0% found this document useful (0 votes)
6K views319 pages

Windows L1

Windows L1 MCQ

Uploaded by

Kaushik Baranwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6K views319 pages

Windows L1

Windows L1 MCQ

Uploaded by

Kaushik Baranwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 319

Set 1

1. What is the GUI tool used to build the UNATTEND.TXT file included with the
Windows 2000 Resource Kit?

A. SETUPMGR.EXE
B. UNATTEND.EXE
C. PREBUILD.EXE
D. SYSLOAD.SYS
E. SETUP.EXE

Answer: A

2. Which component of the Windows 2000 Executive is responsible for


handling input and output from installed devices?
A. The Device Manager
B. The Cache Manager
C. The I/O Manager
D. The Device Manager
E. none of the above

Answer: C

3. Which of the following IRQs are used for LPT1?


A. 1
B. 3
C. 5
D. 7
E. 9

Answer: D

4. Which layer(s) of the OSI model is/are included in the NDIS


specification?
A. 1
B. 2
C. 3
D. 4
E. 5

Answer: B

5. Windows 2000 Professional can access drives compressed with


DriveSpace.
A. TRUE
B. FALSE

Answer: B

6. What should the impedance on RG-58 cable be?


A. 50
B. 75
C. 90
D. 93
E. 98

Answer: A

7. What is another name for 10BaseT?


A. Baseband
B. Broadband
C. Thicknet
D. Thinnet
E. Twisted Pair

Answer: E

8. Which of the following categories for UTP has the least expensive cable?
A. 1
B. 2
C. 3
D. 4
E. 5

Answer: C

9. Which of the following modules manages bindings in NDIS?


A. Protocol manager
B. Binding manager
C. Redirector
D. The registry
E. None of the above

Answer: A

10.If a network has a Windows NT domain controller, what kind of network


is it?
A. WAN
B. High-speed
C. Peer-to-peer
D. Server-based
E. Server-to-server

Answer: D

Which of the following operating systems is designed for servers used in a large
enterprise network?

11.
A. Windows 2000 Client
B. Windows 2000 Workstation
C. Windows 2000 Server
D. Windows 2000 Advanced Server
E. Windows 2000 Enterprise Server

Answer: D

12.RAID 1 offers what type of fault tolerance?


A. Mirroring
B. Stripping
C. Stripping with parity
D. Hot swap
E. Warm swap

Answer: A

13.Which RAID level is also called mirroring?


A. 0
B. 1
C. 3
D. 5
E. 10

Answer: C

14.Which of the following IRQs are used for the CMOS/real-time clock?
A. 0
B. 2
C. 4
D. 6
E. 8

Answer: E

15.You have been asked to install a network of nine Windows NT


workstations in a single department.Low cost is a goal.What kind of
network should you install?
A.
B. WAN
C. Peer-to-peer
D. Sever-based
E. Clustered-server with RAID
F. Hub based star

Answer: B

16.Which of the following IRQs are used for the CMOS/real-time clock?
A. 0
B. 2
C. 4
D. 6
E. 8

Answer: E

17.What is the maximum segment length on 10Base2 media?


A. 100 meters
B. 185 meters
C. 500 meters
D. 1024 meters
E. None of the above

Answer: B

18.Before upgrading to Windows 2000, you should turn off or uninstall


virus-protection software.
A. TRUE
B. FALSE

Answer: A

19.Which of the following IRQs are used for LPT1?


A. 1
B. 3
C. 5
D. 7
E. 9

Answer: D

20.For Windows 2000 Professional to access files on a dual-boot system,


when another partition boots Windows95 and uses DriveSpace, you
must install Windows 2000 in a partition-
A. FAT
B. FAT32
C. NTFS
D. Any of the above
E. Windows 2000 Professional cannot access drives using DriveSpace

Answer: E

21. What is a set of rules for communication between computers called?


A. NOS
B. protocol
C. standards
D. service
E. NDIS

Answer: B

22. Which of the following companies developt ODI (there are two)?
A. Apple
B. Intel
C. Microsoft
D. Novell
E. 3Com

Answer: A and D

23. Which standard divides the data link layer into the LLC and the MAC
sublayers?
A. 802.1
B. 802.2
C. 802.3
D. 802.4
E. 802.5
Answer: B

24. If a network has a Windows NT domain controller, then it is called as?


A. LAN
B. WAN
C. peer-to-peer
D. domain network
E. server-based

Answer: E

25. A database application is designed to use SQL Server on a Windows NT


platform.The database will be populated with over 500,00 rows of
information in approximately 20 tables.Two tables will be populated with
over 400,000 of those rows.Which of the following platforms would offer
the best performance?
A. A P500MHz system with 128MB of RAM, and 12 disks configured in 3 RAID
mirror sets.
B. A P450MHz system with 32MB of RAM and 4 IDE disks.
C. A P100Mhz system with 64MB of RAM and 4 SCSI disks.
D. A P250MHz system with 64MB of RAM and 6 IDE disks.
E. A P133MHz system with 48MB of RAM and 6 IDE disks.

Answer: A

26. Windows 2000 can be installed on a file system compressed by


DoubleSpace.
A. TRUE
B. FALSE

Answer: B

27. Which of the following IRQs are used for the secondary IDE controller?
A. 11
B. 13
C. 15
D. 17
E. 19

Answer: C

28. Both Windows 2000 and Windows NT support file system encryption.
A. TRUE
B. FALSE
Answer: b

29. A 10BaseT network must be terminated with (?)-ohm terminators.


A. 50
B. 58
C. 75
D. 93
E. None of the above

Answer: E

30. Which IRQ has a standard function as COM4?


A. 1
B. 3
C. 5
D. 7
E. 9

Answer: B

31. How many channels are available on a T1 line?


A. 24
B. 32
C. 64
D. 96
E. 132

Answer: A

32. WDM is an acronym for


A. Windows Device Manager
B. Win32 Device Model
C. Windows Driver Manager
D. Win32 Driver Model
E. Win32 Default Mode

Answer: D

33. Which of the following network devices sends packets from a central point
based upon MAC addresses?
A. Repeater
B. Switch
C. Bridge
D. Router
E. Gateway
Answer: B

34. Star topologies use more wire that bus topologies.


A. TRUE
B. FALSE

Answer: A

35. Which coaxial cable type would be used with Thicknet?


A. RG-8
B. RG-11
C. RG-58
D. RG-59
E. RG-62

Answer: A and B

36. Which IRQ has a standard function as the math coprocessor?


A. 10
B. 11
C. 12
D. 13
E. 14

Answer: D

37. What is the minimum hard disk space required for Windows NT Workstation
4?
A. 90MB
B. 110MB
C. 250MB
D. 300MB
E. 643MB

Answer: B

38. What is the bandwidth for a OC-3 leased-line system?


A. 51.840 Mpbs
B. 155 Mbps
C. 622 Mbps
D. 1.2 Gbps
E. 2.4 Gbps

Answer: B
39. Which of the following media has the highest EMI?
A. UTP
B. STP
C. Coaxial cable (thin)
D. Radio
E. Microwave

Answer: D

40. Windows 2000 can act as a RADIUS client, a RADIUS server, or both.
A. TRUE
B. FALSE

Answer: A

41. What is a MAC address in an Ethernet network?


A. The address assigned by DHCP.
B. A TCP/IP address.
C. The physical address assigned by the NIC manufacturer.
D. A logical address created by the network administrator.
E. A logical address which is subnet specific.

Answer: C

42. Microsoft IIS4.0 doesn't support which of the following service.


A. News
B. Mail
C. Gopher
D. WWW

Answer: C

43. You want to provide search capabilities to the browsers of your Web
site.Which IIS service provides this feature?
A. NNTP
B. Mail Server
C. Index Server
D. Transaction Server

Answer: C

44. You have a domain name host.primary.mycomp.com.Which portion of the


domain name must be registered with InterNIC at the minimum assuming
that your have a DNS Server setup?
A. host.primary.mycomp.com
B. primary.mycomp.com
C. mycomp.com
D. None of the above

Answer: C

45. MMC is an acronym for:


A. Microsoft Management Console
B. Multimedia Management and Control
C. Microsoft Media Console
D. Microsoft Motion Control

Answer: A

46. Which are the IIS services that can use SSL communication?(Choose 3).
A. News
B. Mail
C. WWW
D. FTP

Answer: A, B and C

47. You want to see if any broken links are there in your Web site.Which tool do
you use?
A. NT Explorer
B. Site Server Express
C. User Manager
D. Performance Monitor

Answer: B

48. You have a Corpus of 100 MB.What would be the approximate disk space
required to index these documents?
A. The disk space required to index the documents is roughly 22% of the
Corpus.
B. The disk The disk space required to index the documents is roughly 40% of
the Corpus.
C. The disk space required to index the documents is roughly 60% of the
Corpus.
D. The disk space required to index the documents is roughly 80% of the
Corpus.

Answer: B
49. You are hosting a Web Site which contain some Web pages using Perl
Script.You find that none of the users are able to see Web pages which
contain Perl script.What is the likely cause?
A. Perl interpreter which gets installed as part of IIS4.0, needs to be pointed by
modifying the Properties of Scripts folder.
B. You can not use Perl Scripts on Microsoft Web Server.Microsoft Web server
doesn't support it.
C. You need to install Perl interpreter on the Web Server.
D. Perl interpreter needs to be installed as plug-in on all client machines.

Answer: C

50. When connecting IIS to an external data source through ODBC (Open Data
Base Connector), which type of ODBC DSN must be specified?
A. System
B. File
C. Server
D. User

Answer: A

51.Which of the following are Windows 2000 Executive Services?


A. Window Manager
B. User Manager
C. Task Manager
D. Graphics Device Drivers
E. all of the above

Answer: A and B

52.Which component of the Windows 2000 Executive is responsible for


handling all communications between clients and servers?
A. The Client/Server Manager
B. The IPC Manager
C. The Distributed Manager
D. The Parallel Server
E. none of the above

Answer: B

53.Windows 2000 supports Kerebos authentication.


A. TRUE
B. FALSE
Answer: A

54.RG-58 coaxial cable is commonly used with-


A. Thicknet
B. Thinnet
C. UTP
D. Cable TV
E. ARCnet

Answer: B

55.Which IRQ has a standard function as COM1?


A. 0
B. 1
C. 2
D. 4
E. 6

Answer: D

56.Which of the following network devices translates between data


formats?
A. Repeater
B. Switch
C. Bridge
D. Router
E. Gateway

Answer: E

57.Another name for 10Base2?


A. Baseband
B. Broadband
C. Thicknet
D. Thinnet
E. STP

Answer: D

58.Write the name of layer of the OSI model that maintains a connection
between nodes?
A. Transport Layer
B. Session Layer
C. Physical Layer
D. Network Layer
E. Data Link Layer

Answer: B

59.Which coaxial cable type would be used with Thinnet?


A. RG-8
B. RG-11
C. RG-58
D. RG-59
E. RG-62

Answer: C

60.Which of the following operating systems is ideal for Web servers?


A. Windows 2000 Server
B. Windows 2000 Professional
C. Windows 2000 Print Server
D. Windows 2000 File Server
E. Windows 2000 Datacenter Server

Answer: A

61.Which of the following media has the lowest susceptiblity to


eavesdropping?
A. RG-8 coaxial cable
B. STP
C. fiber optic
D. infrared
E. microwave

Answer: C

62.The gradual weakening of a signal on a wire or other medium?


A. Attenuation
B. Collesce
C. Divergence
D. Impedance
E. Resistance

Answer: A
63.What is the another name for Raid 1?
A. Stripping
B. Mirroring
C. Hot swappable
D. Warm swappable
E. Redudant disks

Answer: B

64.How many channels are available on a T4 line?


A. 1024
B. 2048
C. 4032
D. 4096
E. 8192

Answer: C

65.If you are planning a dual boot system which will boot either Windows
95 or Windows 2000 Professional, which operating system should be
loaded first?
A. Windows 95
B. Windows 2000
C. They may be loaded in any order
D. Dual booting is not supported for Windows 95 and Windows 2000
E. Dual booting is not supported for Windows 2000

Answer: A

66.To specify a batch file to be run after the GUI part of the installation
using WINNT, use the (?) parameter.
A. /B
B. /C
C. /E
D. /P
E. None of the above

Answer: C

67.The Windows 2000 Server Indexing Service can be used to automatically


build an index of a Web server.
A. TRUE
B. FALSE
Answer: A

68.Files in an EFS partition are-


A. Compressed
B. Archived
C. Encapsulated
D. Encrypted
E. EFS is not a valid file system type

Answer: D

69.Windows 2000 assigns a (?) address space to every virtual machine.


