Windows Server 2003

42 Questions | Total Attempts: 443

SettingsSettingsSettings
Please wait...
Windows Server 2003 Quizzes & Trivia

Reckon you know about computers? In this quiz, we’ll be putting your knowledge of Windows 2003 Server 70-290, chapters one through four to the test. Test all your knowledge on remote desktop, active directories and much more in this one!


Questions and Answers
  • 1. 
     The person nominated in the Name field of the Managed By tab of the computer accounts properties must exist in Active Directory.
    • A. 

      True

    • B. 

      False

  • 2. 
    When you use Dsadd to create a computer account, the DN must be surrounded by quotation marks in order for the account to be created successfully
    • A. 

      True

    • B. 

      False

  • 3. 
    You can use the Ping utility to prove that the printer is connected to the network, powered on, and online.
    • A. 

      True

    • B. 

      False

  • 4. 
    When you install a printer that is connected directly to the Windows Server 2003 system, the installation process does not create a logical printer device for it.
    • A. 

      True

    • B. 

      False

  • 5. 
    What security principal is assigned as the owner of files and folders created by the operating system?
    • A. 

      The Administrator account

    • B. 

      The Administrators group

    • C. 

      The SYSVOL special identity

    • D. 

      The SYSTEM special identity

  • 6. 
    Which of the following commands creates a computer account for computer1.sales .contoso.com?
    • A. 

      Dsadd computer CN=computer1,CN=sales,DC=contoso,DC=com

    • B. 

      Dsadd comp CN=computer1,CN=sales,DC=contoso,DC=com

    • C. 

      Dsmod computer CN=computer1,CN=sales,DC=contoso,DC=com

    • D. 

      Dsrm computer CN=computer1,CN=sales,DC=contoso,DC=com

  • 7. 
    You are the network administrator for a telecommunications company in Mobile, Alabama. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. The company employs 134 people, and all of them have a Windows XP Professional system. One morning, you get a call from a user who has received the following error message: Windows cannot connect to the domain, either because the domain controller is down or otherwise unavailable, or because your computer account was not found. Please try again later. If this message continues to appear, contact your system administrator for assistance. The user logged on to the system without any problem the previous day, and you have received no other reports of users experiencing problems. You reset the computer account in Active Directory Users And Computers, but the user still cannot connect to log on to the domain. Which of the following do you try next?
    • A. 

      Disable and reenable the computer account.

    • B. 

      Disable and reenable the user account.

    • C. 

      Change the computer system’s membership to a workgroup, and then rejoin it to the domain.

    • D. 

      Delete the existing computer account, and re-create a new computer account with the same name.

  • 8. 
    You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?
    • A. 

      The NTFS permissions on the folders were reset to Read for the Everyone special identity during the restore process.

    • B. 

      The ACLs for the folders were re-created by the restore process and are now empty.

    • C. 

      The shares that the users used to connect to the server were removed.

    • D. 

      The shares that the users used to connect to the server were automatically set to deny access to the Everyone special identity, as a security precaution.

  • 9. 
    You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?
    • A. 

      On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.

    • B. 

      On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98.

    • C. 

      On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. Select the Automatic Update Of Clients option in the Sharing tab of the printer’s properties.

    • D. 

      Install the new Windows 98 drivers on the Windows 98 client systems. Install the Windows Server 2003 drivers on the server.

  • 10. 
    After you create a new printer and share it out, users can start printing to the device even if you have not made any permission assignments for the printer. How is this possible?
    • A. 

      The default permission assignment for a newly created printer is Everyone, Full Control.

    • B. 

      The default permission assignment for a newly created printer is Everyone, Print.

    • C. 

      The default permission assignment for a newly created printer is Domain Users, Print.

    • D. 

      The default permission assignment for a newly created printer is Domain Users, Full Control.

  • 11. 
    By default, members of which Active Directory groups can assign ownership of an NTFS file or folder to another user?
    • A. 

