Answers to wewentwon

216

1. You are the administrator for your company's Windows 2000 network. Your company has three offices: on in Dallas, TX, one in Houston, TX, and one in Galveston, TX. Houston and Galveston are connected to Dallas by a T1 line. Each site has its own Windows Internet Name Service (WINS) server.
You have implemented WINS replication between the WINS servers. You view the WINS database on the WINS server in Houston. It contains records in the active state, records in the released state, and records in the tombstoned state.

Which records will be replicated to the WINS server in Dallas?

a. All the records, regardless of their state
b. Only records in the active state
c. Both the records in the active state and the records in the released state
d. Both the records in the active state and the records in the tombstoned state
e. Both the records in the released state and the records in the tombstoned state

2. You are the administrator for a Windows 2000 Server network. You have a Dynamic Host Configuration Protocol (DHCP) Server which is configured to give DHCP clients all appropriate TCP/IP settings. You also have a Domain Name System (DNS) / Windows Internet Name Service (WINS) server. You set up a Windows 2000 Server computer to be the dial-up connection server and want to configure the security for the dial-up connections. You want to accomplish the following goals:

Require the entry of a password upon connection.
Use the Windows logon and password for authentication.
Require the use of data encryption.
Automatically run a script named logon.scp upon connection.

You perform the following actions:

From the dial-up connection properties on the Security tab in the Security options section, select Typical (recommended settings) radio button.
For the Validate my identity as follows box, select Allow unsecured password.
Check the Automatically use my Windows logon name and password (and domain if any) box.
Check the Require data encryption (disconnect if none) box. In the Interactive logon scripting section, check the Run script box and type in filename logon.scp.

Which goal or goals are accomplished from these actions? (Choose all that apply.)

a. Require the entry of a password upon connection
b. Use the Windows logon and password for authentication
c. Require the use of data encryption
d. Automatically run a script named logon.scp upon connection




3. You are the administrator for your company's Windows 2000 Server network. You company has a main office in Dallas, TX. There are three branch offices: one in Atlanta, GA, one in Chicago, IL, and one in Sacramento, CA. All branches are connected to Dallas by a T1 line. A diagram of the network in shown below:

The routers between the offices supports the forwarding of BOOTP messages.
At each branch office, you have a local user who is responsible for all administrative duties. Currently the local administrator is responsible for configuring the TCP/IP settings for all the Windows 2000 Professional computers at his/her local branch.

You have been experiencing network communication problems which were the direct result of configuration errors. You want to prevent this from happening again.

What should you do? (Choose two.)

a. Install and configure a Dynamic Host Configuration P. (DHCP) Server in Dallas.
b. Install and configure a Windows Internet Name Service (WINS) Server in Dallas.
c. Install and configure a Domain Name System (DNS) Server in Dallas.
d. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain an IP address automatically.
e. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain WINS server address automatically.
f. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain DNS server address automatically.

4. You are the administrator for your company's Windows 2000 domain. You have a Windows 2000 Server computer that is your Domain Name System (DNS) server. The DNS server contains the following types of resource records:
Start of Authority (SOA)
Name Server (NS)
Address (A)
Point (PTR)
Mail Exchange (MX)
Service (SRV).
You update a host resource record.

Which type of record may be associated with this record and need to be updated also?

a. The associated SOA resource record
b. The associated NS resource record
c. The associated A resource record
d. The associated PTR resource record


5. You work for a local state agency that does not use Windows Internet Name Service (WINS) for NetBIOS name resolution. Instead, each client on the network copies a master LMHOSTS file from a central server during the logon process.
After experiencing a number of problems with the current Primary Domain Controller (PDC) named MIS4 of the HR domain, you decide to promote one of the Backup Domain Controllers (BDCs) named Payroll2 to PDC status and take the former PDC offline.
In the master LMHOSTS file, you take off the listing for the former PDC.

What is the other change you must make?

a. 128.131.24.122 Payroll2 #DOM:HR
b. 128.131.24.122 Payroll2 #DOMAIN:HR
c. 128.131.24.122 #PRE Payroll2 #DOM:HR
d. 128.131.24.122 Payroll2 #PRE #DOM:HR

6. Your home office network contains 2 Windows 2000 Server computers, 1 Windows 2000 Professional client computer, and 1 Windows 98 second edition client computer.

You want to accomplish the following goals:

Provide one Internet connection for the entire network.
Provide network address translation.
Provide name resolution.
Provide IP address configurations for the entire network.

You perform the following tasks:

You enable Internet Connection Sharing.
You create a connection between the network and the Internet.
You install and configure LAN adapters connecting the client computers to the network.

Which goal is accomplished from these tasks?

a. Provide one Internet connection for the entire network
b. Provide network address translation
c. Provide name resolution
d. Provide IP address configurations for the entire network


7. You are the administrator for your company's network. Your network has three Windows 2000 Server computers, named Srvr1, Srvr2, and Srvr3. Each employee has his own Windows 2000 Professional computer. Also there is one Windows 2000 Professional computer, named Prof1, that is used by the general public.

Recently several files have been written to Srvr1 and Srvr2 that could have possibly caused great harm to your company's network. You suspect that the files came from Prof1. You want to monitor the traffic between these three computers.

Srvr3 is located in your office so you decide to capture the data there. You want to accomplish these goals with the least amount of administrative overhead.

What should you do?

a. On Srvr3, install the Network Monitor Tools. Then start Network Monitor and
configure the capture data for Prof1, Srvr1, and Srvr2.
b. On Prof1, install the Network Monitor driver.
On Srvr1 and Srvr2, install the Network Monitor driver.
On Srvr3, install the Network Monitor Tools. Then start Network Monitor and configure the capture data for Prof1, Srvr1, and Srvr2.
b. On Prof1, install the Network Monitor Tools. Then start Network Monitor and
configure capture data for Prof1. On Srvr1 and Srvr2, install the Network Monitor driver. On Srvr3, install the Network Monitor Tools. Then start Network Monitor and configure the capture data for Srvr1 and Srvr2.
d. On Prof1, install the Network Monitor driver
On Srvr1 and Srvr2, install the Network Monitor Tools. Then start Network Monitor and configure the capture data for Srvr1 and Srvr2, respectively.
On Srvr3, install Network Monitor Tools. Then start Network Monitor and configure the capture data for Prof1.

8. You administer your company's network. You have 20 Windows 2000 Professional computers operating in a switched network environment running TCP/IP. Ten of the Windows 2000 Professional computers are on subnet A. The other ten Windows 2000 Professional computers are on subnet B.
The company uses a Windows 2000 Server computer running Internet Authentication Service (IAS) to connect to the Internet. The IAS server is on subnet B. You decide to set up Network Monitor to monitor all traffic on your network. You install Network Monitor on the IAS server. You configure Network Monitor properly to monitor all TCP/IP traffic.

Which packets will you be able to monitor?

a. All packets
b. Only packets sent from the IAS server
c. Only packets addressed to the IAS server
d. All packets addressed to and sent from the IAS computer


9. You administer your company's Windows 2000 network. Your company employs a sales force that needs access to the latest company data when traveling. You want to ensure that the company will establish a network connection for your salespeople regardless of where the call originates.
Your company also allows customers access to the network using Routing and Remote Access to view and track orders. To ensure network and data security, your company wants to specify the location from which customers can connect to your network. You want to configure your company's Routing and Remote Access server (RRAS) to facilitate access for salespeople and for customers. You want both the salespeople and the customers to use mutual authentication to provide protection against remote server impersonation.

Which settings should you configure? (Choose three.)

a. Set Callback option to Always Callback To for salespeople
b. Set Callback option to Set by Caller for salespeople
c. Set Callback option to No Callback for customers
d. Set Callback option to Always Callback to for customers
e. Enable Microsoft Challenge Handshake Authent. Pr. version 2 (MS-CHAP v2)

10. You are the administrator for your company's network. You have several NetWare servers running on your network and want to synchronize the user accounts between your Windows 2000 Server domain and your NetWare Servers.
You select all the NetWare servers and use the Directory Service Manager for NetWare (DSMN) to synchronize the user accounts.
You receive the following error message: "NWC is a NetWare 4.x server. It cannot be added to the domain."

What should you do?