A. 1GB
B. 2GB
C. 4GB
D. 16GB
E. 32GB

Answer: C

70.What is another name for 10Base5 ?


A. Baseband
B. Broadband
C. Thicknet
D. Thinnet
E. STP

Answer: C

71.To uninstall Windows 2000(?)


A. Boot from the distribution CD and select UNINSTALL from the dialog box
B. Invoke C:\WINNT32\UNINSTALL
C. Invoke SETUP from the CD and select UNINSTALL
D. Boot from a recovery disk set and select UNINSTALL
E. None of the above

ans: E

72.Which component of the Windows 2000 Executive is responsible for


linking virtual address space to actual memory storage?
A. The Memory Manager
B. The Cache Manager
C. The Installation Manager
D. IPC Manager
E. None of the above

Answer: A

73.Windows clustering provides with of the following benefits?


A. High-availability
B. Network load balancing
C. Component load balancing
D. All of the above
E. None of the above

Answer: D

74.What is the middle layer of the OSI reference model?


A. Application
B. Session
C. Transport
D. Data Link
E. Physical

Answer: C

75.Windows 2000 can be installed on a file system compressed by


DoubleSpace.
A. TRUE
B. FALSE

Answer: B

76.Which RAID level is also called duplexing?


A. 0
B. 1
C. 3
D. 5
E. 10

Answer: B

77.In an OEM directory structure, the equivalent to the root drive on which
Windows 2000 will be installed is called-
A. \$root$
B. \$$
C. \$1
D. \$winnt$
E. \$winnt32$

Answer: B

78.During a RIS installation, after the client system boots, it initiates a-


A. TFTP download
B. DHCP request
C. Telnet Session
D. ROSI protocol
E. All of the above

Answer: B

79.When installing a dual-boot configuration with Windows 98 and


Windows 2000 Professional?
A. Each operating system must be installed in a separate partition or disk
drive
B. The operating systems may be installed in any order
C. Security of Windows 98 may be enhanced using the tools available in
Windows 2000 Professional
D. All of the above
E. None of the above

Answer: A and B

80.Which IRQ has a standard function as COM4?


A. 1
B. 3
C. 5
D. 7
E. 9

Answer: B

81. Which of the following are Windows 2000 Executive Services?


A. Process Manager
B. Plug and Play Manager
C. Security Reference Manager
D. Power Manager
E. All of the above

Answer: E
82. When WINNT is invoked with the /s: parameter, and alternate path for
Windows 2000 (?) is defined.
A. Distribution files
B. Temporary files
C. Answer files
D. Post installation batch files
E. None of the above

Answer: A

83. Which IEEE standard defines internetworking and the OSI model?
A. 802.1
B. 802.2
C. 802.3
D. 802.4
E. 802.5

Answer: A

84. Which level of RAID provides mirroring only?


A. 0
B. 1
C. 2
D. 3
E. 5

Answer: B

85. A network where each workstation can make resources available (ie files
and printers) to any other workstation is called as?
A. LAN
B. Star
C. peer-to-peer
D. client/server
E. WAN

Answer: C

86. What is the minimum hard disk space required for Windows NT Server 4?
A. 110MB
B. 124MB
C. 250MB
D. 500MB
E. 700MB
Answer: B

87. What is the maximum segment length on 10Base5 media?


A. 100 meters
B. 185 meters
C. 500 meters
D. 1024 meters
E. None of the above

Answer: C

88. Windows 2000 Server simplifies management of the network with?


A. Directory service (ADS)
B. Configuration management
C. Network and system management
D. Application services
E. All of the above

Answer: E

89. You have been asked to install a network of 6 workstations in a department


to share a networked printer. Your requirements are: The network
installation an maintenance should be inexpensive. What should your
solution be?
A. a peer-to-peer network
B. a print-server based network
C. install print services on one of the workstations
D. a FDDI ring with dual redundancy
E. a WAN

Answer: A

90. Which component of the Windows 2000 Executive is responsible for


handling all communications between clients and servers?
A. The Client/Server Manager
B. The IPC Manager
C. The Distributed Manager
D. The Parallel Server
E. None of the above

Answer: B

91. When using WINNT32, to define an alternative path to the Windows 2000
distribution files, which parameter is used?
A. /A
B. /M
C. /P
D. /S
E. None of the above

Answer: B

92. Which IRQ has a standard function as COM3?


A. 2
B. 4
C. 6
D. 8
E. 10

Answer: B

93. he acronym UDF, when used with an unattended installation, stands for?
A. Unattended Database File
B. Unique Default File
C. Uniform Database Format
D. Unified Definition File
E. Uniqueness Database File

Answer: E

94. The Network Connection Wizard allows you to set up virtual private
networks.
A. TRUE
B. FALSE

Answer: A

95. Which access method is used for network access by Ethernet?


A. Token Ring
B. CSMA/CA
C. CSMA/CD
D. CTS / RTS
E. Xon / Xoff

Answer: C

96. Which network must be present to use RIS?


A. Telnet
B. DHCP
C. BOOTP
D. RAS
E. Any of the above

Answer: B

97. he interface which guides a user through a RIS installation is called?


A. Client Installation Wizard (CIW)
B. Remote Server Wizard (RSW)
C. Remote Client Wizard (RCW)
D. Remote Operating System Installation (ROSI)
E. None of the above

Answer: A

98. CSMA/CD stands for?


A. Complete System for Media Attenuation and Collision Detection
B. Collision Signaling - Message Access / Collision Detection
C. Collision Sense Multiple Access / Common Deferment
D. Carry Signal Method Access / Complete Detection
E. Carrier Sense Multiple Access / Collision Detection

Answer: E

99. To configure RIS, the RIS host must also be a domain controller.
A. TRUE
B. FALSE

Answer: B

100. When installing a dual-boot configuration using Windows 98 and


Windows 2000 Professional, the primary partition may be?
A. FAT
B. FAT16
C. FAT32
D. NTFS
E. NFS

Answer: A or B

Which of the following is a transport-layer protocol?

101.
A. NetBEUI
B. NetBIOS
C. NDOS
D. PPP
E. SLIP

Answer: A

102. NetBEUI could be used in?


A. small, department-sized networks
B. large multi-building networks
C. WANs
D. MANs
E. any network which supports the OSI model

Answer: A

103. Which of the following operating systems can be upgraded to


Windows 2000?
A. Windows NT 3.5.1
B. Windows NT Workstation
C. Windows NT Server
D. Windows NT Terminal Server
E. All of the above

Answer: E

104. Which of the following media has the highest EMI?


A. UTP
B. STP
C. coaxial cable (thin)
D. radio
E. microwave

Answer: d

105. When using SYSPREP, the base computer must not be a member
of a domain.
A. TRUE
B. FALSE

Answer: A

106. Which of the following operating systems can be upgraded to


Windows 2000?
A. Windows 95
B. Windows 98
C. Windows 98SE
D. Windows NT 3.5.1
E. All of the above

Answer: E

107. he GUI tool used to build the UNATTEND.TXT file included with the
Windows 2000 Resource Kit is?
A. SETUPMGR.EXE
B. UNATTEND.EXE
C. PREBUILD.EXE
D. SYSLOAD.SYS
E. SETUP.EXE

Answer: A

108. What should the impedance on RG-11 cable be?


A. 50
B. 75
C. 90
D. 93
E. 98

Answer: A

109. What is a FDDI network?


A. Bus network
B. EMI suseptible network
C. Star network
D. Ring network
E. 10BaseF network

Answer: D

110. The Windows 2000 Server Indexing Service can be used to


automatically build an index of a Web server.
A. TRUE
B. FALSE

Answer: A

111. Which protocol cannot be routed?


A. TCP/IP
B. SPX/IPX
C. NetBEUI
D. ARP/RARP
E. UDP

Answer: C

112. What network evolved from the Defense Department's ARPANET?


A. MILNET
B. ARP/RARP
C. TCP/IP
D. Ethernet
E. Internet

Answer: E

113. SYSDIFF can be used even if the base and target computers are not
on the same version of Windows 2000 (or Windows NT).
A. TRUE
B. FALSE

Answer: B

114. What is a MAC address in an Ethernet network?


A. The address assigned by DHCP.
B. A TCP/IP address.
C. The physical address assigned by the NIC manufacturer.
D. A logical address created by the network administrator.
E. A logical address which is subnet specific.

Answer: C

115. RG-59 coaxial cable is commonly used with?


A. Thicknet
B. Thinnet
C. UTP
D. Cable TV
E. ARCnet

Answer: D

116.
A.
Answer:

117. Select the proper Windows 2000 Server for the following configuration:
118. 12 CPUs
119. 32 GB RAM
120. to be used as a large-scale web site host
A. Windows 2000 Server
B. Windows 2000 Professional
C. Windows 2000 Advanced Server
D. Windows 2000 Datacenter Server
E. Windows 2000 NetManager

Answer: D

121. Which IEEE 802 protocol defines Broadband technology?


A. 802.1
B. 802.3
C. 802.5
D. 802.7
E. 802.9

Answer: D

122. Windows clustering provides with of the following benefits?


A. high-availability
B. network load balancing
C. component load balancing
D. all of the above
E. none of the above

Answer: D

123. Windows 2000 Professional supports dual-boot configurations with?


A. Windows for Workgroups 3.11
B. Windows 3.x
C. MS-DOS
D. OS/2
E. all of the above

Answer: E

121. When WINNT32 is invoked with the /m: parameter, and alternate
path for Windows 2000 (?) is defined.
A. Distribution files
B. Temporary files
C. Answer files
D. Post installation batch files
E. None of the above

Answer: A

122. Which cable type can operate a speeds of 100Mbps?


A. 10Base2
B. Category 3
C. 10Base5
D. Token Ring
E. Category 5

Answer: E

123. Windows 2000 supports Kerebos authentication.


A. TRUE
B. FALSE

Answer: A

124. What is the minimum recommended processor for a Windows 2000


Server installation?
A. 133MHz
B. 166MHz
C. 250MHz
D. 300MHz
E. 366MHz

Answer: A

125. Which of the following operating systems replaces Windows 95,


Windows 98, and Windows NT 4.0 in a business environment?
A. Windows 2000 Client
B. Windows 2000 Professional
C. Windows 2000 Workstation
D. Windows 2000 End-user
E. Windows 2000 Server

Answer: B

126. Which of the following operating systems can be upgraded to


Windows 2000?
A. Windows 95
B. Windows 98
C. Windows 98SE
D. Windows NT 3.5.1
E. All of the above

Answer: E

127. What should be download and run to check a system for Windows
2000 compatibilty?
A. Windows 2000 System Analysis Tool (SAT)
B. Windows 2000 Installation Preview
C. Windows 2000 Readiness Analyzer
D. Windows 2000 System Integrity Checker
E. None of the above

Answer: C

128. What is the minimum processor requirement for Windows NT Server


4?
A. 486DX
B. P133
C. P233
D. P300
E. P350

Answer: A

129. Which security model is used in a peer-to-peer network?


A. Access Control Lists (ACLs)
B. Access Control Entries (ACEs)
C. Password-protected Shares
D. Share-level Security
E. User-level Security

Answer: D

130. When using WINNT32, the file WINNT32.LOG is the default file name
for the parameter.
A. /DEBUG
B. /LOG
C. /RECORD
D. /RESPONSE
E. None of the above

Answer: A
131. What command displays messages, or turns command echoing on or
off.

Answer: ECHO

131. Which DOS command will display or modifies file types used in file
extension associations?

Answer: FTYPE

132. Which DOS command will display the name of or changes the current
directory?

Answer: CHDIR

133. What command displays or modifies file extension associations

Answer: ASSOC

134. What command prints a text file.

Answer: PRINT

135. What command converts FAT volumes to NTFS.You cannot convert


the current drive.

