Full
January 9, 2017 | Author: Hoang Cao | Category: N/A
Short Description
Download Full...
Description
1/ Which of the following organizations is a large working committee of operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet? a. Internet Engineering Task Force (IETF) b. Internet Research Task Force (IRTF) c. Internet Architecture Board (IAB) d. Internet Corporation for assigned Names and Numbers (ICANN)
2/ Which of the following protocols functions at the Internet Layer of the TCP/IP Architecture? a. TCP b. FTP c. ICMP d. SMTP
3/ Which of the following RFC Standards is achieved after the detailed assessment of at least two successful independent and interoperable implementation of a specification? a. Proposed Standard b. Draft Standard c. Historic Standard d. Internet standard
4/ What is the minimum length of an Ethernet data field? a. 1500 Bytes b. 512 Bytes c. 24 Bytes d. 46 Bytes
5/ Which of the following protocols lie above the Internet Protocol in the TCP/IP architecture? a. ICMP and IGMP b. ICMP and ARP
c. IGMP and RARP d. Network Access Layer
6/ What is the minimum length of IP header? a. 40 Bytes b. 60 Bytes c. 46 Bytes d. 20 Bytes
7/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service b. Fragment Offset c. Options d. Flags
9/ An IPv6 address consists of ___________ bytes. a. 12 Bytes b. 16 Bytes c. 24 Bytes d. 32 Bytes
10/ To enable reverse lookups over the Internet, a special domain called the __________ domain has been built into the DNS structure over the Internet. a. in.addr.arpa b. in-addr.arpa c. arpa-in.addr d. arpa.in.addr
11/ Which of the following domain specify the country/region or the type of organization? a. Root-level domain b. Second-level domain c. Sub domain d. Top-level domain
12/ Which of the following DNS server is registered in the top-level domains? a. Primary server b. Root server c. Secondary server d. Forwarding server
13/ Which of the following RFC defines BOOTP? a. RFC 980 b. RFC 826 c. RFC 951 d. RFC 802
14/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address. The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a DHCP address to the node? a. He has to create a new scope for the node b. A RFC 1542 compliant router to be added in the network c. Provide a new DHCP server in the network d. A bridge to be added in the network
15/ Amazon.com is a company using a DNS system. The company has configured a server for resolving the IP address. The company wants to have a server that can work as a primary server in case of failure of the existing server. The server should also handle the fault tolerance and load balancing. Which of the following server is capable of doing that? a. Primary Server
b. Secondary Server c. Caching Server d. Forwarding Server
17/ Jim is configuring a router table. He wants to implement the default routing method. In the default routing method the routing table:
A. Contains one entry, 255.255.255.255 B. Contains one entry, 127.0.0.1 C. Contains one entry, 0.0.0.0 D. Contains one entry, 255.255.255.0
18/ You are analysing TCP data packets through a network analyzer. Which of the following information can you read from a IP header? A. The total lifetime of a datagram. B. The hardware address of the source node. C. The IP address of the destination node. D. The final destination protocol to which the data packet or datagram should be delivered a. A, B and D b. A, C and D c. B, C, and D d. A, B, C and D
Which of the following network component will meet the preceding requirements? a. Repeaters b. Hubs c. Switch d. Bridge
21/ You are a network administrator in an insurance company. The company is having 2 Windows 2000 Server, 20 Windows 2000 Professional nodes and 15 Novell Netware nodes. You want to increase the speed of the network traffic within the same physical network and also want to have minimum overhead when a data packet is travelling on the same physical network. Which of the following protocols you need to implement in the network?
A. TCP/IP B. IPX/SPX C. SNA D. NetBEUI E. DLC F. Apple talk a. A, B and D b. A, D and F c. A, B and F d. A, C and F
22/ Which of the following field in the ARP packet format helps to define the type of network on which ARP is running? a. PTYPE field b. HLEN field c. HTYPE field d. PLEN field
23/ Statement A: Internet Standard is achieved when a draft standard for which successful demonstration of its execution and significant operational and functional experience has been obtained. Statement B: A standard or specification is called an historic standard or specification when it has been outdated by a more recent specification.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true.
c. Both, Statement A and Statement B are true. d. Both, Statement A and Statement B are false.
24/ Statement A: IP generates control messages related to any error in connection or flow control over the network. Statement B: IP is responsible for addressing and forming the data packets to be transferred over the network.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and Statement B are true. d. Both, Statement A and Statement B are false.
25/ Node X request’s Node Y to set up a connection. Node X sends a SYN segment to node Y. Node Y sends an acknowledgement to Node X to start the data communication. Node Y sends the second segment; a combination of SYN and ACK segment to Node X. Node X sends a confirmation to Node Y. Which of the following flag will be set active by node X? a. SYN b. PSH c. RST d. ACK
26/ Statement A: CSMA/CA is the access method used in Ethernet and wireless Ethernet networks. Statement B: CSMA/CD is a slower access method than CSMA/CA.
Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false b. Statement A is false, and statement B is true c. Both, Statement A and Statement B are false. d. Both, Statement A and Statement B are true.
28/ Statement A: A domain is a logical group of computers over a large network. Statement B: Resolver is a computer that maintains the database of host names and their corresponding IP addresses for name resolution.
Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false b. Statement A is false, and statement B is true c. Both, Statement A and Statement B are false. d. Both, Statement A and Statement B are true.
29/ Assertion: BOOTP was evolved because of limitations of RARP. Reason: RARP does not provide IP address. a. Both, the assertion and reason are true, and the reason IS a correct explanation of the assertion. b. Both, the assertion and reason are true, and the reason IS NOT a correct explanation of the assertion. c. The assertion is true and the reason is false. d. The assertion is false and hence the reason does not apply.
30/ You observe that each time you run the program, escape.exe, the computer slows down significantly. You decide to set the priority of the program to low. Which of the following options will enable you to perform this task? a. Task Manager b. System Monitor c. Performance Console d. Service Manager
31/ When James runs the application, uinstall.exe, he observes that the computer slows down and the application hangs. James is unable to close the application by using the Close button. Which of the following options should James use to exit the application? a. System Monitor b. Performance Logs and Alerts c. Task Manager
d. Performance Console
33/ Consider the following statements: Statement A: By default, IIS is not installed with Windows Server 2003. Statement B: By default, support for Active Server Pages is enabled in IIS.
Which of the following is correct about the above statements? a. Both, Statement A and Statement B are False. b. Both, Statement A and Statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
35/ You are installing Windows Server 2003 using a Windows 98 bootable floppy and an error message indicating “Not enough space to create swap files” is displayed. Which of the following options is a possible solution for this problem? a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want to install Windows Server 2003. b. Press F3 key to exit setup and from the command line and disable the Cache Shadow option in the BIOS. c. Disable the Shadow Copies option in the BIOS. d. Disable the Caching Shadow option in the BIOS.
36/ You are installing Windows Server 2003 on a computer with the following configuration:
Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk
During installation, setup displays the error message, “Dumping Physical Memory”.
Which of the following options can be a possible solution to this problem?
a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want to install Windows Server 2003. b. Disable the Cache Shadow option in the BIOS. c. Replace the RAM. d. Replace the hard disk.
37/ You are installing Windows Server 2003 on a computer with the following configuration:
Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk
During installation, setup displays the error message, ERROR_INVALID_PARAMETER.
What does this error message indicate? a. The Windows Installer service has failed to start. b. The hard disk does not have the disk space required to install Windows Server 2003. c. One of the parameters entered is incorrect. d. The data entered is of incorrect type.
38/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, Statement A and Statement B are False. b. Both, Statement A and Statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
39/ The domain controller needs to have a(n) __________ address. a. IP b. Dynamic IP c. Static IP d. Route IP
40/ Windows Server 2003 ______ bit version runs on Pentium-based systems. a. 8 bit b. 16 bit c. 32 bit d. 64 bit
41/ Which of the following servers assigns the Static IP address to the domain controller in an organization’s forest?
a. DHCP Server b. DNS Server c. FTP Server d. ADC Server
42/ Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of Windows Server 2003 computer from the client computer? a. Admin$ b. Print$ c. C$ d. D$
43/ Which option will enable you to change the password of a user account? a. Right click the user name and select the Reset Password option. b. Open the user account properties dialog box to change the password. c. Double-click the user name to change the password. d. Create a new user account with the same user name and password.
44/ A user account that has similar properties already configured is called ___________. a. Domain user account b. Local user account template c. Local account template d. User account template
45/ Identify the correct method to create local user accounts? a. Select the Start ( Programs ( Administrative Tools ( Microsoft Management Console menu command. b. Select the Start ( Programs ( Administrative Tools ( Computer Management menu command. c. Select the Start ( Programs ( Administrative Tools menu command. d. Select the Start ( Programs ( Administrative Tools ( Active Directory Users and Computers menu command.
46/ Which container lists the default users and group accounts created by Windows Server 2003? a. Users and Computers b. Builtin and Computers c. Builtin and Users d. Users and Domain Controllers
48/ Which command-line tool enables you to create domain computer accounts in Active Directory? a. DSGET b. DSADD c. NETSH
d. DSRM
49/ Which group has the right to create computer accounts in an organizational unit? a. Enterprise Admins on a server b. Server Operators on a domain controller c. Server Operators on a server d. Account Operators on a domain controller
50/ Which of the following groups are primarily used for backward compatibility with the Windows NT 4.0 operating system? a. Global groups b. Distribution groups c. Local groups d. Security groups
51/ Which of the following group is used to assign rights and permissions to members who perform similar operations and access similar resources in any domain in the forest? a. Universal group b. Domain local group c. Security group d. Distribution group
52/ Which of the following options are used with the DSMOD and DSADD commands to create user-specific profile folders? a. $Username$ b. CN=Username c. %Username% d. #Username#
54/ You are the system administrator in an organization. A user accidentally deletes the shortcuts on his desktop and asks you to create the shortcuts again. What should you do to ensure that the shortcuts do not get deleted from his desktop again?
a. Make his user profile mandatory. b. Ask the user to login again. c. Make the default user profile mandatory. d. Make all user profiles mandatory. 57/ In Blue Sky Computers, several employees login remotely. Chris, the system administrator wants to know the applications that are started when a Terminal Services user logs on. Which of the following tabs in the user account properties dialog box will enable him to accomplish this task? a. Environment b. Sessions c. Remote Control d. Terminal Services Profile 61/ Which GPO is linked to the domain and affects all the users and computers included in the domain as well as the domain controller? a. Default Domain Controllers policy b. Default Domain policy c. Default GPO based policy d. Default Domain GPO based policy
62/ Which of the following parameters of the Gpupdate command enables you to specify any one of the user or computer Group Policy that needs to be refreshed? a. /Target b. /Boot c. /Logoff d. /Force
63/ You are a system administrator in Blue Sky IT Systems. As a security measure, you want to ensure that users do not add new programs and applications from the network. Which Group Policy should you configure so that you can prevent users from installing new programs over the network? a. Configure the “Hide programs from your network” option. b. Configure the “Hide applications from your network” option.
c. Configure the “Hide programs/applications from your network” option. d. Configure the “Hide programs from your network” page.
64/ As a system administrator, you have delegated the task of configuring Group Policies to the junior system administrator, James. While trying to configure Group Policies for the organizational unit, Finance, and two users of the organizational unit, Marketing, James finds that he is not able to open Group Policy Object Editor. What could be the possible cause for this problem? a. Group Policy Object Editor is not installed on the domain controller. b. James does not have the Modify permission for the GPO. c. James does not have the Full Control permission for the GPO. d. James does not have the Read and Write permissions for the GPO. 66/ Which component of the Administrative Template node includes User Profiles, Scripts, Logon, Ctrl+Alt+Del Options, Group Policy, and Power Management? a. Network b. System c. Windows Components d. Computer
67/ Consider the following statements: Statement A: Windows Server 2003 provides Group Policy modeling that enables you to simulate GPO deployment before deploying it. Statement B: Group Policy modeling enables you to generate a simulation report related to the group membership of the object on which the GPO is being deployed. Statement C: Group Policy modeling enables you to block the inheritance option for specific GPOs. Which of the following is correct about the above statements? a. Statements A, B, and C are True. b. Only Statement A is True. c. Only Statement B is True. d. Statements A, B, and C are False.
68/ You are the system administrator of a Windows Server 2003 network. You have placed the domain controllers in the Domain Controllers organizational unit. You suspect that some unauthorized users are trying to access the network. You need to determine which computer is being used for this purpose. What would you do to identify the computer? a. Configure a local security policy for each domain controller to audit the success and failure of account logon events. b. Configure a domain policy to audit the success and failure of logon events. c. Configure a local security policy for each domain controller to audit the success and failure of directory service access. d. Configure a domain policy to audit the success and failure of account logon events.
