Answers to wewentwon
216
1. You are the
administrator for your company's Windows 2000 network. Your company has three
offices: on in Dallas, TX, one in Houston, TX, and one in Galveston, TX.
Houston and Galveston are connected to Dallas by a T1 line. Each site has its
own Windows Internet Name Service (WINS) server.
You have implemented WINS replication between the WINS servers. You view the
WINS database on the WINS server in Houston. It contains records in the active
state, records in the released state, and records in the tombstoned state.
Which records will be replicated to the WINS server in Dallas?
a. All the records, regardless of their state
b. Only records in the active state
c. Both the records in the active state and the records in the released state
d. Both the records in the active state and the records in the tombstoned state
e. Both the records in the released state and the records in the tombstoned
state
2. You are the administrator for a Windows 2000 Server network. You have a Dynamic
Host Configuration Protocol (DHCP) Server which is configured to give DHCP
clients all appropriate TCP/IP settings. You also have a Domain Name System
(DNS) / Windows Internet Name Service (WINS) server. You set up a Windows 2000
Server computer to be the dial-up connection server and want to configure the
security for the dial-up connections. You want to accomplish the following
goals:
Require the entry of a password upon connection.
Use the Windows logon and password for authentication.
Require the use of data encryption.
Automatically run a script named logon.scp upon connection.
You perform the following actions:
From the dial-up connection properties on the Security tab in the Security
options section, select Typical (recommended settings) radio button.
For the Validate my identity as follows box, select Allow unsecured password.
Check the Automatically use my Windows logon name and password (and domain if
any) box.
Check the Require data encryption (disconnect if none) box. In the Interactive
logon scripting section, check the Run script box and type in filename
logon.scp.
Which goal or goals are accomplished from these actions? (Choose all that
apply.)
a. Require the entry of a password upon connection
b. Use the Windows logon and password for authentication
c. Require the use of data encryption
d. Automatically run a script named logon.scp upon connection
3. You are the administrator for your company's Windows 2000 Server network.
You company has a main office in Dallas, TX. There are three branch offices:
one in Atlanta, GA, one in Chicago, IL, and one in Sacramento, CA. All branches
are connected to Dallas by a T1 line. A diagram of the network in shown below:
The routers between the offices supports the forwarding of BOOTP messages.
At each branch office, you have a local user who is responsible for all
administrative duties. Currently the local administrator is responsible for
configuring the TCP/IP settings for all the Windows 2000 Professional computers
at his/her local branch.
You have been experiencing network communication problems which were the direct
result of configuration errors. You want to prevent this from happening again.
What should you do? (Choose two.)
a. Install and configure a Dynamic Host Configuration P. (DHCP) Server in
Dallas.
b. Install and configure a Windows Internet Name Service (WINS) Server in
Dallas.
c. Install and configure a Domain Name System (DNS) Server in Dallas.
d. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain an IP address automatically.
e. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain WINS server address automatically.
f. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain DNS server address automatically.
4. You are the administrator for your company's Windows 2000 domain. You have a
Windows 2000 Server computer that is your Domain Name System (DNS) server. The
DNS server contains the following types of resource records:
Start of Authority (SOA)
Name Server (NS)
Address (A)
Point (PTR)
Mail Exchange (MX)
Service (SRV).
You update a host resource record.
Which type of record may be associated with this record and need to be updated
also?
a. The associated SOA resource record
b. The associated NS resource record
c. The associated A resource record
d. The associated PTR resource record
5. You work for a local state agency that does not use Windows Internet Name
Service (WINS) for NetBIOS name resolution. Instead, each client on the network
copies a master LMHOSTS file from a central server during the logon process.
After experiencing a number of problems with the current Primary Domain
Controller (PDC) named MIS4 of the HR domain, you decide to promote one of the
Backup Domain Controllers (BDCs) named Payroll2 to PDC status and take the
former PDC offline.
In the master LMHOSTS file, you take off the listing for the former PDC.
What is the other change you must make?
a. 128.131.24.122 Payroll2 #DOM:HR
b. 128.131.24.122 Payroll2 #DOMAIN:HR
c. 128.131.24.122 #PRE Payroll2 #DOM:HR
d. 128.131.24.122 Payroll2 #PRE #DOM:HR
6. Your home office network contains 2 Windows 2000 Server computers, 1 Windows
2000 Professional client computer, and 1 Windows 98 second edition client
computer.
You want to accomplish the following goals:
Provide one Internet connection for the entire network.
Provide network address translation.
Provide name resolution.
Provide IP address configurations for the entire network.
You perform the following tasks:
You enable Internet Connection Sharing.
You create a connection between the network and the Internet.
You install and configure LAN adapters connecting the client computers to the
network.
Which goal is accomplished from these tasks?
a. Provide one Internet connection for the entire network
b. Provide network address translation
c. Provide name resolution
d. Provide IP address configurations for the entire network
7. You are the administrator for your company's network. Your network has three
Windows 2000 Server computers, named Srvr1, Srvr2, and Srvr3. Each employee has
his own Windows 2000 Professional computer. Also there is one Windows 2000
Professional computer, named Prof1, that is used by the general public.
Recently several files have been written to Srvr1 and Srvr2 that could have
possibly caused great harm to your company's network. You suspect that the
files came from Prof1. You want to monitor the traffic between these three
computers.
Srvr3 is located in your office so you decide to capture the data there. You
want to accomplish these goals with the least amount of administrative
overhead.
What should you do?
a. On Srvr3, install the Network Monitor Tools. Then start Network Monitor and
configure the capture data for Prof1, Srvr1, and Srvr2.
b. On Prof1, install the Network Monitor driver.
On Srvr1 and Srvr2, install the Network Monitor driver.
On Srvr3, install the Network Monitor Tools. Then start Network Monitor and
configure the capture data for Prof1, Srvr1, and Srvr2.
b. On Prof1, install the Network Monitor Tools. Then start Network Monitor and
configure capture data for Prof1. On Srvr1 and Srvr2, install the Network
Monitor driver. On Srvr3, install the Network Monitor Tools. Then start Network
Monitor and configure the capture data for Srvr1 and Srvr2.
d. On Prof1, install the Network Monitor driver
On Srvr1 and Srvr2, install the Network Monitor Tools. Then start Network
Monitor and configure the capture data for Srvr1 and Srvr2, respectively.
On Srvr3, install Network Monitor Tools. Then start Network Monitor and
configure the capture data for Prof1.
8. You administer your company's network. You have 20 Windows 2000 Professional
computers operating in a switched network environment running TCP/IP. Ten of
the Windows 2000 Professional computers are on subnet A. The other ten Windows
2000 Professional computers are on subnet B.
The company uses a Windows 2000 Server computer running Internet Authentication
Service (IAS) to connect to the Internet. The IAS server is on subnet B. You
decide to set up Network Monitor to monitor all traffic on your network. You
install Network Monitor on the IAS server. You configure Network Monitor
properly to monitor all TCP/IP traffic.
Which packets will you be able to monitor?
a. All packets
b. Only packets sent from the IAS server
c. Only packets addressed to the IAS server
d. All packets addressed to and sent from the IAS computer
9. You administer your company's Windows 2000 network. Your company employs a
sales force that needs access to the latest company data when traveling. You
want to ensure that the company will establish a network connection for your
salespeople regardless of where the call originates.
Your company also allows customers access to the network using Routing and
Remote Access to view and track orders. To ensure network and data security,
your company wants to specify the location from which customers can connect to
your network. You want to configure your company's Routing and Remote Access
server (RRAS) to facilitate access for salespeople and for customers. You want
both the salespeople and the customers to use mutual authentication to provide
protection against remote server impersonation.
Which settings should you configure? (Choose three.)
a. Set Callback option to Always Callback To for salespeople
b. Set Callback option to Set by Caller for salespeople
c. Set Callback option to No Callback for customers
d. Set Callback option to Always Callback to for customers
e. Enable Microsoft Challenge Handshake Authent. Pr. version 2 (MS-CHAP v2)
10. You are the administrator for your company's network. You have several
NetWare servers running on your network and want to synchronize the user
accounts between your Windows 2000 Server domain and your NetWare Servers.
You select all the NetWare servers and use the Directory Service Manager for
NetWare (DSMN) to synchronize the user accounts.
You receive the following error message: "NWC is a NetWare 4.x server. It
cannot be added to the domain."
What should you do?
A Remove the bindery emulation mode option from NWC. Reboot NWC. Rerun
DSMN, selecting only NWC for synchronization
B. Do nothing. NetWare 4.x servers running in bindery emulation mode cannot be
added to Windows 2000 Server domains under any circumstances.
C. Using REGEDT32.exe on the Windows 2000 Server domain controller, go to the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters key.
Choose Add Value option for Edit menu. In Value Name, type Allow4X. In Type,
enter REG_DWORD. In Data, enter 1. Close the Registry. Restart the Windows 2000
Server.
