MCSE 70-291: Microsoft 70 291 Practice Questions

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 622,320
| Attempts: 1,852
SettingsSettings
Please wait...
  • 1/82 Questions

    Which of the following will help you cler the DNS cache on the client side?

    • Ipconfig/flushdns
    • Ipconfig/displaydns
    • Ipconfig/release
    • Ipconfig/registerdns
Please wait...
About This Quiz

MCSE 70-291:Implementing, Managing, and Maintaining a Server 2003 Network Infrastructure. These are practice questions for MCSE 70-291 that will help you prepare for the exam. The practice questions are based on Latest Microsoft MCSE Certification Exam pattern. Try these first followed by the MCSE practice exams.

MCSE 70-291: Microsoft 70 291 Practice Questions - Quiz

Quiz Preview

  • 2. 

    Which of the following is a service dedicated to resolving host names to IP address and vice versa?

    • DNS

    • Host file

    • WINS

    • LMHOSTS file

    Correct Answer
    A. DNS
    Explanation
    HOSTS and LMHOSTS are files and not services. WINS resolves NetBIOS names and not host names. DNS is the dedicated service for resolving host names.

    Rate this question:

  • 3. 

    Which of the statements is correct about an Active Directory-integrated DNS zone?

    • It allows secure dynamic updates.

    • It allows only non-secure updates.

    • It does not allow dynamic update.

    • It can be done only on read-only zones.

    Correct Answer
    A. It allows secure dynamic updates.
    Explanation
    An Active Directory--integrated DNS zone uses Active Directory for permitting secure dynamic updates.

    Rate this question:

  • 4. 

    Which of the following is correct about a DNS query?

    • It is a request that a DNS client resolver makes to a DNS server to obtain the IP address of a host name.

    • It is a request to locate the DNS server.

    • It is a request to maintain a session with the DNS server

    • It is a request to terminate the existing session with the DNS server

    Correct Answer
    A. It is a request that a DNS client resolver makes to a DNS server to obtain the IP address of a host name.
    Explanation
    A DNS query is a request the DNS client resolver makes to a DNS server to obtain the IP address of either a flat or a hierarchical host name.

    Rate this question:

  • 5. 

    The DNS service in Windows Server 2003 environment is not capable of Incremental updation. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The DNS server in the Windows Server 2003 environment is capable of incremental zone transfer.

    Rate this question:

  • 6. 

    NetBIOS is a routable protocol. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    NetBIOS is a naming scheme or a service that is proprietary to Microsoft and limited to LANs only. It cannot be used for routing.

    Rate this question:

  • 7. 

    DHCP Authorization is a must to initialize DHCP servers in Active Directory environment. T/F?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    In an Active Directory environment a DHCP server cannot initialize without authorization from ADS

    Rate this question:

  • 8. 

    Which of the following statements are true about VPN connection?

    • It uses private networks for connection

    • It uses dedicated lines for communication.

    • It uses tunneling protocols and encryption protocols that allow secure information to be transmitted through public networks.

    • None of the above

    Correct Answer
    A. It uses tunneling protocols and encryption protocols that allow secure information to be transmitted through public networks.
    Explanation
    VPN uses tunneling protocols and encryption protocols that allow secure information to be transmitted through public networks.

    Rate this question:

  • 9. 

    Which of the following differentiates a network portion from the host portion of the IP address for a given scope?

    • Network IP address range

    • Subnet mask

    • Exclusion range

    • Router

    Correct Answer
    A. Subnet mask
    Explanation
    The property of the subnet mask is to differentiate or highlight the network portion and mask the host portion of an Ip address.

    Rate this question:

  • 10. 

    Which of the following statements is true of master DNS servers?

    • It is the server responsible for sending update notifications and updates to the secondary server.

    • It is nothing but the Root DNS server

    • It could be any secondary server hosting a secondary zone

    • It is an extension of the DDNS service

    Correct Answer
    A. It is the server responsible for sending update notifications and updates to the secondary server.
    Explanation
    The Master DNS could be any DNS server on the network that has a read-write copy of a zone that has been created on it and is capable of sending notifications for those updates to the secondary servers.

    Rate this question:

  • 11. 

    When Active Directory is deployed you cannot implement UNIX based DHCP servers in the network. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    UNIX based DHCP servers co-exist with Windows based DHCP servers in the Active Directory environment.