69/ You are the system administrator of Blue Sky IT Systems. The organization’s domain structure has separate organizational units for each department. For example, Finance organizational unit for the Finance department and Sales organizational unit for the Sales department. The organizational units contain group and computer accounts for the employees of the domain. You have received complaints that some of the computer accounts have been deleted and some of the group accounts have been modified by unauthorized users. As a system administrator, you want to track and locate the users who are deleting the computer accounts and modifying the group accounts. Which of the following audit policies do you need to configure for this? a. Audit policies related to system events b. Audit policies related to object access c. Audit policies related to Active Directory object access d. Audit policies related to user, group, and computer accounts
70/ As a system administrator, you have asked the technical consultant of your organization to create customized security templates according to the domain structure of the organization. As a precautionary measure, you have also created customized security templates for the organization. The technical consultant creates the security templates and sends it to you. You now need to compare the security templates provided by your technical consultant with the security templates that you have created. Which of the following options will enable you to perform this task? a. The Security Templates snap-in b. The Security Configuration and Analysis snap-in c. The Security Manager snap-in d. The Group Policy Management snap-in
71/ You have recently joined Blue Moon Computers Inc. as a system administrator. You review the current security settings of the organization and find them suitable and according to the requirements of the organization. However, you notice that the default permissions for the root directory of most of the computers in the organization have been changed. You want to restore the default security settings and permissions of the root directory of the computers. Which security template will enable you to perform this task?
a. Rootsec.inf template b. Rootdir.inf template c. Rootdir Security.inf template d. Root Security.inf template 73/ You need to configure a software controlled fault tolerant system by using two hard disks. What level of RAID should you use for this purpose? a. RAID 0 b. RAID 1 c. RAID 5 d. RAID 6
74/ Consider the following statements: Statement A: ASR creates a recovery disk that recovers the system and its data. Statement B: ASR creates a backup of system state data, which includes, disk signatures, volumes, and partitions that are required to start a system Statement C: ASR restores a simplified version of the Windows Server 2003 operating system.
Which of the following options is correct about the above statements? a. Only Statement A is True. b. Only Statement B is True. c. Statements A, B, and C are True. d. Statements A, B, and C are False.
75/ You are the system administrator in CellGo Corp. All the servers in the organization are running on Windows Server 2003 having one Active Directory Service, CellGo.com. You want to have a comprehensive backup plan to ensure that the system can be restored in case of system failure. You want to backup the system state, system services, and all disks associated with the operating system components. Which recovery type should you use for this purpose? a. Shadow copies b. RAID 1 c. Automated system recovery
d. Synchronization tool
76/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance. Which of the following is correct about the above statements? a. Both, Statement A and Statement B are False. b. Both, Statement A and Statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
77/ You are the system administrator of Blue Sky IT Systems. The employees of the Sales department back up their important data on a Windows Server 2003 computer having the following configuration:
Pentium 1V 2.26 GHz 128 MB RAM 40 GB hard disk
While installing an application on the Windows Server 2003 computer, the message “you are running out of disk space on this computer” is displayed. You notice that some employees have stored unnecessary files on the computer. Which of the following actions do you need to perform to solve this problem? a. Perform disk cleanup. b. Enable disk quota for the employees of the Sales department. c. Defragment the hard disk. d. Implement shadow copies.
78/ As a system administrator, you need to perform regular backups. To save time and back up data in an economical manner, you decide to take full backup on Mondays and back up only those files that have not been marked as archived on other week
days. In addition, you do not want to set the archive bit of the files that have been backed up. Which type of backup are you performing? a. Normal b. Differential c. Daily d. Incremental
79/ You are the system administrator of an organization that has 200 employees. You have asked all users to back up their files everyday at 5.30 PM before leaving, but you find that most users do not back up their files. What should you do to enable the users to back up their daily files automatically? a. Schedule a backup job to be performed when the user logs off the computer. b. Schedule a daily backup at 5.30 PM. c. Use Task Manager to backup at 5.30 PM. d. Configure the Computer Management console to take the backup at 5:30 PM.
80/ Consider the following statements: Statement A: A basic disk can have a maximum of four primary partitions. Statement B: An extended partition can be subdivided into a maximum of 24 sub-sections.
Which of the following is correct about the above statements? a. Both, Statement A and Statement B are False. b. Both, Statement A and Statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
81/ You need to install Windows Server 2003 on a computer that contains two 36 GB hard disks. You format the first disk as FAT 32 and the second disk as NTFS. To conserve disk space, you compress the folders on an NTFS disk. However, when other users move files and folders from the NTFS disk to the FAT 32 disk, the files loses the compression attribute. What can be done to ensure that the files remain compressed? a. Format the first disk as NTFS.
b. Upgrade both disks to dynamic disks. c. Convert the first disk to a dynamic disk. d. Upgrade the first disk to NTFS.
1/ Which of the following organizations is a large working committee of operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet? a. Internet Engineering Task Force (IETF). b. Internet Research Task Force (IRTF). c. Internet Architecture Board (IAB). d. Internet Corporation for assigned Names and Numbers (ICANN).
2/ Which of the following protocols functions at the Internet Layer of the TCP/IP Architecture? a. TCP. b. FTP. c. ICMP. d. SMTP.
3/ What is the minimum length of an Ethernet data field? a. 1500 bytes. b. 512 bytes. c. 24 bytes. d. 46 bytes.
4/ Which of the following protocols lie above the Internet Protocol in the TCP/IP architecture? a. ICMP and IGMP. b. ICMP and ARP. c. IGMP and RARP. d. Network Access Layer.
5/ For which of the following field the length varies in the IP header? a. Flag. b. Options. c. Fragment Offset. d. Protocol.
6/ An IPv6 address consists of ___________ bytes. a. 12 bytes. b. 16 bytes. c. 24 bytes. d. 32 bytes.
7/ To enable reverse lookups over the Internet, a special domain called the __________ domain has been built into the DNS structure over the Internet. a. in.addr.arpa b. in-addr.arpa c. arpa-in.addr d. arpa.in.addr
8/ Which of the following domain specify the country/region or the type of organization? a. Root-level domain. b. Second-level domain. c. Sub domain. d. Top-level domain.
9/ Which of the following DNS server is registered in the top-level domains? a. Primary server.
b. Root server. c. Secondary server. d. Forwarding server.
10/ Which of the following RFC defines BOOTP? a. RFC 980. b. RFC 826. c. RFC 951. d. RFC 802.
11/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address. The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a DHCP address to the node? a. He has to create a new scope for the node. b. A RFC 1542 compliant router to be added in the network. c. Provide a new DHCP server in the network. d. A bridge to be added in the network.
12/ You are analysing TCP data packets through a network analyzer. Which of the following information can you read from a IP header? A. The total lifetime of a datagram B. The hardware address of the source node C. The IP address of the destination node D. The final destination protocol to which the data packet or datagram should be delivered a. A, B and D. b. A, C and D. c. B, C, and D. d. A, B, C and D.
13/ In an organization, there are 400 nodes spread across eight subnets with two DHCP servers. You are the network administrator of the organization. You want each node to receive an IP address automatically but one of the DHCP servers is down. What should you do? a. Create four DHCP scopes on each DHCP server. b. Create eight DHCP scopes on each DHCP server. c. Create two global DHCP scopes on each DHCP server. d. Create one global DHCP scope on each DHCP server.
14/ Your company wants to setup a LAN environment. You are assigned to design the new network. You want to implement a device, which:
A. Joins multiple computers or other network devices together to form a single network segment B. Amplify and regenerate the signal from one node to another in a network C. Provides a common connection point for computers, printers, and other network devices in a star topology network Which of the following network component will meet the preceding requirements? a. Repeaters. b. Hubs. c. Switch. d. Bridge.
15/ You are a network administrator in an insurance company. The company is having 2 Windows 2000 Server, 20 Windows 2000 Professional nodes and 15 Novell Netware nodes. You want to increase the speed of the network traffic within the same physical network and also want to have minimum overhead when a data packet is travelling on the same physical network. Which of the following protocols you need to implement in the network? A. TCP/IP. B. IPX/SPX. C. SNA. D. NetBEUI. E. DLC. F. Apple talk.
a. A, B and D. b. A, D and F. c. A, B and F. d. A, C and F.
16/ Which of the following field in the ARP packet format helps to define the type of network on which ARP is running? a. PTYPE field. b. HLEN field. c. HTYPE field. d. PLEN field.
17/ Node X request’s Node Y to set up a connection. Node X sends a SYN segment to node Y. Node Y sends an acknowledgement to Node X to start the data communication. Node Y sends the second segment; a combination of SYN and ACK segment to Node X. Node X sends a confirmation to Node Y. Which of the following flag will be set active by node X? a. SYN. b. PSH. c. RST. d. ACK.
18/ Statement A: CSMA/CA is the access method used in Ethernet and wireless Ethernet networks. Statement B: CSMA/CD is a slower access method than CSMA/CA. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, Statement A and statement B are false. d. Both, Statement A and statement B are true.
19/ Statement A: FCS contains an 8-byte CRC value used for error checking.
Statement B: The sending node creates the CRC value in Network Access layer. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, Statement A and statement B are false. d. Both, Statement A and statement B are true.
20/ Statement A: A domain is a logical group of computers over a large network. Statement B: Resolver is a computer that maintains the database of host names and their corresponding IP addresses for name resolution. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, Statement A and statement B are false. d. Both, Statement A and statement B are true.
21/ Assertion: BOOTP was evolved because of limitations of RARP. Reason: RARP does not provide IP address. a. Both, the assertion and reason are true, and the reason IS a correct explanation of the assertion. b. Both, the assertion and reason are true, and the reason IS NOT a correct explanation of the assertion. c. The assertion is true and the reason is false. d. The assertion is false and hence the reason does not apply.
22/ You observe that each time you run the program, escape.exe, the computer slows down significantly. You decide to set the priority of the program to low. Which of the following options will enable you to perform this task? a. Task Manager. b. System Monitor. c. Performance Console. d. Service Manager.
23/ When James runs the application, uinstall.exe, he observes that the computer slows down and the application hangs. James is unable to close the application by using the Close button. Which of the following options should James use to exit the application? a. System Monitor. b. Performance Logs and Alerts. c. Task Manager. d. Performance Console.
24/ Consider the following statements: Statement A: Integrated Windows Authentication method provides high-level security because the credentials of a user are confirmed through a cryptographic exchange between the Web server and the Web browser of the user. Statement B: Integrated Windows Authentication method is recommended on the intranet of an organization. Which of the following is correct about the above statements? a. Both, Statement A and statement B are False. b. Both, Statement A and statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
25/ You are installing Windows Server 2003 using a Windows 98 bootable floppy and an error message indicating “Not enough space to create swap files” is displayed. Which of the following options is a possible solution for this problem? a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want to install Windows Server 2003. b. Press F3 key to exit setup and from the command line and disable the Cache Shadow option in the BIOS. c. Disable the Shadow Copies option in the BIOS. d. Disable the Caching Shadow option in the BIOS.
26/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM
4.5 GB Hard Disk During installation, setup displays the error message, “Dumping Physical Memory”. Which of the following options can be a possible solution to this problem? a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want to install Windows Server 2003. b. Disable the Cache Shadow option in the BIOS. c. Replace the RAM. d. Replace the hard disk.
27/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_INVALID_PARAMETER. What does this error message indicate? a. The Windows Installer service has failed to start. b. The hard disk does not have the disk space required to install Windows Server 2003. c. One of the parameters entered is incorrect. d. The data entered is of incorrect type.
28/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? a. Both, Statement A and statement B are False. b. Both, Statement A and statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
29/ The domain controller needs to have a(n) __________ address. a. IP. b. Dynamic IP. c. Static IP. d. Route IP.
30/ Windows Server 2003 ______ bit version runs on Pentium-based systems. a. 8 bit. b. 16 bit. c. 32 bit. d. 64 bit.
31/ Which of the following servers assigns the Static IP address to the domain controller in an organization’s forest? a. DHCP Server. b. DNS Server. c. FTP Server. d. ADC Server.
33/ Which option will enable you to change the password of a user account? a. Right click the user name and select the Reset Password option. b. Open the user account properties dialog box to change the password. c. Double-click the user name to change the password. d. Create a new user account with the same user name and password.
34/ Which file system supports partitions only up to 2 TB in size? a. FAT. b. FAT 32.
c. NTFS. d. FAT 16.
35/ Which command-line tool enables you to create domain computer accounts in Active Directory? a. DSGET. b. DSADD. c. NETSH. d. DSRM.
36/ Which group has the right to create computer accounts in an organizational unit? a. Enterprise Admins on a server. b. Server Operators on a domain controller. c. Server Operators on a server. d. Account Operators on a domain controller.
37/ Which of the following groups are primarily used for backward compatibility with the Windows NT 4.0 operating system? a. Global groups. b. Distribution groups. c. Local groups. d. Security groups.
38/ Which of the following group is used to assign rights and permissions to members who perform similar operations and access similar resources in any domain in the forest? a. Universal group. b. Domain local group. c. Security group. d. Distribution group.