D. Using REGEDT32.exe on the Windows 2000 Server domain controller, go to the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters key.
Choose Add Value option for Edit menu. In Value Name, type Allow4X. In Type,
enter REG_DWORD. In Data, enter 0. Close the Registry. Restart the Windows 2000
Server
11. You are the administrator for a Windows 2000 Server network. The network
contains three Windows 2000 Server computers and 35 Windows 2000 Professional
client computers.
You want to accomplish the following goals:
Install and enable Network Address Translation (NAT) on the network.
Allow Internet users to access resources from the network.
Install and enable Internet Connection Sharing.
Configure dynamic IP addresses on the network.
You perform the following actions:
You configure a static IP address configuration on the resource server.
You exclude the IP address used by the resource computer from the range of IP
addresses allocated by the NAT computer.
Configure a special port with a dynamic mapping of a public address and port
number to a private address and port number.
Which goal or goals are accomplished from these actions? (Choose all that
apply.)
a. Configure dynamic IP addresses on the network
b. Install and enable Internet Connection Sharing
c. Allow Internet users to access resources from the network
d. Install and enable Network Address Translation (NAT) on the network
12. You are the administrator for your company's Windows 2000 domain. On this
domain, you have a Windows 2000 Server computer acting as your company's
Internet interface.
This morning when you came to work, you noticed that you had an unusually long
wait time to access resources on your network. You run several tests but cannot
seem to find any problems although the access times are incredibly long.
When the users come in for work, they immediately start complaining about
network performance. You then decide to start checking packets on the network.
After investigating the problem, you notice that a denial of service attack has
flooded your Internet server with "Destination Unreachable" packets.
You want to prevent this from happening again with the least amount of
administrative overhead possible. You do not want to prevent legitimate packets
from being forwarded.
What should you do?
A Configure input filters on the Internet server to accept all packets except
IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0 and IP Address 192.168.0.0 with
Subnet Mask 255.255.0.0.
B Configure input filters on the Internet server to accept all packets except
IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0 and IP Address 172.16.0.0 with
Subnet Mask 255.240.0.0.
C Configure input filters on the Internet server to accept all packets except
IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0, IP Address 172.16.0.0 with Subnet
Mask 255.240.0.0, and IP Address 192.168.0.0 with Subnet Mask 255.255.0.0.
D Configure input filters on the Internet server to accept all packets except
IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0, IP Address 127.0.0.1 with Subnet
Mask 255.0.0.0, IP Address 172.16.0.0 with Subnet Mask 255.240.0.0, and IP
Address 192.168.0.0 with Subnet Mask 255.255.0.0.
13. You have just taken a job with a company that would like to convert its
current network operating system to Windows 2000. The company has four subnets
on its TCP/IP network, each of which will have its own Backup Domain Controller
(BDC), except for the subnet on which the Primary Domain Controller (PDC) will
reside.
The company would like to allow browsing across the entire network without
needing the implement Windows Internet Name Service (WINS) on a Windows 2000
Server computer.
What should you do?
a. Create an LMHOSTS file. Create entries in the LMHOSTS file for the PDC and
all
BDCs using the #DOM keyword. Place this file on the PDC.
b. Create an LMHOSTS file. Create entries in the LMHOSTS file for the PDC and
all
BDCs using the #DOM keyword. Place this file on the PDC and all BDCs.
c. Create an LMHOSTS file. Create an entry in the LMHOSTS file for the PDC and
all
BDCs using the #MH keyworkd. Place this file on the PDC.
d. Create an LMHOSTS file. Create an entry in the LMHOSTS file for the PDC and
all
BDCs using the #MH keyword. Place this file on the PDC and all BDCs
14 You are the administrator of your company's network. Your company owns the
Class B subnet 172.41.48.0/24 that consists of 12 servers and 200 client
computers, all configured as DHCP clients. The hard disk on your company's DHCP
server fails, and your server responds with a fatal error. Your company does
not have a backup of the server, and you do not remember which IP addresses have
been distributed throughout the network. You need to install a new DHCP server
to prevent any connectivity problems that might occur.
What should you do? (Choose two)
A Increase Conflict Detection Attempts on the DHCP server
B Decrease Conflict Detection Attempts on the DHCP server
C Add an exclusion for the 12 servers
D Create a scope that has a range of 172.41.48.1 to 172.41.48.200
E Create a scope that has a range of 172.41.48.1 to 172.41.48.254
15 Your company has a SNMP-enabled network router installed on its network.
Your company wants to monitor all SNMP traffic generated by the router. You
install Network Monitor on a Windows 2000 server computer on your network. Your
router is configured to trap to an SNMP manager installed on another server.
You want to receive a notification whenever the network router raises an SNMP
trap.
What should you do? (Choose two)
A Create an Network Monitor filter that has a pattern match for SNMP-traffic.
B Install SNMP on the server.
C Create a network monitor trigger to run the Net Send command
D Create a TCP/IP filter on the server.
E Start the Windows 2000 Alerter Service on the server.
F Configure the network router to trap to the IP address of the server.
16 You have a IPSec policy, you want to prevent the re-use of previous-session
keys.
What should you do?
A On the generate a new key every property sheet, modify the time allocations
B Master key Prefect forward Secrecy check box
C Session key Prefect forward Secrecy check box
D ??
17.You are the administrator of your company's network The network consists of
a single Windows 2000 domain The network has Windows 2000 Server computers,
Windows 2000 Professional computers, and Windows NT Workstation 40 computers
distributed across two IP subnets as shown in the exhibit (Click the Exhibit
button) Two Windows 2000 domain controllers are located on Subnet1 Each domain
controller is also a DNS server hosting an Active Directory integrated zone You
implement WINS for NetBIOS name resolution on your network WINS is installed on
a server on Subnet2 Users of the Windows NT Workstation 40 computers on Subnet2
report that they are receiving the following error message 'Domain Controller
cannot be located' Subsequently, these users cannot be validated on the network
Windows NT Workstation 40 users on Subnet1 are not experiencing this problem.
However, they do report that response times for logon requests are extremely
slow None of the Windows 2000 Professional users on either subnet report these
problems You want to ensure that Windows NT Workstation 4.0 users on Subnet2
can be validated You also want to improve logon request response time for users
on Subnet1
What should you do?
A .Configure the router to forward NetBIOS broadcast packets
B .Configure the Windows NT Workstation 40 computers as WINS clients in the
exist. zone
C. Configure the Windows NT Workstation 40 computers as WINS clients
D. Configure the Windows 2000 Server domain controller computers as WINS
clients
18.You are the administrator of a Windows 2000 network. The network has seven
Windows 2000-based WINS servers, and each is in a separate location. Because
network users frequently log on at different locations, you want to configure
the seven WINS servers to have a convergence time of less than one hour.
How should you configure the seven WINS servers to accomplish this goal?
A. Create a display of the seven WINS servers in a circular arrangement
Configure each WINS server as a push/pull partner with the two WINS servers beside
it in the circle .Use a replication interval of 25 minutes
B. Designate one of the WINS servers as the central WINS server Configure the
other six WINS servers as push/pull partners with the central WINS server.
Configure the central WINS server as a push/pull partner with the other six
WINS servers. Use a replication interval of 25 minutes
C. Configure each WINS server to automatically configure the other WINS servers
as its replication partners Use the default interval time for automatic
partners configuration.
D. Configure each WINS server to use a renew interval of 50 minutes . Use the
default value for the verification interval
19.You are the administrator of a Windows 2000 domain The domain has four
Windows 2000-based WINS servers . You want to delegate the ability to create
the four WINS servers' performance logs to a domain user named Kim . You do not
want Kim to be able to change the configuration of the four WINS servers The
performance logs for the WINS servers are created by using the Performance
console.
How should you configure the network to accomplish this goal?
A. Add the user Kim to the Domain Local group named Wins Users.
B. Create a new Domain Local group named Performance Administrators Add the
user Kim to the Performance Administrators group
C. On the four WINS servers, change the NTFS permissions on the System32\Wins
folder to include Read permission for user Kim
D. On the four WINS servers, change the Registry permissions on the HKEY
-LOCAL-MACHINE\system\CUrrentContro\Set\ServiCeS\W key to include Read
permission for user Kim.
20 You are the administrator of your company's network The network consists of
10 Windows 2000 Server computers, 200 Windows 2000 Professional computers, 250
Windows 98 computers, and 25 UNIX workstation computers running 5MB server
software. The network runs only TCP/IP as its transport protocol You implement
WINS in the network for NetBIOS name resolution.
Users of the Windows-based client computers report that they cannot access
resources based on the UNIX computers by NetBIOS name
There is no problem accessing Windows-based resources by NetBIOS name
What should you do to resolve this problem?