    Rate this question:

  • 12. 

    Which of the following is used to seclude a range of IP addresses from getting assigned to clients on a network?

    • MX

    • Subnet mask

    • Exclusion range

    • Router

    Correct Answer
    A. Exclusion range
    Explanation
    To exclude a set of IP addresses from being assigned to clients on the network, you must use the exclusion range property.

    Rate this question:

  • 13. 

    Which of the following would you use to apply IPSec policies?

    • Domain Admin console.

    • IP Security Console

    • Replication monitor

    • Command prompt

    Correct Answer
    A. IP Security Console
    Explanation
    You can create a console for your own convenience through the Microsoft Management Console or use the regular IP Security Console through the MMC.

    Rate this question:

  • 14. 

    Which of the tools can be used to view the auditing results?

    • Event Viewer

    • Network Monitor

    • System Properties

    • Task Manager

    Correct Answer
    A. Event Viewer
    Explanation
    The Event Viewer tool helps you to review the auditing information of all servers on the network

    Rate this question:

  • 15. 

    Which of the following counters can be used to monitor the network activity on all types of servers?

    • A. Memory, Processor, Network, and Disk

    • B. Disk read/write

    • C. Processor% time

    • D. CPU utilization

    Correct Answer
    A. A. Memory, Processor, Network, and Disk
    Explanation
    Performance counters such as memory, processor, network, and disk use standard network service counters for monitoring the performance of network access servers.

    Rate this question:

  • 16. 

    Which of the following services accepts dial-in connection on a Microsoft network?

    • RAS

    • RPC

    • Server

    • None of the above

    Correct Answer
    A. RAS
    Explanation
    RAS (Remote Access Service) when configured is responsible for accepting dial-in connections on a Microsoft network

    Rate this question:

  • 17. 

    TTL is set for a zone that has been deleted and waiting to be purged. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    TTL is set for any Active Directory integrated zone

    Rate this question:

  • 18. 

    When a couple of subnets separate a DHCP server from the client, a hop count is significant factor for the client to reach the server. T/F?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A hop count is a significant factor when the DHCP server and the client are separated by subnets.

    Rate this question:

  • 19. 

    Which of the following provides and IP address--to--host name mapping?

    • Forward lookup

    • Reverse lookup zone

    • Stub zone

    • Secondary zone

    Correct Answer
    A. Reverse lookup zone
    Explanation
    As the name suggests the reverse lookup zone provides an Ip to name resolution

    Rate this question:

  • 20. 

    Why is it required to maintain the DHCP database as per schedule?

    • Because it is a dynamic environment

    • Because it is very inconsistent by default

    • Because it is very susceptible to virus

    • It can get corrupted very easily

    Correct Answer
    A. Because it is a dynamic environment
    Explanation
    Any database that is subject to dynamic changes should be maintained as per schedule to avoid database inconsistencies.

    Rate this question:

  • 21. 

    Which of the following is the correct duration for the first DHCP Renewal message to be sent by the client?

    • 50% of lease duration

    • 85% of lease duration

    • After lease expiry

    • Immediately after receiving the lease

    Correct Answer
    A. 50% of lease duration
    Explanation
    The first DHCP Renewal is raised by the client after 50% of the lease has expired.

    Rate this question:

  • 22. 

    When the DHCP is declining a clients� renewal request, it informs so with the help of DHCPACK. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    When the DHCP is declining a clients� renewal request, it informs so with the help of a negative acknowledgement.

    Rate this question:

  • 23. 

    Which of the statements is correct about certificates?

    • They help to authenticate as well encrypt data

    • They are an improvisation over Kerberos

    • They are restricted to LAN.

    • It can be deployed only to authenticate ADS objects.

    Correct Answer
    A. They help to authenticate as well encrypt data
    Explanation
    Certificates are meant to authenticate end users or computers in a communication session as well as encrypt the data is required.

    Rate this question:

  • 24. 

    SOA acts as a proxy for downward compatible clients of DNS. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    PTR records and acts as a proxy for downward compatible clients of DNS

    Rate this question:

  • 25. 

    Which of the following is a read-only copy of the original zone?