Answer: CONVERT

136. What command records comments (remarks) in batch files or


CONFIG.SYS.

Answer: REM

137. Which DOS command will configure a system device?

Answer: MODE

138. Which DOS command will call one batch program from another?

Answer: CALL

139. Which DOS command will clear the screen?

Answer: CLS
141. What command moves one or more files from one directory to
another directory

Answer: MOVE

141. Which DOS command will create, change, or delete the volume
label of a disk?

Answer: LABEL

142. Which DOS command will compare two files or sets of files, and
displays the differences between them?

Answer: FC

143. What command performs conditional processing in batch


programs.

Answer: IF

144. Which DOS command will remove a directory (short version)?

Answer: RD

145. Which DOS command will display or set the system time?

Answer: TIME

146. What command schedules commands and programs to run on a


computer.

Answer: AT

147. What command displays a list of files and subdirectories in a


directory.

Answer: DIR

148. Which DOS command will enable Windows NT to display an


extended character set in graphics mode?

Answer: GRAFTABL
149. Which DOS command will edit command lines, recalls Windows NT
commands, and creates macros?

Answer: DOSKEY

151. What command sets or clears extended CTRL+C checking?

Answer: BREAK

151. Which DOS command will display or modify file extension


associations?

Answer: ASSOC

152. Which DOS command will display the contents of a text file?

Answer: TYPE

153. Which DOS command will copy files and directory trees?

Answer: XCOPY

154. Which DOS command will shift the position of replaceable parameters
in batch files?

Answer: SHIFT

155. Which DOS command will search for a text string in a file or files?

Answer: FIND

156. Which DOS command will compare the contents of two files or sets of
files?

Answer: COMP

157. What command directs the Windows 2000 command interpreter to a


labeled line in a batch program.

Answer: GOTO

158. Which DOS command will display output one screen at a time?

Answer: MORE
159. What command begins localization of environment changes in a batch
file.

Answer: SETLOCA

Set 2:

erQuestion 1: Files in an EFS partition -


Option Available

 A)Compressed
 B)Archived
 C)Encapsulated
 D)EncryptedYour selected option : D)Encrypted
Link: undefined
References: undefined
Question 2: What is the middle layer of the OSI reference model?
Option Available

 A)Application
 B)Session
 C)Transport
 D)Data LinkYour selected option : B)Session
Link: undefined
References: undefined
Question 3: Which IEEE standard defines internetworking and the OSI model?
Option Available

 A)802.1
 B)802.2
 C)802.3
 D)802.4Your selected option : B)802.2
Link: undefined
References: undefined
Question 4: Which ONE of the following is a transport-layer protocol?
Option Available

 A)NetBEUI
 B)NetBIOS
 C)NDOS
 D)PPPYour selected option : A)NetBEUI
Link: undefined
References: undefined
Question 5: What network evolved from the Defense Department's ARPANET?
Option Available

 A)MILNET
 B)ARP/RARP
 C)TCP/IP
 D)InternetYour selected option : A)MILNET
Link: undefined
References: undefined
Question 6: Which ONE of the following network device send packets from a central point based upon
MAC addresses?
Option Available

 A)Repeater
 B)Switch
 C)Bridge
 D)RouterYour selected option : B)Switch
Link: undefined
References: undefined
Question 7: Which IRQ has a standard function as the math coprocessor?
Option Available

 A)10
 B)11
 C)12
 D)13Your selected option : D)13
Link: undefined
References: undefined
Question 8: Which of the following media has the highest EMI?
Option Available

 A)UTP
 B)STP
 C)Coaxial cable (thin)
 D)RadioYour selected option : D)Radio
Link: undefined
References: undefined
Question 9: What is a MAC address in an Ethernet network?
Option Available
 A)The address assigned by DHCP
 B)A TCP/IP address
 C)The physical address assigned by the NIC manufacturer
 D)A logical address created by the network administratorYour selected option : C)The
physical address assigned by the NIC manufacturer
Link: undefined
References: undefined
Question 10: Which ONE of the following network device translates between data formats?
Option Available

 A)Repeater
 B)Switch
 C)Bridge
 D)GatewayYour selected option : D)Gateway
Link: undefined
References: undefined
Question 11: You are the administrator of a Windows 2003 network. Your network includes 75 Windows
XP Workstation computers. You are adding 50 new PXE-compliant computers to the network. The
hardware on each computer is configured identically. You are using a RIS image to deploy Windows XP
Professional to the 50 computers. You successfully install Windows XP Professional on the first 10
computers. However, you cannot install Windows XP Professional on remaining 40 computers. What
should you do?
Option Available

 A) Configure the DHCP scope to add additional IP addresses.


 B) Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.
 C) Modify the startup sequence in the CMOS of the remaining computers.
 D) Create computer accounts on the remaining computers in the Active Directory.Your
selected option : A) Configure the DHCP scope to add additional IP addresses.
Link: undefined
References: undefined
Question 12: Computers on the Sales subnet run Windows XP Professional. These computers are having
dynamically assigned IP addresses and configuration information from a DHCP server on the subnet.
Computers on the development subnet run Windows 7. These computers are having statically assigned
IP addresses and configuration information. Users on the Sales subnet report that they cannot
communicate with users on the development subnet. A user who works on computer3 reports that he
cannot communicate with computers on either subnet. You want all users to be able to communicate
with other users on both subnets.What should you do?
Option Available

 A) Change the frame type to 802.2 on computer3.


 B) Change the default gateway option IP address on the DHCP server.
 C) Change the default protocol on the computers on the Sales subnet to NWLink
IPX/SPX/NetBIOS Compatible Transport Protocol.
 D) Enable TCP/IP protocol with the default settings on Computer3.Your selected option : C)
Change the default protocol on the computers on the Sales subnet to NWLink IPX/SPX/NetBIOS
Compatible Transport Protocol.
Link: undefined
References: undefined
Question 13: You want to install Windows XP Professional on 45 new computers on your company's
network. You first install Windows XP Professional on one of the new computer. You log on to the
computer by using the local Administrator account. You install Microsoft Office 97, a virus scanner, and
other company-standard applications. You then create a RIS image of the computer you configured. You
want to configure the RIS image so that the standard applications will be accessible to the user when the
user first logs on to the network. What should you do?
Option Available

 A) Run Rbfg.exe before installing the standard applications.


 B) Run RIPrep.exe before installing the standard applications.
 C) Copy the All Users profile to the Default Users profile.
 D) Copy the local Administrator account profile to the Default Users profile.Your selected
option : C) Copy the All Users profile to the Default Users profile.
Link: undefined
References: undefined
Question 14: You are the administrator of 15 Windows XP Professional portable computers in the sales
department of your company. The company network uses DHCP to configure the IP address of the
portable computers when the computers are used in the office. Company policy allows the company
portable computers to be connected to users home to networks. The sales department reports that
users who use home networks that have manually configured IP address are unable to connect the
portable computers to their home networks. You want to ensure that users can connect portable
computers to their home networks when they are at home and to the company network when they are
in the office. You do not want to change the configuration of home computers on users home networks.
You do not want to change the administrative privileges of the sales department users. What should you
do?
Option Available

 A) Configure the network adapters of the portable computers to enable Internet Connection
Sharing (ICS).
 B) Configure the network adapters of the portable computers to enable Automatic Private IP
Addressing (APIPA).
 C) Add a script to the users desktops that changes the IP configuration between dynamic
and manual.
 D) Configure the IP properties of the portable computers so that they have an alternate
configuration.Your selected option : D) Configure the IP properties of the portable computers
so that they have an alternate configuration.
Link: undefined
References: undefined
Question 15: You are the administrator of your company's network, which includes an Active Directory
domain. Your company hires Julie to help deploy Windows XP Professional to 200 new computers. You
create a new domain user account for Julie and add it to the Domain Users group. Julie is able to
perform the Windows XP Professional installation on the new computers, but she is unable to add the
computers to the Active Directory domain. She verifies that the computers are connected to the
network and that they are receiving IP configuration information from your company's DHCP server. You
need to ensure that Julie can add the new computers to the Active Directory domain. You also need to
ensure that Julie does not have any unnecessary security privileges on the network. What should you
do?
Option Available

 A) Add Julies domain use account to the Server Operators domain user group.
 B) Use the Delegation of Control Wizard to grant Julies domain user account the right to
create new objects in the computers container.
 C) On a domain controller, use the Local Computer Policy MMC to add Julies domain user
account to the add workstations to domain user right policy.
 D) Install the Active Directory users and computers MMC on Julies Windows XP Professional
computer. Add Julies domain user account top the domain Administrators domain user
group.Your selected option : A) Add Julies domain use account to the Server Operators domain
user group.
Link: undefined
References: undefined
Question 16: You are the network administrator for TestKing. The network consists of a single Active
Directory domain testking.com. All network servers run Windows Server 2003, and all client computers
run Windows XP Professional. TestKing includes a main office and several branch offices. You work in the
main office. A DNS server named TESTKING1 is located in one of the branch office. You need to perform
DNS management on TESTKING1. First, you log on to a client computer. However, the computer does
not have the DNS snap-in installed. What should you do next?
Option Available

 A) Install the Service Pack 2 on the client computer


 B) From a command prompt, start Nslookup.exe. At the prompt, type install.
 C) Use Windows Explorer to open the c$ share on TESTKING1. Select \windows\system32
and install Adminpak.msi
 D) Use Windows Explorer to copy C:\windows\system32\dnsmgmt.msc from TESTKING1 to
C:\windows\system32 on the client computerYour selected option : C) Use Windows Explorer
to open the c$ share on TESTKING1. Select \windows\system32 and install Adminpak.msi
Link: undefined
References: undefined
Question 17: You are the network administrator for TestKing. The network consists of a single Active
Directory forest that contains three domains. Each domain contains domain controllers that run
Windows 2003 Server and domain controllers that run Windows Server 2003. The DNS Server service is
installed on all domain controllers. All client computers run Windows XP Professional. You need to add
an additional DNS zone that is hosted on at least one DNS server on each domain. You want to configure
the zone to allow secure updates only. What should you do?
Option Available

 A) Configure the new zone on DNS servers in the root domain. Configure stub zones that
refer to DNS servers in another two domains
 B) Configure the new zone as a primary zone on one DNS server. Configure other DNS
servers in the three domains as secondary servers for this zone. Enable the DNS Security
Extensions (DNSSEC) protocol
 C) Configure the new zone as an Active Directory-integrated zone on DNS servers in the
three domains. Store the zone data in the DNS directory partition named DomainDNSZones
 D) Configure the new zone as an Active Directory-integrated zone on DNS servers in the
three domains. Store the zone data in the DNS directory partition named ForestDNSZonesYour
selected option : D) Configure the new zone as an Active Directory-integrated zone on DNS
servers in the three domains.
Store the zone data in the DNS directory partition named ForestDNSZones
Link: undefined
References: undefined
Question 18: You are the network administrator for TestKing. You need to provide Internet name
resolution services for the company. You set up a Windows Server 2003 computer running the DNS
Server service to provide this network service. During testing, you notice the following intermittent
problems: Name resolution queries sometimes take longer than one minute to resolve. Some valid
name resolution queries receive the following error message in the Nslookup command line tool: Non-
existent domain. You suspect that there is a problem with name resolution. You need to review the
individual queries that the server handles. You want to configure monitoring on the DNS server to
troubleshoot the problem. What should you do?
Option Available

 A) In the DNS server properties, on the Debug Logging tab, select the Log packets for
debugging option
 B) In the DNS server properties, on the Event Logging tab, select the Errors and warnings
option
 C) In the System Monitor, monitor the Recursive Query Failure counter in the DNS object
 D) In the DNS server properties, on the Monitoring tab, select the monitoring optionsYour
selected option : A) In the DNS server properties, on the Debug Logging tab, select the Log
packets for debugging option
Link: undefined
References: undefined
Question 19: You are a network administrator for TestKing. TestKing has a main office and two branch
offices. The branch offices are connected to the main office by T1 lines. The network consists of three
Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or
Windows XP Professional. Each office has a small data center that contains domain controllers, WINS,
DNS, and DHCP servers, all running Windows Server 2003. Users in all offices connect to a file server in
the main office to retrieve critical files. The network team reports that the WAN connections are
severely congested during peak business hours. Users report poor file server performance during peak
business hours. The design team is concerned that the file server is a single point of failure. The design
team requests a plan to alleviate the WAN congestion during business hours and to provide high
availability for the file server. You need to provide a solution that will improve file server performance
during peak hours and that provides high availability for file services. You need to minimize bandwidth
utilization. What should you do?
Option Available