A Remove the bindery emulation mode option from NWC. Reboot NWC. Rerun
DSMN, selecting only NWC for synchronization
B. Do nothing. NetWare 4.x servers running in bindery emulation mode cannot be
added to Windows 2000 Server domains under any circumstances.
C. Using REGEDT32.exe on the Windows 2000 Server domain controller, go to the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters key. Choose Add Value option for Edit menu. In Value Name, type Allow4X. In Type, enter REG_DWORD. In Data, enter 1. Close the Registry. Restart the Windows 2000 Server.
D. Using REGEDT32.exe on the Windows 2000 Server domain controller, go to the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters key. Choose Add Value option for Edit menu. In Value Name, type Allow4X. In Type, enter REG_DWORD. In Data, enter 0. Close the Registry. Restart the Windows 2000 Server


11. You are the administrator for a Windows 2000 Server network. The network contains three Windows 2000 Server computers and 35 Windows 2000 Professional client computers.
You want to accomplish the following goals:
Install and enable Network Address Translation (NAT) on the network.
Allow Internet users to access resources from the network.
Install and enable Internet Connection Sharing.
Configure dynamic IP addresses on the network.
You perform the following actions:
You configure a static IP address configuration on the resource server.
You exclude the IP address used by the resource computer from the range of IP addresses allocated by the NAT computer.
Configure a special port with a dynamic mapping of a public address and port number to a private address and port number.

Which goal or goals are accomplished from these actions? (Choose all that apply.)
a. Configure dynamic IP addresses on the network
b. Install and enable Internet Connection Sharing
c. Allow Internet users to access resources from the network
d. Install and enable Network Address Translation (NAT) on the network

12. You are the administrator for your company's Windows 2000 domain. On this domain, you have a Windows 2000 Server computer acting as your company's Internet interface.
This morning when you came to work, you noticed that you had an unusually long wait time to access resources on your network. You run several tests but cannot seem to find any problems although the access times are incredibly long.
When the users come in for work, they immediately start complaining about network performance. You then decide to start checking packets on the network.
After investigating the problem, you notice that a denial of service attack has flooded your Internet server with "Destination Unreachable" packets.
You want to prevent this from happening again with the least amount of administrative overhead possible. You do not want to prevent legitimate packets from being forwarded.

What should you do?
A Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0 and IP Address 192.168.0.0 with Subnet Mask 255.255.0.0.
B Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0 and IP Address 172.16.0.0 with Subnet Mask 255.240.0.0.
C Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0, IP Address 172.16.0.0 with Subnet Mask 255.240.0.0, and IP Address 192.168.0.0 with Subnet Mask 255.255.0.0.
D Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0, IP Address 127.0.0.1 with Subnet Mask 255.0.0.0, IP Address 172.16.0.0 with Subnet Mask 255.240.0.0, and IP Address 192.168.0.0 with Subnet Mask 255.255.0.0.


13. You have just taken a job with a company that would like to convert its current network operating system to Windows 2000. The company has four subnets on its TCP/IP network, each of which will have its own Backup Domain Controller (BDC), except for the subnet on which the Primary Domain Controller (PDC) will reside.
The company would like to allow browsing across the entire network without needing the implement Windows Internet Name Service (WINS) on a Windows 2000 Server computer.

What should you do?

a. Create an LMHOSTS file. Create entries in the LMHOSTS file for the PDC and all
BDCs using the #DOM keyword. Place this file on the PDC.
b. Create an LMHOSTS file. Create entries in the LMHOSTS file for the PDC and all
BDCs using the #DOM keyword. Place this file on the PDC and all BDCs.
c. Create an LMHOSTS file. Create an entry in the LMHOSTS file for the PDC and all
BDCs using the #MH keyworkd. Place this file on the PDC.
d. Create an LMHOSTS file. Create an entry in the LMHOSTS file for the PDC and all
BDCs using the #MH keyword. Place this file on the PDC and all BDCs

14 You are the administrator of your company's network. Your company owns the Class B subnet 172.41.48.0/24 that consists of 12 servers and 200 client computers, all configured as DHCP clients. The hard disk on your company's DHCP server fails, and your server responds with a fatal error. Your company does not have a backup of the server, and you do not remember which IP addresses have been distributed throughout the network. You need to install a new DHCP server to prevent any connectivity problems that might occur.

What should you do? (Choose two)

A Increase Conflict Detection Attempts on the DHCP server
B Decrease Conflict Detection Attempts on the DHCP server
C Add an exclusion for the 12 servers
D Create a scope that has a range of 172.41.48.1 to 172.41.48.200
E Create a scope that has a range of 172.41.48.1 to 172.41.48.254

15 Your company has a SNMP-enabled network router installed on its network. Your company wants to monitor all SNMP traffic generated by the router. You install Network Monitor on a Windows 2000 server computer on your network. Your router is configured to trap to an SNMP manager installed on another server. You want to receive a notification whenever the network router raises an SNMP trap.

What should you do? (Choose two)

A Create an Network Monitor filter that has a pattern match for SNMP-traffic.
B Install SNMP on the server.
C Create a network monitor trigger to run the Net Send command
D Create a TCP/IP filter on the server.
E Start the Windows 2000 Alerter Service on the server.
F Configure the network router to trap to the IP address of the server.


16 You have a IPSec policy, you want to prevent the re-use of previous-session keys.

What should you do?

A On the generate a new key every property sheet, modify the time allocations
B Master key Prefect forward Secrecy check box
C Session key Prefect forward Secrecy check box
D ??

17.You are the administrator of your company's network The network consists of a single Windows 2000 domain The network has Windows 2000 Server computers, Windows 2000 Professional computers, and Windows NT Workstation 40 computers distributed across two IP subnets as shown in the exhibit (Click the Exhibit button) Two Windows 2000 domain controllers are located on Subnet1 Each domain controller is also a DNS server hosting an Active Directory integrated zone You implement WINS for NetBIOS name resolution on your network WINS is installed on a server on Subnet2 Users of the Windows NT Workstation 40 computers on Subnet2 report that they are receiving the following error message 'Domain Controller cannot be located' Subsequently, these users cannot be validated on the network Windows NT Workstation 40 users on Subnet1 are not experiencing this problem. However, they do report that response times for logon requests are extremely slow None of the Windows 2000 Professional users on either subnet report these problems You want to ensure that Windows NT Workstation 4.0 users on Subnet2 can be validated You also want to improve logon request response time for users on Subnet1

What should you do?
A .Configure the router to forward NetBIOS broadcast packets
B .Configure the Windows NT Workstation 40 computers as WINS clients in the exist. zone
C. Configure the Windows NT Workstation 40 computers as WINS clients
D. Configure the Windows 2000 Server domain controller computers as WINS clients

18.You are the administrator of a Windows 2000 network. The network has seven Windows 2000-based WINS servers, and each is in a separate location. Because network users frequently log on at different locations, you want to configure the seven WINS servers to have a convergence time of less than one hour.

How should you configure the seven WINS servers to accomplish this goal?
A. Create a display of the seven WINS servers in a circular arrangement Configure each WINS server as a push/pull partner with the two WINS servers beside it in the circle .Use a replication interval of 25 minutes
B. Designate one of the WINS servers as the central WINS server Configure the other six WINS servers as push/pull partners with the central WINS server. Configure the central WINS server as a push/pull partner with the other six WINS servers. Use a replication interval of 25 minutes
C. Configure each WINS server to automatically configure the other WINS servers as its replication partners Use the default interval time for automatic partners configuration.
D. Configure each WINS server to use a renew interval of 50 minutes . Use the default value for the verification interval


19.You are the administrator of a Windows 2000 domain The domain has four Windows 2000-based WINS servers . You want to delegate the ability to create the four WINS servers' performance logs to a domain user named Kim . You do not want Kim to be able to change the configuration of the four WINS servers The performance logs for the WINS servers are created by using the Performance console.

How should you configure the network to accomplish this goal?

A. Add the user Kim to the Domain Local group named Wins Users.
B. Create a new Domain Local group named Performance Administrators Add the user Kim to the Performance Administrators group
C. On the four WINS servers, change the NTFS permissions on the System32\Wins folder to include Read permission for user Kim
D. On the four WINS servers, change the Registry permissions on the HKEY -LOCAL-MACHINE\system\CUrrentContro\Set\ServiCeS\W key to include Read permission for user Kim.

20 You are the administrator of your company's network The network consists of 10 Windows 2000 Server computers, 200 Windows 2000 Professional computers, 250 Windows 98 computers, and 25 UNIX workstation computers running 5MB server software. The network runs only TCP/IP as its transport protocol You implement WINS in the network for NetBIOS name resolution.
Users of the Windows-based client computers report that they cannot access resources based on the UNIX computers by NetBIOS name
There is no problem accessing Windows-based resources by NetBIOS name

What should you do to resolve this problem?