A. Install a WINS proxy agent on one of the UNIX computers
B. Install a WINS proxy agent on one of the Windows-based computers
C. On the WINS server, create static mappings for the UNIX computers
D. On the WINS server, create static mappings for the Windows-based computers
21.You are the administrator of a Windows 2000 network The network has four
Windows 2000-based WINS servers named NY1 , NY2, Bos1 , and Bos2 The network
has computers in two locations Boston and New York . The Bos 1 and Bos2 WINS
servers are at the Boston location The NY1 and NY2 WINS servers are at the New
York location.
You want to configure the replication between the WINS servers to accomplish
the following goals The NY1 and NY2 WINS servers must replicate changes in the
local database to each other immediately following each new registration or IP
address change registration The Bos1 and Bos2 WINS servers must replicate
changes in the local database to each other every 30 minutes.
The changes in the WINS database in either location should be replicated to the
other location every three hours.
How should you configure the WINS servers to accomplish these goals? (Choose
three)
A. Configure the WINS servers to enable burst handling. Set the number of
requests for burst handling to 1
B. Configure the NY1 and NY2 WINS servers as push/pull partners of each other.
Configure both WINS servers to use persistent connections for push replication
partners Set the number of changes before replication to 1
C. Configure the Bos1 and Bos2 WINS servers as push/pull partners of each other
Specify a replication interval of 30 minutes
D. Configure the Bos1 and Bos2 WINS servers as push/pull partners of each other
Configure both WINS servers to enable periodic database consistency checking
every 30 minutes
E. Configure the NY1 and the Bos1 WINS servers as push partners of each other.
Configure both WINS servers to update statistics every three hours
F. Configure the NY1 and the Bos1 WINS servers as push/pull partners of each
other Specify a replication interval of three hours
22. You are the administrator of a Windows 2000 network The network has three
Windows 2000-based WINS servers named Srv1 , Srv2, and Srv3 You want to
periodically compact the WINS database to reclaim unused space.
How should you perform a manual compaction of the WINS database on the Srv1
WINS server?
A. Configure the Srv1 WINS server to block replication of WINS records from the
Srv2 and Srv3 WINS servers Initiate database consistency checking . Allow
replication of records from the Srv2 and Srv3 WINS servers.
B. Stop the Srv1 WINS server. Use the jetpack command-line tool to compact the
WINS database Start the Srv1 WINS server again.
C. Stop the Srv1 WINS server. Use the Backup Database command to create a
backup of the Srv1 WINS database. Compact the backup of the database by using
the compact command-line tool. Use the Restore Database command to restore the
backup of the database. Start the Srv1 WINS server again
D. In the WINS console, use the Scavenge Database command
23. You are the administrator of a Windows 2000 network. The network has six
Windows 2000-based WINS servers and two Windows 2000-based DHCP servers.
To anticipate the migration of the network from WINS to DNS, you decide to
remove one WINS server named Wins6 from the network by performing the following
actions.
On Wins6, stop the WINS Service and uninstall WINS.
On the DHCP servers in the network, reconfigure the options to no longer
specify Wins6 as a WINS server Configure the DHCP options to instead use the
other five WINS servers equally.
On WINS client computers that are manually configured to use TCP/IP , re
configure the network properties to no longer use Wins6 as a WINS server
Configure these client computers to instead use any of the other five WINS
servers.
On one of the remaining WINS servers, delete the static mappings originally
made on Wins6
After two weeks, you notice that static mappings originally made on Wins6 are
still present on all the remaining WINS servers.
What should you do to permanently remove these unwanted static mappings from
the remaining WINS servers?
A. On the remaining WINS servers, use the Scavenge Database command in the WINS
console
B. On the remaining WINS servers, perform an offline compaction of the WINS
database
C. Configure the remaining WINS servers to use Migrate On handling of static
entries
D. On one of the remaining WINS servers. manually tombstone the Wins6 owner
from the database .
24. You are the administrator of a Windows 2000 network The network has three
segments connected by a router. Each segment contains a Windows 2000-based WINS
server and two other Windows 2000 Server computers. The network also has 300
Windows NT Workstation 4.0 WINS client computers distributed evenly over the
three segments. Users in each network segment inform you that they cannot
browse any network resources on the other network segments. They do not have
problems browsing their own segment.
How should you configure the network to enable users to browse for network
resources on all three network segments?
A. Configure all WINS client computers to be NetBIOS node type Mixed (m-node)
B. Configure all WINS client computers to use all three WINS servers.
C. On each WINS server, configure the Lmhosts file to contain entries that
include #PRE and #DOM for the other two WINS servers
D.Configure the three WINS servers as replication partners of one another
25. You are the administrator of your company's network. The network consists
of a single IP subnet that uses DHCP to automate client computer configuration.
You install a WINS server on the network to reduce broadcast traffic for name
resolution.
After several days, users report that the network response time is still
unacceptably slow.
You investigate and discover that the levels of broadcast traffic have not been
reduced. When you view the WINS database, you also find that the only entry is
for the WINS server itself
What should you do to resolve this problem?
A. Configure the WINS server as a DHCP client computer
B. Configure the DHCP server as a WINS client computer
C. Configure a DHCP scope option to include the address of the WINS server
D. Configure static mappings on the WINS server for each client computer
26. You are the administrator of your company's network You have a portable
computer that uses Microsoft Internet Explorer to access your company's
Internet Information Services (lIS) computer. This application works
successfully when your portable computer is docked at the office, but it fails
when your portable computer is connected by Routing and Remote Access
You want to configure your portable computer to connect to your company's
network by Routing and Remote Access You want to install only what is necessary
while maximizing performance and minimizing administrative overhead.
What should you do?
To answer, click in the appropriate box or boxes in the Networking tab of the
dialog box.
Internet Protocol [TCP/IP)
File and Printer Sharing for Microsoft Networks
Network Load Balancing
Client for Microsoft Networks
27. You are the administrator of a Windows 2000 domain. The domain has two
Windows 2000 member server computers named Istanbul and Rome. Routing and
Remote Access is enabled for remote access on Rome. Internet Authentication
Service (IAS) is installed on Istanbul Rome uses Istanbul to authenticate
remote access credentials.
The remote access policies on Istanbul specify that domain members are allowed
remote access to the network.
However, users report that they are not allowed to dial in to Rome When you
investigate the problem, you discover that the configuration of Istanbul
supports only local user accounts.
What should you do?
A. Add Istanbul to the RAS and IAS Servers group in Active Directory
B. Configure Routing and Remote Access on Istanbul to use RADIUS Authentication
C. On Istanbul, add a realm replacement rule for the Windows 2000 domain.
D. On Istanbul, add a remote access policy that uses MS-CHAP
28. You are the administrator of a Windows 2000 network that consists of a
single domain Because no employee in your company should have the ability to encrypt
files by using Encrypting File System (EFS), you need to remove this ability
from all users in the domain
What should you do to accomplish this goal? (Choose all that apply)
A. From the Run command, start Secpolmsc
B. Go to the Encrypted Data Recovery Agents container and delete the
certificate you find.
From the Active Directory Users and Computers console, access the Group Policy
Editor and edit the domain policy.
C. Go to the Public Key Policies container and delete the Encrypted Data Recovery
Agents policy From the Active Directory Users and Computers console, access the
Group Policy Editor and edit the domain policy.
D. Go to the Encrypted Data Recovery Agents container and delete the
certificate you find
E. Go to the Encrypted Data Recovery Agents container and initialize the empty
policy From the Active Directory Users and Computers console, access the Group
Policy Editor and edit the domain policy
F. Go to the Public Key Policies container and initialize the empty policy
29. You are the administrator of your company's network Your company has branch
offices in New York and Paris . Because each branch office will support its own
Routing and Remote Access server, you implement a Remote Authentication Dial-In
User Service (RADIUS) server to centralize administration
You remove the default remote access policy
You need to implement one company policy that requires all dial-up
communications to use 40-bit encryption.
You want to configure your network to require secure communications by using
the least amount of administrative effort.
What should you do? (Choose two)
A. Create one remote access policy on each Routing and Remote Access server
B. Create one remote access policy on the RADIUS server
C. Set encryption to Basic in the remote access policy or policies
D. Set encryption to Strong in the remote access policy or policies
E. Enable the Secure Server IPSec policy on the RADIUS server
F. Enable the Server IPSec policy on the RADIUS server
30. You are the administrator of your company's network. You need to Implement
a remote access solution that is highly available and highly secure Your
company consists of a single location and has a T3 connection to the Internet.
Your company has 1,000 salespeople who need reliable connectivity to the
company network from any remote location All servers are running Windows 2000
Advanced Server, and all client computers are running Windows 2000
Professional.
You want to accomplish the following goals:
No single point of failure, aside from total loss of the T3, will result in
total loss of remote access connectivity.
No authentication traffic will be carried as clear text.
No data traffic will be carried as clear text.
Support for at least 200 simultaneous remote users accessing the network will
be available at all times.