 A) Purchase two high-end servers and a shared fiber-attached disk array. Implement a file
server cluster in the main office by using both new servers and the shared fiber attached disk
array
 B) Implement Offline Files on the client computers in the branch offices by using
Synchronization Manager. Schedule synchronization to occur during off-peak hours
 C) Implement a stand-alone Distributed File System (DFS) root in the main office. Implement
copies of shared folders for the branch offices. Schedule replication of shared folders to occur
during off-peak hours by using scheduled tasks
 D) Implement a domain Distributed File System (DFS) root in the main office. Implement DFS
replicas for the branch offices. Schedule replication to occur during off-peak hoursYour selected
option : C) Implement a stand-alone Distributed File System (DFS) root in the main office.
Implement copies of shared folders for the branch offices.
Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks
Link: undefined
References: undefined
Question 20: You are the network administrator for Testking.com. The network consists of a single
Active Directory domain TestKing.com. All network servers run Windows Server 2003. Terminal Services
is installed on three servers running Windows 2000 Server. Remote users use the terminal servers to
access the company intranet so they can read e-mail and submit time sheets. To make a connection,
users choose a terminal server from a list. This process generates help desk requests. Over time, the
remote user load increases. The existing terminal server cannot support the number of concurrent
connections. You need to create a new terminal server to assist in handling the load. However, you must
not add any new server names to the list of terminal servers. First, you upgrade all three servers to
Windows Server 2003 with Terminal Server installed. What should you do next?
Option Available

 A) Create a Session Directory terminal server farm


 B) Configure the Windows Cluster Services on each terminal server
 C) Install and configure Network Load Balancing
 D) Install and configure round robin DNSYour selected option : A) Create a Session Directory
terminal server farm
Link: undefined
References: undefined
Question 21: You use a Windows XP Professional computer at home. You need to access shared files on
a server named server1. This server is on your company's network and is not accessible from the
Internet. Your company's network also includes a third party VPN server that is accessible from the
Internet. You dial in to your Internet service provider and then create a VPN connection to your
company's VPN server. After the connection is successfully established, you run the net view \\server1
command and receive the following error 'the server is inaccessible or could not be found'. You need to
access the shared files on server 1. What should you do?
Option Available

 A) Stop and then start the TCP/IP NetBIOS helper service on your computer.
 B) Stop and then start the DNS client service on your computer.
 C) Add a HOSTS entry for server1 to your computer.
 D) No need to do anythingYour selected option : C) Add a HOSTS entry for server1 to your
computer.
Link: undefined
References: undefined
Question 22: You want to write a script that encrypts each user's My Documents folder using EFS. It has
to be scheduled to run only once. Which tool should you use in the script?
Option Available

 A) Windows Explorer
 B) Efsinfo
 C) Syskey
 D) CipherYour selected option : C) Syskey
Link: undefined
References: undefined
Question 23: You are the network administrator for TestKing.com. The network consists of a single
Active Directory domain named testking.com. All network servers run Windows Server 2003, and all
client computers run Windows XP Professional. XML Web services for the internal network run on a
member server named TK1, which is configured with default settings. You are a member of the local
Administrators group on TK1. You need the ability to remotely manage TK1. You have no budget to
purchase any additional licensing for your network until the next fiscal year. How should you reconfigure
TK1?
Option Available

 A) In the System Properties dialog box, enable Remote Desktop


 B) Add your user account to the Remote Desktop Users local group
 C) In the System Properties dialog box, enable Remote Assistance
 D) Install Terminal Services by using Add or Remove ProgramsYour selected option : A) In the
System Properties dialog box, enable Remote Desktop
Link: undefined
References: undefined
Question 24: You have just installed two Windows Server 2003 computers. You configure the servers as
a two node server cluster. You install WINS on each Node of the cluster. You create a new virtual server
to support WINS. You create a new cluster group named WINSgroup. When you attempt to create the
Network Name resource, you receive an error message. You need to make the proper changes to the
cluster to complete the installation of WINS. What should you do?
Option Available

 A) Create a Generic Service resource in the WINSgroup cluster group


 B) Configure the network priorities for the cluster
 C) Create an IP address resource in the WINSgroup cluster group
 D) Add the proper DNS name for the WINS Server in the DNS databaseYour selected option :
D) Add the proper DNS name for the WINS Server in the DNS database
Link: undefined
References: undefined
Question 25: TestKing uses WINS and DNS for name resolution. The LMHosts and Hosts files are not
used. A user Tess on a server named TestKing2 reports that when she runs a script to transfer files to a
server named TestKing5, she receives the following error stating Unknown Host TestKing5. You use
TestKing2 to troubleshoot the problem. The results of your troubleshooting show that the nslookup
utility replies with an address of 192.168.1.8. When you try to ping TestKing5, the reply times out and
shows a different IP address. You need to allow Tess on TestKing2 to use the script on TestKing5. What
should you do?
Option Available

 A) Re register TestKing5 with WINS


 B) On TestKing5 run the ipconfig /registerdns command
 C) On TestKing2 run the ipconfig /flushdns command
 D) On TestKing2, purge and reload the remote NetBIOS cache name tableYour selected
option : D) On TestKing2, purge and reload the remote NetBIOS cache name table
Link: undefined
References: undefined
Question 26: You want to see if any broken links are there in your Web site.Which tool do you use?
Option Available

 A)NT Explorer
 B)Site Server Express
 C)User Manager
 D)Performance MonitorYour selected option : B)Site Server Express
Link: undefined
References: undefined
Question 27: When connecting IIS to an external data source through ODBC (Open Data Base
Connector), which type of ODBC DSN must be specified?
Option Available
 A)System
 B)File
 C)Server
 D)UserYour selected option : A)System
Link: undefined
References: undefined
Question 28: Identify the operating system that is ideal for Web servers?
Option Available

 A)Windows 2003 Web Server


 B)Windows 2003 Standard
 C)Windows 2003 Enterprise Server
 D)Windows 2000 File ServerYour selected option : A)Windows 2003 Web Server
Link: undefined
References: undefined
Question 29: You are the network administrator for TestKing. The network consists of a single Active
Directory domain testking.com. The functional level of the domain is Windows Server 2003. You install
Terminal Services on all domain controllers. However, your technical support specialists report that they
cannot use Terminal Services to access any domain controllers. What action should you perform to solve
this problem?
Option Available

 A) Install Remote Desktop for Administration


 B) Require the support specialists to use a console session to connect to the terminal servers
 C) Add the Remote Administrators group to the Account Operators group
 D) Modify the Default Domain Controller Group Policy object (GPO) to grant the Log on
locally user right to the support specialistsYour selected option : C) Add the Remote
Administrators group to the Account Operators group
Link: undefined
References: undefined
Question 30: You are the network administrator for Testking.com. You manage a computer named
TestKing3 that runs Windows Server 2003 with the default settings. You install Terminal Services on
TestKing3. You attempt to connect to TestKing3 by using the URL http://TestKing3/TestKingweb. You
cannot connect to TestKing3. You need to be able to access Terminal Services on TestKing3 by using
Internet Explorer 6.0. What action should you perform?
Option Available

 A) Create a new Web site named TestKingweb


 B) Create a new virtual directory named TestKingweb
 C) Install the Remote Administration IIS subcomponent
 D) Install IIS Install the Remote Desktop Web Connection IIS subcomponentYour selected
option : C) Install the Remote Administration IIS subcomponent
Link: undefined
References: undefined
Question 31: Which RAID level is also called mirroring?
Option Available

 A)0
 B)1
 C)3
 D)5Your selected option : B)1
Link: undefined
References: undefined
Question 32: WDM is an acronym for
Option Available

 A)Windows Device Manager


 B)Win32 Device Model
 C)Windows Driver Manager
 D)Win32 Driver ModelYour selected option : C)Windows Driver Manager
Link: undefined
References: undefined
Question 33: MMC is an acronym for:
Option Available

 A)Microsoft Management Console


 B)Multimedia Management and Control
 C)Microsoft Media Console
 D)Microsoft Motion ControlYour selected option : A)Microsoft Management Console
Link: undefined
References: undefined
Question 34: What is another name for Raid 1?
Option Available

 A)Stripping
 B)Mirroring
 C)Hot swappable
 D)Warm swappableYour selected option : B)Mirroring
Link: undefined
References: undefined
Question 35: Which component of the Windows 2003 Executive is responsible for linking virtual address
space to actual memory storage?
Option Available
 A)The Memory Manager
 B)The Cache Manager
 C)The Installation Manager
 D)IPC ManagerYour selected option : A)The Memory Manager
Link: undefined
References: undefined
Question 36: Which ONE of the following, can you use to generate a list of signed drivers on your
Windows XP Professional system?
Option Available

 A)At a command prompt, type drivers signed


 B)At a command prompt, type msinfo signed
 C) At a command prompt, type msinfo. In the system information window that appears,
select "Software Environment," then "Signed Drivers."
 D)At a command prompt, type winmsd In the system information window that appears,
select "Software Environment," then "Signed Drivers."Your selected option : C) At a command
prompt, type msinfo. In the system information window that appears, select "Software
Environment," then "Signed Drivers."
Link: undefined
References: undefined
Question 37: Which tool can be used to convert a disk from basic to dynamic?
Option Available

 A) Disk management snap-in.


 B) Fsutil.exe
 C) Format.exe
 D)E. Disk defragmenter snap-inYour selected option : C) Format.exe
Link: undefined
References: undefined
Question 38: You are the administrator of a Windows 2003 Server. You schedule a task to run after 15
minutes. One hour later, the task has still not run. You notice that your Event Viewer system log has the
following error message; "The task scheduler service failed to start due to following error. The service
did not start due to login failure." You want to run the scheduler task again. What should you do before
restarting the task scheduler service?
Option Available

 A) Set the task scheduler service to log on using the local system account.
 B) Set the task scheduler service to allow the service to interact with the desktop.
 C) Restart the remote producer call (RPC) service.
 D) Log off and then log on to an account in the Power Users group.Your selected option : A)
Set the task scheduler service to log on using the local system account.
Link: undefined
References: undefined
Question 39: You are the administrator of your company's network. You purchase 75 new Windows
2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the
computers are configured identically. You want the users to be able to maintain their individual desktop
settings regardless of which computer they use. You want to accomplish this with the least amount of
administrative effort. What should you do?
Option Available

 A) Configure each computer to join a workgroup. Create a user account and a local profile
for each user.
 B) Configure each computer to join a workgroup. Create a domain user account that uses
roaming user profiles.
 C) Configure each computer to join the domain. Create a user account for each user on a
domain controller.
 D) Configure each computer to join the domain. Create domain user accounts that use
roaming user profiles.Your selected option : D) Configure each computer to join the domain.
Create domain user accounts that use roaming user profiles.
Link: undefined
References: undefined
Question 40: You are the network administrator for TestKing. All network servers run Windows Server
2003. One of your servers, TestKingSrv1, contains a RAID-5 volume. Routine monitoring reveals a failed
disk in the set. TestKingSrv1 is running and users are connecting to shared folders on the RAID-5 volume.
You shut down the server and replace the failed disk. Now you need to ensure that the RAID-5 volume is
redundant. What should you do?
Option Available