A. Install a WINS proxy agent on one of the UNIX computers
B. Install a WINS proxy agent on one of the Windows-based computers
C. On the WINS server, create static mappings for the UNIX computers
D. On the WINS server, create static mappings for the Windows-based computers


21.You are the administrator of a Windows 2000 network The network has four Windows 2000-based WINS servers named NY1 , NY2, Bos1 , and Bos2 The network has computers in two locations Boston and New York . The Bos 1 and Bos2 WINS servers are at the Boston location The NY1 and NY2 WINS servers are at the New York location.
You want to configure the replication between the WINS servers to accomplish the following goals The NY1 and NY2 WINS servers must replicate changes in the local database to each other immediately following each new registration or IP address change registration The Bos1 and Bos2 WINS servers must replicate changes in the local database to each other every 30 minutes.
The changes in the WINS database in either location should be replicated to the other location every three hours.

How should you configure the WINS servers to accomplish these goals? (Choose three)

A. Configure the WINS servers to enable burst handling. Set the number of requests for burst handling to 1
B. Configure the NY1 and NY2 WINS servers as push/pull partners of each other. Configure both WINS servers to use persistent connections for push replication partners Set the number of changes before replication to 1
C. Configure the Bos1 and Bos2 WINS servers as push/pull partners of each other Specify a replication interval of 30 minutes
D. Configure the Bos1 and Bos2 WINS servers as push/pull partners of each other Configure both WINS servers to enable periodic database consistency checking every 30 minutes
E. Configure the NY1 and the Bos1 WINS servers as push partners of each other. Configure both WINS servers to update statistics every three hours
F. Configure the NY1 and the Bos1 WINS servers as push/pull partners of each other Specify a replication interval of three hours

22. You are the administrator of a Windows 2000 network The network has three Windows 2000-based WINS servers named Srv1 , Srv2, and Srv3 You want to periodically compact the WINS database to reclaim unused space.
How should you perform a manual compaction of the WINS database on the Srv1 WINS server?

A. Configure the Srv1 WINS server to block replication of WINS records from the Srv2 and Srv3 WINS servers Initiate database consistency checking . Allow replication of records from the Srv2 and Srv3 WINS servers.
B. Stop the Srv1 WINS server. Use the jetpack command-line tool to compact the WINS database Start the Srv1 WINS server again.
C. Stop the Srv1 WINS server. Use the Backup Database command to create a backup of the Srv1 WINS database. Compact the backup of the database by using the compact command-line tool. Use the Restore Database command to restore the backup of the database. Start the Srv1 WINS server again
D. In the WINS console, use the Scavenge Database command


23. You are the administrator of a Windows 2000 network. The network has six Windows 2000-based WINS servers and two Windows 2000-based DHCP servers.
To anticipate the migration of the network from WINS to DNS, you decide to remove one WINS server named Wins6 from the network by performing the following actions.
On Wins6, stop the WINS Service and uninstall WINS.
On the DHCP servers in the network, reconfigure the options to no longer specify Wins6 as a WINS server Configure the DHCP options to instead use the other five WINS servers equally.
On WINS client computers that are manually configured to use TCP/IP , re configure the network properties to no longer use Wins6 as a WINS server Configure these client computers to instead use any of the other five WINS servers.
On one of the remaining WINS servers, delete the static mappings originally made on Wins6
After two weeks, you notice that static mappings originally made on Wins6 are still present on all the remaining WINS servers.
What should you do to permanently remove these unwanted static mappings from the remaining WINS servers?

A. On the remaining WINS servers, use the Scavenge Database command in the WINS console
B. On the remaining WINS servers, perform an offline compaction of the WINS database
C. Configure the remaining WINS servers to use Migrate On handling of static entries
D. On one of the remaining WINS servers. manually tombstone the Wins6 owner from the database .

24. You are the administrator of a Windows 2000 network The network has three segments connected by a router. Each segment contains a Windows 2000-based WINS server and two other Windows 2000 Server computers. The network also has 300 Windows NT Workstation 4.0 WINS client computers distributed evenly over the three segments. Users in each network segment inform you that they cannot browse any network resources on the other network segments. They do not have problems browsing their own segment.

How should you configure the network to enable users to browse for network resources on all three network segments?

A. Configure all WINS client computers to be NetBIOS node type Mixed (m-node)
B. Configure all WINS client computers to use all three WINS servers.
C. On each WINS server, configure the Lmhosts file to contain entries that include #PRE and #DOM for the other two WINS servers
D.Configure the three WINS servers as replication partners of one another

25. You are the administrator of your company's network. The network consists of a single IP subnet that uses DHCP to automate client computer configuration. You install a WINS server on the network to reduce broadcast traffic for name resolution.
After several days, users report that the network response time is still unacceptably slow.
You investigate and discover that the levels of broadcast traffic have not been reduced. When you view the WINS database, you also find that the only entry is for the WINS server itself
What should you do to resolve this problem?
A. Configure the WINS server as a DHCP client computer
B. Configure the DHCP server as a WINS client computer
C. Configure a DHCP scope option to include the address of the WINS server
D. Configure static mappings on the WINS server for each client computer

26. You are the administrator of your company's network You have a portable computer that uses Microsoft Internet Explorer to access your company's Internet Information Services (lIS) computer. This application works successfully when your portable computer is docked at the office, but it fails when your portable computer is connected by Routing and Remote Access
You want to configure your portable computer to connect to your company's network by Routing and Remote Access You want to install only what is necessary while maximizing performance and minimizing administrative overhead.

What should you do?
To answer, click in the appropriate box or boxes in the Networking tab of the dialog box.

Internet Protocol [TCP/IP)
File and Printer Sharing for Microsoft Networks
Network Load Balancing
Client for Microsoft Networks

27. You are the administrator of a Windows 2000 domain. The domain has two Windows 2000 member server computers named Istanbul and Rome. Routing and Remote Access is enabled for remote access on Rome. Internet Authentication Service (IAS) is installed on Istanbul Rome uses Istanbul to authenticate remote access credentials.
The remote access policies on Istanbul specify that domain members are allowed remote access to the network.
However, users report that they are not allowed to dial in to Rome When you investigate the problem, you discover that the configuration of Istanbul supports only local user accounts.

What should you do?

A. Add Istanbul to the RAS and IAS Servers group in Active Directory
B. Configure Routing and Remote Access on Istanbul to use RADIUS Authentication
C. On Istanbul, add a realm replacement rule for the Windows 2000 domain.
D. On Istanbul, add a remote access policy that uses MS-CHAP

28. You are the administrator of a Windows 2000 network that consists of a single domain Because no employee in your company should have the ability to encrypt files by using Encrypting File System (EFS), you need to remove this ability from all users in the domain

What should you do to accomplish this goal? (Choose all that apply)

A. From the Run command, start Secpolmsc
B. Go to the Encrypted Data Recovery Agents container and delete the certificate you find.
From the Active Directory Users and Computers console, access the Group Policy Editor and edit the domain policy.
C. Go to the Public Key Policies container and delete the Encrypted Data Recovery Agents policy From the Active Directory Users and Computers console, access the Group Policy Editor and edit the domain policy.
D. Go to the Encrypted Data Recovery Agents container and delete the certificate you find
E. Go to the Encrypted Data Recovery Agents container and initialize the empty policy From the Active Directory Users and Computers console, access the Group Policy Editor and edit the domain policy
F. Go to the Public Key Policies container and initialize the empty policy

29. You are the administrator of your company's network Your company has branch offices in New York and Paris . Because each branch office will support its own Routing and Remote Access server, you implement a Remote Authentication Dial-In User Service (RADIUS) server to centralize administration
You remove the default remote access policy
You need to implement one company policy that requires all dial-up communications to use 40-bit encryption.
You want to configure your network to require secure communications by using the least amount of administrative effort.

What should you do? (Choose two)

A. Create one remote access policy on each Routing and Remote Access server
B. Create one remote access policy on the RADIUS server
C. Set encryption to Basic in the remote access policy or policies
D. Set encryption to Strong in the remote access policy or policies
E. Enable the Secure Server IPSec policy on the RADIUS server
F. Enable the Server IPSec policy on the RADIUS server

30. You are the administrator of your company's network. You need to Implement a remote access solution that is highly available and highly secure Your company consists of a single location and has a T3 connection to the Internet.
Your company has 1,000 salespeople who need reliable connectivity to the company network from any remote location All servers are running Windows 2000 Advanced Server, and all client computers are running Windows 2000 Professional.
You want to accomplish the following goals:
No single point of failure, aside from total loss of the T3, will result in total loss of remote access connectivity.
No authentication traffic will be carried as clear text.
No data traffic will be carried as clear text.
Support for at least 200 simultaneous remote users accessing the network will be available at all times.