39/ Which of the following options are used with the DSMOD and DSADD commands to create user-specific profile folders? a. $Username$ b. CN=Username c. %Username% d. #Username#
40/ Which command-line tool enables you to identify user and group accounts that have not been used for the past 3 months? a. DSMOD. b. DSQUERY. c. DSADD. d. DSGET.
41/ You are the system administrator in an organization. A user accidentally deletes the shortcuts on his desktop and asks you to create the shortcuts again. What should you do to ensure that the shortcuts do not get deleted from his desktop again? a. Make his user profile mandatory. b. Ask the user to login again. c. Make the default user profile mandatory. d. Make all user profiles mandatory.
42/ You are the system administrator of CellGo. You want to hide one of the file server drives from the domain end users. How will you achieve it with minimum administrative cost? a. Disable the view option from the registry of each machine. b. Open Active Directory and remove the Share from the snap-in. c. Share the drive with a name ending with $. d. Share the drive with the name Admin$.
43/ You are the system administrator of your organization. You want to create a customized console containing the following administrative tools: Active Directory Users and Computers
Computer Management Event Viewer Which of the following options will enable you to perform this task with the least administrative effort? a. Create consoles for each tool on the desktop. b. Create a console containing the required tools using the DSMOD command-line utility. c. Create a console containing the required tools using MMC. d. Create a console containing the required tools using the Active Directory Users and Computers tool.
44/ Consider the following two statements: Statement A: DFS is a service that centralizes the file system resources that are physically spread over the network. Statement B: DFS Microsoft Management Console enables configuration of replication services and topologies.
Which of the following is correct about the above statements? a. Both, Statement A and statement B are False. b. Both, Statement A and statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
45/ As a system administrator, you need to restrict access of the members of the Finance organizational unit to the Internet. Which is the best possible method for performing this task? a. Disable Internet Explorer for each user of the Finance organizational unit. b. Apply a security policy for each user of the Finance organizational unit. c. Apply a group policy setting that restricts access of each user of the Finance organizational unit to the Internet. d. Configure a GPO that restricts access to the Internet and apply this GPO on the Finance organizational unit.
46/ Which GPO is linked to the domain and affects all the users and computers included in the domain as well as the domain controller? a. Default Domain Controllers policy. b. Default Domain policy.
c. Default GPO based policy. d. Default Domain GPO based policy.
47/ Which of the following parameters of the Gpupdate command enables you to specify any one of the user or computer Group Policy that needs to be refreshed? a. /Target b. /Boot c. /Logoff d. /Force
48/ You are a system administrator in Blue Sky IT Systems. As a security measure, you want to ensure that users do not add new programs and applications from the network. Which Group Policy should you configure so that you can prevent users from installing new programs over the network? a. Configure the “Hide programs from your network” option. b. Configure the “Hide applications from your network” option. c. Configure the “Hide programs/applications from your network” option. d. Configure the “Hide programs from your network” page.
49/ As a system administrator, you have delegated the task of configuring Group Policies to the junior system administrator, James. While trying to configure Group Policies for the organizational unit, Finance, and two users of the organizational unit, Marketing, James finds that he is not able to open Group Policy Object Editor. What could be the possible cause for this problem? a. Group Policy Object Editor is not installed on the domain controller. b. James does not have the Modify permission for the GPO. c. James does not have the Full Control permission for the GPO. d. James does not have the Read and Write permissions for the GPO.
50/ Which of the following administrative control design implies that the administration of Group Policy is delegated only to toplevel organizational unit administrators of an organization’s domain? a. Centralized administrative control design. b. Decentralized administrative control design.
c. Task-based administrative control design. d. Multi-level administrative control design.
51/ You are the system administrator of a Windows Server 2003 network. You have placed the domain controllers in the Domain Controllers organizational unit. You suspect that some unauthorized users are trying to access the network. You need to determine which computer is being used for this purpose. What would you do to identify the computer? a. Configure a local security policy for each domain controller to audit the success and failure of account logon events. b. Configure a domain policy to audit the success and failure of logon events. c. Configure a local security policy for each domain controller to audit the success and failure of directory service access. d. Configure a domain policy to audit the success and failure of account logon events.
52/ You are the system administrator of Blue Sky IT Systems. The organization’s domain structure has separate organizational units for each department. For example, Finance organizational unit for the Finance department and Sales organizational unit for the Sales department. The organizational units contain group and computer accounts for the employees of the domain. You have received complaints that some of the computer accounts have been deleted and some of the group accounts have been modified by unauthorized users. As a system administrator, you want to track and locate the users who are deleting the computer accounts and modifying the group accounts. Which of the following audit policies do you need to configure for this? a. Audit policies related to system events. b. Audit policies related to object access. c. Audit policies related to Active Directory object access. d. Audit policies related to user, group, and computer accounts.
53/ As a system administrator, you have asked the technical consultant of your organization to create customized security templates according to the domain structure of the organization. As a precautionary measure, you have also created customized security templates for the organization. The technical consultant creates the security templates and sends it to you. You now need to compare the security templates provided by your technical consultant with the security templates that you have created. Which of the following options will enable you to perform this task? a. The Security Templates snap-in. b. The Security Configuration and Analysis snap-in. c. The Security Manager snap-in. d. The Group Policy Management snap-in.
54/ You have recently joined Blue Moon Computers Inc. as a system administrator. You review the current security settings of the organization and find them suitable and according to the requirements of the organization. However, you notice that the default permissions for the root directory of most of the computers in the organization have been changed. You want to restore the default security settings and permissions of the root directory of the computers. Which security template will enable you to perform this task? a. Rootsec.inf template. b. Rootdir.inf template. c. Rootdir Security.inf template. d. Root Security.inf template.
55/ As a system administrator, you want to apply enhanced security settings on the computers of the Sales department of your organization in addition to the security settings already applied. You want that the new security settings should define security settings for auditing of events. However, you do not want that the new security settings should interfere with the applications running on the computers of the Sales department. Which of the following security templates will enable you to perform these tasks? a. Rootsec.inf b. DC Secure.inf c. Secure*.inf d. hisec.inf
56/ You are the system administrator of Blue Sky IT Systems. The employees of the Sales department back up their important data on a Windows Server 2003 computer having the following configuration: Pentium 1V 2.26 GHz 128 MB RAM 40 GB hard disk While installing an application on the Windows Server 2003 computer, the message “you are running out of disk space on this computer” is displayed. You notice that some employees have stored unnecessary files on the computer. Which of the following actions do you need to perform to solve this problem? a. Perform disk cleanup. b. Enable disk quota for the employees of the Sales department. c. Defragment the hard disk. d. Implement shadow copies.
57/ As a system administrator, you need to perform regular backups. To save time and back up data in an economical manner, you decide to take full backup on Mondays and back up only those files that have not been marked as archived on other week days. In addition, you do not want to set the archive bit of the files that have been backed up. Which type of backup are you performing? a. Normal. b. Differential. c. Daily. d. Incremental.
58/ You are the system administrator of an organization that has 200 employees. You have asked all users to back up their files everyday at 5.30 PM before leaving, but you find that most users do not back up their files. What should you do to enable the users to back up their daily files automatically? a. Schedule a backup job to be performed when the user logs off the computer. b. Schedule a daily backup at 5.30 PM. c. Use Task Manager to backup at 5.30 PM. d. Configure the Computer Management console to take the backup at 5:30 PM.
59/ Consider the following statements: Statement A: A basic disk can have a maximum of four primary partitions. Statement B: An extended partition can be subdivided into a maximum of 24 sub-sections. Which of the following is correct about the above statements? a. Both, Statement A and statement B are False. b. Both, Statement A and statement B are True. c. Statement A is True and Statement B is False. d. Statement A is False and Statement B is True.
1/ Which of the following MAN components provide connectivity between MANs and LANs, between networks with different topologies, or between networks using different network standards? a. Bridges. b. Routers.
c. Switches. d. Repeaters.
2/ Statement A: With TCP, applications exchange messages over the network with a minimum of protocol overhead. Statement B: TCP enables hosts to maintain multiple simultaneous connections.
Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true.
3/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given figure, find out the length of the data packet?
a. 53 b. 92 c. 58 d. 1090
4/ Sky Lark Inc. is an IT-based company. It has provided laptops with Windows 2000 Professional to their employees. The employee transfers are very frequent in this company so the laptops move from one subnet to another subnet. You want to automatically assign the TCP/IP configuration to the laptop connected. Which service should you use? a. BOOTP b. DNS c. DHCP d. DHCP relay agent
5/ You want to enable Windows ME, Linux and Macintosh computers to use Internet Explorer to access your Web servers by using a host name. Which of the following service should you use? a. DHCP b. Hosts c. BOOTP d. DNS
6/ Statement A: IP generates control messages related to any error in connection or flow control over the network. Statement B: IP is responsible for addressing and forming the data packets to be transferred over the network. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
7/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service. b. Fragment Offset. c. Options. d. Flags.
8/ Statement A: Infrared transmissions can provide line of sight communications over short distances. Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial links. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true.
9/ You are analyzing IP data packets from node A to node B using a Network Analyzer. From the given figure, identify the error control value?
a. 0x86ee b. 0x01 c. 0x00 d. 0x5332
10/ Gregg is a network administrator in a large finance organization, which is having a Windows 2003 Server. For the last 2-3 weeks he found that the network traffic is getting very heavy to the Window 2003 Server. He wants to track all the traffic to the Windows 2003 Server. What action should he perform? A. He should use network analyzer on any node of the network. B. He should use network analyzer on the Windows 2003 Server of the network. C. He should enable the Promiscuous Mode in the network analyzer. D. He should disable the Promiscuous Mode in the network analyzer.
a. A and C. b. B and D. c. B and C. d. A and D.
11/ A local area network is handling large number of client computers. The network administrator was previously using the BOOPTP protocol for handling the client computers. The administrator is having a problem in manually allocating and configuring the IP addresses over the network. The protocol is also not able to detect the unused IP addresses over the network for their future allocation to another client. Which of the following protocol does the administrator implement to overcome that problem? a. DHCP protocol. b. BOOTP protocol. c. Internet protocol. d. Stop-and-wait protocol.
12/ From the given figure, specify the type of delivery of data packets between Node X to Router 1 and between Router 1 and Router 2.
a. Both will use direct delivery. b. It will be direct delivery between Node X to Router 1 and indirect delivery between Router 1 and Router 2. c. It will be indirect delivery between Node X to Router 1 and direct delivery between Router 1 and Router 2,
d. Both will use indirect delivery.
13/ Your company wants to setup a LAN environment. You are assigned to design the new network. You want to implement a device, which: 1. Joins multiple computers or other network devices together to form a single network segment. 2. Amplify and regenerate the signal from one node to another in a network. 3. Provides a common connection point for computers, printers, and other network devices in a star topology network.
Which of the following network component will meet the preceding requirements? a. Repeaters. b. Hubs. c. Switch. d. Bridge.
14/ In which of the following state, the DHCP client enters, after sending the DHCPDISCOVER message? a. Initializing state. b. Requesting state. c. Selecting state. d. Bound state.
15/ Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the servers are configured as static routers. The network is divided into various subnets depending on departments. He wants to identify the path that a data packet takes as it passes through the routers. Which of the following utility will he use? a. Ipconfig.exe b. Tracert.exe d. Ping.exe c. Route.exe
16/ Which of the following is a reliable protocol of the Transport layer?
a. IP b. TCP d. ICMP c. UDP
17/ You are analyzing UDP data packets from node A to node B using a network analyzer. From the given figure, find out the destination port number?
c. 17 a. 1090 b. 58 d. 53
18/ Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header, provides integrity and confidentiality to IPv6 datagrams.
Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating Security Header, provides authentication and integrity to IPv6 datagrams.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
19/ Alder tries to connect a ftp server from a node having Windows 2000 Professional by issuing the command ftp sales.books.com but it fails. But he is able to connect the server by using the Windows Explorer program. What is the likely problem? a. No DNS server configured on Alder’s workstation. b. No DNS client configured on Alder’s workstation. c. No default gateway defined on the server. d. No DNS server defined on the server.
20/ In which of the following modes, two nodes can send as well as receive data but not at the same time? a. Simplex mode. b. Half-duplex mode. c. Full-duplex mode. d. Promiscuous mode.
21/ Which of the following layer comes below Network Layer in the bottom-up approach of OSI Reference Model? a. Transport Layer. b. Session Layer. c. Presentation Layer. d. Data Link Layer.
22/ Which of the following is the correct definition for Ethernet Access Method? a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream, by checking for matches between the data transmitted and the data received. b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and which to block. c. Ethernet Access Method is a set of rules that defines how a computer transmits data on the network cable and retrieves data from the cable. d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large, heterogeneous networks.
23/ Your company decided to open small branch offices in various cities of US. Each branch office will have 10-12 nodes, 1 fax machine and 1 printer. You were asked to design the network of each branch office. You decided to have peer-to-peer network in the branch offices. You were asked to analyze the advantages of the peer-to-peer network. Which of the following are the advantages of peer-to-peer network?