 A) Initialize the new disk. Select the failed region and then select the Repair Volume option
 B) Import the foreign disk. Select the failed region and then select the Repair Volume option
 C) Initialize the new disk. Select the failed region and then select the Reactive Disk option
 D) Import the foreign disk. Select the failed region and then select the Reactive Disk
optionYour selected option : D) Import the foreign disk. Select the failed region and then select
the Reactive Disk option
Link: undefined
References: undefined
Question 41: You are a network administrator for TestKing. Your network consists of a single Active
Directory domain named testking.com. All servers run Windows Server 2003. A help desk user reports
that a user object was accidentally deleted and the user can no longer log on to the domain and access
resources. You confirm that the user object was included in the most recent backup. You need to enable
the user to log on to the domain. You must ensure that the user retains access to resources. What
should you do?
Option Available
 A) Install a new domain controller. Install Active Directory from media by using the most
recent backup. Manually initiate replication
 B) Decrease the garbage collection interval. Perform a nonauthorative restoration of Active
Directory by using the most recent backup
 C) Perform a nonauthorative restoration of Active Directory by using the most recent
backup. Authoritatively restore the user object that was deleted
 D) Re-create a user object that has the same user principal name (UPN) as the user object
that was deleted. Authoritatively restore this user objectYour selected option : A) Install a new
domain controller. Install Active Directory from media by using the most recent backup.
Manually initiate replication
Link: undefined
References: undefined
Question 42: You are the network administrator for TestKing. The network consists of a single Active
Directory domain named testking.com. You are testing Group Policy object (GPOs) on an organizational
unit (OU) named Test. The Test OU contains a Windows XP Professional client computer that you use as
a test computer. The domain contains a group named Security. You create a new GPO and configure the
Computer Configuration section to grant the Security group to Change the system time user right. You
log on to the test computer and discover that the setting you set through the GPO is not in effect. You
need to apply the GPO settings immediately. What should you do?
Option Available

 A) Log off the test computer and log on again


 B) Log off the test computer. Create a test user account in the Test OU and then log on as
the test user account
 C) On the test computer, run the gpresult command
 D) On the test computer command prompt, run the gpupdate /force commandYour selected
option : C) On the test computer, run the gpresult command
Link: undefined
References: undefined
Question 43: A senior manager has asked you to help her disable a particularly annoying application that
runs every time she logs on. Unfortunately, the application is corrupt and locks up the system, so the
manager can't delete the application by removing it from the Startup folder. When you arrive at her
office, the boot process has progressed to the point where the logon banner appears. You want to deal
with this problem as expeditiously as possible, which means that you don't want to reboot back into
Safe mode. Which ONE of the following step would you take?
Option Available

 A)Press Ctrl+Alt+Del and log on. When the logon process begins, hold down the Alt key to
prevent all Startup programs from running
 B)Press Ctrl+Alt+Del and log on. When the logon process begins, hold down the Shift key to
prevent all Startup programs from running.
 C)Press Ctrl+Alt+Del and log on. When the logon process begins, hold down the Break key to
prevent all Startup programs from running.
 D) Do NothingYour selected option : A)Press Ctrl+Alt+Del and log on. When the logon
process begins, hold down the Alt key to prevent all Startup programs from running
Link: undefined
References: undefined
Question 44: You are the desktop administrator for Wingtip Toys. Management requires that a standard
user profile be created for all domain user accounts. Additionally, the standard profile must be
protected so that domain users cannot make permanent changes to the standard profile. You create a
company standard user profile. You require all domain user accounts to use this profile. Later, users
report that the changes they make to their desktop are overwriting the standard profile settings. What
should you do to ensure permanent changes cannot be made to the standard user profile?
Option Available

 A)Open the local default user profile. Rename ntuser.dat to ntuser.man.


 B)Enable the local Group Policy to exclude directories in roaming profile for all users in the
Wingtip Toys domain.
 C)Open control panel. In system properties, copy the standard user profile to the profile
server. Grant the Everyone group Allow-Full Control permission on the copied profile. Change
the profile type from Local to Roaming.
 D)Open control panel. In system properties, copy the standard user profile folder to the
profile server. Grant the Everyone group Allow-Full Control permission on the copied profile.
Name the directory that contains the standard user profile to standard man.Your selected
option : A)Open the local default user profile. Rename ntuser.dat to ntuser.man.
Link: undefined
References: undefined
Question 45: You are the desktop administrator for Wide World Importers. You have installed Windows
XP Professional on a portable computer for a user named Bruno. Bruno travels between the main office
in New York and the branch office in Tokyo. Bruno needs to create documents in English and Japanese
languages. You need to provide an easy method for Bruno to switch between languages. You also need
to allow Bruno to create documents in the selected language immediately. How should you configure
the Regional and Language Options on Bruno's computer?
Option Available

 A) In the Languages options, configure the Language bar to show additional Language bar
icons.
 B) In the Languages options, select the Install files for complex script and right-to-left
languages (including Thai) check box.
 C)In the Languages options, select the Install Files for East Asian languages check box. Add
Japanese as an input language.
 D) In the Advanced options, select Japanese as the Language for non-Unicode programs. In
the Language options, add the Japanese keyboard/ME layout.Your selected option : C)In the
Languages options, select the Install Files for East Asian languages check box. Add Japanese as
an input language.
Link: undefined
References: undefined
Question 46: You are the desktop administrator for your company. All users in the network have
Windows XP Professional computers. Users in the research department have dual-processor computers.
Users in the research department report that when they run 16-bit Windows programs, their computer
performance becomes very slow. You use system monitor to monitor the users' computers. You discover
that when the users are running their 16-bit applications, one processor shows a sustained utilization of
more than 90 percent while the other processor only shows utilization of less than 10 percent. You need
to improve application performance for the users in the research department. What should you do?
Option Available

 A)Configure each application to run in a separate memory space


 B) Configure each application to run in AboveNormal priority class.
 C)For each application, set the compatibility mode to Windows 95.
 D) Configure processor affinity for each application to allow it to run on both
processors.Your selected option : D) Configure processor affinity for each application to allow it
to run on both processors.
Link: undefined
References: undefined
Question 47: You want to use Windows Installer service to deploy software applications on the desktop
computers. How do you configure Group Policy so that the applications are not advertised?
Option Available

 A) Assign applications to computers


 B) Publish applications to computers
 C)Publish applications to users
 D) Assign applications to usersYour selected option : A) Assign applications to computers
Link: undefined
References: undefined
Question 48: How to ensure offline files on the laptop will not be accessible to unauthorized persons, if
lost?
Option Available

 A) NTFS permissions on offline files on Laptop


 B) NTFS permissions on server
 C) GPO "Encrypt the offline file cache" on the domain level
 D) Encrypt on the server and add all users on the encryption detailsYour selected option :
Not Answered
Link: undefined
References: undefined
Question 49: How do you prevent the inappropriate use of the domain Administrator account.
Option Available

 A) Rename the Administrator account and change the password


 B) Track failed logons on the domain
 C) Set account lockout policies to track after one failed attempt.
 D) None of the aboveYour selected option : B) Track failed logons on the domain
Link: undefined
References: undefined
Question 50: You are using Windows Installer to deploy an application to 750 Windows XP Professional
computers on your network. The network includes an organizational unit (OU) named Sales. A Group
Policy object (GPO) is created for the Sales OU. The software deployment of the application is
unsuccessful. During the deployment, some users in the Sales OU report that the installation is aborting
with random errors midway through the installation process. The remaining users in the Sales OU report
that the software is installing, but it is giving them general protection fault errors. What should you do?
Option Available

 A) Repackage and redeploy the application's .msi file to the Sales OU.
 B) Repackage and redeploy the application's.mst file to the Sales OU.
 C) Redeploy the application by using the Group Policy object (GPO) for the Sales OU.
 D) Restart Windows Installer on all computers in the Sales OU. Then redeploy the
application's .zap file to the Sales OU.Your selected option : C) Redeploy the application by
using the Group Policy object (GPO) for the Sales OU.
Link: undefined
References: undefined

Question 1: A senior manager has asked you to help her disable a particularly annoying application that
runs every time she logs on. Unfortunately the application is corrupt and locks up the system so the
manager can t delete the application by removing it from the Startup folder. When you arrive at her
office the boot process has progressed to the point where the logon banner appears. You want to deal
with this problem as expeditiously as possible which means that you don t want to reboot back into Safe
mode. Which of the following steps should you take?
Option Available

 A)Press Ctrl+Alt+Del and log on. When the logon process begins hold down the Alt key to
prevent all Startup programs from running
 B)Press Ctrl+Alt+Del and log on. When the logon process begins hold down the Shift key to
prevent all Startup programs from running.
 C)Press Ctrl+Alt+Del and log on. When the logon process begins hold down the Break key to
prevent all Startup programs from running.
 D) Do NothingYour selected option : Not Answered
Link: undefined
References: undefined
Question 2: You are the desktop administrator for your company. All employees have Windows XP
Professional computers. All employees are members of the local Users group on their own computers. A
user in the graphics department has a removable disk cartridge drive on his computer. The disk cartridge
contains an unsupported third party file system. When he tries to save data to the disk cartridge the
user is prompted to reformat the disk cartridge. However he receives an Access denied error message
when attempting to reformat. You need to enable the user to save data to the disk cartridge. What
should you do?
Option Available

 A)Instruct the user to format the cartridge as FAT32.


 B)Remove the Read only attribute from the disk cartridge.
 C)Add the user to the Power Users local group on the computer.
 D)Configure the local security settings to allow the user to format and eject removable
mediaYour selected option : Not Answered
Link: undefined
References: undefined
Question 3: You are a help desk technician for your company. Initially all your client computers run
Microsoft NT workstation 4.0. You upgrade these computers. Now some run Windows 2000 Professional
and others run Windows XP Professional. Users now report display problems. When they run an
application named App2 their displays become garbled or their computers do not display the application
window correctly. They do not experience this problem when running other applications. How should
you reconfigure each computer?
Option Available

 A) In the Display settings adjust the screen resolution to a lower value.


 B) In the Monitor properties adjust the screen refresh rate to a lower value.
 C)In the Advanced Display settings configure the display DPI settings to 120 dots per inch.
 D)In the Compatibility settings for app2 select the Run in 256 colors check box.Your selected
option : Not Answered
Link: undefined
References: undefined
Question 4: You are the desktop administrator for Wingtip Toys. Management requires that a standard
user profile be created for all domain user accounts. Additionally the standard profile must be protected
so that domain users cannot make permanent changes to the standard profile. You create a company
standard user profile. You require all domain user accounts to use this profile. Later users report that
the changes they make to their desktop are overwriting the standard profile settings. What should you
do to ensure permanent changes cannot be made to the standard user profile?
Option Available

 A)Open the local default user profile. Rename ntuser.dat to ntuser.man.


 B)Enable the local Group Policy to exclude directories in roaming profile for all users in the
Wingtip Toys domain.
 C)Open control panel. In system properties copy the standard user profile to the profile
server. Grant the Everyone group Allow Full Control permission on the copied profile. Change
the profile type from Local to Roaming.
 D)Open control panel. In system properties copy the standard user profile folder to the
profile server. Grant the Everyone group Allow Full Control permission on the copied profile.
Name the directory that contains the standard user profile to standard man.Your selected
option : Not Answered
Link: undefined
References: undefined
Question 5: You are a help desk technician for your company. Irene is a user in the human resources
department. She often works with documents that contain confidential information. Irene creates a
folder named Private on volume C. Volume C is an NTFS volume on her Windows XP Professional
computer. Then she adds the confidential files to the Private folder. Whenever Irene opens a file any
subsequent temporary files are created within the same folder as the source document. You need to
configure Irene s computer so that only she can access the confidential documents. You also need to
minimize the impact of the configuration on her computer s performance. What should you do?
Option Available

 A)In the Encrypted data Recovery Agents policy for the local computer import a certificate.
Compress the contents of volume
 B)Instruct Irene to modify the properties of each file in the Private folder by selecting the
option to encrypt the contents of the files.
 C)Instruct Irene to modify the properties of the Private folder by selecting the option to
encrypt the contents of the folder. Then instruct Irene to accept the default setting on the
Confirm Attributes Changes dialog box.
 D)Ensure that Irene has Allow Full Control permission on the Private folder. Instruct Irene to
modify the properties of the Private folder and then select the option to compress the contents
of the folder.Your selected option : Not Answered
Link: undefined
References: undefined
Question 6: You are a help desk technician for your company. All employees use Windows XP
Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from
his supervisor. Philippe now reports that he cannot edit files on the cartridge he receives an access
denied error message. Philippe s supervisor is currently out of the office. You place the cartridge in the
removable drive on your computer. You receive the same access denied error message when you try to
access the files and folders. You call Philippe s supervisor. She asks you to grant permission to access the
contents of the cartridge only to Philippe. However she also wants to prevent Philippe from changing
permissions on the contents of the cartridge.Which action should you take?
Option Available

 A)As administrator take ownership of the files and folders.