You take the following actions:
Install three virtual private network (VPN) servers at the main office.
Configure each VPN server to support 150 PPTP connections.
Configure the client computers to use Password Authentication Protocol (PAP) as
the authentication protocol.
Create DNS Round Robin entries with a Time to Live (TTL) of zero for each VPN
server
Which result or results do these actions produce? (Choose all that apply)
A. No single point of failure, aside from total loss of the T3, results in
total loss of remote access connectivity
B. No authentication traffic is carried as clear text
C. No data traffic is carried as clear text
D. Support for at least 200 simultaneous remote users accessing the network is
available at all times
31. You are the administrator of your company's network You are configuring
your users' portable computers to allow users to connect to the company network
by using Routing and Remote Access.
You test the portable computers on the LAN and verify that they can
successfully connect to resources on the company network by name.
When you test the connection through Remote Access, all of the portable
computers can successfully connect, but they cannot access files on computers on
different segments by using the computer name.
What should you do to resolve this problem?
A. Set the authentication method to Allow remote systems to connect without
authentication
B. Enable the computer account for each portable computer
C. Change the computer name on each portable computer
D. Install the DHCP Relay Agent on the Remote Access server
32. You are the administrator of a Windows 2000 domain. The domain has a
Windows 2000 member server computer named DeskA Routing and Remote Access is
enabled for remote access on DeskA.
Your company is organizing an industry trade show in a conference center You
have set up 15 desks and telephones in the conference area. During the
conference, attendees will be allowed to dial in to your network by using any
of the 15 telephones Each telephone line has its own telephone number.
The conference attendees can use their own portable computers to dial in. When
attendees dial in to DeskA, they do not need to specify a user name or password
However, you do not want to allow dial-in access from any telephone other than
the 15 telephones in the conference area. You enable unauthenticated access on
the DeskA remote access server
You also create a remote access policy named Conference that allows
unauthenticated access as the authentication method. Attendees report that they
are not able to dial in unless they specify a user name and password
You want to ensure that attendees can dial in without specifying a user name
and password.
What should you do?
A. Create a user account named Conference Guest. Configure Routing and
Remote Access to use the Conference Guest account as the default user identity.
B. Configure the Conference Guest account to use the 15 phone numbers as Caller
ID
Create 15 user accounts named Conf-1, Conf-2, Conf-3, and so on through Conf-15
Specify a separate Caller ID phone number for each of the 15 users.
C. Create 15 user accounts that use each phone number as the user name .
Configure Routing and Remote Access to use the calling number as the
authentication identity.
D. Configure the Conference remote access policy so that it has a
Calling-Station ID condition. Use the 15 phone numbers as the condition
33. You are the administrator of your company's network T o facilitate connections
for remote administration, you install Routing and Remote Access on a Windows
2000 domain controller.
You want to accomplish the following goals
Only administrators will have dial-up access
Dial-up connections will be accepted only from 400 p .M to 700 AM.
Connections will be forcibly disconnected after 20 minutes of inactivity
All connections will encrypt all communications
Connections will be limited to one hour
You take the following actions
Set the level or levels of encryption to No Encryption and Basic.
Add Domain Admins to the Windows Group Policy condition.
Configure the rest of the remote access policy as shown in the exhibit
(Click the Exhibit button)
Idle time 60
Max session time 20
Allow dial times Sun 07:00-16:00
Mon 07:00-16:00 etc...
Which result or results do these actions produce? (Choose all that apply)
A. Only administrators have dial-up access
B. Dial-up connections are accepted only between 400 PM and 700 A.M
C. Connections are forcibly disconnected after 20 minutes of inactivity
D. All connections encrypt all communications
E. Connections are limited to one hour
34. You are the administrator of your company's Routing and Remote Access
servers Your company's administrators are able to dial in to the company's
network to perform remote monitoring and administration
This remote monitoring and administration requires an excessive amount of
network bandwidth You want to allow only administrators to use multiple phone
lines, and you want to limit all other users to a single phone line.
You want to configure multiple phone-line network connections to adapt to
changing bandwidth conditions. When the phone lines fall below 50 percent
capacity, you want to reduce the number of phone lines utilized.
You also want to allow all users the ability to connect to the network by
Routing and Remote Access No default remote access policies currently exist
What should you do? (Choose three)
A. Create one remote access policy on the Routing and Remote Access server
B. Create two remote access policies on the Routing and Remote Access server
C. Allow Multilink
D. Decrease the maximum number of ports used by the Routing and Remote Access
server
E. Select the Require Bandwidth Allocation Protoco\ BAP) for the Dynamic Multilink
Requests check box.
F. Increase the maximum number of dial-up sessions
35. You are the administrator of a Web server hosted on the Internet that is
running on a Windows 2000 Server computer.
Your company's Web developers have developed applications that download ActiveX
controls automatically to your customers' browsers.
You discover that the default security settings on your customers' browsers are
preventing the ActiveX controls from being downloaded automatically. You want
to facilitate the downloading of ActiveX controls from your Web server to the
Internet clients
What should you do?
A. Install an Enterprise Subordinate Certificate Authority (CA) that uses a
commercial CA as the parent. Create a policy on the CA that allows the Web
developers to request a certificate for code signing
B. Install an Enterprise Certificate Authority (CA). Create a policy on the CA
that allows the Web developers to request a certificate for trust list signing.
C. Install an Enterprise Subordinate Certificate Authority (CA) that uses a
commercial CA as the parent. Create a policy on the CA that allows the Web
developers to request a certificate for trust list signing
D. Install an Enterprise Certificate Authority (CA). Create a policy on the CA
that allows the Web developers to request a certificate for code signing
36. You are the administrator of a Windows 2000 network Your company wants you
to provide a high level of security for its Public Key Infrastructure.
You decide to create an offline root Certificate Authority (CA) You want the
offline root CA to be capable of processing certificate requests from files,
and you want the offline root CA to be recognized as a trusted root authority
for Windows 2000 client computers.
How should you create the offline root CA?
A. On a member Windows 2000 Server computer that is connected to the network,
create an Enterprise CA. After you install the CA, remove the server to a
secure and separate location
B. On a member Windows 2000 Server computer, create a subordinate Enterprise CA
that uses a Commercial CA as the certifying authority. After you install the
CA, remove the server to a secure and separate location
C. On a stand-alone Windows 2000 Server computer that is isolated from the
network, create a Stand-Alone CA. Export the certificate for the CA to a floppy
disk
D. In the Default Domain Group Policy object (GPO) , import the certificate to
the Enterprise Trust Certificate Store
E. On a stand-alone Windows 2000 Server computer that is isolated from the network,
create a Stand-Alone CA. Export the certificate for the CA to a floppy disk. In
the Default Domain Group Policy object (GPO), import the certificate to the
Trusted Root Certification Authority Store
37. You are the administrator of a Windows 2000 network Some of the members of
your company's graphics department use Macintosh computers and are not using
Internet Explorer as their browser.
These users inform you that they cannot request valid user certificates from
your Enterprise Certificate Authority (CA).
You want to make it possible for these users to request certificates by using
Web-based enrollment.
What should you do?
A. In the Internet Information Services (IIS) console, access the properties
for the CertSrv virtual directory. On the Directory Security tab, set the
authentication type to Basic Authentication
B. In the Policy Settings container in the CA console for your CA, add a new
Enrollment Agent certificate
C. Edit the ACL on the user certificate template to grant the graphics department
users enroll access
D. In the Internet Information Services (IIS) console, access the properties
for the CertSrv virtual directory. On the Directory Security tab, set the
authentication type to Integrated Windows Authentication
38. You are the administrator of a Windows 2000 network. The network consists
of one Windows 2000 domain that has Windows 2000 Professional client computers
and Windows NT Workstation 40 client computers. To create a digital
certificate, you use a stand-alone certificate server configured as a root
Certificate Authority (CA). You use the digital certificate to secure a virtual
directory on your Internet Web server.
Users report that when they connect to the virtual directory by means of a new
URL, a Security Alert dialog box appears with the following warning message
'The security certificate was issued by a company you have not chosen to trust'
You want to prevent this warning message from appearing. You also want to avoid
any unnecessary reconfiguration of either the certificate server or the Web
server.
What should you do?
A. Inform your users of the new URL that points to the host name used in the
digital certificate
B. Configure a Group Policy that automatically installs as a trusted authority
in the client computers the digital certificate for the certificate server
C. Inform your users that they need to install a client certificate from the
certificate server
D. Inform your users that they need to install as a trusted authority in the
client computers the digital certificate for the certificate server
39. You are the administrator of your company's network. The network consists
of Windows 2000 Server computers, Windows NT Workstation client computers, and
Windows for Workgroups 311 client computers distributed across three subnets
All client computers are configured as DHCP client computers to automate TCP/IP
configuration.