You take the following actions:
Install three virtual private network (VPN) servers at the main office.
Configure each VPN server to support 150 PPTP connections.
Configure the client computers to use Password Authentication Protocol (PAP) as the authentication protocol.
Create DNS Round Robin entries with a Time to Live (TTL) of zero for each VPN server

Which result or results do these actions produce? (Choose all that apply)

A. No single point of failure, aside from total loss of the T3, results in total loss of remote access connectivity
B. No authentication traffic is carried as clear text
C. No data traffic is carried as clear text
D. Support for at least 200 simultaneous remote users accessing the network is available at all times


31. You are the administrator of your company's network You are configuring your users' portable computers to allow users to connect to the company network by using Routing and Remote Access.
You test the portable computers on the LAN and verify that they can successfully connect to resources on the company network by name.
When you test the connection through Remote Access, all of the portable computers can successfully connect, but they cannot access files on computers on different segments by using the computer name.

What should you do to resolve this problem?

A. Set the authentication method to Allow remote systems to connect without authentication
B. Enable the computer account for each portable computer
C. Change the computer name on each portable computer
D. Install the DHCP Relay Agent on the Remote Access server

32. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named DeskA Routing and Remote Access is enabled for remote access on DeskA.
Your company is organizing an industry trade show in a conference center You have set up 15 desks and telephones in the conference area. During the conference, attendees will be allowed to dial in to your network by using any of the 15 telephones Each telephone line has its own telephone number.
The conference attendees can use their own portable computers to dial in. When attendees dial in to DeskA, they do not need to specify a user name or password However, you do not want to allow dial-in access from any telephone other than the 15 telephones in the conference area. You enable unauthenticated access on the DeskA remote access server
You also create a remote access policy named Conference that allows unauthenticated access as the authentication method. Attendees report that they are not able to dial in unless they specify a user name and password
You want to ensure that attendees can dial in without specifying a user name and password.

What should you do?

A. Create a user account named Conference Guest. Configure Routing and
Remote Access to use the Conference Guest account as the default user identity.
B. Configure the Conference Guest account to use the 15 phone numbers as Caller ID
Create 15 user accounts named Conf-1, Conf-2, Conf-3, and so on through Conf-15
Specify a separate Caller ID phone number for each of the 15 users.
C. Create 15 user accounts that use each phone number as the user name . Configure Routing and Remote Access to use the calling number as the authentication identity.
D. Configure the Conference remote access policy so that it has a Calling-Station ID condition. Use the 15 phone numbers as the condition


33. You are the administrator of your company's network T o facilitate connections for remote administration, you install Routing and Remote Access on a Windows 2000 domain controller.

You want to accomplish the following goals
Only administrators will have dial-up access
Dial-up connections will be accepted only from 400 p .M to 700 AM.
Connections will be forcibly disconnected after 20 minutes of inactivity
All connections will encrypt all communications
Connections will be limited to one hour

You take the following actions
Set the level or levels of encryption to No Encryption and Basic.
Add Domain Admins to the Windows Group Policy condition.
Configure the rest of the remote access policy as shown in the exhibit
(Click the Exhibit button)
Idle time 60
Max session time 20
Allow dial times Sun 07:00-16:00
Mon 07:00-16:00 etc...

Which result or results do these actions produce? (Choose all that apply)

A. Only administrators have dial-up access
B. Dial-up connections are accepted only between 400 PM and 700 A.M
C. Connections are forcibly disconnected after 20 minutes of inactivity
D. All connections encrypt all communications
E. Connections are limited to one hour

34. You are the administrator of your company's Routing and Remote Access servers Your company's administrators are able to dial in to the company's network to perform remote monitoring and administration
This remote monitoring and administration requires an excessive amount of network bandwidth You want to allow only administrators to use multiple phone lines, and you want to limit all other users to a single phone line.
You want to configure multiple phone-line network connections to adapt to changing bandwidth conditions. When the phone lines fall below 50 percent capacity, you want to reduce the number of phone lines utilized.
You also want to allow all users the ability to connect to the network by Routing and Remote Access No default remote access policies currently exist
What should you do? (Choose three)

A. Create one remote access policy on the Routing and Remote Access server
B. Create two remote access policies on the Routing and Remote Access server
C. Allow Multilink
D. Decrease the maximum number of ports used by the Routing and Remote Access server
E. Select the Require Bandwidth Allocation Protoco\ BAP) for the Dynamic Multilink Requests check box.
F. Increase the maximum number of dial-up sessions


35. You are the administrator of a Web server hosted on the Internet that is running on a Windows 2000 Server computer.
Your company's Web developers have developed applications that download ActiveX controls automatically to your customers' browsers.
You discover that the default security settings on your customers' browsers are preventing the ActiveX controls from being downloaded automatically. You want to facilitate the downloading of ActiveX controls from your Web server to the Internet clients

What should you do?

A. Install an Enterprise Subordinate Certificate Authority (CA) that uses a commercial CA as the parent. Create a policy on the CA that allows the Web developers to request a certificate for code signing
B. Install an Enterprise Certificate Authority (CA). Create a policy on the CA that allows the Web developers to request a certificate for trust list signing.
C. Install an Enterprise Subordinate Certificate Authority (CA) that uses a commercial CA as the parent. Create a policy on the CA that allows the Web developers to request a certificate for trust list signing
D. Install an Enterprise Certificate Authority (CA). Create a policy on the CA that allows the Web developers to request a certificate for code signing

36. You are the administrator of a Windows 2000 network Your company wants you to provide a high level of security for its Public Key Infrastructure.
You decide to create an offline root Certificate Authority (CA) You want the offline root CA to be capable of processing certificate requests from files, and you want the offline root CA to be recognized as a trusted root authority for Windows 2000 client computers.

How should you create the offline root CA?

A. On a member Windows 2000 Server computer that is connected to the network, create an Enterprise CA. After you install the CA, remove the server to a secure and separate location
B. On a member Windows 2000 Server computer, create a subordinate Enterprise CA that uses a Commercial CA as the certifying authority. After you install the CA, remove the server to a secure and separate location
C. On a stand-alone Windows 2000 Server computer that is isolated from the network, create a Stand-Alone CA. Export the certificate for the CA to a floppy disk
D. In the Default Domain Group Policy object (GPO) , import the certificate to the Enterprise Trust Certificate Store
E. On a stand-alone Windows 2000 Server computer that is isolated from the network, create a Stand-Alone CA. Export the certificate for the CA to a floppy disk. In the Default Domain Group Policy object (GPO), import the certificate to the Trusted Root Certification Authority Store


37. You are the administrator of a Windows 2000 network Some of the members of your company's graphics department use Macintosh computers and are not using Internet Explorer as their browser.
These users inform you that they cannot request valid user certificates from your Enterprise Certificate Authority (CA).
You want to make it possible for these users to request certificates by using Web-based enrollment.

What should you do?

A. In the Internet Information Services (IIS) console, access the properties for the CertSrv virtual directory. On the Directory Security tab, set the authentication type to Basic Authentication
B. In the Policy Settings container in the CA console for your CA, add a new Enrollment Agent certificate
C. Edit the ACL on the user certificate template to grant the graphics department users enroll access
D. In the Internet Information Services (IIS) console, access the properties for the CertSrv virtual directory. On the Directory Security tab, set the authentication type to Integrated Windows Authentication

38. You are the administrator of a Windows 2000 network. The network consists of one Windows 2000 domain that has Windows 2000 Professional client computers and Windows NT Workstation 40 client computers. To create a digital certificate, you use a stand-alone certificate server configured as a root Certificate Authority (CA). You use the digital certificate to secure a virtual directory on your Internet Web server.
Users report that when they connect to the virtual directory by means of a new URL, a Security Alert dialog box appears with the following warning message 'The security certificate was issued by a company you have not chosen to trust'
You want to prevent this warning message from appearing. You also want to avoid any unnecessary reconfiguration of either the certificate server or the Web server.
What should you do?

A. Inform your users of the new URL that points to the host name used in the digital certificate
B. Configure a Group Policy that automatically installs as a trusted authority in the client computers the digital certificate for the certificate server
C. Inform your users that they need to install a client certificate from the certificate server
D. Inform your users that they need to install as a trusted authority in the client computers the digital certificate for the certificate server


39. You are the administrator of your company's network. The network consists of Windows 2000 Server computers, Windows NT Workstation client computers, and Windows for Workgroups 311 client computers distributed across three subnets All client computers are configured as DHCP client computers to automate TCP/IP configuration.
You install a WINS server on one subnet on your network You also define a DHCP scope option to include the WINS server's address. Users report that they can access resources on servers on their own subnet, but they cannot access resources on other subnets.