      Administrators, Backup Operators

    • B. 

      Administrators, Backup Operators, Server Operators

    • C. 

      Administrators, Server Operators

    • D. 

      Administrators, Backup Operators, Account Operators

  • 12. 
    Which of the following is considered a standard NTFS permission?
    • A. 

      List Folder Contents

    • B. 

      Read Extended Attributes

    • C. 

      Create Folders/Append Data

    • D. 

      List Folder/Read Data

  • 13. 
    Which of the following tasks can be performed with the Full Control share permission but not the Change share permission?
    • A. 

      Changing the name of the file

    • B. 

      Changing file permissions

    • C. 

      Changing the contents of the file

    • D. 

      Deleting the file

  • 14. 
    You want a user to take ownership of a file or folder that she did not create. Which of the following groups do you not add her to?
    • A. 

      Administrators group

    • B. 

      Backup Operators group

    • C. 

      Creator/Owner special identity

    • D. 

      Server Operators group

  • 15. 
    A user is assigned the Change share permission to the \\SERVER2\DATA share that represents the C:\Data folder on Server2. The user connects to the DATA share across the network and opens a file from the \\SERVER2\DATA\SALES folder. He then decides that he no longer needs that file, and he tries to delete it. However, he is unable to do so and receives an error. Which of the following is a possible explanation for this?
    • A. 

      NTFS permissions are restricting the user’s access to the folder.

    • B. 

      The user is a member of a group that is assigned the Read share permission to the DATA share.

    • C. 

      Share permissions on the SALES folder in the DATA share are preventing the user from deleting the file.

    • D. 

      The user is a member of a group that has been denied all permissions to the DATA share.

  • 16. 
    You are the network administrator for a small furniture manufacturing company in Portland, Oregon. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. Each server has three disk drives in it. One drive is dedicated to the system and boot partition, and the other two drives hold the company sales order-processing database. All of the drives use NTFS. One day, a user reports that she has been configuring a folder that she created, removing all of the users, including herself, from the ACL. Now she is unable to access the files in the folder. How do you restore her access to the files in the folder?
    • A. 

      Restore the folder and its files from a backup taken before the user made the changes.

    • B. 

      Have the user assign herself permission to the folder again.

    • C. 

      Retake ownership of the folder, and reassign permissions to the users as necessary.

    • D. 

      Assign the user to the Creator/Owner special identity so she can edit the ACL.

  • 17. 
    You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?
    • A. 

      The NTFS permissions on the folders were reset to Read for the Everyone special identity during the restore process.

    • B. 

      The ACLs for the folders were re-created by the restore process and are now empty.

    • C. 

      The shares that the users used to connect to the server were removed.

    • D. 

      The shares that the users used to connect to the server were automatically set to deny access to the Everyone special identity, as a security precaution.

  • 18. 
    You are the network administrator for a small company that develops integrated circuit chips for mobile communications manufacturers. The company network comprises a single Windows Server 2003 system that provides file and print services to the company’s 25 users. Three of the users are working on a top-secret project. They require a folder on the server that only they can access. Auditing is enabled on the server, but the manager wants to make sure that no one, including the Administrator, can access the files except the three engineers working on the project. The manager asks you to remove all entries from the ACL for the folder for users, groups, and special identities other than the three engineers. Will this prevent all others from seeing or opening the files in the folder?
    • A. 

      Yes.

    • B. 

      No. Someone else might be able to open or see the files, but you will have no way of knowing if this has occurred.

    • C. 

      No. Someone else might be able to open or see the files, but you will be able to tell if this has occurred.

    • D. 

      No. Members of the Administrators group will also be able to see or open the files.