You install a WINS server on one subnet on your network You also define a DHCP
scope option to include the WINS server's address. Users report that they can
access resources on servers on their own subnet, but they cannot access
resources on other subnets.
What should you do to resolve this problem?
A. Use the ipconfig /renew command to refresh the client computers'
configuration
B. Use the ipconfig /release command to refresh the client computers'
configuration
C. Install a WINS proxy agent on the subnet that hosts the WINS server
D. Install a WINS proxy agent on the subnets that do not host the WINS server
40. You are the administrator of a Windows 2000 network. The network has 18,000
Windows 2000 Professional WINS client computers and six Windows 2000-based WINS
servers The WINS client computers are portable client computers, and they
frequently connect to the network at different locations.
The WINS client computers access NetBIOS-based resources. The TCP/IP
configuration of the WINS client computers is provided by DHCP servers on the
network.
Some of the WAN links in your network are unreliable You want to ensure that
all Windows 2000 Professional computers are able to resolve NetBIOS names, even
if some of the WINS servers are not available
How should you configure the network to accomplish this goal?
A. On each segment, configure a computer as a WINS proxy
B. Configure the DHCP servers to provide each client computer with a list of
WINS servers.
C. Configure the WINS servers to enable burst handling Set the number of
requests for burst handling to High
D. Configure the DHCP server to set the NetBIOS over TCP/IP node type for each
client computer to Mixed node)
41. You are not running in native mode.
Your company is a sales organization and has 150 salespeople. When these
salespeople are out of the office, they require file and print services,
e-mail, and access to the company's product and inventory database.
These salespeople belong to a group named SalesMobile. Your company has
dedicated T1 access to the Internet Your company also uses a virtual private
network (VPN) to reduce the costs and hardware required to support the
salespeople.
You want to accomplish the following goals:
Required network resources will be accessible to all salespeople
Connections to the network will be made only by salespeople
Sensitive company data will be kept confidential over the VPN connections
Access to the network will only take place during business hours
All salespeople will be able to connect to the network simultaneously
You take the following actions:
On a Windows 2000 Server computer, install Routing and Remote Access and
configure virtual private networking.
Increase the WAN Miniport (PPTP) maximum port limit to 150.
Create a new remote access policy that has the condition to allow access to the
users in the SalesMobile group
Set the new remote access policy's order of precedence higher than the default
policy.
Edit the default remote access profile to require strong encryption of data.
Which result or results do these actions produce? (Choose all that apply)
A. Required network resources are accessible to all salespeople
B. Connections to the network are made only by salespeople
C. Sensitive company data is kept confidential over the VPN connections
D. Access to the network only takes place during business hours
E. All salespeople are able to connect to the network simultaneously
42. You are the administrator of a Windows 2000 domain. The domain has a
Windows 2000 member server computer named Delta Routing and Remote Access is
enabled for remote access on Delta. The domain is in native mode For all user
accounts, the dial-in permission is set to control access through remote access
policies.
You want to allow all users in the domain to dial in during the workday. You
also want to allow only members of the global security group named Support
Staff to be able to dial in between 6 00 PM and 8 00 AM. However, you do not
want to allow the Support Staff members to be able to dial in when the log
files are made each day between 7:00 AM and 8:00 AM. You create four remote
access policies on Delta as shown in the following table
Name
Domain users all policy
Support staff all policy
Domain users 6-8 policy
Condition
Windows-group=Domain users Windows-group=Support staff
Day-and- Time=6PM-8AM Windows-group=Domain users
Day-and- Time= 7 AM-8AM Windows-group=Support staff
Permission Access
Access Deny Profile (default) (default) (default) Support staff 7 -8 policy
Deny (default)
To specify the appropriate access control for Delta, click the Select and Place
button, and then drag the remote access policies and place them in the correct
order.
43. You are the administrator of a Windows 2000 domain. The domain has a
Windows 2000 member server computer named Vegas Routing and Remote Access is
enabled for remote access on Vegas Some of the remote access client computers
require the use of CHAP. You enable CHAP on Vegas You also configure the
appropriate remote access policy to use CHAP. However, users who require CHAP
report that they are not able to dial in to Vegas
What should you do?
A. Configure Vegas to prohibit the use of U\.N Manager authentication
B. Configure Vegas to disable the use of link Control Protocol (lCP) extensions
C. Configure the user accounts by selecting Store passwords using reversible
encrvption Set the user passwords to change the next time each user logs on
D. Configure the user accounts to use a static IP address when they dial in to
the network
44. You are the administrator of a Windows 2000 domain. The domain has a
Windows 2000 member server computer named Ras5 Routing and Remote Access is
enabled for remote access on Ras5
The domain also has a Windows NT 40 member server computer named Ras4. Ras4 is
running Remote Access Service (RAS).
The domain is in mixed mode. Users in the domain use Windows 2000 Professional
computers to dial in to the network through Ras4 or Ras5. However, Ras4 is not
able to validate remote access credentials of domain accounts.
How should you configure the network to enable the Windows NT 40 Ras4 member
server computer to validate remote access domain users?
A. Change the domain from mixed mode to native mode
B. Add the Ras4 computer account to the RAS and IAS Servers group
C. Add the Everyone group to the Pre-Windows 2000 Compatible Access group
D. Create a remote access policy that has the Ras4 computer account as a
condition Grant remote access permission if the condition matches the
properties of the dial-in attempt
45. You are the administrator of a Windows 2000 network. Your network has one
primary internal DNS server and one primary external DNS server. Your network
has three secondary DNS servers that transfer zone information from the primary
external DNS server. The secondary DNS servers are installed on two Windows
2000 Server computers and one Windows NT Server 40 computer.
The primary external DNS server is used to host records for your company's Web
and mail servers. It has only a limited number of resource records in its zone
file The Web server and the mail server have static IP addresses.
When you monitor the secondary DNS servers by using System Monitor, you notice
a high number of hits when monitoring the counter DNS Zone Transfer SOA
Requests Sent. You want to minimize the bandwidth that is required for this
traffic
What should you do? (Choose two)
A. Upgrade the Windows NT Server 40 computer that is hosting the secondary DNS
server to a Windows 2000 Server computer
B. Configure the notify list on the primary external DNS server to notify the
secondary DNS servers when there are changes to be replicated.
C. Reconfigure the primary external DNS server so that it does not allow
dynamic updates
D. Increase the value of the Refresh interval in the SOA (start of authority)
record
E. Decrease the value of the Refresh interval in the SOA (start of authority)
record
46. You are the administrator of your company's network. Your Windows 2000
Server computer named Srv2 cannot communicate with your UNIX server named Srv1
Srv2 can communicate with other computers on your network. You try to ping
Srv1, but you receive the following error message. "Unknown host
Srv1."
You create an A (host) record that has the correct name and IP address.
However, when you try to ping Srv1 again, you receive the same error message
What should you do to resolve this problem?
A. Restart the DNS server
B. Clear the DNS Server Cache
C. Run the ipconfig Iregisterdns command on Srv2
D. Run the ipconfig /fIushdns command on Srv2
47. You are the network administrator for Wood grove Bank Your network is
configured as shown in the exhibit (Click the Exhibit button)
Srv2 and Srv3 are configured as caching-only servers. Both servers forward
requests to Srv1 Srv1 is configured as the primary server for the
woodgrovebank.com domain.
Users on networks 10 10720 and 10 10730 frequently use an Internet application
that gathers stock quotes from various servers on the woodgrovebank.com domain
You want to reduce DNS network traffic.
What should you do?
A. Increase the Time to live (TTl) for the SOA (start of authority) record on
Srv1
B. Increase the Time to live (TTl) for the SOA (start of authority) record on
Srv2 and Srv3
C. Set the Server Optimi2ation option on Srv2 and Srv3 to Maximi2e data
throughput for network applications
D. Increase the forward time-out seconds on Srv2 and Srv3
48. You are the administrator of a Windows 2000 network Your company's primary
DNS server, named ns1 contoso.com, is heavily used, and the CPU utilization on
this server is consistently high. Because of the large number of records that
are stored on the DNS server, you suspect that some DNS queries result in
answers that exceed the limit for a single UDP packet You want to know if
answers to DNS queries are exceeding the limit for a single UDP packet
What should you do?
A. Start System Monitor. On the DNS server, monitor the counters for DNS TCP
Responses Sent and DNS. TCP Responses SentlSec.
B. Start System Monitor. On the DNS server, monitor the counters for DNS UDP
Message Memory.
C. Use Network Monitor to analyze network traffic. Use nslookup on a separate
computer to query for NS records on the primary DNS server. Compare the number
of UDP packets returned from the DNS server in response to your queries with
the number of queries you issued
D. Use Network Monitor to analyze network traffic. From a client computer on your
network, ping host records that are stored on your DNS server. Compare the
number of UDP packets returned from the DNS server in response to your queries
with the number of queries you issued
49. You are the administrator of your company's network The network consists of
a single Windows 2000 domain that spans multiple locations The locations are
connected over the Internet by using Routing and Remote Access.