 B)As administrator grant your help desk user account Allow Full Control permission on the
files and folders.
 C)Grant Philippe Allow Modify permission on the files and folders.
 D) Grant Philippe Allow Full Control permission on the files and folders.Your selected
option : Not Answered
Link: undefined
References: undefined
Question 7: You are the desktop administrator for Wide World Importers. You have installed Windows
XP Professional on a portable computer for a user named Bruno. Bruno travels between the main office
in New York and the branch office in Tokyo. Bruno needs to create documents in the English and
Japanese languages. You need to provide an easy method for Bruno to switch between languages. You
also need to allow Bruno to create documents in the selected language immediately. How should you
configure the Regional and Language Options on Bruno s computer?
Option Available

 A) In the Languages options configure the Language bar to show additional Language bar
icons.
 B) In the Languages options select the Install files for complex script and right to left
languages (including Thai) check box.
 C)In the Languages options select the Install Files for East Asian languages check box. Add
Japanese as an input language.
 D) In the Advanced options select Japanese as the Language for non Unicode programs. In
the Language options add the Japanese keyboard/ME layout.Your selected option : Not
Answered
Link: undefined
References: undefined
Question 8: If a network has a Windows NT domain controller what kind of network is it?
Option Available

 A)WAN
 B)High speed
 C)Peer to peer
 D)Server basedYour selected option : Not Answered
Link: undefined
References: undefined
Question 9: In an OEM directory structure the equivalent to the root drive on which Windows 2000 will
be installed is called
Option Available

 A)\$root$
 B)\$$
 C)\$1
 D)\$winnt$Your selected option : Not Answered
Link: undefined
References: undefined
Question 10: Windows 2000 Server simplifies management of the network with?
Option Available

 A)Directory service (ADS)


 B)Configuration management
 C)Network and system management
 D)All of the aboveYour selected option : Not Answered
Link: undefined
References: undefined
Question 11: Windows clustering provides with of the following benefits?
Option Available

 A)high availability
 B)network load balancing
 C)component load balancing
 D)all of the aboveYour selected option : Not Answered
Link: undefined
References: undefined
Question 12: You are a help desk technician for your company. Your company s network includes an
Active Directory domain and Windows XP Professional computers that are configured as members of the
domain. Company policy prohibits users from accessing their computers unless they are authenticated
by a domain controller. However users report that they can log on to their computers even though a
network administrator has told them that a domain controller is not available. As a test you log off of
your computer and disconnect it from the network. You discover that you can log on by using your
domain user account. You need to ensure that users cannot access their computers unless they are
authenticated by a domain controller. How should you configure the local computer policy on these
computers?
Option Available

 A)Enable the Require domain controller to unlock policy.


 B)Set the Number of previous logons to cache policy to 0
 C)Remove all user and group accounts from the Log on locally user right.
 D)Remove all user and group accounts from the Access this computer from the network user
right.Your selected option : Not Answered
Link: undefined
References: undefined
Question 13: You are the administrator of your company s network which includes an Active Directory
domain. Your company hires Julie to help deploy Windows XP Professional to 200 new computers. You
create a new domain user account for Julie and add it to the Domain Users group. Julie is able to
perform the Windows XP Professional installation on the new computers but she is unable to add the
computers to the Active Directory domain. She verifies that the computers are connected to the
network and that they are receiving IP configuration information from your company s DHCP server. You
need to ensure that Julie can add the new computers to the Active Directory domain. You also need to
ensure that Julie does not have any unnecessary security privileges on the network. What should you
do?
Option Available

 A) Add Julie s domain use account to the Server Operators domain user group.
 B) Use the Delegation of Control Wizard to grant Julie s domain user account the right to
create new objects in the computers container.
 C)On a domain controller use the Local Computer Policy MMC to add Julie s domain user
account to the add workstations to domain user right policy.
 D) Install the Active Directory users and computers MMC on Julie s Windows XP Professional
computer. Add Julie s domain user account top the domain Administrators domain user
group.Your selected option : Not Answered
Link: undefined
References: undefined
Question 14: Miracleinfocom.com wants to enforce a strong password policy throughout its entire
organization. At which level of the Active Directory hierarchy should this security policy be enforced?
Option Available

 A) Site
 B) Domain
 C) Local Computer
 D) Organization UnitYour selected option : Not Answered
Link: undefined
References: undefined
Question 15: During a RIS installation after the client system boots it initiates a
Option Available

 A)TFTP download
 B)DHCP request
 C)Telnet Session
 D)ROSI protocolYour selected option : Not Answered
Link: undefined
References: undefined
Question 16: Which network service must be present to use RIS?
Option Available

 A)Telnet
 B)DHCP
 C)BOOTP
 D)RASYour selected option : Not Answered
Link: undefined
References: undefined
Question 17: The interface which guides a user through a RIS installation is called?
Option Available

 A)Client Installation Wizard (CIW)


 B)Remote Server Wizard (RSW)
 C)Remote Client Wizard (RCW)
 D)Remote Operating System Installation (ROSI)Your selected option : Not Answered
Link: undefined
References: undefined
Question 18: You are the desktop administrator for your company. You are using RIS to install Windows
XP Professional on a new computer. You start the computer but instead of connecting to your network
RIS server your computer returns the following error message Operating system not found . You verify
that the computer contains a PXE compliant network adapter that is connected to your network. You
need to start the computer and connect to your network RIS server.What should you do?
Option Available

 A)Ask a network administrator to modify the network DHCP server to include a DHCP
reservation for the computer.
 B)Ask a network administrator to modify the RIS server permissions to grant your domain
user account Allow Read permission on the RIS images.
 C)Modify the computer s BIOS settings and ensure that the computer is configured to boot
from the network.
 D)Modify the computer s BIOS settings and ensure that the computer s boot password is the
same as the RIS server s Administrator passwordYour selected option : Not Answered
Link: undefined
References: undefined
Question 19: You want to install Windows 2000 Professional on 45 new computers on your company s
network. You first install Windows 2000 Professional on one of the new computers. You log on to the
computer by using the local Administrator account. You install Microsoft Office 97 a virus scanner and
other company standard applications. You then create a RIS image of the computer you configured. You
want to configure the RIS image so that the standard applications will be accessible to the user when the
user first logs on to the network. What should you do?
Option Available

 A) Run Rbfg.exe before installing the standard applications.


 B) Run RIPrep.exe before installing the standard applications.
 C) Copy the All Users profile to the Default Users profile.
 D) Copy the local Administrator account profile to the Default Users profile.Your selected
option : Not Answered
Link: undefined
References: undefined
Question 20: You have a domain name host.primary.mycomp.com.Which portion of the domain name
must be registered with InterNIC at the minimum assuming that your have a DNS Server setup?
Option Available

 A)host.primary.mycomp.com
 B)primary.mycomp.com
 C)mycomp.com
 D)None of the aboveYour selected option : Not Answered
Link: undefined
References: undefined
Question 21: You are the systems engineer for TestKing. The network consists of a single Active
Directory domain named testking.com. All servers run Windows Server 2003. A Windows Server 2003
computer named TESTKINGDNS1 functions as the internal DNS server and has zones configured as
shown in the exhibit. The network is not currently connected to the Internet. TestKing maintains a
separate network that contains publicly accessible Web and mail servers. These Web and mail servers
are members of a DNS domain named testking.com. The testking.com zone is hosted by a UNIX based
DNS server named UNIXDNS which is running the latest version of BIND. The company plans to allow
users of the internal network to access Internet based resources. The company s written security policy
states that resources located on the internal network must never be exposed to the Internet. The
written security policy states that the internal network s DNS namespace must never be exposed to the
Internet. To meet these requirements the design specifies that all name resolution requests for Internet
based resources from computers on the internal network must be sent from TESTKINGDNS1. The
current design also specifies that UNIXDNS must attempt to resolve any name resolution requests
before sending them to name servers on the Internet. You need to plan a name resolution strategy for
Internet access. You need to configure TESTKINGDNS1 so that it complies with company requirements
and restrictions. What should you do?
Option Available

 A) Delete the root zone form TESTKINGDNS1. Configure TESTKINGDNS1 to forward requests
to UNIXDNS
 B) Copy the Cache.dns file from the Windows Server 2003 installation CD ROM to the C:\
Windows\System32\Dns folder on TESTKINGDNS1
 C) Add a name server (NS) resource record for UNIXDNS to your zone. Configure UNIXDNS
with current root hints
 D) On TESTKINGDNS1 configure a secondary zone named testking.com that uses UNIXDNS as
the master server. Configure UNIXDNS to forward requests to your ISP s DNS serversYour
selected option : Not Answered
Link: undefined
References: undefined
Question 22: You are a help desk technician for your company. The network consists of a single Active
Directory domain. The network includes Windows 2000 Advanced Server computers and Windows 2000
Professional and Windows XP Professional client computers. Except for the domain controllers all
computers on the network use DHCP for their TCP/IP configuration. During the business day the
network administrators perform emergency maintenance on a file server named Filesrv1. Filesrv1 is
then restarted and experiences no further problems. Users begin reporting that when they try to access
resources on Filesrv1 they receive the following error message: Network path not found. You verify that
Filesrv1 is functional. You need to ensure that all users can access Filesrv1. What command should you
instruct users to run?
Option Available

 A) Nbstat R
 B) Nbstat RR
 C)IPconfig/flushdns
 D) IPconfig/registerdnsYour selected option : Not Answered
Link: undefined
References: undefined
Question 23: Bill is a local Admin of his XP connect to office by dialup from several branchs in different
dialup connection. He can t enable the ICF for the new connection but he did it for the previous
connections. How to enable that ICF?
Option Available

 A) remove local admin grant Power User


 B) remove Prohibit use of ICF on your DNS Domain group policy in the Domain
 C) disable ICS discovery and control delete and recreate the dialup
 D) delete and recreate the dialup use ICSYour selected option : Not Answered
Link: undefined
References: undefined
Question 24: After several installation failures you determine that you need to examin a debug log for
the setup routine. You want the setup routine to create the most detailed debug log possible. Which
command do you use?
Option Available

 A)Winnt32 /debug7: Debug.log


 B) Winnt32 /debug4: Debug.log
 C) Winnt32 /debug1: Debug.log
 D) Winnt32 /debug0: Debug.logYour selected option : Not Answered
Link: undefined
References: undefined
Question 25: Microsoft IIS4.0 doesn t support which of the following service.
Option Available

 A)News
 B)Mail
 C)Gopher
 D)WWWYour selected option : Not Answered
Link: undefined
References: undefined
Question 26: You want to provide search capabilities to the browsers of your Web site.Which IIS service
provides this feature?
Option Available

 A)NNTP
 B)Mail Server
 C)Index Server
 D)Transaction ServerYour selected option : Not Answered
Link: undefined
References: undefined
Question 27: Which are the IIS services that can use SSL communication?
Option Available

 A)News
 B)Mail
 C)WWW
 D)FTPYour selected option : Not Answered
Link: undefined
References: undefined
Question 28: You want to see if any broken links are there in your Web site.Which tool do you use?
Option Available

 A)NT Explorer
 B)Site Server Express
 C)User Manager
 D)Performance MonitorYour selected option : Not Answered
Link: undefined
References: undefined
Question 29: You are hosting a Web Site which contain some Web pages using Perl Script.You find that
none of the users are able to see Web pages which contain Perl script.What is the likely cause?
Option Available

 A)Perl interpreter which gets installed as part of IIS4.0 needs to be pointed by modifying the
Properties of Scripts folder.
 B)You can not use Perl Scripts on Microsoft Web Server.Microsoft Web server doesn t
support it.
 C)You need to install Perl interpreter on the Web Server.
 D)Perl interpreter needs to be installed as plug in on all client machines.Your selected option
: Not Answered
Link: undefined
References: undefined
Question 30: What is another name for 10BaseT?
Option Available

 A)Baseband
 B)Broadband
 C)Thicknet
 D)Twisted PairYour selected option : Not Answered
Link: undefined
References: undefined
Question 31: Which of the following categories for UTP has the least expensive cable?
Option Available