What should you do to resolve this problem?

A. Use the ipconfig /renew command to refresh the client computers' configuration
B. Use the ipconfig /release command to refresh the client computers' configuration
C. Install a WINS proxy agent on the subnet that hosts the WINS server
D. Install a WINS proxy agent on the subnets that do not host the WINS server

40. You are the administrator of a Windows 2000 network. The network has 18,000 Windows 2000 Professional WINS client computers and six Windows 2000-based WINS servers The WINS client computers are portable client computers, and they frequently connect to the network at different locations.

The WINS client computers access NetBIOS-based resources. The TCP/IP configuration of the WINS client computers is provided by DHCP servers on the network.
Some of the WAN links in your network are unreliable You want to ensure that all Windows 2000 Professional computers are able to resolve NetBIOS names, even if some of the WINS servers are not available

How should you configure the network to accomplish this goal?

A. On each segment, configure a computer as a WINS proxy
B. Configure the DHCP servers to provide each client computer with a list of WINS servers.
C. Configure the WINS servers to enable burst handling Set the number of requests for burst handling to High
D. Configure the DHCP server to set the NetBIOS over TCP/IP node type for each client computer to Mixed node)


41. You are not running in native mode.
Your company is a sales organization and has 150 salespeople. When these salespeople are out of the office, they require file and print services, e-mail, and access to the company's product and inventory database.
These salespeople belong to a group named SalesMobile. Your company has dedicated T1 access to the Internet Your company also uses a virtual private network (VPN) to reduce the costs and hardware required to support the salespeople.

You want to accomplish the following goals:

Required network resources will be accessible to all salespeople
Connections to the network will be made only by salespeople
Sensitive company data will be kept confidential over the VPN connections
Access to the network will only take place during business hours
All salespeople will be able to connect to the network simultaneously

You take the following actions:

On a Windows 2000 Server computer, install Routing and Remote Access and configure virtual private networking.
Increase the WAN Miniport (PPTP) maximum port limit to 150.
Create a new remote access policy that has the condition to allow access to the users in the SalesMobile group
Set the new remote access policy's order of precedence higher than the default policy.
Edit the default remote access profile to require strong encryption of data.

Which result or results do these actions produce? (Choose all that apply)
A. Required network resources are accessible to all salespeople
B. Connections to the network are made only by salespeople
C. Sensitive company data is kept confidential over the VPN connections
D. Access to the network only takes place during business hours
E. All salespeople are able to connect to the network simultaneously


42. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named Delta Routing and Remote Access is enabled for remote access on Delta. The domain is in native mode For all user accounts, the dial-in permission is set to control access through remote access policies.

You want to allow all users in the domain to dial in during the workday. You also want to allow only members of the global security group named Support Staff to be able to dial in between 6 00 PM and 8 00 AM. However, you do not want to allow the Support Staff members to be able to dial in when the log files are made each day between 7:00 AM and 8:00 AM. You create four remote access policies on Delta as shown in the following table
Name
Domain users all policy
Support staff all policy
Domain users 6-8 policy
Condition
Windows-group=Domain users Windows-group=Support staff
Day-and- Time=6PM-8AM Windows-group=Domain users
Day-and- Time= 7 AM-8AM Windows-group=Support staff
Permission Access
Access Deny Profile (default) (default) (default) Support staff 7 -8 policy
Deny (default)
To specify the appropriate access control for Delta, click the Select and Place button, and then drag the remote access policies and place them in the correct order.

43. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named Vegas Routing and Remote Access is enabled for remote access on Vegas Some of the remote access client computers require the use of CHAP. You enable CHAP on Vegas You also configure the appropriate remote access policy to use CHAP. However, users who require CHAP report that they are not able to dial in to Vegas

What should you do?

A. Configure Vegas to prohibit the use of U\.N Manager authentication
B. Configure Vegas to disable the use of link Control Protocol (lCP) extensions
C. Configure the user accounts by selecting Store passwords using reversible encrvption Set the user passwords to change the next time each user logs on
D. Configure the user accounts to use a static IP address when they dial in to the network

44. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named Ras5 Routing and Remote Access is enabled for remote access on Ras5
The domain also has a Windows NT 40 member server computer named Ras4. Ras4 is running Remote Access Service (RAS).
The domain is in mixed mode. Users in the domain use Windows 2000 Professional computers to dial in to the network through Ras4 or Ras5. However, Ras4 is not able to validate remote access credentials of domain accounts.
How should you configure the network to enable the Windows NT 40 Ras4 member server computer to validate remote access domain users?

A. Change the domain from mixed mode to native mode
B. Add the Ras4 computer account to the RAS and IAS Servers group
C. Add the Everyone group to the Pre-Windows 2000 Compatible Access group
D. Create a remote access policy that has the Ras4 computer account as a condition Grant remote access permission if the condition matches the properties of the dial-in attempt
45. You are the administrator of a Windows 2000 network. Your network has one primary internal DNS server and one primary external DNS server. Your network has three secondary DNS servers that transfer zone information from the primary external DNS server. The secondary DNS servers are installed on two Windows 2000 Server computers and one Windows NT Server 40 computer.
The primary external DNS server is used to host records for your company's Web and mail servers. It has only a limited number of resource records in its zone file The Web server and the mail server have static IP addresses.
When you monitor the secondary DNS servers by using System Monitor, you notice a high number of hits when monitoring the counter DNS Zone Transfer SOA Requests Sent. You want to minimize the bandwidth that is required for this traffic

What should you do? (Choose two)

A. Upgrade the Windows NT Server 40 computer that is hosting the secondary DNS server to a Windows 2000 Server computer
B. Configure the notify list on the primary external DNS server to notify the secondary DNS servers when there are changes to be replicated.
C. Reconfigure the primary external DNS server so that it does not allow dynamic updates
D. Increase the value of the Refresh interval in the SOA (start of authority) record
E. Decrease the value of the Refresh interval in the SOA (start of authority) record

46. You are the administrator of your company's network. Your Windows 2000 Server computer named Srv2 cannot communicate with your UNIX server named Srv1 Srv2 can communicate with other computers on your network. You try to ping Srv1, but you receive the following error message. "Unknown host Srv1."
You create an A (host) record that has the correct name and IP address. However, when you try to ping Srv1 again, you receive the same error message

What should you do to resolve this problem?

A. Restart the DNS server
B. Clear the DNS Server Cache
C. Run the ipconfig Iregisterdns command on Srv2
D. Run the ipconfig /fIushdns command on Srv2

47. You are the network administrator for Wood grove Bank Your network is configured as shown in the exhibit (Click the Exhibit button)
Srv2 and Srv3 are configured as caching-only servers. Both servers forward requests to Srv1 Srv1 is configured as the primary server for the woodgrovebank.com domain.
Users on networks 10 10720 and 10 10730 frequently use an Internet application that gathers stock quotes from various servers on the woodgrovebank.com domain
You want to reduce DNS network traffic.

What should you do?

A. Increase the Time to live (TTl) for the SOA (start of authority) record on Srv1
B. Increase the Time to live (TTl) for the SOA (start of authority) record on Srv2 and Srv3
C. Set the Server Optimi2ation option on Srv2 and Srv3 to Maximi2e data throughput for network applications
D. Increase the forward time-out seconds on Srv2 and Srv3


48. You are the administrator of a Windows 2000 network Your company's primary DNS server, named ns1 contoso.com, is heavily used, and the CPU utilization on this server is consistently high. Because of the large number of records that are stored on the DNS server, you suspect that some DNS queries result in answers that exceed the limit for a single UDP packet You want to know if answers to DNS queries are exceeding the limit for a single UDP packet

What should you do?

A. Start System Monitor. On the DNS server, monitor the counters for DNS TCP Responses Sent and DNS. TCP Responses SentlSec.
B. Start System Monitor. On the DNS server, monitor the counters for DNS UDP Message Memory.
C. Use Network Monitor to analyze network traffic. Use nslookup on a separate computer to query for NS records on the primary DNS server. Compare the number of UDP packets returned from the DNS server in response to your queries with the number of queries you issued
D. Use Network Monitor to analyze network traffic. From a client computer on your network, ping host records that are stored on your DNS server. Compare the number of UDP packets returned from the DNS server in response to your queries with the number of queries you issued

49. You are the administrator of your company's network The network consists of a single Windows 2000 domain that spans multiple locations The locations are connected over the Internet by using Routing and Remote Access.
Resources are located on TCP/IP hosts on your network. To facilitate name resolution for client access to these resources, you implement Windows 2000 DNS servers on your network.
You want to ensure that when the zone transfer traffic between your DNS servers crosses the Internet links between the locations, it cannot be compromised by outside parties.
What should you do?