Resources are located on TCP/IP hosts on your network. To facilitate name
resolution for client access to these resources, you implement Windows 2000 DNS
servers on your network.
You want to ensure that when the zone transfer traffic between your DNS servers
crosses the Internet links between the locations, it cannot be compromised by
outside parties.
What should you do?
A. Select the option to allow zone transfers only to servers listed on the Name
Servers tab
B. Set up an Active Directory integrated zone
C. Set the Allow Dynamic Updates setting for your zone to No
D. Set the Allow Dynamic Updates setting for your zone to Only Secure Updates
50. You are the administrator of your company's network Your company has a main
office, two large branch offices, and two small branch offices The company's
network consists of one Windows 2000 domain
The main office and the two large branch offices are connected by dedicated T1
lines, as shown in the exhibit (Click the Exhibit button) The two small branch
offices use 128-Kbps ISDN lines and Routing and Remote Access over the Internet
to connect to the company's internal network You are designing your DNS name
resolution environment.
You want to accomplish the following goals.
DNS name resolution traffic across the WAN links will be minimized.
DNS replication traffic across the WAN links will be minimized
DNS replication traffic across the public WAN links will be secured
Name resolution performance for client computers will be optimized
You take the following actions:
Install the DNS Server service on one domain controller at each office
Create an Active Directory integrated zone on each DNS server at each office.
Configure client computers to query their local DNS server
Configure the zones to allow dynamic updates
Which result or results do these actions produce? (Choose all that apply)
A. DNS name resolution traffic across the WAN links is minimized
B. DNS replication traffic across the WAN links is minimized
C. DNS replication traffic across the public WAN links is secured.
D. Name resolution performance for client computers is optimized
51. You are the administrator of your company's network. To allow fault
tolerance for your external DNS server, your Internet service provider (ISP)
hosts a DNS server on its UNIX server. The UNIX server is used as the secondary
DNS server for your primary external DNS server Users inform you that they are
not able to connect to the URl of the company's Web server You investigate and
discover that this inability to connect occurs during times when your primary
external DNS server is unavailable.
What should you do to resolve this problem?
To answer, click the appropriate check box in the Advanced tab of the london
Properties dialog box
52. You are the administrator of your company's network. The network consists
of one Windows 2000 domain. All servers and client computers are running
Windows 2000
To facilitate name resolution and client access to resources on the servers,
you have configured your DNS standard primary zone to include the addresses of
all of your servers
You later add three new member servers to your network Users report that they
can find these servers in the directory but cannot access these servers You
want to resolve this problem.
What should you do?
A. Convert the DNS standard primary zone to an Active Directory integrated zone
B. Create SRV (service) records for each new server in the DNS zone.
C. Set the Allow Dynamic Updates setting for the DNS standard primary zone to
Yes
D. Set the Allow Dynamic Updates setting for the DNS standard primary zone to
Only Secure Updates
53. You are the administrator of the contoso.com domain. Your network
environment consists of a main office and two branch offices The branch offices
are connected to the main office by 256-Kbps leased lines You have a single DNS
zone, and all DNS servers are located at the main office
All servers on your network are running Windows 2000 Server Your network is not
connected to the Internet
Users report that response times are extremely slow when they attempt to access
intra net resources.
When you monitor the network, you discover that DNS name resolution queries are
generating heavy traffic across the WAN links
You want to accomplish the following goals:
Name resolution traffic across the WAN links will be reduced
Response times for name resolution queries will be reduced
Administrative overhead for DNS maintenance will be minimized
Current DNS namespace design will be maintained.
You take the following actions:
Increase the refresh interval for zone transfers.
For each branch office, create a new Windows 2000 domain in the same tree as
the first domain .
Install a DNS server and create a new standard primary DNS zone for each new
Windows 2000 domain
Configure each DNS server to forward requests to the other DNS servers on the
network
Add resource records for each office's local intranet resources to the local
zone files
Configure client computers in the branch offices to query their local DNS
servers only
Which result or results do these actions produce? (Choose all that apply)
A. Name resolution traffic across the WAN links is reduced
B. Response times for name resolution queries are reduced
C. Administrative overhead for DNS maintenance is minimized
D.Current DNS namespace design is maintained
54. You are the administrator of your company's network. You configure a
Windows 2000 Server computer as the DNS server for your network. You create
both standard primary forward lookup and reverse lookup zones.
You discover that when you use the nslookup utility, you cannot resolve host
names from IP addresses on your network.
You also discover that when you run the Tracert.exe utility, you receive the
following error message. "Unable to resolve target system name"
What should you do?
A. Create A (host) records in the forward lookup zone
B. Create A (host) records in the reverse lookup zone
C. Create PTR (pointer) records in the forward lookup zone
D. Create PTR (pointer) records in the reverse lookup zone
55. You are the administrator of the contoso.com domain. Your network
environment consists of a main office and two branch offices The branch offices
are connected to the main office by 256-Kbps leased lines. You have a single
DNS zone, and all DNS servers are located at the main office All servers on
your network are running.
Windows 2000 Server Your network is not connected to the Internet.
Users report that response times are extremely slow when they attempt to access
intranet resources. When you monitor the network, you discover that DNS name
resolution queries are generating heavy traffic across the WAN links.
You want to accomplish the following goals
Name resolution traffic across the WAN links will be reduced.
Response times for name resolution queries will be reduced
Administrative overhead for DNS maintenance will be minimized
Current DNS namespace design will be maintained
You take the following actions
Create a new secondary DNS zone at each branch office Use the primary zone at
the main office as the master zone.
Increase the refresh interval for zone transfers.
Configure the client computers to query their local DNS servers.
Which result or results do these actions produce? (Choose all that apply)
A. Name resolution traffic across the WAN links is reduced.
B. Response times for name resolution queries are reduced
C. Administrative overhead for DNS maintenance is minimized
D. Current DNS namespace design is maintained
56. You are the administrator of a Windows 2000 network that consists of three
subnets. For load-balancing purposes, each Web server on your network is
configured to maintain exactly the same content as all the other Web servers.
You want to configure your DNS server to allow users to type a host name in
their browsers to connect to the Web server that is on the same subnet. The
host name that all users type will be identical regardless of the subnet they
are on.
How should you configure your DNS server?
A. On the primary DNS server, create three A (host) records that map the same
host name to the IP address of the Web server on each subnet
B. On the primary DNS server, create one A (host) record that is located on the
same sub net as the DNS server. On the secondary DNS servers on the two
remaining subnets, edit the zone file for the domain on each DNS server to
include an A (host) record for the Web server on each subnet
C. On the primary DNS server, create three A (host) records that map a
different host name to the IP address of the Web server on each subnet.
D. On the primary DNS server, create one A (host) record for one Web server and
two CNAME (canonical name) records for the remaining two Web servers .
57. You are the administrator of your company's network Your primary internal
DNS server is installed on a UNIX computer named ns1 contoso.com The ns1
contoso.com server is configured to send zone transfers to a secondary DNS
server installed on a Windows 2000 Server computer named ns2 contoso.com. The
ns1 contoso.com server is also configured to send zone transfers to a DNS
server installed on a Windows NT Server 40 computer named ns3contoso.com.
When you examine the records in the zone file on the ns2contoso.com server, you
notice that they do not match the records found on either the ns 1 contoso.com
server or the ns3contoso.com server.
What should you do to correct this problem? (Choose all that apply)
A. Install the DNS Server service on a separate Windows 2000 Server computer on
your network
B. Create sub zones on the UNIX DNS server.
C. Delegate the sub zones that contain the SRV (service) records to a separate
DNS server
D. Configure the primary DNS server so that only the root zone is transferred
to the Windows 2000 DNS server.
E. Configure the WINS resource records so that they are not replicated to
secondary name servers
F. Clear the Fail on load if bad 2One data check box in the properties of the
primary DNS server
G. Change the zone on the primary DNS server from an Active Directory
integrated zone to a standard primary zone.
58. You are the administrator of a Windows 2000 network. The network consists
of 30 Windows 2000 Professional computers and two Windows 2000 Server computers
named Athens and Boston Athens has a permanent cable modem connection to the
Internet.
All Windows 2000 Professional computers on the network are configured to use Automatic
Private IP Addressing (APIPA). The network does not contain a DHCP server.
To allow all Windows 2000 Professional computers on the network to access the
Internet through the cable modem connection of Athens, you install and
configure the Network Address Translation (NAT) routing protocol on Athens
You decide to use IP addresses in the range of 192.168.40.1 through
192.168.40.50 for the network. Athens is config.to use an IP address of
192.168.40 1.
Boston is a Web server configured with an IP address of 192.168.40.2 and a
default gateway of 192168.40 1. Your Internet service provider (ISP) has
allocated two IP addresses, 207.46.179 16 and 207.46.179 17, to your network.