 A)1
 B)2
 C)3
 D)4Your selected option : Not Answered
Link: undefined
References: undefined
Question 32: You have been asked to install a network of nine Windows NT workstations in a single
department. Low cost is a goal. What kind of network should you install?
Option Available

 A)LAN
 B)WAN
 C)Peer to peer
 D)Sever basedYour selected option : Not Answered
Link: undefined
References: undefined
Question 33: Which of the following IRQs are used for the CMOS/real time clock?
Option Available

 A)0
 B)2
 C)4
 D)8Your selected option : Not Answered
Link: undefined
References: undefined
Question 34: Which of the following IRQs are used for LPT1?
Option Available

 A)1
 B)3
 C)5
 D)7Your selected option : Not Answered
Link: undefined
References: undefined
Question 35: Which layer(s) of the OSI model is/are included in the NDIS specification?
Option Available

 A)1
 B)2
 C)3
 D)4Your selected option : Not Answered
Link: undefined
References: undefined
Question 36: Which of the following modules manages bindings in NDIS?
Option Available

 A)Protocol manager
 B)Binding manager
 C)Redirector
 D)The registryYour selected option : Not Answered
Link: undefined
References: undefined
Question 37: What is a set of rules for communication between computers called?
Option Available

 A)NOS
 B)protocol
 C)standards
 D)serviceYour selected option : Not Answered
Link: undefined
References: undefined
Question 38: Which standard divides the data link layer into the LLC and the MAC sublayers?
Option Available

 A)802.1
 B)802.2
 C)802.3
 D)802.4Your selected option : Not Answered
Link: undefined
References: undefined
Question 39: Write the name of layer of the OSI model that maintains a connection between nodes?
Option Available
 A)Transport Layer
 B)Session Layer
 C)Physical Layer
 D)Network LayerYour selected option : Not Answered
Link: undefined
References: undefined
Question 40: You are a help desk technician for your Litware In Litware In maintains a secure intranet
web site at intranet litwareincom. All employees use Windows XP Professional computers. A user named
Katherine reports that she cannot access the secure web site by using internet explorer. When she types
http://intranet.litware.com into the internet explorer address bar an error message reports that the
digital certificate is not from a trusted source. You confirm that the intranet web server is using a digital
certificate issued by your company s Enterprise Certificate Authority. The Enterprise Certificate
Authority is located on a server named certificates.litwareincom You need to ensure that Katherine can
access the secure intranet web site without receiving an error message. What should you do?
Option Available

 A)Ask a network administrator to modify the properties for IIS on intranet.litwareincom and
set the SSL port number to 443.
 B)Ask your network administrator to create a Certificate Trust List (CTL) that includes your
Enterprise Certificate Authority. On Katherine s computer open the Certificates settings for
internet explorer and import the CTL.
 C)On Katherine s computer open the security properties for Internet Explorer. Add
intranet.litwareincom to the Trusted Sites list.
 D)On Katherine s computer open Internet Explorer s list of certificates. Import a copy of the
certificate used by the intranet.litwareincom server into Katherine s Trusted Publishers
certificates storeYour selected option : Not Answered
Link: undefined
References: undefined
Question 41: You visit a regional office in New York to install and upgrade that office s Windows 2000
Server cluster. You also install Windows XP Professional on a secretary s workstation. You use Win2K
Server Terminal Services across the WAN from your office in Los Angeles to manage other Win2K Server
clusters in Denver Des Moines and Duluth and you want to test the Remote Desktop function as a
precursor to migrating away from PC Anywhere for desktop management. You enable Remote Desktop
on the secretary s system install the regular applications enable access to your user account then return
to your office.Which of the following steps should you take to connect to the secretary s machine in
New York with a minimal amount of effort?
Option Available

 A) Install an XP Pro machine in your office and select Remote Desktop Client.
 B) Make sure port 3389 is open on the WAN links between your office and the New York
office.
 C)Make sure port 1168 is open on the WAN links between your office and the New York
office.
 D)On the XP Pro machine in your office go to My Network Places Entire Network Microsoft
Terminal Services and select the secretary s machine.Your selected option : Not Answered
Link: undefined
References: undefined
Question 42: Which of the following best describes the difference between Windows XP s Remote
Desktop and Remote Assistance features?
Option Available

 A) There s no difference Remote Desktop and Remote Assistance are the same thing.
 B) Remote Assistance lets you view a remote desktop but doesn t let you interact with it
Remote Desktop lets you interact with another user s desktop settings.
 C) Remote Assistance lets you view a remote desktop but doesn t let you interact with it
Remote Desktop lets multiple users connect to an XP Professional workstation in the same way
Windows 2000 Server Terminal Services Application Server does. A maximum of five users can
connect to the Remote Desktop at any time.
 D)Remote Assistance lets you view a remote desktop but doesn t let you interact with it
unless the remote user permits you to Remote Desktop lets you remotely connect to your
workstation as if you were directly connected.Your selected option : Not Answered
Link: undefined
References: undefined
Question 43: What is the GUI tool used to build the UNATTEND.TXT file included with the Windows 2000
Resource Kit?
Option Available

 A)SETUPMGR.EXE
 B)UNATTEND.EXE
 C)PREBUILD.EXE
 D)SYSLOAD.SYSYour selected option : Not Answered
Link: undefined
References: undefined
Question 44: Which component of the Windows 2000 Executive is responsible for handling input and
output from installed devices?
Option Available

 A)The Device Manager


 B)The Cache Manager
 C)The I/O Manager
 D)The Device ManagerYour selected option : Not Answered
Link: undefined
References: undefined
Question 45: Which of the following operating systems is designed for servers used in a large enterprise
network?
Option Available

 A)Windows 2000 Client


 B)Windows 2000 Workstation
 C)Windows 2000 Server
 D)Windows 2000 Advanced ServerYour selected option : Not Answered
Link: undefined
References: undefined
Question 46: RAID 1 offers what type of fault tolerance?
Option Available

 A)Mirroring
 B)Stripping
 C)Stripping with parity
 D)Hot swapYour selected option : Not Answered
Link: undefined
References: undefined
Question 47: Which RAID level is also called mirroring?
Option Available

 A)0
 B)1
 C)3
 D)5Your selected option : Not Answered
Link: undefined
References: undefined
Question 48: You want to install Windows 2000 Professional on 10 non PXE compliant computers on the
marketing segment of your network. The 10 computers do not have operating systems installed. You
attempt to load the computers by using an existing RIS image that is on the RIS server. You find that the
10 computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers including the RIS server. You then check the network servers and find
that the Windows NT Server 4.0 computer running WINS has stopped responding due to hard disk
failure. You want to enable the computers to connect to the RIS server. What should you do?
Option Available

 A) Repair and restart the WINS server.


 B) Repair the WINS server and upgrade the server to Windows 2000 Server.
 C) Configure the Active Directory server to run DHCP
 D) Configure a static entry in WINS that points to the RIS server.Your selected option : Not
Answered
Link: undefined
References: undefined
Question 49: You install Windows 2000 Professional on a computer that has a Non Plug and Play video
adapter. You want to configure the video adapter to use 16 bit color and 1024 x 768 resolution. The
color setting for the video adapter is set to 16 colors and you cannot change that setting. What should
you do?
Option Available

 A) Change the adapter refresh rate to 60Mhz.


 B) Change the monitor drivers to be WDM compliant drivers.
 C) Use List All Modes to select the adapter default mode.
 D) Install the WDM compliant video adapter and monitor drivers.Your selected option : Not
Answered
Link: undefined
References: undefined
Question 50: Your computer has Windows 2000 Professional installed. Your office has a power outage
while you are running the Windows 2000 disk defragmenter. When you restart your computer you
receive the following error message: Bad or missing operating system . What should you do?
Option Available

 A) Start the computer in Safe Mode and reformat the hard disk
 B) Start the computer in debug mode and reformat the hard disk
 C) Start the computer by using the Emergency Repair Disk and repair the Master Boot Recor
 D) Start the computer by using the Windows 2000 Professional CD ROMYour selected option
: Not Answered
Link: undefined
References: undefined

Set 3:

Question 1: An administrator currently has Secure Gateway and web interface on the same server
in the DMZ. After learning about Access Gateway the administrator decided to purchase two
units for redundancy that will be located in the DMZ and implement the increased functionality
that Access Gateway offers. Two new Interface servers will be introduced. Where should the
administrator place the web interface servers?
Option Available

 Both Web Interface servers should be placed in the DMZ


 One Web interface server should be placed on the internal network and one web interface
server should be placed on the external network
 Both Web Interface servers should be placed on the internal network
 One web interface server should be placed in the DMZ and one web interface server should
be placed on the internal networkYour selected option : One Web interface server should be
placed on the internal network and one web interface server should be placed on the external
network
Link: undefined
References: undefined
Question 2: An administrator decided to make a number of video-based training packages
available to the Finance department through Citrix XenApp. The Citrix XenApp farm silos its
applications and all Finance Applications are in the Finance Application silo. Other application
silos include Technical Sales and workflow. Where can an administrator enable multimedia
optimization for the finance training applications?
Option Available

 A policy applied to all finance users


 Server properties
 Server farm properties
 A policy applied to all servers in the finance application siloYour selected option : Server
farm properties
Link: undefined
References: undefined
Question 3: What should an administrator use to confirm the name of a Citrix License Server?
Option Available

 The hostname command in a command prompt


 The basic information screen in the Windows 2008 system applet
 The query command in a command prompt
 The server information screen in the Access Management ConsoleYour selected option : The
server information screen in the Access Management Console
Link: undefined
References: undefined
Question 4: An administrator configured a session bandwidth policy. The administrator set a
maximum bandwidth rule of 200 Kbps and placed a 50 Kbps and a 30% restriction on the audio
channel. The effective bandwidth for the audio channel will be _______________ kbps?
(Choose the correct option to complete the sentence.)
Option Available

 50
 60
 15
 200Your selected option : 15
Link: undefined
References: undefined
Question 5: To which Citrix service does Web Interface forward a users logon credentials?
Option Available

 MFCOM
 Independent Management Architecture
 WMI
 XMLYour selected option : WMI
Link: undefined
References: undefined
Question 6: How can an administrator turn off a policy rule without having to edit every policy
that contains that rule?
Option Available

 Lower the priority of the policy


 Change the Policy to deny
 Delete the Policy
 Change the rule in the highest priority policy to disabledYour selected option : Change the
rule in the highest priority policy to disabled
Link: undefined
References: undefined
Question 7: Several new policies were recently created in a Citrix XenApp farm. A user has
called stating that he cannot see client drivers or printers when connecting to the farm since the
polices were implemented. What could an administrator use to determine which policies are
conflicting?
Option Available

 Policies Search Engine


 Report Center
 Event Viewer
 Diagnostic FacilityYour selected option : Event Viewer
Link: undefined
References: undefined
Question 8: What should an administrator install to secure communication between the Web
Interface server and Secure Gateway server?
Option Available

 Secure Gateway Proxy in the DMZ


 Secure Gateway Service on a Citrix XenApp server in the internal network
 Web Interface server on the Citrix XenApp server in the internal network
 SSL Server certificate on the Web Interface serverYour selected option : Web Interface
server on the Citrix XenApp server in the internal network
Link: undefined
References: undefined
Question 9: An administrator should implement a restart schedule on a server with
____________
Option Available

 Low page file utilization


 High Processor utilization
 A down ICA listener
 A memory leakYour selected option : A down ICA listener
Link: undefined
References: undefined
Question 10: Which SpeedScreen technology can be adjusted using Citrix Policies?
Option Available

 Image Acceleration
 Multimedia Acceleration
 Flash Acceleration
 Browser AccelerationYour selected option : Browser Acceleration
Link: undefined
References: undefined
Question 11: Scenario: An administrator has created three XenApp policies called Austin Dallas
and Houston. The Austin policy sets up session printers for the Austin location based on the
subnet. The Dallas policy sets up session printers for Dallas based on user groups. The Houston
policy sets up session printers for Houston and is applied to all the servers in the farm. As a
result of these. (Choose the correct option to complete the sentence.)
Option Available

 only the Dallas


 only the Austin
 the Dallas and Austin
 the Austin Dallas and HoustonYour selected option : the Austin Dallas and Houston
Link: undefined
References: undefined
Question 12: An environment consists of two Citrix XenApp farms each consisting of twelve
Citrix XenApp servers. The user community consists of internal telecommuter and three vendors
that connect to the Citrix XenApp environment on a regular basis. All users are running
Windows XP and Internet Explorer. The requirements are following: Minimal administrative
configuration. Seamless integration into the Start menu. Application delivery for published
applications available for all users. Which step should the administrator take to meet the
requirements of the scenario?
Option Available