A. Select the option to allow zone transfers only to servers listed on the Name Servers tab
B. Set up an Active Directory integrated zone
C. Set the Allow Dynamic Updates setting for your zone to No
D. Set the Allow Dynamic Updates setting for your zone to Only Secure Updates


50. You are the administrator of your company's network Your company has a main office, two large branch offices, and two small branch offices The company's network consists of one Windows 2000 domain
The main office and the two large branch offices are connected by dedicated T1 lines, as shown in the exhibit (Click the Exhibit button) The two small branch offices use 128-Kbps ISDN lines and Routing and Remote Access over the Internet to connect to the company's internal network You are designing your DNS name resolution environment.

You want to accomplish the following goals.
DNS name resolution traffic across the WAN links will be minimized.
DNS replication traffic across the WAN links will be minimized
DNS replication traffic across the public WAN links will be secured
Name resolution performance for client computers will be optimized

You take the following actions:

Install the DNS Server service on one domain controller at each office
Create an Active Directory integrated zone on each DNS server at each office.
Configure client computers to query their local DNS server
Configure the zones to allow dynamic updates

Which result or results do these actions produce? (Choose all that apply)

A. DNS name resolution traffic across the WAN links is minimized
B. DNS replication traffic across the WAN links is minimized
C. DNS replication traffic across the public WAN links is secured.
D. Name resolution performance for client computers is optimized

51. You are the administrator of your company's network. To allow fault tolerance for your external DNS server, your Internet service provider (ISP) hosts a DNS server on its UNIX server. The UNIX server is used as the secondary DNS server for your primary external DNS server Users inform you that they are not able to connect to the URl of the company's Web server You investigate and discover that this inability to connect occurs during times when your primary external DNS server is unavailable.
What should you do to resolve this problem?

To answer, click the appropriate check box in the Advanced tab of the london Properties dialog box

52. You are the administrator of your company's network. The network consists of one Windows 2000 domain. All servers and client computers are running Windows 2000
To facilitate name resolution and client access to resources on the servers, you have configured your DNS standard primary zone to include the addresses of all of your servers
You later add three new member servers to your network Users report that they can find these servers in the directory but cannot access these servers You want to resolve this problem.
What should you do?

A. Convert the DNS standard primary zone to an Active Directory integrated zone
B. Create SRV (service) records for each new server in the DNS zone.
C. Set the Allow Dynamic Updates setting for the DNS standard primary zone to Yes
D. Set the Allow Dynamic Updates setting for the DNS standard primary zone to Only Secure Updates
53. You are the administrator of the contoso.com domain. Your network environment consists of a main office and two branch offices The branch offices are connected to the main office by 256-Kbps leased lines You have a single DNS zone, and all DNS servers are located at the main office
All servers on your network are running Windows 2000 Server Your network is not connected to the Internet
Users report that response times are extremely slow when they attempt to access intra net resources.
When you monitor the network, you discover that DNS name resolution queries are generating heavy traffic across the WAN links

You want to accomplish the following goals:

Name resolution traffic across the WAN links will be reduced
Response times for name resolution queries will be reduced
Administrative overhead for DNS maintenance will be minimized
Current DNS namespace design will be maintained.

You take the following actions:

Increase the refresh interval for zone transfers.
For each branch office, create a new Windows 2000 domain in the same tree as the first domain .
Install a DNS server and create a new standard primary DNS zone for each new Windows 2000 domain
Configure each DNS server to forward requests to the other DNS servers on the network
Add resource records for each office's local intranet resources to the local zone files
Configure client computers in the branch offices to query their local DNS servers only

Which result or results do these actions produce? (Choose all that apply)

A. Name resolution traffic across the WAN links is reduced
B. Response times for name resolution queries are reduced
C. Administrative overhead for DNS maintenance is minimized
D.Current DNS namespace design is maintained


54. You are the administrator of your company's network. You configure a Windows 2000 Server computer as the DNS server for your network. You create both standard primary forward lookup and reverse lookup zones.
You discover that when you use the nslookup utility, you cannot resolve host names from IP addresses on your network.
You also discover that when you run the Tracert.exe utility, you receive the following error message. "Unable to resolve target system name"

What should you do?

A. Create A (host) records in the forward lookup zone
B. Create A (host) records in the reverse lookup zone
C. Create PTR (pointer) records in the forward lookup zone
D. Create PTR (pointer) records in the reverse lookup zone

55. You are the administrator of the contoso.com domain. Your network environment consists of a main office and two branch offices The branch offices are connected to the main office by 256-Kbps leased lines. You have a single DNS zone, and all DNS servers are located at the main office All servers on your network are running.

Windows 2000 Server Your network is not connected to the Internet.
Users report that response times are extremely slow when they attempt to access intranet resources. When you monitor the network, you discover that DNS name resolution queries are generating heavy traffic across the WAN links.

You want to accomplish the following goals

Name resolution traffic across the WAN links will be reduced.
Response times for name resolution queries will be reduced
Administrative overhead for DNS maintenance will be minimized
Current DNS namespace design will be maintained

You take the following actions

Create a new secondary DNS zone at each branch office Use the primary zone at the main office as the master zone.
Increase the refresh interval for zone transfers.
Configure the client computers to query their local DNS servers.

Which result or results do these actions produce? (Choose all that apply)

A. Name resolution traffic across the WAN links is reduced.
B. Response times for name resolution queries are reduced
C. Administrative overhead for DNS maintenance is minimized
D. Current DNS namespace design is maintained


56. You are the administrator of a Windows 2000 network that consists of three subnets. For load-balancing purposes, each Web server on your network is configured to maintain exactly the same content as all the other Web servers.

You want to configure your DNS server to allow users to type a host name in their browsers to connect to the Web server that is on the same subnet. The host name that all users type will be identical regardless of the subnet they are on.

How should you configure your DNS server?

A. On the primary DNS server, create three A (host) records that map the same host name to the IP address of the Web server on each subnet
B. On the primary DNS server, create one A (host) record that is located on the same sub net as the DNS server. On the secondary DNS servers on the two remaining subnets, edit the zone file for the domain on each DNS server to include an A (host) record for the Web server on each subnet
C. On the primary DNS server, create three A (host) records that map a different host name to the IP address of the Web server on each subnet.
D. On the primary DNS server, create one A (host) record for one Web server and two CNAME (canonical name) records for the remaining two Web servers .

57. You are the administrator of your company's network Your primary internal DNS server is installed on a UNIX computer named ns1 contoso.com The ns1 contoso.com server is configured to send zone transfers to a secondary DNS server installed on a Windows 2000 Server computer named ns2 contoso.com. The ns1 contoso.com server is also configured to send zone transfers to a DNS server installed on a Windows NT Server 40 computer named ns3contoso.com.
When you examine the records in the zone file on the ns2contoso.com server, you notice that they do not match the records found on either the ns 1 contoso.com server or the ns3contoso.com server.

What should you do to correct this problem? (Choose all that apply)

A. Install the DNS Server service on a separate Windows 2000 Server computer on your network
B. Create sub zones on the UNIX DNS server.
C. Delegate the sub zones that contain the SRV (service) records to a separate DNS server
D. Configure the primary DNS server so that only the root zone is transferred to the Windows 2000 DNS server.
E. Configure the WINS resource records so that they are not replicated to secondary name servers
F. Clear the Fail on load if bad 2One data check box in the properties of the primary DNS server
G. Change the zone on the primary DNS server from an Active Directory integrated zone to a standard primary zone.


58. You are the administrator of a Windows 2000 network. The network consists of 30 Windows 2000 Professional computers and two Windows 2000 Server computers named Athens and Boston Athens has a permanent cable modem connection to the Internet.
All Windows 2000 Professional computers on the network are configured to use Automatic Private IP Addressing (APIPA). The network does not contain a DHCP server.
To allow all Windows 2000 Professional computers on the network to access the Internet through the cable modem connection of Athens, you install and configure the Network Address Translation (NAT) routing protocol on Athens
You decide to use IP addresses in the range of 192.168.40.1 through
192.168.40.50 for the network. Athens is config.to use an IP address of 192.168.40 1.
Boston is a Web server configured with an IP address of 192.168.40.2 and a default gateway of 192168.40 1. Your Internet service provider (ISP) has allocated two IP addresses, 207.46.179 16 and 207.46.179 17, to your network. The network is shown in the exhibit (Click the Exhibit button) You want to allow Internet users from outside your internal network to use an IP address of 207.46.179.17 to access the resources on Boston through the NAT service on Athens

How should you configure the network to accomplish this goal?