A. Strong central security B. Easy setup C. Ability of users to control resources sharing D. No network administrator required E. Optimized dedicated servers a. A, B and D. b. B, D and E. c. A, B and E. d. B, C and D.
24/ A datagram received from one network may be too large to be transmitted in a single packet on a different network. Which of the following TCP/IP protocol helps the router to divide the datagram into smaller pieces? a. ICMP b. IP c. IGMP d. TCP
25/ Which of the following is an 8-bit value field that defines the type of BOOTP packet? a. Operation Code. b. Hop count. c. Hardware Type. d. Options.
26/ Tom tries to connect a ftp server from a node having Windows 2000 Professional by issuing the command ftp sales.books.com. He received the following error message “Bad IP Address”. He then successfully pings the server. What is the likely problem? a. No DNS client configured on Tom’s workstation. b. No DNS server configured on Tom’s workstation. c. No default gateway defined on the server. d. No DNS server defined on the server.
28/ Statement A: Name server is a computer that maintains the database of host names and their corresponding IP addresses for name resolution. Statement B: The function of the resolvers is to pass name request between applications and name servers.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
29/ You can connect through Windows Explorer to all nodes on the local network, but cannot connect to any nodes on the remote subnet. Which IP address should you ping first to diagnose the problem? a. Ping b. Ping c. Ping
d. Ping
30/ You cannot connect to a Windows 2000 Server from a node running on Windows 2000 Professional using Windows Explorer. Both the server and the node are in the same physical network. By using a network analyzer, you found that each time the node attempts to connect to the server, it broadcasts an ARP request for the default gateway. What is the most likely cause of the problem?
A. Invalid default gateway address on the Windows 2000 Professional node B. Invalid subnet mask on the Windows 2000 Professional node C. Invalid default gateway address on the Windows 2000 Server D. Invalid subnet mask on the Windows 2000 Server
31/ It is developed to implement file transfer, printer sharing, and mail service among Apple systems. Macintosh machines have them installed by default. Identify the protocol. a. DLC. b. SNA. c. AppleTalk. d. IPX/SPX.
32/ Statement A: Transport Layer is responsible for process-to-process communication. Statement B: The Transport layer can delivery a data packet either reliably or unreliably.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
33/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new subnet, he checked
the IP address of the node. He found that the node failed to get the proper IP address. The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a DHCP address to the node? a. He has to create a new scope for the node. b. A RFC 1542 compliant router to be added in the network. c. Provide a new DHCP server in the network. d. A bridge to be added in the network.
34/ Which of the following WAN components converts the digital signals from the computer to analog signals? a. Routers. b. Brouters. c. CSU/DSU. d. Modem.
35/ Which of the following record helps the DNS in providing information about the host such as, operating system used? a. HINFO. b. Start of authority (SOA). c. Address (A). d. Canonical Name (CNAME).
37/ Statement A: IPv6 data packets are exchanged and processed on each host by using IPv6 at the Network Access layer. Statement B: In IPv6, the Internet layer creates IPv6 packets including the source and destination address information that is used to route the data through the network.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
38/ You are analyzing TCP data packets from node A to node B using a Network Analyzer. From the given figure, find out the size of the header?
a. 28 Bytes b. 8 Bytes c. 60 Bytes d. 40 Bytes
41/ Which of the following layer of the OSI Reference model is responsible for routing, switching, and controlling the flow of data between nodes? a. Transport Layer. b. Network Layer. c. Presentation Layer. d. Physical Layer.
42/ Tom is designing a network for his office. He is not able to decide on the type of transmission medium. His office is in an area that is prone to high levels of EMI or for long distance data transmissions, where electrical signals are significantly distorted and degraded. He wants minimum distortion of signals in the transmission medium. a. He can select fibre-optic cables. b. He can select twisted-pair cables. c. He can select both fibre-optic cables or twisted-pair cables. d. He can select both coaxial cables or twisted-pair cables.
43/ Which of the following DHCP message consists of the IP address and additional configuration information, such as lease duration and subnet mask? a. Discover message. b. Offer message. c. Request message. d. Bootreply message.
45/ You are a network administrator in a finance organization. You want to configure your Windows 2003 Server on the Internet and download files. Which of the following service you should use in the Windows 2003 Server? a. Telnet. b. SMTP. c. SNMP. d. FTP.
46/ Which of the following protocols function at the Transport Layer? a. ICMP and IGMP. b. TCP and UDP. c. TCP and FTP. d. Network Access Layer.
48/ Tim George is a network administrator in an organization. The organization has three subnets. One subnet has only laptop
Windows 2000 Professional nodes. The other two subnets have Windows 2000 nodes. Tim has installed a DHCP server to support all the clients. Tim wants to set the IP lease period for the laptops to 7 days and for the other two subnets to 20 days. How should Tim implement this? a. Create one DHCP scope for all subnets. For each node, create an exclusion range with a unique lease period. b. Create one DHCP scope for all subnets. For each node other than laptops, create a reservation with a 30-day lease period. c. Create one DHCP scope for each subnet. Specify the lease period as part of the scope’s configuration. d. Create one DHCP scope for each subnet. Create a global option that specifies a lease period that is based on the operating system the client computer is running.
49/ Which of the following RFCs define the protocols of the Network Access Layer? a. RFC 926 and RFC 951 b. RFC 826 and RFC 894 c. RFC 826 and RFC 951 d. RFC 894 and RFC 926
1/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
2/ Which audit policy is intended for the domain controllers that authenticate users as they log on to other computers? a. Audit object access b. Audit logon events c. Audit Account logon events d. Audit Account management
3/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
4/ When James tries to open a newly installed application, his computer hangs. He tries to restart his computer but fails to do so. Which of the following options will enable James to restart the computer? a. Boot the computer using the Safe Mode with Networking option. b. Boot the computer using the Last Known Good Configuration. c. Boot the computer using the Safe Mode option. d. Boot the computer using the Windows Startup Disk.
5/ As a system administrator, you have created a GPO that is applied to the organization’s domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users.
6/ Consider the following statements: Statement A: Audit policies enable you to track the success of certain events and failure of all the events. Statement B: Audit policies only track the activities performed by a user.
Statement C: You can use the audit policies to track the location where the activity occurred. Which of the following is correct about the above statements? a. Only Statement A is true. b. Only Statement B is true. c. Statements A, B, and C are true. d. Only Statement C is true.
7/ You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all client computers updated with patches and critical system updates from Microsoft. You plan to install software update service on a server, which will download all the required software updates and distribute the updates to the clients. Identify the server on which you should install the software update service. a. Server with DNS installed. b. Server with RRAS installed. c. Server with IIS installed. d. Server with DHCP installed.
8/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the client’s computer.
9/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You don’t have appropriate rights for the folder. d. Shadow copies are configured on the folder.
10/ Which of the following is a logical boundary of an organization’s network? a. Domain b. Tree c. Forest d. Organizational unit
11/ You are a system administrator of an organization that consists of 1000 users who use Windows Server 2003 and Windows 2000 computers. To secure the organization’s network, you and the junior administrators have planned and implemented several GPOs on the domain and organizational units. In addition, you have implemented Group Policies on individual users also. As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and Group Policies. While conducting this review you need to view the configured GPOs in a report format, which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which the GPO is applied. Identify the tool that will enable you to view GPOs in the report format. a. Group Policy Modeling b. Group Policy HTML Report c. Group Policy Reporting d. Group Policy HTML Reporting
12/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition.
13/ Consider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.
Which of the following options is correct about the above statements? a. Statement A is true and Statement B is false. b. Both, statement A and statement B are true. c. Both, statement A and statement B are false. d. Statement A is false and Statement B is true.
14/ Identify the hardware device required for printing a document. a. Print device b. Print driver c. Print server d. Print job
16/ Consider the following statements:
Statement A: The backup utility of Windows Server 2003 enables you to backup files and folders, schedule a backup, and restore data on the Windows Server 2003 computer. Statement B: ASR is a feature of the backup utility that enables you to recover a Windows Server 2003 computer that does not boot. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
17/ Which container lists the default users and group accounts created by Windows Server 2003? a. Users and Computers b. Builtin and Computers c. Builtin and Users d. Users and Domain Controllers
18/ Which of the following actions should you take if folder redirection is successful but the files and sub-folders are not available? a. Check if the redirected folder exists. b. Check if Remote Desktop for Administration is enabled. c. Check your permissions on the redirected folder. d. Check for the extensions of the files contained in the redirected folder.
19/ You are the system administrator for CellGo. The network of CellGo consists of a single Active Directory domain named CellGo.com. All network servers run Windows Server 2003. Some of the client computers run Windows XP Professional and some work on Windows NT Workstation. You install terminal server on three member servers named Cell1, Cell2, and Cell3. You place all three terminal servers in an organizational unit named Terminal Server. You link a GPO to the Terminal Server OU. Five days later, end users notify that the performance of Cell2 is very slow. You discover that Cell2 has 70 disconnected Terminal Server sessions. You need to configure all the three terminal servers to end the disconnected session after 15 minutes of inactivity. You must achieve this goal by using the minimum amount of administrative effort. What should you do? a. Log on to the console of each terminal server. In the RDP-Tcp connection properties dialog box, set the “End a disconnected session” option to 15 minutes. b. Edit the GPO to set the time limit for disconnected sessions to 15 minutes. c. On Cell2, run the tsdiscon command to disconnect all 70 users from Cell2. d. In Active Directory Users and Computers, set the “End a disconnected session” option for all domain user accounts to 15 minutes.
20/ Jenny is the system administrator of a domain named Aztec.com. In this domain, the accounting group and the marketing group share the same printer. Jenny receives a complaint from the marketing group that their small print jobs take a lot of time to print. Jenny finds that the accounting group gives large print jobs to the printer, which causes the delay. She learns that the accounting jobs are not needed on the same day on which the request has been sent to the printer. What should Jenny do to improve the situation? a. Create a separate printer; configure the printer to print directly to the printer port and then direct the accounting group to print through this printer. b. Create a separate printer; configure the printer to start printing immediately, and then direct the marketing group to print through this printer. c. Create a separate printer; configure the printer to be available only after certain hours, and then direct the accounting group to print large documents through this printer. d. Create a separate printer; configure the printer to be available only after certain hours, and then direct the marketing group to print documents through this printer.
21/ Which of the following options enables you to install the device drivers that are not digitally signed? a. Warn. b. Install. c. Ignore. d. Update.
22/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
24/ Consider the following statements: Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003. Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003. Which of the following is correct about the above statements? d. Statement A is false and Statement B is true. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. a. Both, statement A and statement B are false.
25/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales
department to the administration department. You plan to move Harry’s computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? c. Disable the computer account, PC02, in the sales organizational unit. a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. d. Create a new computer account, PC02, in the administration organizational unit.
26/ Catherine is a user in your domain. Her username is Cath13 and she has a roaming profile stored in the domain controller. At what location will her desktop be stored? a. \\domain controller\ documents and settings\Cath13\desktop b. C:\documents and settings\Cath13\desktop c. C:\winnt\Profiles\Catherine\desktop d. C:\Profiles\desktop\Catherine
27/ You are the system administrator of your organization. You need to take backup of the data stored in the Sales_Data folder on the first Monday of every month. Which of the following options enables you to accomplish this task with least administrative effort? a. Take incremental backup of Sales_Data folder on the first Monday of every month. b. Schedule backup job of Sales_Data folder for the first Monday of every month. c. Take normal backup of Sales_Data folder on the first Monday of every month. d. Take differential backup of Sales_Data folder on the first Monday of every month.
28/ Which of the following protocols uses Transmission Control Protocol to ensure that data transfer is complete and accurate? a. FTP. b. HTTP. c. NNTP. d. SMTP.
29/ Consider the following statements: Statement A: Security policies cannot be implemented using GPOs.
Statement B: Audit policies can be implemented using GPOs. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false.
30/ Identify the NTFS folder permission that enables users to only view the names of files and subfolders contained within a folder? a. List folder contents. b. Full Control. c. Modify. d. Read and Execute.
31/ Identify the group that has the rights and permissions to create and delete shared resources, stop and start services, and backup and restore files. b. Administrators. d. Server Operators. c. Print Operators. a. Backup Operators.
32/ You are the system administrator of Red Star Corp. John requests you to install a printer on his computer. To install the printer for John, you required the printer driver files. Identify the folder that you need to access to get the files. a. Print$ folder. b. Admin$ folder. c. Printer$ folder. d. Prn$ folder.
33/ You are working as a system administrator in an organization, which has its head office in Chicago. The organization has two branch offices, one in New York and the other in Texas. All the three offices have an interconnected WAN network. As a
system administrator, you have been assigned the task of viewing the Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for each computer using the computer name, you decide to use the IP address of each computer with the Gpresult command. Which parameter of the Gpresult command will help you define the name or IP address of the remote computers? a. /u Domain/User b. /p Password c. /user TargerUserName d. /s Computer
34/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk During installation, setup displays an error message, ERROR_CREATE_FAILED.