  • 19. 
    You are the network administrator for a charity based in Dallas, Texas. You have a single Windows Server 2003 system, running Active Directory, that provides file and print server services to 50 users. The system was donated by a local business, and while it is powerful enough for your needs, storage capacity on the server is limited. Your manager has assured you that as soon as funds become available, you will be able to purchase an additional disk drive, but in the meantime he has asked you to use any available means to control the storage situation. As a result, you have implemented disk quotas so that one user cannot monopolize all the available disk space. After creating a new directory structure for a user and copying a number of large files from the user’s workstation to the server, you want to make sure the files are counted toward the user’s disk quota. Which approach are you most likely to use?
    • A. 

      Make the user a member of the Administrators group, which allows her to take ownership of the files. Once she has done that, remove her from the Administrators group.

    • B. 

      Make the user a member of the Creator/Owner special identity to allow her to take ownership of the files.

    • C. 

      Give the user the Modify NTFS permission so she can take ownership of the files.

    • D. 

      While logged on as a user account that is a member of the Server Operators group, assign ownership of the files to the user.

  • 20. 
    You have created a printer on a Windows Server 2003 system. During the creation process, you shared the printer out, but now you want to configure the printer so it is not listed in Active Directory. Which of the following is the correct way to do this?
    • A. 

      Select the printer icon in the Printers And Faxes window and, from the File menu, select Properties. In the General tab, clear the List In The Directory check box.

    • B. 

      Select the printer icon in the Printers And Faxes window. Right-click the icon, and deselect List In The Directory on the menu.

    • C. 

      Select the printer icon in the Printers And Faxes window and, from the File menu, select Sharing. Clear the List In The Directory check box.

    • D. 

      Locate the corresponding printer object in Active Directory Users And Computers, and delete or disable it.

  • 21. 
    You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?
    • A. 

      On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.

    • B. 

      On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98.

    • C. 

      On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. Select the Automatic Update Of Clients option in the Sharing tab of the printer’s properties.

    • D. 

      Install the new Windows 98 drivers on the Windows 98 client systems. Install the Windows Server 2003 drivers on the server.

  • 22. 
    You are the network administrator for a small computer distributor. The network comprises a single Windows Server 2003 system, which is configured as a domain controller, and 17 Windows XP Professional workstations. There is a single high-performance laser printer, which is directly connected to the network. The Windows Server 2003 system acts as a print server for the device, with a single logical printer. You are due to take a week’s vacation, and although you anticipate few problems, you want to give a user with some technical expertise the ability to pause and restart the printer if a printing problem arises. You also want to allow him to manage jobs in the print queue other than his own. To give him the necessary rights, you want to make a single group assignment for the user. If possible, though, you do not want to add him to a group that grants him more rights than he needs. Which of the following predefined Active Directory groups do you add him to?
    • A. 

      Print Operators

    • B. 

      Administrators

    • C. 

      Power Users

    • D. 

      Print Managers

  • 23. 
    Which of the following statements is true of global groups?
    • A. 

      Global groups can include only users from within their domain.

    • B. 

      Global groups can include users from any domain in the tree.

    • C. 

      Global groups can include users from any domain in the forest.

    • D. 

      Global groups can include users from any domain in Active Directory

  • 24. 
    You are the network administrator for a bank. The network comprises 3 Windows Server 2003 systems, 23 Windows 98 client systems, 3 Windows NT 4 systems, and 14 Windows XP Professional systems. You have one laser printer that is connected directly to the network. One of the servers is configured as a print server for the printer, and the Windows 98 and Windows XP Professional systems all have a logical printer configured that connects to the printer via the print server. The Windows NT 4 workstation systems print directly to the printer across the network. You have just purchased a new printer and are in the process of configuring it. The users on the Windows NT 4 workstation systems do not need to access it. The new printer will be attached directly to the print server by a parallel interface. What platforms do you install drivers for when you configure the printer?
    • A. 

      Windows Server 2003

    • B. 

      Windows Server 2003 and Windows 98

    • C. 

      Windows Server 2003, Windows XP Professional, and Windows 98

    • D. 

      Windows Server 2003 and Windows XP Professional

  • 25. 
    Before you create a domain controller, a DNS server must be available on the network.
    • A. 

      True

    • B. 