A.Configure Athens with a static route on the private interface of the NAT routing protocol.
Use a destination address of 207.46.179.17, a network mask of 255.255.255.255, and a gateway of 192.168.40.2
B.Configure Boston with a static route on the U\.N interface. Use a destination address of 192.168.40.1, a network mask of 255.255.255.255, and a gateway of 207.46.179.17
C. Configure the U\.N interface of Boston to use multiple IP addresses Assign the additional lP address of 207.46.179.17 to the interface.
D. Configure the public interface of the NAT routing protocol to use an address pool with a starting address of 207.46.179.16 and a mask of 255.255.255.254. Reserve a public IP address of 207.46.179.17 for the private IP address of 192.168.40.2

59. You are the administrator of a Windows 2000 network. The network consists of a Windows 2000 Server computer named SrvA and 30 Windows 2000 Professional computers SrvA has a dial-up connection that connects to the Internet All Windows 2000 Professional computers on the network are configured to use Automatic Private IP Addressing (APIPA). There is no DHCP server on the network.
SrvA is configured to use an IP address of 1921680 1 Routing and Remote Access and all the ports on SrvA are enabled for demand-dial routing The Network Address Translation (NAT) routing protocol is added.
You want to allow all Windows 2000 Professional computers on the network to access the Internet through a translated demand-dial connection on SrvA.

How should you configure the network? (Choose four)

A. Create a new demand-dial interface for the local area connection
B. Create a new demand-dial interface for the dial-up connection
C. Add a public and a private interface to the NA T routing protocol
D. Configure the IP address of the Internet service provider (ISP) as the default gateway on the private interface
E. Add a default static route that uses the public interface
F. Configure the NA T routing protocol to enable network address translation assignment and name resolution
G. Configure the public NA T interface with an address pool of 1921680 1

60. You are the administrator of a Windows 2000 network. The network consists of a Windows 2000 Server computer named Srv1 and 12 Windows 2000 Professional computers Srv1 has a dial-up connection that connects to the Internet.
Srv1 is configured to use Internet Connection Sharing to allow Internet access through the dial-up connection of Srv1.
The 12 Windows 2000 Professional computers are configured for static TCP/lP addressing. The IP addresses are 192.168.0 1 through 192.168.0.12, and the subnet mask is 255.255.255.0 The 12 Windows 2000 Professional computers have no default gateway configured.
You discover that the Windows 2000 Professional computers are not able to access the Internet through the dial-up connection of Srv1 You confirm that the preferred DNS server on the Windows 2000 Professional computers is configured correctly.
What should you do to allow all 12 computers to access the Internet through the dial-up connection of Srv1? (Choose all that apply)
A. On the Windows 2000 Professional computer with IP address 192.168.0.1 , change the IP address to 192.168.0.13
B. Change the IP address on all 12 Windows 2000 Professional computers to 169.254.0.2 through 169.254.0.13
C. Change the subnet mask on all 12 Windows 2000 Professional computers to 255.255.0.0.
D. Change the default gateway on all 12 Windows 2000 Professional comp. to 192.168.0 1
E. Change the default gateway on all 12 Windows 2000 Professional computers to 169.254.0.1

61.You are the administrator of a Windows 2000 network The network consists of two Windows 2000 Server computers named ServerA and ServerB and 180 Windows 2000 Professional computers on one segment.
ServerA has an IP address of 192.168.2.1 ServerA is a DHCP server. The TCP/IP configuration of all the Windows 2000 Professional computers is provided by the DHCP server. The range of IP addresses used at ServerA is 192.168.20.1/24 The lease time used is 15 days.
You want to change the IP addresses on the network from 192.168.20/24 to 10.178.0/24. ServerB has an IP address of 10 178.1
You install another DHCP server on ServerB The range of IP addresses used at ServerB is 10 178.0/24 The lease time used is 15 days.
The network is shown in the exhibit (Click the Exhibit button )
To ensure compatibility, the two address ranges will be used concurrently on the same segment for three months. Routing between the two address ranges is provided by a router on the network
After you activate the DHCP scope on ServerB, users report that they are unable to obtain a valid IP address.
When you investigate the problem, you discover that each of the two DHCP servers responds with DHCP negative acknowledge (DHCPNAK) messages to leases requested by the client computers.
What should you do?
A. On the Windows 2000 Professional computers, disable Automatic Private IP Addressing (APIPA)
B. On the Windows 2000 Professional computers, configure the DHCP client computers to release the DHCP lease at shutdown.
C. On both DHCP servers, set the number of times the DHCP server should attempt conflict detection to 0
D. On both DHCP servers, configure a superscope so that it has both address ranges Define an exclusion range for the entire address range of 10 1780124 on ServerA and of 192.168.20.124 on ServerB
E. On both DHCP servers, set scope option 031 Perform Router Discoverv to 1 to enable the option on the Windows 2000 Professional computers

62. You are the administrator of your company's network. The network consists of 10 Windows 2000 Server computers, 100 Windows 2000 Professional computers, and 150 Windows NT Workstation computers.
For workgroup collaboration and document sharing, all client computers have file and print sharing services enabled.
You are using DHCP to automate the TCP/IP configuration of all client computers

You want to accomplish the following goals

All client computers will be able to be located on the network by the network's fully qualified domain name.
A (host) records for all client computers will be automatically added to the DNS zone files.
PTR (pointer) records for reverse name lookup for all client computers will be automatically added to the DNS zone files
A records and PTR records will be automatically removed from the DNS zone files when the DHCP lease expires

You take the following actions

Configure the DHCP server to always update client computer information in DNS
Configure the DHCP server to discard forward lookups when the lease expires
Configure the DHCP server to update DNS for client computers that do not support dynamic updates
Configure the DHCP scope to configure the domain name for all DHCP client computers.

Which result or results do these actions produce? (Choose all that apply)

A. All client computers are able to be located on the network by the network's fully qualified domain name
B. A records for all client computers are automatically added to the DNS zone files
C. PTR records for reverse name lookup for all client computers are automatically added to the DNS zone files
D. A records and PTR records are automatically removed from the DNS zone files when the DHCP lease expires


63. You are the administrator of your company's network The network consists of five subnets that are connected by a BOOTP relay-enabled router There are 50 Windows 2000 Server computers and 1,000 Windows 2000 Professional client computers distributed approximately evenly across the five subnets.
There are also 25 UNIX servers and 100 DHCP-enabled network printers on the network

You want to accomplish the following goals

The correct assignment of IP addresses to each client computer on each subnet will be automated
Address conflicts between client computers and servers will be prevented Correct scope options will be applied to each client computer on each subnet
Client computers that are not in use will be prevented from keeping an IP address for more than three days.
Each network printer will always receive the same IP address

You take the following actions:

Install the DHCP Server service on a Windows 2000 Server computer. Create five scopes, each containing the address range for a specific subnet
In the DHCP console, set optional client configurations for each scope in the Scope Options container
Exclude the range of addresses in use by the servers
Exclude the range of addresses in use by the network printers.

Which result or results do these actions produce? (Choose all that apply)

A.The correct assignment of IP addresses to each client computer on each subnet is automated
B. Address conflicts between client computers and servers are prevented
C. Correct scope options are applied to each client computer on each subnet
D. Client computers that are not in use are prevented from keeping an IP address for more than three days
E. Each network printer always receives the same IP address


64. You are the administrator of your company's network. The network consists of 10 Windows 2000 Server computers, 100 Windows 2000 Professional computers, and 150 Windows NT Workstation computers.
For workgroup collaboration and document sharing, all client computers have file and print sharing services enabled. You are using DHCP to automate the TCP/IP configuration of all client computers

You want to accomplish the following goals
All client computers will be able to be located on the network by the network's fully qualified domain name.
A (host) records for all client computers will be automatically added to the DNS zone files.
PTR (pointer) records for reverse name lookup for all client computers will be automatically added to the DNS zone files
A records and PTR records will be automatically removed from the DNS zone files when the DHCP lease expires

You take the following actions
Configure the DHCP server to never update client information in DNS
Configure the DHCP server to discard forward lookups when the lease expires
Configure the DHCP scope to configure the domain name for all DHCP client computers

Which result or results do these actions produce? (Choose all that apply)

A. All client computers are able to be located on the network by the network's fully qualified domain name
B. A records for all client computers are automatically added to the DNS zone files
C. PTR records for reverse name lookup for all client computers are automatically added to the DNS zone files
D. A records and PTR records are automatically removed from the DNS zone files when the DHCP lease expires

65. You are the administrator of your company's network. The network consists of one Windows 2000 domain that has 10 Windows 2000 Server computers and 500 Windows 2000 Professional client computers. You want all client computers to receive their TCP/IP configuration from DHCP
You install the DHCP Server service on one of your Windows 2000 Server computers and create and activate a scope of addresses.
Users report that they cannot connect to the network. You discover that none of the client computers are receiving TCP/IP configurations from DHCP.