What does this error message indicate? a. The Windows Installer service has failed to start. b. The hard disk does not have the disk space required to install Windows Server 2003. c. One of the parameters entered is invalid. d. The data entered is of incorrect type.
35/ Consider the following statements: Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services (DNS) namespace. Statement B: Trees are implemented in the domain structure of an organization when the organization requires multiple domains. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
2/ You want to generate RsoP queries for the users in your organization to view the Group Policy settings applied to them. Which of the following tools will enable you to perform this task? a. Gpupdate.exe b. Gpresult.exe c. Group Policy Management Console. d. Group Policy Object Editor.
3/ As a system administrator, you have created a GPO that is applied to the organization’s domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users.
4/ Consider the following statements:
Statement A: You need at least 100 MB free space on a volume for creating shadow copies. Statement B: You cannot edit shadow copies because they are read-only. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
5/ You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you want to save disk space and back up only those files that have been created or modified. Which of the following options will enable you to accomplish this task? a. Schedule incremental backup of the Accounts folder on the first Monday of every month. b. Schedule normal backup of the Accounts folder on the first Monday of every month.
c. Schedule copy backup of the Accounts folder on the first Monday of every month. d. Schedule daily backup of the Accounts folder on the first Monday of every month.
6/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP. b. SSL. c. NNTP. d. FTP.
7/ Which policy enables you to specify password restrictions, account lockout policies, and Kerberos policies? a. Local Policies. b. Event Log Policies. c. Password Policies. d. Account Policies.
8/ Identify the correct method to create local user accounts? a. Select the Start > Programs > Administrative Tools > Microsoft Management Console menu command. b. Select the Start > Programs > Administrative Tools > Computer Management menu command. c. Select the Start > Programs > Administrative Tools menu command. d. Select the Start > Programs > Administrative Tools > Active Directory Users and Computers menu command.
9/ Which of the following options enables you to prevent the installation of any unsigned device driver? c. Prevent. a. Warn. d. Block. b. Stop.
10/ You are working as a system administrator in an organization, which has its head office in Chicago. The organization has two branch offices, one in New York and the other in Texas. All the three offices have an interconnected WAN network. As a system administrator, you have been assigned the task of viewing the Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for each computer using the computer name, you decide to use the IP address of each computer with the Gpresult command. Which parameter of the Gpresult command will help you define the name or IP address of the remote computers? a. /u Domain/User b. /p Password c. /user TargerUserName d. /s Computer
11/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false.
12/ Consider the following statements: Statement A: A spanned volume offers fault tolerance. Statement B: A striped volume increases the speed at which data is read and written, but it does not offer fault tolerance. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
13/ As a system administrator, you need to secure the organization’s domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To implement this, which security policy do you need to configure? a. Configure the “Enforce old password history” policy. b. Configure the “Enforce password history” policy. c. Configure the “Enforce password history list” policy. d. Configure the Enforce old password history list” policy.
14/ The network of your organization consists of 300 end users who use the Windows application server. This application server is used for storing and processing data. The users complain it takes a long time to access the application server. In addition, it takes a long time to process data at certain times of the day. To solve this problem, you need to perform the following tasks: Task 1: Determine if processor is the bottleneck. Task 2: Determine if memory is the bottleneck. Task 3: Determine if network is the bottleneck.
To perform these tasks, you propose to run the system monitor at different times throughout the day for a number of days, and view the data generated by the counters of Processor Time, Processor Queue Length, Pages per Second, and Average Disk Queue Length objects. Identify the tasks that will be completed by you if you use the proposed solution. a. Tasks 1 and 3. b. Task 1. c. Tasks 2 and 3. d. Task 3.
15/ You are the system administrator for CellGo. The organizational hierarchy consists of a head office and three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All the servers run Windows Server 2003. You work from the head office. Each branch office has a system administrator assigned to it. You want to review the auditing information of each branch office server. What should you do to view the auditing information with minimum administrative cost? a. View the security template from the Security Configuration and Analysis snap-in. b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view Event Viewer. c. Run the Seregcedit.exe utility and specify the appropriate parameters. d. Establish a Remote Desktop client session with each branch office server.
16/ Which of the following enables you to monitor the performance of printers? a. Device Manager. b. Event Viewer. c. Performance Console. d. Task Manager.
17/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 29. What should you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver. b. Verify that the device driver is not corrupt. c. Verify that the device driver has been properly configured. d. Check if the BIOS for the hardware device is enabled.
18/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? a. Create user accounts using user account template. b. Create 30 user accounts one by one. c. Create user accounts using user profiles. d. Create user accounts using command line tools.
19/ Which of the following options is a collection of multiple domains that share a common schema and global catalog server? a. Active Directory. b. Tree. c. Forest. d. Organizational unit.
21/ Identify the physically separated part of a domain network, which is connected with a slow wide area network (WAN) link to
the domain network. a. Domain controller. b. Site. c. Forest. d. Organizational unit.
22/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH.
What does this error message indicate? a. The Windows Installer service has failed to start. b. The data entered is invalid. c. One of the parameters entered is invalid. d. The data entered is of incorrect type.
23/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
24/ Consider the following statements: Statement A: Group Policy is a feature of the Computer Management utility. Statement B: Group Policies can only be applied to multiple users.
Which of the following options is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
25/ You are the system administrator of your organization. You plan to enhance the availability of data stored in your Windows Server 2003 computer by implementing RAID-5 volumes on two hard disks. However, on the Select the Volume Type page, the RAID-5 volume option is not highlighted. What can be the possible cause of this problem? a. There are bad sectors in any of the hard disks. b. The hard disks are not of the same manufacturer. c. A minimum of three hard disks is required for creating RAID-5 volumes. d. The hard disks have not been activated.
26/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
27/ Identify the group that has full control over all domains that exist in an Active Directory forest. a. Security. b. Domain Admins. c. Backup Operator. d. Enterprise Admins.
28/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the client’s computer.
29/ Kate, the system administrator in ServeYourMoney Inc. wants to ensure that the call center executives of the company are able to view the daily calls data file in the calls folder. Kate also wants to ensure that the executives do not delete data from the folder. Which option will enable Kate to accomplish this task? a. Apply Full Control folder permission on the calls folder. b. Apply Write folder permission on the calls folder. c. Apply Read folder permission on the calls folder. d. Apply Modify folder permission on the calls folder.
30/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition.
31/ As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced security-related
problems during a fresh installation of Windows Server 2003 on another computer. To avoid a similar situation, you plan to apply security settings for the fresh installation. Which security template will you use to perform this task? a. Setup security.inf b. DC security.inf c. Secure*.inf d. Security Set up.inf
32/ As a system administrator, you need to deploy different types of GPOs on the domain, organizational units, and individual users working on server computers. To avoid problems related to Group Policy inheritance, you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on server computers. Which of the following tools will enable you to do this task? a. Group Policy Modeling b. Group Policy Object Reporting c. Group Policy Object Modeling d. Group Policy Object Simulating
33/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You don’t have appropriate rights for the folder. d. Shadow copies are configured on the folder.
34/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales department to the administration department. You plan to move Harry’s computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. c. Disable the computer account, PC02, in the sales organizational unit. d. Create a new computer account, PC02, in the administration organizational unit.
35/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true. 1/ Which of the following MAN components provide connectivity between MANs and LANs, between networks with different topologies, or between networks using different network standards? a. Bridges. b. Routers. c. Switches. d. Repeaters.
2/ Statement A: With TCP, applications exchange messages over the network with a minimum of protocol overhead. Statement B: TCP enables hosts to maintain multiple simultaneous connections.
Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true.
3/ You are analyzing UDP data packets from node A to node B using a network Analyzer. From the given figure, find out the length of the data packet?
a. 53 b. 92 c. 58 d. 1090
4/ Sky Lark Inc. is an IT-based company. It has provided laptops with Windows 2000 Professional to their employees. The employee transfers are very frequent in this company so the laptops move from one subnet to another subnet. You want to automatically assign the TCP/IP configuration to the laptop connected. Which service should you use? a. BOOTP b. DNS c. DHCP d. DHCP relay agent
5/ You want to enable Windows ME, Linux and Macintosh computers to use Internet Explorer to access your Web servers by using a host name. Which of the following service should you use? a. DHCP b. Hosts c. BOOTP d. DNS
6/ Statement A: IP generates control messages related to any error in connection or flow control over the network. Statement B: IP is responsible for addressing and forming the data packets to be transferred over the network.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
7/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service. b. Fragment Offset. c. Options. d. Flags.
8/ Statement A: Infrared transmissions can provide line of sight communications over short distances. Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial links.
Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false.
b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true.
9/ You are analyzing IP data packets from node A to node B using a Network Analyzer. From the given figure, identify the error control value? a. 0x86ee b. 0x01 c. 0x00 d. 0x5332
10/ Gregg is a network administrator in a large finance organization, which is having a Windows 2003 Server. For the last 2-3 weeks he found that the network traffic is getting very heavy to the Window 2003 Server. He wants to track all the traffic to the Windows 2003 Server. What action should he perform?
A. He should use network analyzer on any node of the network. B. He should use network analyzer on the Windows 2003 Server of the network. C. He should enable the Promiscuous Mode in the network analyzer. D. He should disable the Promiscuous Mode in the network analyzer. a. A and C. b. B and D. c. B and C. d. A and D.
11/ A local area network is handling large number of client computers. The network administrator was previously using the BOOPTP protocol for handling the client computers. The administrator is having a problem in manually allocating and configuring the IP addresses over the network. The protocol is also not able to detect the unused IP addresses over the network for their future allocation to another client. Which of the following protocol does the administrator implement to overcome that problem? a. DHCP protocol. b. BOOTP protocol.
c. Internet protocol. d. Stop-and-wait protocol.
12/ From the given figure, specify the type of delivery of data packets between Node X to Router 1 and between Router 1 and Router 2.
a. Both will use direct delivery. b. It will be direct delivery between Node X to Router 1 and indirect delivery between Router 1 and Router 2. c. It will be indirect delivery between Node X to Router 1 and direct delivery between Router 1 and Router 2. d. Both will use indirect delivery and Router 2.
13/ Your company wants to setup a LAN environment. You are assigned to design the new network. You want to implement a device, which: 1. Joins multiple computers or other network devices together to form a single network segment. 2. Amplify and regenerate the signal from one node to another in a network. 3. Provides a common connection point for computers, printers, and other network devices in a star topology network. Which of the following network component will meet the preceding requirements? a. Repeaters. b. Hubs.
c. Switch. d. Bridge.
14/ In which of the following state, the DHCP client enters, after sending the DHCPDISCOVER message? a. Initializing state. b. Requesting state. c. Selecting state. d. Bound state.
16/ Which of the following is a reliable protocol of the Transport layer? a. IP b. TCP d. ICMP c. UDP
18/ Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header, provides integrity and confidentiality to IPv6 datagrams. Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating Security Header, provides authentication and integrity to IPv6 datagrams.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
19/ Alder tries to connect a ftp server from a node having Windows 2000 professional by issuing the command: ftp sales.books.com but it fails. But he is able to connect the server by using the windows explorer program. What is the likely
problem? a. No DNS server configured on Alder’s workstation. b. No DNS client configured on Alder’s workstation. c. No default gateway defined on the server. d. No DNS server defined on the server.
20/ In which of the following modes, two nodes can send as well as receive data but not at the same time? a. Simplex mode. b. Half-duplex mode. c. Full-duplex mode. d. Promiscuous mode.
21/ Which of the following layer comes below Network Layer in the bottom-up approach of OSI Reference Model? a. Transport Layer. b. Session Layer. c. Presentation Layer. d. Data Link Layer.
22/ Which of the following is the correct definition for Ethernet Access Method? a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream, by checking for matches between the data transmitted and the data received. b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and which to block. c. Ethernet Access Method is a set of rules that defines how a computer transmits data on the network cable and retrieves data from the cable. d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large, heterogeneous networks.
23/ Your company decided to open small branch offices in various cities of US. Each branch office will have 10-12 nodes, 1 fax machine and 1 printer. You were asked to design the network of each branch office. You decided to have peer-to-peer network in the branch offices. You were asked to analyze the advantages of the peer-to-peer network. Which of the following are the
advantages of peer-to-peer network? A. Strong central security B. Easy setup C. Ability of users to control resources sharing D. No network administrator required E. Optimized dedicated servers a. A, B and D. b. B, D and E. c. A, B and E. d. B, C and D.
24/ A datagram received from one network may be too large to be transmitted in a single packet on a different network. Which of the following TCP/IP protocol helps the router to divide the datagram into smaller pieces? a. ICMP b. IP c. IGMP d. TCP
25/ Which of the following is an 8-bit value field that defines the type of BOOTP packet? a. Operation Code. b. Hop count. c. Hardware Type. d. Options.