      False

  • 26. 
    Which of the following media has the largest data storage capacity?
    • A. 

      Zip cartridge

    • B. 

      CD

    • C. 

      DVD

    • D. 

      Jaz cartridge

  • 27. 
    You are reconfiguring a SQL Server database application on a member server. The reconfigurations seem to go smoothly, but after you have finished, a user calls you to report that they are having an issue accessing certain records in the database. In which of the following places are you most likely to look for events related to this problem?
    • A. 

      In the System log of Event Viewer

    • B. 

      In the Database log of Event Viewer

    • C. 

      In the Application log of Event Viewer

    • D. 

      In the Security log of Event Viewer

  • 28. 
    What does the Server: Bytes Total/Sec Performance console counter reflect?
    • A. 

      The amount of data that is being written to the page file every second

    • B. 

      The amount of data that is being processed by the server service each second

    • C. 

      The amount of data sent and received by the server over all of its network interfaces

    • D. 

      The amount of data being written to disk each second

  • 29. 
    You are troubleshooting a problem with a Windows Server 2003 system whereby users cannot connect to the server. The server itself appears to be running, but you notice that there is no link light on the port of the hub into which the server is connected. As a result, you suspect that the network card in the server may have failed. Where would you look to see events related to the network card?
    • A. 

      The Network log of Event Viewer

    • B. 

      The System log of Event Viewer

    • C. 

      The Application log of Event Viewer

    • D. 

      The Security log of Event Viewer

  • 30. 
    You are working on a Windows Server 2003 system that has just been installed by another administrator. The administrator completed the installation but did not make any configuration changes following the installation. While checking the maximum log sizes in Event Viewer, you notice that the maximum size of the Security log is 16 MB. What does this tell you about the system?
    • A. 

      That Auditing has been enabled

    • B. 

      That the system is running either the DNS or DHCP service

    • C. 

      That the system is a domain controller

    • D. 

      That the system is not a domain controller

  • 31. 
    You are the network administrator for a property development company in Salt Lake City, UT. You have a single Windows Server 2003 system that is a domain controller, a DHCP and DNS server, a file and print server, and the company e-mail server. The server also hosts a document management system. One Wednesday afternoon, without warning, the server crashes. You reboot the server and it comes up without a problem. You examine the system performance through System Monitor, but everything seems in order. Two weeks later, the server crashes again. As before, you reboot the server and it comes up without any errors. Immediately after the restart, you use System Monitor and observe the following counters and values. Server Work Queues: Queue Length = 2 Memory: Page Faults/Sec = 2 Memory: Pages/Sec = 7 Memory: Available Bytes = 452,332,145 PhysicalDisk: % Disk Time = 34 Network Interface: Output Queue Length = 1 Two days later, you monitor the same counter statistics and note the following: Server Work Queues: Queue Length = 1 Memory: Page Faults/Sec = 3 Memory: Pages/Sec = 11 Memory: Available Bytes = 124,342,841 PhysicalDisk: % Disk Time = 43 Network Interface: Output Queue Length = 0 Which of the following strategies are you likely to take with the server?  
    • A. 

      Move an application off of the server and on to another server.

    • B. 

      Examine memory usage for each application on the server.

    • C. 

      Upgrade the network card from a 10 Mbps card to a 100 Mbps card.

    • D. 

      Nothing. The counter statistics do not indicate any issues.

  • 32. 
    What utility do you use to mark specific Active Directory objects as authoritative?
    • A. 

      ADutil.exe

    • B. 

      Auth.exe

    • C. 

      DSAuth.exe

    • D. 

      Ntdsutil.exe

  • 33. 
    Which of the following backup types does not alter the archive bit on a newly created file?
    • A. 

      Full

    • B. 

      Incremental

    • C. 

      Symmetrical

    • D. 

      Differential

  • 34. 
    In an authoritative restore of Active Directory, the objects in the Active Directory database are restored with updated sequence numbers that prevent them from being overwritten during the next replication pass.
    • A. 