The network is shown in the exhibit (Click the Exhibit button) You want to allow
Internet users from outside your internal network to use an IP address of
207.46.179.17 to access the resources on Boston through the NAT service on
Athens
How should you configure the network to accomplish this goal?
A.Configure Athens with a static route on the private interface of the NAT
routing protocol.
Use a destination address of 207.46.179.17, a network mask of 255.255.255.255,
and a gateway of 192.168.40.2
B.Configure Boston with a static route on the U\.N interface. Use a destination
address of 192.168.40.1, a network mask of 255.255.255.255, and a gateway of
207.46.179.17
C. Configure the U\.N interface of Boston to use multiple IP addresses Assign
the additional lP address of 207.46.179.17 to the interface.
D. Configure the public interface of the NAT routing protocol to use an address
pool with a starting address of 207.46.179.16 and a mask of 255.255.255.254.
Reserve a public IP address of 207.46.179.17 for the private IP address of
192.168.40.2
59. You are the administrator of a Windows 2000 network. The network consists
of a Windows 2000 Server computer named SrvA and 30 Windows 2000 Professional
computers SrvA has a dial-up connection that connects to the Internet All
Windows 2000 Professional computers on the network are configured to use
Automatic Private IP Addressing (APIPA). There is no DHCP server on the
network.
SrvA is configured to use an IP address of 1921680 1 Routing and Remote Access
and all the ports on SrvA are enabled for demand-dial routing The Network
Address Translation (NAT) routing protocol is added.
You want to allow all Windows 2000 Professional computers on the network to
access the Internet through a translated demand-dial connection on SrvA.
How should you configure the network? (Choose four)
A. Create a new demand-dial interface for the local area connection
B. Create a new demand-dial interface for the dial-up connection
C. Add a public and a private interface to the NA T routing protocol
D. Configure the IP address of the Internet service provider (ISP) as the
default gateway on the private interface
E. Add a default static route that uses the public interface
F. Configure the NA T routing protocol to enable network address translation
assignment and name resolution
G. Configure the public NA T interface with an address pool of 1921680 1
60. You are the administrator of a Windows 2000 network. The network consists
of a Windows 2000 Server computer named Srv1 and 12 Windows 2000 Professional
computers Srv1 has a dial-up connection that connects to the Internet.
Srv1 is configured to use Internet Connection Sharing to allow Internet access
through the dial-up connection of Srv1.
The 12 Windows 2000 Professional computers are configured for static TCP/lP
addressing. The IP addresses are 192.168.0 1 through 192.168.0.12, and the
subnet mask is 255.255.255.0 The 12 Windows 2000 Professional computers have no
default gateway configured.
You discover that the Windows 2000 Professional computers are not able to
access the Internet through the dial-up connection of Srv1 You confirm that the
preferred DNS server on the Windows 2000 Professional computers is configured
correctly.
What should you do to allow all 12 computers to access the Internet through the
dial-up connection of Srv1? (Choose all that apply)
A. On the Windows 2000 Professional computer with IP address 192.168.0.1 ,
change the IP address to 192.168.0.13
B. Change the IP address on all 12 Windows 2000 Professional computers to
169.254.0.2 through 169.254.0.13
C. Change the subnet mask on all 12 Windows 2000 Professional computers to
255.255.0.0.
D. Change the default gateway on all 12 Windows 2000 Professional comp. to
192.168.0 1
E. Change the default gateway on all 12 Windows 2000 Professional computers to
169.254.0.1
61.You are the administrator of a Windows 2000 network The network consists of
two Windows 2000 Server computers named ServerA and ServerB and 180 Windows
2000 Professional computers on one segment.
ServerA has an IP address of 192.168.2.1 ServerA is a DHCP server. The TCP/IP
configuration of all the Windows 2000 Professional computers is provided by the
DHCP server. The range of IP addresses used at ServerA is 192.168.20.1/24 The
lease time used is 15 days.
You want to change the IP addresses on the network from 192.168.20/24 to
10.178.0/24. ServerB has an IP address of 10 178.1
You install another DHCP server on ServerB The range of IP addresses used at
ServerB is 10 178.0/24 The lease time used is 15 days.
The network is shown in the exhibit (Click the Exhibit button )
To ensure compatibility, the two address ranges will be used concurrently on
the same segment for three months. Routing between the two address ranges is
provided by a router on the network
After you activate the DHCP scope on ServerB, users report that they are unable
to obtain a valid IP address.
When you investigate the problem, you discover that each of the two DHCP
servers responds with DHCP negative acknowledge (DHCPNAK) messages to leases
requested by the client computers.
What should you do?
A. On the Windows 2000 Professional computers, disable Automatic Private IP
Addressing (APIPA)
B. On the Windows 2000 Professional computers, configure the DHCP client
computers to release the DHCP lease at shutdown.
C. On both DHCP servers, set the number of times the DHCP server should attempt
conflict detection to 0
D. On both DHCP servers, configure a superscope so that it has both address
ranges Define an exclusion range for the entire address range of 10 1780124 on
ServerA and of 192.168.20.124 on ServerB
E. On both DHCP servers, set scope option 031 Perform Router Discoverv to 1 to
enable the option on the Windows 2000 Professional computers
62. You are the administrator of your company's network. The network consists
of 10 Windows 2000 Server computers, 100 Windows 2000 Professional computers,
and 150 Windows NT Workstation computers.
For workgroup collaboration and document sharing, all client computers have
file and print sharing services enabled.
You are using DHCP to automate the TCP/IP configuration of all client computers
You want to accomplish the following goals
All client computers will be able to be located on the network by the network's
fully qualified domain name.
A (host) records for all client computers will be automatically added to the
DNS zone files.
PTR (pointer) records for reverse name lookup for all client computers will be
automatically added to the DNS zone files
A records and PTR records will be automatically removed from the DNS zone files
when the DHCP lease expires
You take the following actions
Configure the DHCP server to always update client computer information in DNS
Configure the DHCP server to discard forward lookups when the lease expires
Configure the DHCP server to update DNS for client computers that do not
support dynamic updates
Configure the DHCP scope to configure the domain name for all DHCP client
computers.
Which result or results do these actions produce? (Choose all that apply)
A. All client computers are able to be located on the network by the network's
fully qualified domain name
B. A records for all client computers are automatically added to the DNS zone
files
C. PTR records for reverse name lookup for all client computers are
automatically added to the DNS zone files
D. A records and PTR records are automatically removed from the DNS zone files
when the DHCP lease expires
63. You are the administrator of your company's network The network consists of
five subnets that are connected by a BOOTP relay-enabled router There are 50
Windows 2000 Server computers and 1,000 Windows 2000 Professional client
computers distributed approximately evenly across the five subnets.
There are also 25 UNIX servers and 100 DHCP-enabled network printers on the
network
You want to accomplish the following goals
The correct assignment of IP addresses to each client computer on each subnet
will be automated
Address conflicts between client computers and servers will be prevented
Correct scope options will be applied to each client computer on each subnet
Client computers that are not in use will be prevented from keeping an IP
address for more than three days.
Each network printer will always receive the same IP address
You take the following actions:
Install the DHCP Server service on a Windows 2000 Server computer. Create five
scopes, each containing the address range for a specific subnet
In the DHCP console, set optional client configurations for each scope in the
Scope Options container
Exclude the range of addresses in use by the servers
Exclude the range of addresses in use by the network printers.
Which result or results do these actions produce? (Choose all that apply)
A.The correct assignment of IP addresses to each client computer on each subnet
is automated
B. Address conflicts between client computers and servers are prevented
C. Correct scope options are applied to each client computer on each subnet
D. Client computers that are not in use are prevented from keeping an IP
address for more than three days
E. Each network printer always receives the same IP address
64. You are the administrator of your company's network. The network consists
of 10 Windows 2000 Server computers, 100 Windows 2000 Professional computers,
and 150 Windows NT Workstation computers.
For workgroup collaboration and document sharing, all client computers have
file and print sharing services enabled. You are using DHCP to automate the
TCP/IP configuration of all client computers
You want to accomplish the following goals
All client computers will be able to be located on the network by the network's
fully qualified domain name.
A (host) records for all client computers will be automatically added to the
DNS zone files.
PTR (pointer) records for reverse name lookup for all client computers will be
automatically added to the DNS zone files
A records and PTR records will be automatically removed from the DNS zone files
when the DHCP lease expires
You take the following actions
Configure the DHCP server to never update client information in DNS
Configure the DHCP server to discard forward lookups when the lease expires
Configure the DHCP scope to configure the domain name for all DHCP client
computers
Which result or results do these actions produce? (Choose all that apply)
A. All client computers are able to be located on the network by the network's
fully qualified domain name
B. A records for all client computers are automatically added to the DNS zone
files
C. PTR records for reverse name lookup for all client computers are
automatically added to the DNS zone files
D. A records and PTR records are automatically removed from the DNS zone files
when the DHCP lease expires
65. You are the administrator of your company's network. The network consists
of one Windows 2000 domain that has 10 Windows 2000 Server computers and 500
Windows 2000 Professional client computers. You want all client computers to
receive their TCP/IP configuration from DHCP
You install the DHCP Server service on one of your Windows 2000 Server computers
and create and activate a scope of addresses.