26/ Tom tries to connect a ftp server from a node having Windows 2000 professional by issuing the command ftp sales.books.com. He received the following error message “Bad IP Address”. He then successfully pings the server. What is the likely problem? a. No DNS client configured on Tom’s workstation.
b. No DNS server configured on Tom’s workstation. c. No default gateway defined on the server. d. No DNS server defined on the server.
27/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given figure, find out the destination port number? a. 1090 b. 58 c. 17 d. 53
28/ Statement A: Name server is a computer that maintains the database of host names and their corresponding IP addresses for name resolution. Statement B: The function of the resolvers is to pass name request between applications and name servers. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
29/ You can connect through Windows explorer to all nodes on the local network, but cannot connect to any nodes on the remote subnet. Which IP address should you ping first to diagnose the problem? a. Ping b. Ping c. Ping d. Ping
30/ You cannot connect to a Windows 2000 Server from a node running on Windows 2000 Professional using Windows Explorer. Both the server and the node are in the same physical network. By using a network analyzer, you found that each time
the node attempts to connect to the server, it broadcasts an ARP request for the default gateway. What is the most likely cause of the problem? A. Invalid default gateway address on the Windows 2000 Professional node B. Invalid subnet mask on the Windows 2000 Professional node C. Invalid default gateway address on the Windows 2000 Server D. Invalid subnet mask on the Windows 2000 Server
31/ It is developed to implement file transfer, printer sharing, and mail service among Apple systems. Macintosh machines have them installed by default. Identify the protocol. a. DLC. b. SNA. c. AppleTalk. d. IPX/SPX.
32/ Statement A: Transport Layer is responsible for process-to-process communication.
Statement B: The Transport layer can delivery a data packet either reliably or unreliably.
Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
33/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address. The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a DHCP address to the node? a. He has to create a new scope for the node. b. A RFC 1542 compliant router to be added in the network.
c. Provide a new DHCP server in the network. d. A bridge to be added in the network.
34/ Which of the following WAN components converts the digital signals from the computer to analog signals? a. Routers. b. Brouters. c. CSU/DSU. d. Modem.
35/ Which of the following record helps the DNS in providing information about the host such as, operating system used? a. HINFO. b. Start of authority (SOA). c. Address (A). d. Canonical Name (CNAME). 36/ Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the servers are configured as static routers. The network is divided into various subnets depending on departments. He wants to identify the path that a data packet takes as it passes through the routers. Which of the following utility will he use? a. Ipconfig.exe b. Tracert.exe c. Route.exe d. Ping.exe
37/ Statement A: IPv6 data packets are exchanged and processed on each host by using IPv6 at the Network Access layer. Statement B: In IPv6, the Internet layer creates IPv6 packets including the source and destination address information that is used to route the data through the network. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true.
d. Both, statement A and statement B are false.
38/ You are analyzing TCP data packets from node A to node B using a Network Analyzer. From the given figure, find out the size of the header? a. 28 bytes. b. 8 bytes. c. 60 bytes. d. 40 bytes.
39/ Which of the following is the correct definition for Ethernet Access Method? a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream, by checking for matches between the data transmitted and the data received. b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and which to block. c. Ethernet Access Method is a set of rules that defines how a computer transmits data on the network cable and retrieves data from the cable d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large, heterogeneous networks.
40/ Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header, provides integrity and confidentiality to IPv6 datagrams. Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating Security Header, provides authentication and integrity to IPv6 datagrams. Which of the following options is correct about the above statement? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, statement A and statement B are true. d. Both, statement A and statement B are false.
41/ Which of the following layer of the OSI Reference model is responsible for routing, switching, and controlling the flow of data between nodes? a. Transport Layer.
b. Network Layer. c. Presentation Layer. d. Physical Layer.
42/ Tom is designing a network for his office. He is not able to decide on the type of transmission medium. His office is in an area that is prone to high levels of EMI or for long distance data transmissions, where electrical signals are significantly distorted and degraded. He wants minimum distortion of signals in the transmission medium. a. He can select fibre-optic cables. b. He can select twisted-pair cables. c. He can select both fibre-optic cables or twisted-pair cables. d. He can select both coaxial cables or twisted-pair cables.
43/ Which of the following DHCP message consists of the IP address and additional configuration information, such as lease duration and subnet mask? a. Discover message. b. Offer message. c. Request message. d. Bootreply message.
44/ Statement A: Infrared transmissions can provide line of sight communications over short distances. Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial links. Which of the following options is correct about the above statements? a. Statement A is true, and statement B is false. b. Statement A is false, and statement B is true. c. Both, statement A and statement B are false. d. Both, statement A and statement B are true.
46/ Which of the following protocols function at the Transport Layer? a. ICMP and IGMP.
b. TCP and UDP. c. TCP and FTP. d. Network Access Layer.
48/ Tim George is a network administrator in an organization. The organization has three subnets. One subnet has only laptop Windows 2000 Professional nodes. The other two subnets have Windows 2000 nodes. Tim has installed a DHCP server to support all the clients. Tim wants to set the IP lease period for the laptops to 7 days and for the other two subnets to 20 days. How should Tim implement this? a. Create one DHCP scope for all subnets. For each node, create an exclusion range with a unique lease period. b. Create one DHCP scope for all subnets. For each node other than laptops, create a reservation with a 30-day lease period. c. Create one DHCP scope for each subnet. Specify the lease period as part of the scope’s configuration. d. Create one DHCP scope for each subnet. Create a global option that specifies a lease period that is
49/ Which of the following RFCs define the protocols of the Network Access Layer? a. RFC 926 and RFC 951 b. RFC 826 and RFC 894 c. RFC 826 and RFC 951 d. RFC 894 and RFC 926
50/ Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? a. Service b. Fragment Offset c. Options d. Flags
1/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
2/ Which audit policy is intended for the domain controllers that authenticate users as they log on to other computers? a. Audit object access b. Audit logon events c. Audit Account logon events d. Audit Account management
3/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
4/ When James tries to open a newly installed application, his computer hangs. He tries to restart his computer but fails to do so. Which of the following options will enable James to restart the computer? a. Boot the computer using the Safe Mode with Networking option. b. Boot the computer using the Last Known Good Configuration. c. Boot the computer using the Safe Mode option. d. Boot the computer using the Windows Startup Disk.
5/ As a system administrator, you have created a GPO that is applied to the organization’s domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users.
6/ Consider the following statements:
Statement A: Audit policies enable you to track the success of certain events and failure of all the events. Statement B: Audit policies only track the activities performed by a user. Statement C: You can use the audit policies to track the location where the activity occurred.
Which of the following is correct about the above statements? a. Only Statement A is true. b. Only Statement B is true. c. Statements A, B, and C are true. d. Only Statement C is true.
7/ You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all client computers updated with patches and critical system updates from Microsoft. You plan to install software update service on a server, which will download all the required software updates and distribute the updates to the clients. Identify the server on which you should install the software update service. a. Server with DNS installed. b. Server with RRAS installed. c. Server with IIS installed. d. Server with DHCP installed.
8/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the client’s computer.
9/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You don’t have appropriate rights for the folder. d. Shadow copies are configured on the folder.
10/ Which of the following is a logical boundary of an organization’s network? a. Domain b. Tree c. Forest d. Organizational unit
11/ You are a system administrator of an organization that consists of 1000 users who use Windows Server 2003 and Windows 2000 computers. To secure the organization’s network, you and the junior administrators have planned and implemented several GPOs on the domain and organizational units. In addition, you have implemented Group Policies on individual users also. As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and Group Policies. While conducting this review you need to view the configured GPOs in a report format, which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which the GPO is applied. Identify the tool that will enable you to view GPOs in the report format. a. Group Policy Modeling b. Group Policy HTML Report c. Group Policy Reporting
d. Group Policy HTML Reporting
12/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition.
13/ Consider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.
Which of the following options is correct about the above statements? a. Statement A is true and Statement B is false. b. Both, statement A and statement B are true. c. Both, statement A and statement B are false. d. Statement A is false and Statement B is true.
14/ Identify the hardware device required for printing a document. a. Print device b. Print driver c. Print server d. Print job
16/ Consider the following statements: Statement A: The backup utility of Windows Server 2003 enables you to backup files and folders, schedule a backup, and restore data on the Windows Server 2003 computer. Statement B: ASR is a feature of the backup utility that enables you to recover a Windows Server 2003 computer that does not
boot. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
17/ Which container lists the default users and group accounts created by Windows Server 2003? a. Users and Computers b. Builtin and Computers c. Builtin and Users d. Users and Domain Controllers
18/ Which of the following actions should you take if folder redirection is successful but the files and sub-folders are not available? a. Check if the redirected folder exists. b. Check if Remote Desktop for Administration is enabled. c. Check your permissions on the redirected folder. d. Check for the extensions of the files contained in the redirected folder.
19/ You are the system administrator for CellGo. The network of CellGo consists of a single Active Directory domain named CellGo.com. All network servers run Windows Server 2003. Some of the client computers run Windows XP Professional and some work on Windows NT Workstation. You install terminal server on three member servers named Cell1, Cell2, and Cell3. You place all three terminal servers in an organizational unit named Terminal Server. You link a GPO to the Terminal Server OU. Five days later, end users notify that the performance of Cell2 is very slow. You discover that Cell2 has 70 disconnected Terminal Server sessions. You need to configure all the three terminal servers to end the disconnected session after 15 minutes of inactivity. You must achieve this goal by using the minimum amount of administrative effort. What should you do? a. Log on to the console of each terminal server. In the RDP-Tcp connection properties dialog box, set the “End a disconnected session” option to 15 minutes. b. Edit the GPO to set the time limit for disconnected sessions to 15 minutes. c. On Cell2, run the tsdiscon command to disconnect all 70 users from Cell2.
d. In Active Directory Users and Computers, set the “End a disconnected session” option for all domain user accounts to 15 minutes.
20/ Jenny is the system administrator of a domain named Aztec.com. In this domain, the accounting group and the marketing group share the same printer. Jenny receives a complaint from the marketing group that their small print jobs take a lot of time to print. Jenny finds that the accounting group gives large print jobs to the printer, which causes the delay. She learns that the accounting jobs are not needed on the same day on which the request has been sent to the printer. What should Jenny do to improve the situation? a. Create a separate printer; configure the printer to print directly to the printer port and then direct the accounting group to print through this printer. b. Create a separate printer; configure the printer to start printing immediately, and then direct the marketing group to print through this printer. c. Create a separate printer; configure the printer to be available only after certain hours, and then direct the accounting group to print large documents through this printer. d. Create a separate printer; configure the printer to be available only after certain hours, and then direct the marketing group to print documents through this printer.
21/ Which of the following options enables you to install the device drivers that are not digitally signed? a. Warn. b. Install. c. Ignore. d. Update.
22/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
24/ Consider the following statements: Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003. Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
25/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales department to the administration department. You plan to move Harry’s computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. c. Disable the computer account, PC02, in the sales organizational unit. d. Create a new computer account, PC02, in the administration organizational unit.
26/ Catherine is a user in your domain. Her username is Cath13 and she has a roaming profile stored in the domain controller. At what location will her desktop be stored? a. \\domain controller\ documents and settings\Cath13\desktop b. C:\documents and settings\Cath13\desktop c. C:\winnt\Profiles\Catherine\desktop d. C:\Profiles\desktop\Catherine
27/ You are the system administrator of your organization. You need to take backup of the data stored in the Sales_Data folder on the first Monday of every month. Which of the following options enables you to accomplish this task with least administrative effort?
a. Take incremental backup of Sales_Data folder on the first Monday of every month. b. Schedule backup job of Sales_Data folder for the first Monday of every month. c. Take normal backup of Sales_Data folder on the first Monday of every month. d. Take differential backup of Sales_Data folder on the first Monday of every month.
28/ Which of the following protocols uses Transmission Control Protocol to ensure that data transfer is complete and accurate? a. FTP. b. HTTP. c. NNTP. d. SMTP.
29/ Consider the following statements: Statement A: Security policies cannot be implemented using GPOs. Statement B: Audit policies can be implemented using GPOs. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false.
30/ Identify the NTFS folder permission that enables users to only view the names of files and subfolders contained within a folder? a. List folder contents. b. Full Control. c. Modify. d. Read and Execute.
31/ Identify the group that has the rights and permissions to create and delete shared resources, stop and start services, and backup and restore files.
a. Backup Operators. b. Administrators. c. Print Operators. d. Server Operators.
34/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk During installation, setup displays an error message, ERROR_CREATE_FAILED. What does this error message indicate? a. The Windows Installer service has failed to start. b. The hard disk does not have the disk space required to install Windows Server 2003. c. One of the parameters entered is invalid. d. The data entered is of incorrect type.