      True

    • B. 

      False

  • 35. 
    When you configure volume shadow copy, which of the following parameters cannot be configured?
    • A. 

      Which folders on the drive should be included in the volume shadow copy.

    • B. 

      The drives that should be included in the volume shadow copy.

    • C. 

      The maximum size of the storage area for shadowed files.

    • D. 

      The frequency with which shadow copies should be made.

  • 36. 
    A user calls you because he cannot log on to the system. After verifying his identity, you determine that he recently returned from vacation and is unsure of his password. You decide to reset the password. How do you do accomplish this?
    • A. 

      In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the existing password, and then enter a new password. Retype the new password in the Confirm Password box, and click OK.

    • B. 

      In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the new password, retype the new password in the Confirm Password box, and click OK.

    • C. 

      In the Active Directory Users And Computers MMC snap-in, select the user. On the Account properties page for the user, click Change Password and then enter a new password. Retype the password in the Confirm password box, and click OK.

    • D. 

      On the General properties page for the user, click Change Password and then enter a new password for the user. Retype the password in the Confirm password box, and click OK.

  • 37. 
    There is always less data included in an incremental backup than a full backup.
    • A. 

      True

    • B. 

      False

  • 38. 
    You have recently been employed as the network administrator for a commercial real estate company. The company is relatively small and has a highly mobile workforce. The company has two Windows Server 2003 systems and one Windows 2000 system. Active Directory is configured at a Windows 2000 mixed domain functional level. Many of the sales representatives spend a great deal of time on the road and use the dial-in features of Windows Server 2003. The others are based primarily in the office and rarely work remotely. Late one evening, a user who normally works from the office pages you to report that he can’t gain access to the system over his dial-up link. He is calling from a hotel, where he is staying while at a conference. He explains that he connected the previous night from home without any problems, but this is the first time he has tried to connect from anywhere other than his home. Since you started working with the company, you have not made any changes to the user’s account properties. Based on the information he has provided, which of the following could be the problem?
    • A. 

      The user has Verify Caller ID enabled, and his home phone number is defined for that property.

    • B. 

      The static routes for the user have been configured to only allow the user to connect from his home phone number.

    • C. 

      The Always Callback To property on the user’s Dial-In page has been configured with the user’s home phone number.

    • D. 

      The phone number that the user is calling from is not listed on the Telephones properties page.

  • 39. 
    You are the network administrator for a healthcare provider in Denver, Colorado. The network comprises three Windows Server 2003 systems. You have recently installed a new database application that requires a service account to be created. This service account needs to impersonate a client to access computer resources on behalf of other user accounts. Which of the following approaches do you take to
    • A. 

      Create a new user account. Then, in the General properties tab for that user account, select the Account Is Trusted For Delegation check box.

    • B. 

      Create a new user account. Then, in the Account properties tab for that user, select the Account Is Trusted For Delegation check box.

    • C. 

      Create a new user account. Then, in the Advanced properties tab for that user, select the Account Is Trusted For Delegation check box.

    • D. 

      Use an existing user account. In the Account properties tab for that user, select the Account Is Trusted for Delegation check box.

  • 40. 
    On a domain controller, members of the Power Users group can create user and group accounts and modify the users and groups they have created.
    • A. 

      True

    • B. 

      False

  • 41. 
    Where do you change the scope?
    • A. 

      In the Scopes properties tab of the group in Active Directory and Computers

    • B. 

      In the General properties tab of the group in Active Directory and Computers

    • C. 

      In the Members properties tab of the group in Active Directory and Computers

    • D. 

      In the Type properties tab of the group in Active Directory and Computers

  • 42. 
    On a Windows Server 2003 system, where do you go to join the computer to a domain?
    • A. 

      Control Panel, System, Computer Name

    • B. 

      Control Panel, System, Network Identification

    • C. 

      Control Panel, System, Advanced

    • D. 

      Control Panel, System, General