    • Primary zone

    • Secondary zone

    • Stub zone

    • Reverse lookup zone

    Correct Answer
    A. Secondary zone
    Explanation
    The secondary zone stores a read-only copy of an existing zone to help balance the load of the primary servers and provide backup.

    Rate this question:

  • 26. 

    DDNS is recommended for all networks today irrespective of their size. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Small networks still work efficiently with static or manual updates rather than dynamic environment.

    Rate this question:

  • 27. 

    Which of the following best describe DDNS?

    • It integrates DHCP information for update process

    • It relies only on the OS for update process

    • It is nothing but DNS with additional PERL scripts running for better efficiency

    • It is a process used in windows NT 4.0 and is obsolete now

    Correct Answer
    A. It integrates DHCP information for update process
    Explanation
    DHCP can dynamically update resource records in DNS during a client�s DHCP IP configuration process.

    Rate this question:

  • 28. 

    RADIUS is just an enhancement of the RAS server. T/F?

    • True

    • False.

    Correct Answer
    A. False.
    Explanation
    RADIUS is a very extensive service that is used to secure remote or dial-in connection with the local network.

    Rate this question:

  • 29. 

    _____ uses RADIUS technology and is popularly used on the Microsoft OS platform

    • Kerberos

    • IAS

    • MSN

    Correct Answer
    A. IAS
    Explanation
    Internet Authentication Service uses RADIUS technology and is very popularly usedon the Microsoft networks.

    Rate this question:

  • 30. 

    Which of the statements is correct about routing interface?

    • It is a physical interface (Ethernet or Serial) that interfaces Layer 2 of the LAN to the router.

    • It is an Ethernet interface only

    • It is a serial interface only.

    • None of the above.

    Correct Answer
    A. It is a physical interface (Ethernet or Serial) that interfaces Layer 2 of the LAN to the router.
    Explanation
    Routing interface can be a physical interface (Ethernet or Serial) that interfaces Layer 2 of the LAN to the router. It can also be a logical interface that can be administratively created during the process of configuration.

    Rate this question:

  • 31. 

    Which of the following can be used to classify clients on the network based on the hardware?

    • Vendor-class level

    • User-class level

    • Scope level

    • Reserved client level

    Correct Answer
    A. Vendor-class level
    Explanation
    The vendor-class option is used by a DHCP server to identify the vendor type and hardware configuration options of a client during the lease process.

    Rate this question:

  • 32. 

    Which of the following will help you purge the remote NetBIOS names cache?

    • Nbtstat �n command

    • Nbtstat �A command

    • Ipconfig/all command

    • Nbtstat �R command

    Correct Answer
    A. Nbtstat �R command
    Explanation
    Nbtstat -R command can be used to purge and reload the remote cache name table.

    Rate this question:

  • 33. 

    Which of the following will ensure only valid users on the network receive the IP lease from DHCP server on the network?

    • 1920 Catalyst switches

    • Use 802.1.X-enabled LAN switches for connecting to the network

    • SOHO switches

    • Access points

    Correct Answer
    A. Use 802.1.X-enabled LAN switches for connecting to the network
    Explanation
    Using 802.1.X-enabled LAN switches or wireless Access Points (WAP) for connecting to the network ensures that the client credentials are authenticated before the DHCP server assigns a lease to them.

    Rate this question:

  • 34. 

    Jetpack is used to backup the DHCP database. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Jetpack is a compacting tool and not a backup tool

    Rate this question:

  • 35. 

    Which of the statements is correct about secure dynamic update?

    • It is attempted only if the client can prove its identity and has proper credentials to make the update.

    • It is not available if the server is using the Active directory service.

    • It is available if Active Directory--integrated DNS zones are not configured.

    • It is the most secure method of manually updating resource records.

    Correct Answer
    A. It is attempted only if the client can prove its identity and has proper credentials to make the update.
    Explanation
    Secure dynamic update is the process by which a dynamic update happens under the security of the ADS

    Rate this question:

  • 36. 

    Which of the following is used for smart cards?

    • MSCHAP v2

    • EAP-TLS

    • PEAP

    • MD-5 Challenge

    Correct Answer
    A. EAP-TLS
    Explanation
    To implement smart cards you need to configure EAP-TLS

    Rate this question:

  • 37. 

    Which of the statements best describe a routing protocol?

    • It is a logical interface used by the router.