35/ Consider the following statements: Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services (DNS) namespace. Statement B: Trees are implemented in the domain structure of an organization when the organization requires multiple domains. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
1/ Christina is the system administrator of StarMoon Technologies. She wants to restore the default permissions for a system drive that has been modified. Which of the following security templates will enable her to do this? a. Hisecws.inf b. Rootsec.inf c. Rootws.inf d. Rootdc.inf
2/ You want to generate RsoP queries for the users in your organization to view the Group Policy settings applied to them. Which of the following tools will enable you to perform this task? a. Gpupdate.exe b. Gpresult.exe c. Group Policy Management Console. d. Group Policy Object Editor.
3/ As a system administrator, you have created a GPO that is applied to the organization’s domain. You want that this GPO should not be applied to three users in the Finance organizational unit. Which of the following options will enable you to perform this task with the least administrative effort? a. Move the three users to another organizational unit in the domain. b. Disable the accounts of these users. c. Create a group of the three users and deny the Apply Group Policy option. d. Delete the accounts of these users and create local user accounts for these users.
4/ Consider the following statements: Statement A: You need at least 100 MB free space on a volume for creating shadow copies. Statement B: You cannot edit shadow copies because they are read-only. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
5/ You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you want to save disk space and back up only those files that have been created or modified. Which of the following options will enable you to accomplish this task? a. Schedule incremental backup of the Accounts folder on the first Monday of every month. b. Schedule normal backup of the Accounts folder on the first Monday of every month. c. Schedule copy backup of the Accounts folder on the first Monday of every month. d. Schedule daily backup of the Accounts folder on the first Monday of every month.
6/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP. b. SSL. c. NNTP. d. FTP.
7/ Which policy enables you to specify password restrictions, account lockout policies, and Kerberos policies? a. Local Policies. b. Event Log Policies. c. Password Policies. d. Account Policies.
8/ Identify the correct method to create local user accounts? a. Select the Start > Programs > Administrative Tools > Microsoft Management Console menu command. b. Select the Start > Programs > Administrative Tools > Computer Management menu command. c. Select the Start > Programs > Administrative Tools menu command. d. Select the Start > Programs > Administrative Tools > Active Directory Users and Computers menu command.
9/ Which of the following options enables you to prevent the installation of any unsigned device driver?
c. Prevent. a. Warn. d. Block. b. Stop.
10/ You are working as a system administrator in an organization, which has its head office in Chicago. The organization has two branch offices, one in New York and the other in Texas. All the three offices have an interconnected WAN network. As a system administrator, you have been assigned the task of viewing the Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for each computer using the computer name, you decide to use the IP address of each computer with the Gpresult command. Which parameter of the Gpresult command will help you define the name or IP address of the remote computers? a. /u Domain/User b. /p Password c. /user TargerUserName d. /s Computer
11/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders. Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false.
12/ Consider the following statements: Statement A: A spanned volume offers fault tolerance. Statement B: A striped volume increases the speed at which data is read and written, but it does not offer fault tolerance. Which of the following is correct about the above statements?
a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
14/ The network of your organization consists of 300 end users who use the Windows application server. This application server is used for storing and processing data. The users complain it takes a long time to access the application server. In addition, it takes a long time to process data at certain times of the day. To solve this problem, you need to perform the following tasks: Task 1: Determine if processor is the bottleneck. Task 2: Determine if memory is the bottleneck. Task 3: Determine if network is the bottleneck. To perform these tasks, you propose to run the system monitor at different times throughout the day for a number of days, and view the data generated by the counters of Processor Time, Processor Queue Length, Pages per Second, and Average Disk Queue Length objects. Identify the tasks that will be completed by you if you use the proposed solution. a. Tasks 1 and 3. b. Task 1. c. Tasks 2 and 3. d. Task 3.
15/ You are the system administrator for CellGo. The organizational hierarchy consists of a head office and three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All the servers run Windows Server 2003. You work from the head office. Each branch office has a system administrator assigned to it. You want to review the auditing information of each branch office server. What should you do to view the auditing information with minimum administrative cost? a. View the security template from the Security Configuration and Analysis snap-in. b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view Event Viewer. c. Run the Seregcedit.exe utility and specify the appropriate parameters. d. Establish a Remote Desktop client session with each branch office server.
16/ Which of the following enables you to monitor the performance of printers? a. Device Manager. b. Event Viewer.
c. Performance Console. d. Task Manager.
17/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 29. What should you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver. b. Verify that the device driver is not corrupt. c. Verify that the device driver has been properly configured. d. Check if the BIOS for the hardware device is enabled.
18/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? a. Create user accounts using user account template. b. Create 30 user accounts one by one. c. Create user accounts using user profiles. d. Create user accounts using command line tools.
19/ Which of the following options is a collection of multiple domains that share a common schema and global catalog server? a. Active Directory. b. Tree. c. Forest. d. Organizational unit.
21/ Identify the physically separated part of a domain network, which is connected with a slow wide area network (WAN) link to the domain network. a. Domain controller. b. Site. c. Forest.
d. Organizational unit.
22/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH.
What does this error message indicate? a. The Windows Installer service has failed to start. b. The data entered is invalid. c. One of the parameters entered is invalid. d. The data entered is of incorrect type.
23/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
24/ Consider the following statements: Statement A: Group Policy is a feature of the Computer Management utility. Statement B: Group Policies can only be applied to multiple users.
Which of the following options is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
25/ You are the system administrator of your organization. You plan to enhance the availability of data stored in your Windows Server 2003 computer by implementing RAID-5 volumes on two hard disks. However, on the Select the Volume Type page, the RAID-5 volume option is not highlighted. What can be the possible cause of this problem? a. There are bad sectors in any of the hard disks. b. The hard disks are not of the same manufacturer. c. A minimum of three hard disks is required for creating RAID-5 volumes. d. The hard disks have not been activated.
26/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
27/ Identify the group that has full control over all domains that exist in an Active Directory forest. a. Security. b. Domain Admins. c. Backup Operator.
d. Enterprise Admins.
28/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the client’s computer.
29/ Kate, the system administrator in ServeYourMoney Inc. wants to ensure that the call center executives of the company are able to view the daily calls data file in the calls folder. Kate also wants to ensure that the executives do not delete data from the folder. Which option will enable Kate to accomplish this task? a. Apply Full Control folder permission on the calls folder. b. Apply Write folder permission on the calls folder. c. Apply Read folder permission on the calls folder. d. Apply Modify folder permission on the calls folder.
30/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition.
31/ As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid a similar situation, you plan to apply security settings for the fresh installation. Which security template will you use to perform this task? a. Setup security.inf b. DC security.inf c. Secure*.inf
d. Security Set up.inf
32/ As a system administrator, you need to deploy different types of GPOs on the domain, organizational units, and individual users working on server computers. To avoid problems related to Group Policy inheritance, you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on server computers. Which of the following tools will enable you to do this task? a. Group Policy Modeling b. Group Policy Object Reporting c. Group Policy Object Modeling d. Group Policy Object Simulating
33/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. You don’t have appropriate rights for the folder. d. Shadow copies are configured on the folder.
34/ Harry is assigned the computer account PC02. The management of the organization decides to transfer Harry from the sales department to the administration department. You plan to move Harry’s computer to the administration department instead of allocating a new computer to Harry. Which of the following options will enable you to accomplish this task? a. Move the computer account, PC02, from the sales organizational unit to the administration organizational unit. b. Enable the computer account, PC02, in the administration organizational unit. c. Disable the computer account, PC02, in the sales organizational unit. d. Create a new computer account, PC02, in the administration organizational unit.
35/ Consider the following statements: Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access permissions, callback options, and static IP address. Statement B: The Environment tab of the User Properties dialog box displays the name of the applications that are started when a Terminal Services user logs on.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
1/ A user account that has similar properties already configured is called ___________. a. Domain user account b. Local user account template c. Local account template d. User account template
2/ Which of the following audit policies is enabled by the Default Domain Controllers Policy? a. Audit Service Access b. Audit Directory Service Access c. Audit Domain Controllers d. Audit Child Domain Policies
3/ You notice that the applications on your Windows Server 2003 computer are running slowly. As a first step to troubleshoot this problem, you open the Task Manager window, which shows the CPU usage as 100%. You uninstall a downloaded application, which you suspect was causing the problem. In future, you want to be notified through a CPU alert whenever the processor usage exceeds the limit of 50 percent. What will you do to receive the notification? a. Configure an alert when CPU usage exceeds 50 percent. b. Configure a counter log when CPU usage exceeds 50 percent. c. Configure a trace log when CPU usage exceeds 50 percent. d. Configure a security log when CPU usage exceeds 50 percent.
4/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder.
Statement B: You cannot access the encrypted files and folders like ordinary files and folders.
Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false.
5/ You want to ensure similar desktop settings for all users in an organization. Which option will enable you to do this task? a. Make all the end user profiles mandatory. b. Set the background of each computer. c. Create a group account and configure the settings of the group account. d. Customize all user accounts one by one.
6/ Which of the following is a logical boundary of an organization’s network? a. Domain b. Tree c. Forest d. Organizational unit
7/ You are the system administrator of your organization. You have applied various Group Policies on the users of the network. Now, you want to reapply these Group Policies on a new group. Which option of the Gpupdate command will you use to perform this task? a. /Target b. /Force c. /sync d. /Wait
8/ You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all client computers
updated with patches and critical system updates from Microsoft. You plan to install software update service on a server, which will download all the required software updates and distribute the updates to the clients. Identify the server on which you should install the software update service. a. Server with DNS installed b. Server with RRAS installed c. Server with IIS installed d. Server with DHCP installed
9/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
10/ Which of the following is a collection of user accounts and domain local groups that are created on a member server or a stand-alone server? a. Local group b. Global group c. Universal group d. Security group
11/ You have implemented mirrored volume on your Windows Server 2003 computer to enhance availability of the data stored in your computer. You plan to avoid a situation in which the data becomes inaccessible due to the failure of the common disk controller. Which of the following options will enable you to accomplish this task? a. Add another hard disk. b. Add another hard disk and create a stripe set and copy the temp folder to it.
c. Add another hard disk and create a mirror partition. d. Add separate disk controllers for each hard disk.
12/ You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you want to save disk space and back up only those files that have been created or modified. Which of the following options will enable you to accomplish this task? a. Schedule incremental backup of the Accounts folder on the first Monday of every month. b. Schedule normal backup of the Accounts folder on the first Monday of every month. c. Schedule copy backup of the Accounts folder on the first Monday of every month. d. Schedule daily backup of the Accounts folder on the first Monday of every month.
13/ Consider the following statements: Statement A: You can extend a simple or spanned volume on a dynamic disk by using the DISKPART command. Statement B: You can create an extended partition only on a basic disk.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
14/ Consider the following statements: Statement A: Group Policy is a feature of the Computer Management utility. Statement B: Group Policies can only be applied to multiple users.
Which of the following options is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
15/ Consider the following two statements: Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT or FAT 32, the file loses its permissions. Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or FAT32, the file loses its permissions.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
16/ Steve is the system administrator in PQR Corp. The network of PQR Corp consists of 300 computers running Windows 2000 Professional and 50 computers running Windows Server 2003. To enhance network security, Steve applies a GPO from his Windows Server 2003 computer. Steve notices that the logon process on his computer becomes very slow after the GPO is applied. Which of the following options will enable him to solve this problem? a. Steve should disable unused policies in a GPO. b. Steve should install service pack 3 of Windows Server 2003 to speed up the log on process. c. Steve should increase the RAM of his Windows Server 2003 computer to speed up the logon process. d. Steve should re-install Windows Server 2003 on his compute and re-apply the GPO.
17/ You are a system administrator of an organization that consists of 1000 users who use Windows Server 2003 and Windows 2000 computers. To secure the organization’s network, you and the junior administrators have planned and implemented several GPOs on the domain and organizational units. In addition, you have implemented Group Policies on individual users also. As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and Group Policies. While conducting this review you need to view the configured GPOs in a report format, which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which the GPO is applied. Identify the tool that will enable you to view GPOs in the report format. a. Group Policy Modeling b. Group Policy HTML Report
c. Group Policy Reporting d. Group Policy HTML Reporting
18/ You can access a folder locally but you cannot access the same folder through the network even if the folder is shared. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS. b. You are not a member of the group that has deny permission for the folder. c. Offline caching is implemented on the folder. d. Shadow copies are configured on the folder.
19/ As a system administrator, you need to secure the organization’s domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To implement this, which security policy do you need to configure? a. Configure the “Enforce old password history” policy. b. Configure the “Enforce password history” policy. c. Configure the “Enforce password history list” policy. d. Configure the Enforce old password history list” policy.
20/ You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E drive of your computer. After a couple of days, you notice that it has been modified. What can be the most likely cause of this problem? a. The file has been moved from a FAT 32 partition to an NTFS partition. b. The file has been moved from an NTFS partition to a FAT partition. c. The file has been moved from a FAT partition to an NTFS partition. d. The file has been moved from an NTFS partition to a different NTFS partition.
