MCSE 70-293 Exam Quiz Test 3

23 Questions

Settings
MCSE Quizzes & Trivia

Hello FriendThis practice test helps you prepare for Microsoft certification exam 70-293, which counts toward MCSE certification. This practice test contains 23 questions, provided by Saurabh Singh.


Related Topics
Questions and Answers
  • 1. 
    Which of the following procedures would enable you to request the certificate you need?
    • A. 

      Log on to the workstation as Administrator and try requesting the certificate again.

    • B. 

      Use the Web Enrollment Support pages for your CA instead of the Certificates snap-in.

    • C. 

      Call the network help desk and have someone give you the permissions you need to request the certificate.

    • D. 

      Activate the Secure Server (Require Security) policy in your workstation’s Local Security Settings console.

  • 2. 
    Which of the following packet filtering criteria enable you to prevent a denial-ofservice attack using ICMP messages?
    • A. 

      Port numbers

    • B. 

      Hardware addresses

    • C. 

      Protocol identifiers

    • D. 

      IP addresses

  • 3. 
    Which of the following ESP header fields provides the protocol’s anti-replay capability?
    • A. 

      Sequence Number

    • B. 

      Security Parameters Index

    • C. 

      Pad Length

    • D. 

      Next Header

  • 4. 
    Which of the following IPSec characteristics is different when a connection is operating in tunnel mode instead of transport mode? (Choose all that apply.)
    • A. 

      The order of the fields in the ESP header

    • B. 

      The location of the ESP header in the datagram

    • C. 

      The location of the ESP trailer in the datagram

    • D. 

      The value of the Next Header field in the ESP header

  • 5. 
    • A. 

      Client (Respond Only).

    • B. 

      Secure Server (Require Security).

    • C. 

      Server (Request Security).

    • D. 

      You must create a new custom policy.

  • 6. 
    Which of the following pieces of information must you supply when creating a policy that configures IPSec to use tunnel mode?
    • A. 

      The IP address of the router’s WAN interface

    • B. 

      The port number associated with the WAN technology used for the tunnel

    • C. 

      The IP address of the router at the far end of the tunnel

    • D. 

      The network layer protocol used for the WAN connection

  • 7. 
    Which IPSec component is responsible for actually encrypting the information in IP datagrams?
    • A. 

      Internet Key Exchange

    • B. 

      IPSEC Services

    • C. 

      IPSec driver

    • D. 

      The IP Security Policies snap-in

  • 8. 
    Which of the following Windows Server 2003 tools enables you to tell which Group Policy Object assigned the effective IPSec policy to a particular computer?
    • A. 

      Resultant Set of Policy

    • B. 

      IP Security Monitor

    • C. 

      Network Monitor

    • D. 

      IP Security Policies

  • 9. 
    You have just finished making changes to the IPSec policy assigned to a particular Active Directory Group Policy Object, but the changes have not yet taken effect on the network’s computers. Which of the following procedures will enable the computers to receive the new policy settings?
    • A. 

      In the IP Security Policies snap-in, remove the assignment of the IPSec policy, and then assign it again.

    • B. 

      Restart each network computer.

    • C. 

      Use the Resultant Set of Policy snap-in to refresh the policy assignment.

    • D. 

      Delete the computer objects from Active Directory and recreate them.

  • 10. 
    Which of the following IPSec policies should you assign to the organizational unit object containing the R&D users’ workstations?
    • A. 

      The default Secure Server (Require Security) policy

    • B. 

      The default Client (Respond Only) policy

    • C. 

      A policy that secures all TCP traffic, using both the AH and ESP protocols

    • D. 

      A policy that secures all traffic to the port number of the database application, using the AH protocol

  • 11. 
    Which of the following procedures should you use to secure the WAN traffic between the users in the company headquarters and the R&D database servers?  Choose all that apply.)
    • A. 

      Configure the routers at both ends of the WAN connection to use IPSec in tunnel mode

    • B. 

      Configure the database servers with the Secure Server (Require Security) policy

    • C. 

      Configure the workstations of the users at the headquarters with the Client (Respond Only) policy

    • D. 

      Configure the database servers and the workstations at the headquarters to use IPSec in tunnel mode

  • 12. 
    Which of the following tools can tell you when a computer is missing an important security update? (Choose all that apply.)
    • A. 

      Security Configuration and Analysis

    • B. 

      Hfnetchk.exe

    • C. 

      Microsoft Software Update Services

    • D. 