Users report that they cannot connect to the network. You discover that none of
the client computers are receiving TCP/IP configurations from DHCP.
What should you do to resolve this problem?
A. Stop and restart the DHCP Server service on the DHCP server
B. Restart all client computers
C. Authorize the DHCP server in Active Directory
D. Add a DNS host record for the DHCP server
66. You are the administrator of a Windows 2000 domain named contoso.com. The
domain has a Windows 2000 member server computer named Ras1 and a Windows
2000-based DHCP Server computer named Dora. Routing and Remote Access is
enabled for remote access on Ras1.
The network has two DNS servers that use IP addresses of 10.152 and 10153
Ras1 is configured to use DHCP to assign IP addresses to the remote access
client computers.
The configuration of the scope options on the DHCP server is shown in the
following window.
DHCP
dora,contoso.com[10.1.5,1]
Scope [10.1.5.0] Net5
Address Pool
Address Leases
Reservations
Server Options
DNS Servers
Standard 10.1.5.3
None
The DHCP scope does not have any client computer reservations
When remote access client computers dial in to Ras1, they receive an IP address
from the DHCP scope range, but they do not receive the DNS address configured
in the DHCP scope Instead, the remote access client computers receive a DNS
server address of 10 1 52
You want the remote access client computers to receive the DNS option from the
DHCP server
How should you configure the network to accomplish this goal?
A. Configure the remote access client computers to enable DHCP on the dial-up
connection
B. Configure Ras1 to use Windows Authentication.
C. Install and configure the DHCP Relay Agent routing protocol on the Internal
interface of Ras1
D. On the DHCP server, configure the DNS scope option of 10 1 53 for the
Default Routing and Remote Access user class
67. You want to implement four RRAS-policies. Click and place the four
RRAS-policies in order of execution:
Domain Users - permit access between 07:00 and 17:00
Support Staff - permit access between 18:00 and 20:00
Domain Users - deny access between 17:00 and 07:00
Support Staff - deny access between 20:00 and 18:00.
68. You are the administrator of a large network. At the moment you are using
IP 207.200.16.0/24 for multicasting purposes. Your CEO wants to add 2.000 PC's
to your network, and make sure the current subnet can deal with an extra 2.000
workstations. Should you:
A) add another subnet ranging from 207.200.17.0-207.200.24.0,
B) add another subnet ranging from 207.200.33.0-207.200.48.0.
C) change the advertisement branch IP to 207.200.16.0/20
D) add another subnet ranging from 207.200.16.0/22-207.200.16.0/23
69. Your company has four branch offices Atlanta, Boston, New York and Dallas.
There is a multicast address used for videoconferences and the like to deliver
content to all four sites. Atlanta and Boston are right beside each other
connected by a router. There is a Sales videoconference held every Monday
between Atlanta and Boston. How should you configure the router so that the
Sales multicast videoconferencing does not get broadcasted to all four
branches?
A) Configure TCP-filters on the router to block all multicast traffic.
B) Create a static route for the Sales multicast broadcast on the router.
70. You are the admin of a large network with a web server. Internal users
complain that when they try to view a secure page, they get an error like
"The requested page cannot be displayed".
You have to troubleshoot the problem. Should you:
A) Permit port 20 in your TCP-filter,
B) Permit port 21 in your TCP-filter,
C) Permit port 443 in your TCP-filter,
D) Change the file permissions for the HTTPS-page.
71. You are the admin of a large network consisting of four subnets: A, B, C
and D. There are three workstations on every subnet. One workstation on Subnet
B frequently uses resources from a machine on Subnet A; the other two
workstations on subnet B use resources located in subnet C.
Should you:
A) Configure a DHCP-scope for the two machines on subnet B to use the router to
connect
to Subnet C.
B) Create a reservation for the one machine and specify a DCHP scope option to
use the
router to connect to Subnet A
C) Configure a static route on the router for the machine in Subnet B that gets
its resources
from Subnet A and add that under DHCP-scope options for that DHCP-address
reservation
D) Configure a static route on the router for the machines in Subnet B that get
their
resources from Subnet C, and add that under DHCP-scope options for that
DHCP-scope
72 .You have a Windows 2000 Server with RRAS and fax service, your another
remote office also have a Windows 2000 Server with RRAS. When you start to replicate
some accounting files to the remote office, but fail.
How do you resolve this problem?
A. stop the FAX service.
B. enable Multilink
C. enable Internet Connecting Sharing
D. enable server as a Router.
73 You want to use Network Monitor to analyze ISO and TP4 communication to MS
Exchange Server.
How?(choose two)
A. change the Temporary Capture Directory.
B. Copy ISO.dll and TP4.dll to Netmon Subdirectory.
C. Copy ISO.dll and TP4.dll to Netmon\Parsers Subdirectory.
D. Modify the parser.ini.
E. Modify the Netmon.ini.
Q answer Explanation PART 1
1 D Released records not replicated (W2K-TCP/IP page 500, 533, 534Active record
and Tombstoned record will be replicated ((W2K-TCP/IP page 505)Tomstoned or
extinct is the same.
2 A,D?
3 A,D
4 B (W2K-TCP/IP page 315)
5 D (W2K-TCP/IP page 901)
6 A,B,C,D In the Windows 2000 help file it states: "By enabling Internet
connection sharing on the computer that uses the dial-up connection, you are
providing network address translation, addressing, and name resolution services
for all computers on your home network."
7 B?
8 C (W2K-Inter page 410)
9 B,D,E Mutual authentication (W2K-Inter page 232)
10 C From Error and Event Messages help file: To add NetWare 4.x servers
running in bindery emulation mode to Windows 2000 Server domains: 1. Run
Registry Editor (REGEDT32.EXE). 2. From the HKEY_LOCAL_MACHINE subtree, go to
the following key: \SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters 3. From
the Edit menu, choose Add Value. 4. Type the following in the appropriate text
boxes: Value Name: Allow4X Data Type: REG_DWORD Data: 1 5. Choose OK and close
the Registry Editor. 6. Shut down and restart Windows 2000 Server.
11 A?
12 C (W2K-Inter page 137)
13 B
14 A,E To enable Conflict Detection you have to increase Conflict
DetectionAttempts to a number greater than zero
15 A,C
16 B if you check Master key Prefect forward Secrecy check box, the
Authenticate and generate a new key after every 480 minutes and 1 session(s) by
default. It means that a new key will generate every 480minute or at a new
session start.
17 C
18 B
19 A OR B
20 C
21 B,C,F
22 B
23 D
24 D
25 C
26 Select & TCP/IP and client for Microsoft Network
27 A They will now be a member off the domain group
28 D or E
29 B,C
30 A,D
31 D or B
32 B
33 ?? The idle time and the max session times were backwards so neither of
those was accomplished. The Allow dial in times should have been 12:00-07:00
and 16:00-12:00 for every day of the week. With those numbers, NOTHING WAS
ACCOMPLISHED!!!
34 A,E,F B,C,E???
35 B
36 A
37 C
38 B
39 D
40 B
41 A,B,C,E
42 Select & Question is not very clear with the conditions, but RAS
policies are processed from top to bottom until if finds a match. So it should
usually be set from most specific to general. So, it will process the 7-8 deny
policy first, if it is not 7-8 at that time, it will go on to the next policy
and so on.1) 7-8 policy deny 2) support staff only 3) domain users
43 C
44 C
45 A,B
46 D
47 D
48 C
49 B
50 A,C,D
51 Select & In the Server options list, select the ‘Bind Secondaries’ check
box, and then click OK.
52 A
53 D
54 D
55 A,B,C
56 A
57 A
58 B
59 B,C,E,F
60 A,D
61 D
62 A,B,C,D
63 B
64 B
65 C
66 D
67
68
69
70 C
71
72 A Q192614 It is necessary to stop and restart the Fax and Modem Sharing
services after you change the list of available modems for those services.
73 C,D Q168862 1) Copy the Iso.dll, Iso.ini, Tp4.dll files to your
NetMon\Parsers subdirectory.These files are located in the BackOffice Resource
Kit. 2) Make following additions to your Parser.ini file. The Parser.ini file
is located in the NetMon directory.
W2K-TCP/IP Microsoft Windows 2000 server resource kit TCP/IP Core Networking
GuideW2K-Inter Microsoft Windows 2000 server resource kit Internetworking
GuideQ168862 Microsoft Knowledge base article