What should you do to resolve this problem?

A. Stop and restart the DHCP Server service on the DHCP server
B. Restart all client computers
C. Authorize the DHCP server in Active Directory
D. Add a DNS host record for the DHCP server


66. You are the administrator of a Windows 2000 domain named contoso.com. The domain has a Windows 2000 member server computer named Ras1 and a Windows 2000-based DHCP Server computer named Dora. Routing and Remote Access is enabled for remote access on Ras1.
The network has two DNS servers that use IP addresses of 10.152 and 10153
Ras1 is configured to use DHCP to assign IP addresses to the remote access client computers.
The configuration of the scope options on the DHCP server is shown in the following window.

DHCP
dora,contoso.com[10.1.5,1]
Scope [10.1.5.0] Net5
Address Pool
Address Leases
Reservations
Server Options
DNS Servers
Standard 10.1.5.3
None

The DHCP scope does not have any client computer reservations

When remote access client computers dial in to Ras1, they receive an IP address from the DHCP scope range, but they do not receive the DNS address configured in the DHCP scope Instead, the remote access client computers receive a DNS server address of 10 1 52
You want the remote access client computers to receive the DNS option from the DHCP server

How should you configure the network to accomplish this goal?

A. Configure the remote access client computers to enable DHCP on the dial-up connection
B. Configure Ras1 to use Windows Authentication.
C. Install and configure the DHCP Relay Agent routing protocol on the Internal interface of Ras1
D. On the DHCP server, configure the DNS scope option of 10 1 53 for the Default Routing and Remote Access user class

67. You want to implement four RRAS-policies. Click and place the four
RRAS-policies in order of execution:

Domain Users - permit access between 07:00 and 17:00
Support Staff - permit access between 18:00 and 20:00
Domain Users - deny access between 17:00 and 07:00
Support Staff - deny access between 20:00 and 18:00.

68. You are the administrator of a large network. At the moment you are using IP 207.200.16.0/24 for multicasting purposes. Your CEO wants to add 2.000 PC's to your network, and make sure the current subnet can deal with an extra 2.000 workstations. Should you:

A) add another subnet ranging from 207.200.17.0-207.200.24.0,
B) add another subnet ranging from 207.200.33.0-207.200.48.0.
C) change the advertisement branch IP to 207.200.16.0/20
D) add another subnet ranging from 207.200.16.0/22-207.200.16.0/23

69. Your company has four branch offices Atlanta, Boston, New York and Dallas.
There is a multicast address used for videoconferences and the like to deliver content to all four sites. Atlanta and Boston are right beside each other connected by a router. There is a Sales videoconference held every Monday between Atlanta and Boston. How should you configure the router so that the Sales multicast videoconferencing does not get broadcasted to all four branches?

A) Configure TCP-filters on the router to block all multicast traffic.
B) Create a static route for the Sales multicast broadcast on the router.

70. You are the admin of a large network with a web server. Internal users complain that when they try to view a secure page, they get an error like
"The requested page cannot be displayed".
You have to troubleshoot the problem. Should you:
A) Permit port 20 in your TCP-filter,
B) Permit port 21 in your TCP-filter,
C) Permit port 443 in your TCP-filter,
D) Change the file permissions for the HTTPS-page.

71. You are the admin of a large network consisting of four subnets: A, B, C and D. There are three workstations on every subnet. One workstation on Subnet B frequently uses resources from a machine on Subnet A; the other two workstations on subnet B use resources located in subnet C.

Should you:
A) Configure a DHCP-scope for the two machines on subnet B to use the router to connect
to Subnet C.
B) Create a reservation for the one machine and specify a DCHP scope option to use the
router to connect to Subnet A
C) Configure a static route on the router for the machine in Subnet B that gets its resources
from Subnet A and add that under DHCP-scope options for that DHCP-address reservation
D) Configure a static route on the router for the machines in Subnet B that get their
resources from Subnet C, and add that under DHCP-scope options for that DHCP-scope

72 .You have a Windows 2000 Server with RRAS and fax service, your another remote office also have a Windows 2000 Server with RRAS. When you start to replicate some accounting files to the remote office, but fail.

How do you resolve this problem?
A. stop the FAX service.
B. enable Multilink
C. enable Internet Connecting Sharing
D. enable server as a Router.

73 You want to use Network Monitor to analyze ISO and TP4 communication to MS Exchange Server.
How?(choose two)
A. change the Temporary Capture Directory.
B. Copy ISO.dll and TP4.dll to Netmon Subdirectory.
C. Copy ISO.dll and TP4.dll to Netmon\Parsers Subdirectory.
D. Modify the parser.ini.
E. Modify the Netmon.ini.

Q answer Explanation PART 1
1 D Released records not replicated (W2K-TCP/IP page 500, 533, 534Active record and Tombstoned record will be replicated ((W2K-TCP/IP page 505)Tomstoned or extinct is the same.
2 A,D?
3 A,D
4 B (W2K-TCP/IP page 315)
5 D (W2K-TCP/IP page 901)
6 A,B,C,D In the Windows 2000 help file it states: "By enabling Internet connection sharing on the computer that uses the dial-up connection, you are providing network address translation, addressing, and name resolution services for all computers on your home network."
7 B?
8 C (W2K-Inter page 410)
9 B,D,E Mutual authentication (W2K-Inter page 232)
10 C From Error and Event Messages help file: To add NetWare 4.x servers running in bindery emulation mode to Windows 2000 Server domains: 1. Run Registry Editor (REGEDT32.EXE). 2. From the HKEY_LOCAL_MACHINE subtree, go to the following key: \SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters 3. From the Edit menu, choose Add Value. 4. Type the following in the appropriate text boxes: Value Name: Allow4X Data Type: REG_DWORD Data: 1 5. Choose OK and close the Registry Editor. 6. Shut down and restart Windows 2000 Server.
11 A?
12 C (W2K-Inter page 137)
13 B
14 A,E To enable Conflict Detection you have to increase Conflict DetectionAttempts to a number greater than zero
15 A,C
16 B if you check Master key Prefect forward Secrecy check box, the Authenticate and generate a new key after every 480 minutes and 1 session(s) by default. It means that a new key will generate every 480minute or at a new session start.
17 C
18 B
19 A OR B
20 C
21 B,C,F
22 B
23 D
24 D
25 C
26 Select & TCP/IP and client for Microsoft Network
27 A They will now be a member off the domain group
28 D or E
29 B,C
30 A,D
31 D or B
32 B
33 ?? The idle time and the max session times were backwards so neither of those was accomplished. The Allow dial in times should have been 12:00-07:00 and 16:00-12:00 for every day of the week. With those numbers, NOTHING WAS ACCOMPLISHED!!!
34 A,E,F B,C,E???
35 B
36 A
37 C
38 B
39 D
40 B
41 A,B,C,E
42 Select & Question is not very clear with the conditions, but RAS policies are processed from top to bottom until if finds a match. So it should usually be set from most specific to general. So, it will process the 7-8 deny policy first, if it is not 7-8 at that time, it will go on to the next policy and so on.1) 7-8 policy deny 2) support staff only 3) domain users
43 C
44 C
45 A,B
46 D
47 D
48 C
49 B
50 A,C,D
51 Select & In the Server options list, select the ‘Bind Secondaries’ check box, and then click OK.
52 A
53 D
54 D
55 A,B,C
56 A
57 A
58 B
59 B,C,E,F
60 A,D
61 D
62 A,B,C,D
63 B
64 B
65 C
66 D
67
68
69
70 C
71
72 A Q192614 It is necessary to stop and restart the Fax and Modem Sharing services after you change the list of available modems for those services.
73 C,D Q168862 1) Copy the Iso.dll, Iso.ini, Tp4.dll files to your NetMon\Parsers subdirectory.These files are located in the BackOffice Resource Kit. 2) Make following additions to your Parser.ini file. The Parser.ini file is located in the NetMon directory.

W2K-TCP/IP Microsoft Windows 2000 server resource kit TCP/IP Core Networking GuideW2K-Inter Microsoft Windows 2000 server resource kit Internetworking GuideQ168862 Microsoft Knowledge base article