      Microsoft Baseline Security Analyzer

  • 13. 
    You have just implemented a Microsoft Software Update Services server on your network, and you want workstations running Windows 2000 and Windows XP operating systems to automatically download all the software updates from the SUS server and install them. Which of the following procedures can you use to configure all the workstations at once?
    • A. 

      Configure the SUS server to push the updates to specified computers.

    • B. 

      Use group policies to configure Automatic Updates on the workstations.

    • C. 

      Use Microsoft Baseline Security Analyzer to configure Automatic Updates on the workstations.

    • D. 

      Create a login script for the workstations that downloads the update files and installs them.

  • 14. 
    Which of the following are valid reasons for using Microsoft Software Update Services instead of Windows Update to update your network workstations? (Choose all that apply.)
    • A. 

      To automate the update deployment process

    • B. 

      To conserve Internet bandwidth

    • C. 

      To enable administrators to test updates before deploying them

    • D. 

      To determine which updates must be deployed on each workstation

  • 15. 
    Which of the following authentication mechanisms enables clients to connect to a wireless network using smart cards?
    • A. 

      Open System authentication

    • B. 

      Shared Key authentication

    • C. 

      IEEE 802.1X authentication using EAP-TLS

    • D. 

      IEEE 802.1X authentication using PEAP-MS-CHAP v2

  • 16. 
    You are installing an IEEE 802.11b wireless network in a private home using computers running Windows XP, and you decide that data encryption is not necessary, but you want to use Shared Key authentication. However, when you try to configure the network interface adapter on the clients to use Shared Key authentication, the option is not available. Which of the following explanations could be the cause of the problem?
    • A. 

      WEP is not enabled.

    • B. 

      Windows XP SP1 is not installed on the computers.

    • C. 

      Windows XP does not support Shared Key authentication.

    • D. 

      A PKI is required for Shared Key authentications.

  • 17. 
    Which of the following terms describe a wireless network that consists of two laptop computers with wireless network interface adapters communicating directly with each other? (Choose all that apply.)
    • A. 

      Basic service set

    • B. 

      Infrastructure network

    • C. 

      Ad hoc network

    • D. 

      Access point

  • 18. 
    Your company is installing a computer running Windows Server 2003 in a utility closet that is only accessible to building maintenance personnel. Therefore, you will have to depend on Remote Desktop for maintenance access to the server. You do not have Administrator privileges to the server and your workstation is running Windows 2000 Professional. Which of the following tasks must you perform before you can connect to the server from your workstation using Remote Desktop? (Choose all that apply.)
    • A. 

      Install the Remote Desktop Connection client on the workstation.

    • B. 

      Activate Remote Desktop on the server using the System Control Panel.

    • C. 

      Enable the Solicited Remote Assistance group policy for the domain.

    • D. 

      Add your account name to the Remote Desktop users list.

  • 19. 
    You have just created a Remote Access invitation that you intended to send to a person at the network help desk, but you sent it to someone else instead. Which of the following measures would prevent the unintended recipient from connecting to your computer?
    • A. 

      Display the Remote Assistance Settings dialog box and reduce the duration of the invitations created by your computer.

    • B. 

      Press Esc.

    • C. 

      Refuse the incoming connection when it arrives.

    • D. 

      Change your user account password.

  • 20. 
    Which of the following operating systems includes the Remote Desktop Connection client program? (Choose all that apply.)
    • A. 

      Windows 2000 Server

    • B. 

      Windows XP

    • C. 

      Windows Server 2003

    • D. 

      Windows 98

  • 21. 
    Which of the following tasks would wireless users not be able to do if you decided to use Shared Key authentication?
    • A. 

      Use WEP encryption for all wireless transmissions

    • B. 

      Roam from one access point to another

    • C. 

      Access resources on other wireless computers

    • D. 

      Participate in an infrastructure network

  • 22. 
    Which of the following tasks would you need to perform to use IEEE 802.1X and WEP to secure the WLAN? (Choose all that apply.)
    • A. 

      Install IAS on a computer running Windows Server 2003.

    • B. 

      Deploy a public key infrastructure on the network by installing Certificate Services.

    • C. 

      Install smart card readers in all the laptop computers.

    • D. 

      Install SP1 on all the laptops running Windows XP.

  • 23. 
    If you elect to use Open System authentication with WEP encryption, to which of the following vulnerabilities would the WLAN be subject?
    • A. 

      Unauthorized users connecting to the network

    • B. 

      Passwords from unencrypted WLAN authentication messages

    • C. 

      Interception of transmitted data by someone using a wireless protocol analyzer

    • D. 

      Inability of wireless computers to access resources on the cabled network