21/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 1. What will you do to troubleshoot this problem?
a. Verify that the device is using the current Windows Server 2003 driver or verify that the device has been properly configured. b. Verify that the device driver is not corrupt. c. Restart the computer. d. Verify that the BIOS for the hardware device is enabled.
23/ A local group called Printer User consists of end user accounts that are currently accessing the printer in your domain. You have already removed the Everyone special group from the Printer user group so that only the specified end users have access to the printer. To tighten security, you want the individuals using the printer to manage their own print jobs. However you want the users to view all the print jobs sent to the printer. What is the best way to implement this? a. Assign the Print permission to the Printer user group. b. Assign the Manage document permission to the Printer user group. c. Assign the Read and manage document permission to the Creator owner group. d. Assign the Manage documents permission to the Creator owner group.
24/ As a system administrator, you want to allocate disk quotas for each user in your organization. When you try to allocate disk quotas, you receive an error message that indicates that you cannot configure disk quotas. What is the probable cause of this problem? a. You do not have the right to configure disk quotas. b. The file system being used is not NTFS. c. The disks have not been configured properly. d. The disks being used are corrupt.
25/ Which of the following options enables you to install the device drivers that are not digitally signed? a. Warn. b. Install. c. Ignore. d. Update.
26/ The printer translates the print language into ______before printing the document.
a. Bitmap. b. PNG. c. JPEG. d. TIFF.
27/ As a system administrator, you want to provide high degree of security to domain controllers. For implementing this level of security, you want that the domain controllers should use digitally signed communication channels. Which of the following security templates will enable you to do this? a. Compatws.inf b. Securedc.inf c. Hisecdc.inf d. Setup Security.inf
28/ Which of the following enables you to centrally administer files and applications over a network? a. Group Policy. b. User Accounts. c. NTFS. d. Shared folder.
29/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 2.4 GHz 256 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, “Dumping Physical Memory”. Which of the following options can be a possible solution to this problem? a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want to install Windows Server 2003. b. Disable the Cache Shadow option in the BIOS. c. Replace the RAM.
d. Replace the hard disk.
30/ You are the system administrator of your organization. You want to delegate the following rights and permissions to your junior, Chris, who has recently joined your organization:
Create and delete shared resources Stop and start services Backup and restore files. Format drives and shut down domain controllers in the network.
Which of the following options will enable you to accomplish this task with least administrative effort? a. Add Chris to the Server Operators group. b. Add Chris to the Performance Log Users group. c. Add Chris to the Enterprise Admins group. d. Add Chris to the Backup Operators group.
31/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP b. SSL c. NNTP d. FTP
32/ Consider the following statements: Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services (DNS) namespace. Statement B: Trees are implemented in the domain structure of an organization when the organization requires multiple domains.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
33/ Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
34/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? c. Create user accounts using user profiles. d. Create user accounts using command line tools. a. Create user accounts using user account template. b. Create 30 user accounts one by one.
35/ Consider the following statements: Statement A: Filtering enables you to apply specific Group Policy settings to specific users and computers in a container. Statement B: The Explicitly deny method is used to deny access to the Group Policy settings. Statement C: The Remove Authenticated Users method restricts explicit permissions for the GPO to the domain administrators.
Which of the following is correct about the above statements? a. Statement A, B, and C are true. b. Only Statements A and B are true. c. Only Statements A and C and true. d. Statement A, B, and C are false.
1/ You are installing Windows Server 2003 on a computer with the following configuration: Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH.
What does this error message indicate? a. The Windows Installer service has failed to start. b. The data entered is invalid. c. One of the parameters entered is invalid. d. The data entered is of incorrect type.
2/ Which of the following options enables a print device to communicate with the operating system? a. System Monitor b. Print Driver c. Print Server d. Print Job
3/ You are the system administrator for CellGo. The organizational hierarchy consists of a head office and three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All the servers run Windows Server 2003. You work from the head office. Each branch office has a system administrator assigned to it. You want to review the auditing information of
each branch office server. What should you do to view the auditing information with minimum administrative cost? a. View the security template from the Security Configuration and Analysis snap-in. b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view Event Viewer. c. Run the Seregcedit.exe utility and specify the appropriate parameters. d. Establish a Remote Desktop client session with each branch office server.
4/ Identify the physically separated part of a domain network, which is connected with a slow wide area network (WAN) link to the domain network. a. Domain controller. b. Site. c. Forest. d. Organizational unit.
5/ Consider the following statements: Statement A: When you copy a file from an NTFS partition and paste it within the NTFS partition, the file inherits the permissions of the destination folder. Statement B: When you copy a file from an NTFS partition and paste it to a different NTFS partition, the file inherits the permissions of the destination folder. Statement C: When you copy a file from an NTFS partition and paste it to a FAT partition, the file loses its permissions.
Which of the following is correct about the above statements? a. Statements A, B, and C are false. b. Statements A, B, and C are true. c. Only Statements A and C are true. d. Only Statement B is true.
6/ John needs to back up all the files changed during the day. The backup method should be such that in case of breakdown he can recover the files at the earliest. John wants to use a backup method that does not use too many resources. Which of the following backup methods should John use? a. Normal backup on Sunday and incremental backup from Monday to Saturday.
b. Normal backup on Sunday and differential backup from Monday to Saturday. c. Normal backup on Sunday and daily backup from Monday to Saturday. d. Normal backup on all days.
7/ As a system administrator, you need to secure the member servers of your network by defining stronger password and audit settings. Which of the following security templates will enable you to do this? a. DC Security.inf b. Securews.inf c. Securedc.inf d. Wssecure.inf
8/ Identify the group that has the rights and permissions to create and delete shared resources, stop and start services, and backup and restore files. a. Backup Operators. b. Administrators. c. Print Operators. d. Server Operators.
9/ You are the system administrator of CellGo, which has a single domain called CellGo.com. All the servers run on Windows Server 2003. The head office of CellGo is situated in Washington from where you want to administer the Windows Server 2003 computer named, ServerNY, located at the New York branch. _Which of the following options will enable you to administer ServerNY from your node in the Washington office? a. Install terminal server on ServerNY and connect it to your node. b. Enable remote connection and Remote Desktop on ServerNY and use Remote Desktop for Administration. c. Install Remote Desktop for Administration on ServerNY and enable remote connection and Remote Desktop. d. Enable IIS on your node and implement Offline caching.
10/ Consider the following statements: Statement A: You can apply disk quotas on a FAT partition to track and limit the disk space used for a selected volume or disk.
Statement B: You can use the shadow copies utility to store read-only copies of files stored in shared folders at specific time intervals. Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
11/ Which of the following options enables you to prevent the installation of any unsigned device driver? a. Warn. b. Stop. c. Prevent. d. Block.
12/ Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that he has given a confidential document for printing, which is not printed by the printer. The accountant is also unable to delete the print job from the print queue. What should Robert do to ensure that the document is not printed later? a. On the print server, stop and restart the print spooler service. b. On the client computer, select the pause option from the document menu of the Printer window. c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer window. d. Restart the client’s computer.
13/ You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the Device Manager window and notice that Windows Server 2003 has generated error code 1. What will you do to troubleshoot this problem? a. Verify that the device is using the current Windows Server 2003 driver or verify that the device b. Verify that the device driver is not corrupt. has been properly configured. c. Restart the computer.
d. Verify that the BIOS for the hardware device is enabled.
14/ You want to generate RsoP queries for the users in your organization to view the Group Policy settings applied to them. Which of the following tools will enable you to perform this task? a. Gpupdate.exe b. Gpresult.exe c. Group Policy Management Console d. Group Policy Object Editor
15/ Which audit policy is intended for the domain controllers that authenticate users as they log on to other computers? a. Audit object access b. Audit logon events c. Audit Account logon events d. Audit Account management
16/ Consider the following statements: Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003. Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
17/ A user account that has similar properties already configured is called ___________. a. Domain user account
b. Local user account template c. Local account template d. User account template 18/ Which edition of Windows Server 2003 matches the requirements of small organizations and provides several key utilities, such as secure Web access and printer sharing? a. Standard edition b. Enterprise edition d. Web edition c. Datacenter edition
19/ Consider the following two statements: Statement A: When you move a file within an NTFS partition, the file loses its original permissions. Statement B: When you move a file from an NTFS partition to a different NTFS partition, the file inherits the permissions of the destination folder.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false. d. Statement A is false and Statement B is true.
20/ Consider the following statements: Statement A: A spanned volume offers fault tolerance. Statement B: A striped volume increases the speed at which data is read and written, but it does not offer fault tolerance.
Which of the following is correct about the above statements? a. Both, statement A and statement B are false. b. Both, statement A and statement B are true. c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
21/ As a system administrator, you want to configure security settings for the password and account lockout policies for all the users of the domain. In addition, you want to configure security settings for security and application log sizes. Which of the following security policies will you need to configure? a. Account lockout policies and Application log policies. b. Account policies and Event log policies. c. Account policies and Application log policies. d. Account lockout policies and Event log policies.
23/ Consider the following statements: Statement A: Filtering enables you to apply specific Group Policy settings to specific users and computers in a container. Statement B: The Explicitly deny method is used to deny access to the Group Policy settings. Statement C: The Remove Authenticated Users method restricts explicit permissions for the GPO to the domain administrators.
Which of the following is correct about the above statements? a. Statement A, B, and C are true. b. Only Statements A and B are true. c. Only Statements A and C and true. d. Statement A, B, and C are false.
24/ Which file system supports partitions only up to 2 TB in size? a. FAT. b. FAT 32. c. NTFS. d. FAT 16.
25/ As a system administrator, you need to secure the organization’s domain from any incidental attacks. From your past experience, you have noticed that most of the security breaches occur due to known passwords and user names. To prevent this, you want that the users of the network change their password periodically and the new password should be different from
the old password. In case the new password is similar to any of the old passwords, the new password should not be accepted. To implement this, which security policy do you need to configure? a. Configure the “Enforce old password history” policy. b. Configure the “Enforce password history” policy. c. Configure the “Enforce password history list” policy. d. Configure the Enforce old password history list” policy.
26/ As a system administrator, you need to deploy different types of GPOs on the domain, organizational units, and individual users working on server computers. To avoid problems related to Group Policy inheritance, you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on server computers. Which of the following tools will enable you to do this task? a. Group Policy Modeling. b. Group Policy Object Reporting. c. Group Policy Object Modeling. d. Group Policy Object Simulating.
27/ Consider the following statements: Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders stored in the folder. Statement B: You cannot access the encrypted files and folders like ordinary files and folders.
Which of the following is correct about the above statements? a. Statement A is true and Statement B is false. b. Statement A is false and Statement B is true. c. Both, Statement A and B are true. d. Both, Statement A and B are false.
28/ You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog box. What can be the possible cause of this problem? a. The folder is located on a disk partition that is not NTFS.
b. You are not a member of the group that has deny permission for the folder. c. You don’t have appropriate rights for the folder. d. Shadow copies are configured on the folder.
29/ You want to delegate the task of performing backup and restore operations to your junior administrator, Steve. Which of the following options will enable you to do this? a. Add Steve to the Backup Operators group. b. Add Steve to the Enterprise Administrator group. c. Add Steve to the Network group. d. Add Steve to the Domain Users group.
30/ Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its sales department. Steve has been assigned the task of creating user accounts for the new employees. Which of the following options will enable him to accomplish this task with the least administrative effort? a. Create user accounts using user account template. b. Create 30 user accounts one by one. c. Create user accounts using user profiles. d. Create user accounts using command line tools.
31/ Which of the following options provides a secure path between the client and the Web server so that the data is not diverted to another computer? a. HTTP. b. SSL. c. NNTP. d. FTP.
32/ Consider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.
Which of the following options is correct about the above statements? a. Statement A is true and Statement B is false. b. Both, statement A and statement B are true. c. Both, statement A and statement B are false. d. Statement A is false and Statement B is true.
33/ Ken finds that the access token granted during the log on session is large. He decides to reduce the token size so that the logon process can be fast. Which group should Ken create to achieve this? a. Security. b. Distribution. c. Universal. d. Global. 34/ You have created a GPO, Security_GPO, and linked it to the Marketing and Finance organizational units. However, due to change in the organizational structure, you do not want this GPO to be applied to both the organizational units. In addition, you want to retain this GPO. Which of the following options will enable you to do this task? a. Delete the Security_GPO GPO and create a similar GPO. b. Create another GPO containing similar Group Policies. c. Remove the GPO link and delete the Security_GPO GPO. d. Remove the Security_GPO GPO link.
35/ You are the system administrator of your organization. John complains that his Windows Server 2003 computer is taking more time in accessing files. Which option is a possible solution to this problem? a. Disable shadow copies on his computer. b. Clean the disk space by using the Disk Cleanup utility and defragment the hard disk by using the Disk Defragmenter utility. c. Reinstall Windows Server 2003. d. Repair Windows Server 2003.
View more...
Comments