
Just restart the DHCP server, it will take care of the needful
Right click on the database file and choose the refresh option
Backup the database, compact the database and then restore it
Compact the live database
Rate this question:
GC
DC
Member Server
Stand alone server
Rate this question:
Network load balancing
Server clustering
DFS implementation
EFS implementation
Rate this question:
You will have to create an exception for the created IPSec policy in the internal network and allow the database server to accept queries from the Web server
You will have to create an exception for the IPSec policy created and allow the Web server to receive a response from the database server
Do away with the existing IPSec policies and recreate the relevant one keeping in mind the new requirements.
Move the database servers to the same network as the Web servers
Move the Web servers to the same network as the database servers.
Rate this question:
The CA group
Domain Admin group
Certificate Publisher
Certificate Manager
Rate this question:
Disable Caching
Set Caching to default values
Set Caching to values higher than the default values
Set up a DDR connection between the DFS root and the replica
Rate this question:
Create a Nat such that all authenticated users automatically get mapped to the Web servers.
Deploy a certificate for all domain members to allow access to the Web server.
Ensure the �auto-enroll� permission is assigned to the certificate.
Configure a domain that will have automated policies to map users to web servers.
Rate this question:
TCP is the most secure protocol when concerned about network based attacks.
UDP is the most secure protocol when concerned about network based attacks.
When securing a network against network based attacks you need to employ specialized applications that are built for that purpose.
Neither TCP nor UDP can help against network based attacks.
Rate this question:
Read
Enroll
Auto-enroll
Modify
Rate this question:
Create an OU named Policy test under the root.
Create a child OU, one each under Policy test named desktop and servers, respectively.
Create a child OU, one each under Policy test named domain controllers and servers, respectively.
Create a child OU, one each under Policy test named desktop, domain controllers and servers, respectively.
Rate this question:
Configure disk quota, by checking the options �setup disk quotas for new users�. Also, check to �deny disk usage exceeding disk limit�.
Limit disk space to at least 200 MB
Limit Disk space to 200 MB
Email users who are nearing the disk limit to warn them.
Set up a warning limit and the user will be informed through messages when they reach that limit.
Rate this question:
RIPv1
RIPv2
OSPF
EIGRP
Rate this question:
It is a platform for distributed resource management
It provides uniform convention for file systems
It is a mapping of resources or collection of resources
It is a cheap implementation of server clusters
Rate this question:
By using Kerberos authentication
By setting up workgroups based on projects. Localize the resource servers to the workgroups and deny access to users outside of the project.
By using host-based permit and block IP packets.
By using host-based block IP packets.
Rate this question:
Edge of the internal network
Perimeter network
Internal network
Demilitarized zone
Rate this question:
RAS/VPN service
Remote Registry Service
Server Service
RPC service
Rate this question:
Data Integrity
Data Confidentiality
Data origin authentication
Anti-replay of data between trusted sources
Anti-replay of data between non-trusted sources.
Rate this question:
Read
Enroll
Auto-Enroll
Renew
Rate this question:
The resource server in ad1.Contoso.com is not configured properly as Enterprise CA.
There could be a WAN link problem prohibiting the changes from ad1.contoso.com to flow down to ad2.contoso.com.
The resource server configured as Enterprise CA in ad1.cotoso.com does not have the required permissions in ad2.contoso.com.
Add the resource server of ad1.contoso.com that is configured as Enterprise CA to Cert Publishers group in the ad2.contoso.com.
There is no trust between the ad1.contoso.com and the ad2.contoso.com.
Rate this question:
Create groups based on roles and assign local permissions to resources accordingly to each group
Divide hard disk into as many partitions as users and ensure each partition is not exceeding 100 MB disk space.
Assign 100 MB Disk quota
Create groups based on roles and assign share permissions to resources accordingly to each group.
None of the above.
Rate this question:
Windows Server 2003 Schema
Windows 2000 or Windows Server 2003 Schema
Group policies or scripts
Group policy updates
Rate this question:
At least 2 servers
At least 1 PCI network interface card per server
At least 2 PCI network interface card per server
Local storage
Network storage
Rate this question:
Configure ISDN connection between sites and implement RAS/VPN for remote users.
Implement site-to-site VPN using L2TP/IPSec
Implement RADIUS using IAS server
Implement VPN for dial-in users as well
Secure the network by using end-to-end security of IPSec between all hosts.
Rate this question:
Private keys
Database log
The version of existing service
The database itself
Rate this question:
Check the Event viewer now for detailed error logs.
Run the Network Monitor to capture packets.
Run the certutil �setreg command.
Use the certutil command with �certlog-warning� level.
Use the certutil command with �certlog-verbose� level.
Rate this question:
The NICs should have been PCI cards rather than the existing fault tolerant ones.
Fault tolerant NICs can hamper the process of recovery during failures
A secondary WAN link must exist for backup of cluster information interchange.
This scenario did not require a clustering in the first place, just DFS with replica would have sufficed.
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2022 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
MCSA/MCSE Practice Exam 70-290 Questions 61-80/184
This MCSA\/MCSE Practice Exam 70-290 focuses on troubleshooting and managing Windows Server 2003 environments. It assesses skills crucial for system administrators, such as user...
Questions:
20 |
Attempts:
722 |
Last updated:
Mar 20, 2023
|
|
MCSA/MCSE Practice Exam 70-290 Questions 1-20/184
Exam 70-290 Managing & Maintaining a Microsoft Windows Server 2003 Environment Passing Score: 800 Time Limit: 180 min
Questions:
20 |
Attempts:
917 |
Last updated:
Mar 21, 2023
|
|
MCSE 70-291 Exam Quiz Test 2
Hello FriendThis practice test helps you prepare for Microsoft
certification exam 70-291, which counts toward MCSE certification.
This practice test contains 33 questions,...
Questions:
33 |
Attempts:
689 |
Last updated:
Mar 22, 2023
|
Wait!
Here's an interesting quiz for you.