    • It is a set of common rules agreed by a group of routers and can understand network addresses

    • It is a physical layer protocol

    • It is a Datalink layer protocol

    Correct Answer
    A. It is a set of common rules agreed by a group of routers and can understand network addresses
    Explanation
    Routing protocol is a set of common rules agreed by a group of routers and can understand network addresses

    Rate this question:

  • 38. 

    Which of the following will a System Monitor help you to do?

    • Capture events in the wireless network

    • View the information logged by the Wireless configuration service

    • Generate alerts to administrator

    • Gather performance real time data of specific network components

    Correct Answer
    A. Gather performance real time data of specific network components
    Explanation
    System Monitor enables you to gather performance real time data of specific network components.

    Rate this question:

  • 39. 

    A DNS resource record that points to the parent level is known as a SOA record. T/F?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A DNS resource record that points to the parent level is known as a root hint.

    Rate this question:

  • 40. 

    IPSec can be implemented on IP and IPX networks. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    As the name suggests IPSec is meant for security of IP based networks only.

    Rate this question:

  • 41. 

    Which of the following property will assign a default gateway to a scope?

    • Network IP address range

    • Subnet mask

    • Exclusion range

    • Router

    Correct Answer
    A. Router
    Explanation
    Within the scope options you must choose the �router� property and assign the IP address of the local interface of the router for that network.

    Rate this question:

  • 42. 

    Which of the following is mandatory before the secondary server can pull its updates from the Primary DNS?

    • A notification message from any DNS zone

    • A notification message from the DC

    • A notification message from master DNS servers

    • A notify message sent from any secondary DNS server

    Correct Answer
    A. A notification message from master DNS servers
    Explanation
    A secondary server can pull its updates from the primary server only after it receives a notification from the Primary or the Master server stating that there are updates to be taken.

    Rate this question:

  • 43. 

    Which of the following will help with compatibility issues when applying IPSec policies on downward compatibility clients?

    • Restart the member server on which the policies reside

    • Apply the Compatws.inf security template on the server

    • Apply the Securews.inf security template on the server

    • Apply the Hisecdc.inf security template on a domain controller

    Correct Answer
    A. Apply the Compatws.inf security template on the server
    Explanation
    The Compatws.inf security template allows applications that are not Windows 2003 applications to run successfully on a Windows Server 2003 computer.

    Rate this question:

  • 44. 

    Which of the following is possible only on an ADS environment?

    • Allow only secure dynamic updates

    • Allow both non-secure and secure dynamic updates

    • Do not allow dynamic updates

    • Do not allow secure updates

    Correct Answer
    A. Allow only secure dynamic updates
    Explanation
    Secure updates are possible only if the zones is integrated with Active Directory.

    Rate this question:

  • 45. 

    Which of the following protocols s used for a dial-up connection on Microsoft networks?

    • SLIP

    • PPP

    • PPTP

    • L2TP

    Correct Answer
    A. PPP
    Explanation
    PPP (Point-To-Point) protocol is the dial-up protocol used in Microsoft networks.

    Rate this question:

  • 46. 

    The DHCP server first grants the lease period to the client and then send the acknowledgement. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The DHCP server sends the lease period to the client along with the acknowledgement.

    Rate this question:

  • 47. 

    PAP uses a two-way handshake. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    PAP uses clear text, CHAP uses two-way handshake

    Rate this question:

  • 48. 

    When troubleshooting communication problems while testing IPSec policies implementation, which of the following must be done to eliminate connectivity as a problem?

    • Test connectivity with just clear text password and no IPSec policy in place.

    • Re-apply all policies again.

    • Review the policies on the computers and ensure that they are compatible with each other.

    • Verify that the policies are assigned to both ends.

    Correct Answer
    A. Test connectivity with just clear text password and no IPSec policy in place.
    Explanation
    Best way to be sure that communication has not halted due to connectivity issues, is to check the connectivity without any policies in place and using clear text passwords.

    Rate this question:

  • 49. 

    It is mandatory for a DHCP relay agent to send broadcast messages to communicate with the DHCP server. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    DHCP relay agents can also be configured to communicate with the DHCP server in the Unicast mode.

    Rate this question:

Quiz Review Timeline (Updated): Aug 29, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 29, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 09, 2006
    Quiz Created by
    Vaibhav Agarwal
Back to Top Back to top
Advertisement