 Configure a XenApp Services site


 Configure a XenApp Web Site
 Install the Embedded Native Client
 Install the Native clientYour selected option : Configure a XenApp Web Site
Link: undefined
References: undefined
Question 13: An administrator installed the XenApp Advanced configuration tool to administer a
Citrix XenApp server remotely. The server is accessed through a WAN link and it is behind a
firewall. Which TCP port should be opened on the firewall to allow the administrator to connect
remotely by means of the XenApp Advanced Configuration tool?
Option Available

 1494
 2513
 2512
 2598Your selected option : 1494
Link: undefined
References: undefined
Question 14: what can you use to seize FSMO Roles?
Option Available

 The ntdsutil.exe utility


 The AD site and services
 The secedit.exe utility
 the utilman.exe utilityYour selected option : The secedit.exe utility
Link: undefined
References: undefined
Question 15: RID master assigns a block of how many identifiers to each domain controller ?
Option Available

 100
 250
 500
 1000Your selected option : 100
Link: undefined
References: undefined
Question 16: Which of the following are the FSMO roles?
Option Available

 Domain naming master and RID Master


 Global Catalog
 Configuration Master
 All of theseYour selected option : All of these
Link: undefined
References: undefined
Question 17: Your network consists of one Active Directory forest named ABC.COM. The
functional level of the ABC.COM forest is Windows Server 2008. The network contains seven
servers that run Internet Information Services (IIS) 7.0 and host Web services. Remote users
from a partner company access the Web services through HTTPS. The partner company has a
separate Active Directory forest named XYZ.COM. The functional level of the XYZ.COM
forest is Windows Server 2003. You need to recommend an authentication solution for the
XYZ.COM users. The solution must meet the following requirements: All communications
between both forests must use only HTTPS. Remote users must only authenticate once to access
all Web services. Users from XYZ.COM must access the Web services by using user accounts in
the XYZ.COM forest. What should you recommend?
Option Available

 Implement Client Certificate Mapping Authentication on the IIS servers


 Implement Microsoft Identity Lifecycle Manager (ILM) 2007 on the ABC.COM
forestImplement Microsoft Identity Lifecycle Manager (ILM) 2007 on the ABC.COM forest
 Implement a forest trust between the ABC.COM and the XYZ.COM forests. Configure the
forest trust to use Selective Authentication
 Implement Active Directory Federation Services (AD FS) in the ABC.COM forest. Create a
federation trust between the ABC.COM forest and the XYZ.COM forestYour selected option :
Implement a forest trust between the ABC.COM and the XYZ.COM forests. Configure the forest
trust to use Selective Authentication
Link: undefined
References: undefined
Question 18: Your network consists of one Active Directory domain. All domain controllers run
Windows Server 2003. The functional level of the forest is Windows 2000. The functional level
of the domain is Windows 2000 mixed. You install a domain controller that runs Windows
Server 2008. You plan to deploy a read-only domain controller (RODC). You need to modify the
domain and forest functional levels to support the installation of the RODC. What should you
do?
Option Available

 Set the domain functional level to Windows 2003 and the forest functional level to Windows
2003
 Set the domain functional level to Windows 2003 and the forest functional level to Windows
2000 native
 Set the domain functional level to Windows 2008 and the forest functional level to Windows
2003
 Set the domain functional level to Windows 2008 and the forest functional level to Windows
2003Your selected option : Set the domain functional level to Windows 2008 and the forest
functional level to Windows 2003
Link: undefined
References: undefined
Question 19: Your network consists of one Active Directory forest that contains one domain.
The functional level of the forest is Windows 2000. The functional level of the domain is
Windows 2000 native. Two domain controllers run Windows Server 2008 and three domain
controllers run Windows Server 2003. Service packs are not installed on any of the domain
controllers. You plan to enable Windows BitLocker Drive Encryption (BitLocker) on all domain
controllers. You need to store all BitLocker recovery information in Active Directory Domain
Services (AD DS). What should you do first?
Option Available

 Raise the forest functional level to Windows Server 2003


 Raise the domain functional level to Windows Server 2003
 Upgrade all Windows Server 2003 domain controllers to Windows Server 2008
 Extend the Active Directory schema to include BitLocker and Trusted Platform Module (TPM)
attributesYour selected option : Upgrade all Windows Server 2003 domain controllers to
Windows Server 2008
Link: undefined
References: undefined
Question 20: Your network consists of one Active Directory domain that contains domain
controllers that run Windows Server 2008. The intranet site contains confidential documents.
You need to design an identity and access management policy for the documents to meet the
following requirements: Record each time a document is accessed. Protect confidential
documents on the intranet site. Place a time limit on access to documents,including documents
sent outside the organization. What should you include in your design?
Option Available

 On a domain controller,install and configure Active Directory Federation Services (AD FS)
 On a domain controller,install and configure Active Directory Rights Management Services
(AD RMS)
 On all servers in the domain,ensure that the data volumes are configured to use NTFS file
system and Encrypting File System (EFS)
 On all servers in the domain,ensure that the data volumes are configured to use NTFS file
system and Windows BitLocker Drive Encryption (BitLocker)Your selected option : On all servers
in the domain,ensure that the data volumes are configured to use NTFS file system and
Encrypting File System (EFS)
Link: undefined
References: undefined
Question 21: Your network consists of an Active Directory forest that contains only domain
controllers that run Windows Server 2003. You need to prepare the environment for the
implementation of a new Windows Server 2008 domain in the forest. What should you do?
Option Available

 Run adprep /forestprep on the schema operations master


 Run adprep /domainprep on the schema operations master
 Run adprep /forestprep on the infrastructure operations master
 Run adprep /domainprep on the infrastructure operations masterYour selected option : Run
adprep /forestprep on the infrastructure operations master
Link: undefined
References: undefined
Question 22: Your network consists of two Active Directory forests named Forest1 and Forest2.
The functional level of both forests is Windows Server 2003. Both forests contain only domain
controllers that run Windows Server 2008. You install a new server named Server1 in Forest2.
You need to recommend an access solution that meets the following requirements: Users in
Forest1 must have access to resources on Server1. Users in Forest1 must be denied access to all
other resources within Forest2. What should you recommend?
Option Available

 Raise the forest functional level of Forest1 and Forest2 to Windows Server 2008
 Create a forest trust between Forest1 and Forest2. Set the Allowed to Authenticate right on
the computer object for Server1
 Raise the domain functional level of all domains in both forests to Windows Server 2008
 Create a forest trust between Forest1 and Forest2. Set the Allowed to Authenticate right on
the computer object for the Forest2 infrastructure operations master objectYour selected
option : Create a forest trust between Forest1 and Forest2. Set the Allowed to Authenticate
right on the computer object for Server1
Link: undefined
References: undefined
Question 23: Which command-line tool would you use to add an instance of AD LDS to an
existing Core Server installation?
Option Available

 ADAMinstall.exe
 ldsinstall.exe
 oclist.exe
 ocsetup.exeYour selected option : ldsinstall.exe
Link: undefined
References: undefined
Question 24: Your network consists of one Active Directory domain that contains only domain
controllers that run Windows Server 2003. Your company acquires another company. You need
to provide user accounts for the employees of the newly acquired company. The solution must
support multiple account lockout and password policies. What should you do?
Option Available

 Implement Authorization Manager


 Implement Active Directory Federation Services (AD FS)
 Upgrade one domain controller to Windows Server 2008. Raise the functional level of the
domain to Windows Server 2003
 ADAMinstall.exeYour selected option : Implement Active Directory Federation Services (AD
FS)
Link: undefined
References: undefined
Question 25: Your network consists of one Active Directory forest named contoso.com. The
functional level of the contoso.com forest is Windows Server 2008. The network contains seven
servers that run Internet Information Services (IIS) 7.0 and host Web services. Remote users
from a partner company access the Web services through HTTPS. The partner company has a
separate Active Directory forest named fabrikam.com. The functional level of the fabrikam.com
forest is Windows Server 2003. You need to recommend an authentication solution for the
fabrikam.com users. The solution must meet the following requirements: All communications
between both forests must use only HTTPS. Remote users must only authenticate once to access
all Web services. Users from fabrikam.com must access the Web services by using user accounts
in the fabrikam.com forest. What should you recommend?
Option Available

 Implement Client Certificate Mapping Authentication on the IIS servers


 Implement Microsoft Identity Lifecycle Manager (ILM) 2007 on the contoso.com
forestImplement Microsoft Identity Lifecycle Manager (ILM) 2007 on the contoso.com forest
 Implement a forest trust between the contoso.com and the fabrikam.com forests. Configure
the forest trust to use Selective Authentication
 Implement Active Directory Federation Services (AD FS) in the contoso.com forest. Create a
federation trust between the contoso.com forest and the fabrikam.com forestYour selected
option : Implement Client Certificate Mapping Authentication on the IIS servers
Link: undefined
References: undefined
Question 26: An authentication protocol developed for the purpose of secure authentication on a
public network?
Option Available

 TCP/IP
 ARP
 Kerberos
 RARPYour selected option : TCP/IP
Link: undefined
References: undefined
Question 27: X.500 is a standard that first described directory services using which ONE of the
following communication protocol?
Option Available

 NetBEUI
 TCP/IP
 IPX/SPX
 DAPYour selected option : Not Answered
Link: undefined
References: undefined
Question 28: Protocols and technologies such as SSL and Kerberos would correlate best with
which of the following X.500 model?
Option Available

 Distributed model
 Authorization model
 Authentication model
 Security modelYour selected option : Security model
Link: undefined
References: undefined
Question 29: Which ONE of the following advantage does the multimaster replication model
provide?
Option Available

 It reduces the number of directory servers


 It makes LDAP queries faster
 It allows more efficient modification of objects
 It consumes less network bandwidth.Your selected option : It consumes less network
bandwidth.
Link: undefined
References: undefined
Question 30: Which ONE of the following correctly describes the inter-site replication process?
Option Available

 Transmission originates from one bridgehead server and is received by another bridgehead
server
 Transmission originates from one bridgehead server,but several servers are able to accept
communication on the receiving end
 Transmission originates from several servers in parallel,but only the bridgehead server
accepts communication on the receiving end
 Transmission is conducted by several servers on both the transmitting and receiving ends at
the same timeYour selected option : Transmission originates from one bridgehead server,but
several servers are able to accept
communication on the receiving end
Link: undefined
References: undefined
Question 31: You are the network administrator for window 2003 Active directory single forest.
There are 104 Windows 2003 R2 Domain controller. Your CIO has asked you to force the
replication across site. You need to achieve this with minimum administrative efforts. What
should you do?
Option Available

 replmon /force
 goto site and services and force the replications and In the console tree,click NTDS Settings
for the server that you want to force replication then click replicate now
 repadmin /force
 none of the aboveYour selected option : goto site and services and force the replications and
In the console tree,click NTDS Settings for the server that you want to force replication then
click replicate now
Link: undefined
References: undefined
Question 32: Your boss wants you to install vSphere 4 server on two HP C-class Blades. Each
blade has two dual core CPU's. How many vSphere processor licenses will be needed for this
setup?
Option Available

 12
 4
 2
 8Your selected option : 8
Link: undefined
References: undefined
Question 33: A vNetwork Distributed Switch is best described as?
Option Available

 A distributed set of vNetwork Standard Switches on individual ESX Hosts capable of


forwarding traffic between hosts
 A distributed set of vNetwork Standard Switches that allow a virtual machine to maintain a
consistent network configuration between multiple ESX Hosts
 A single virtual switch that aggregates existing vNetwork Standard Switches
 A single virtual switch shared between multiple ESX HostsYour selected option : Not
Answered
Link: undefined
References: undefined
Question 34: Assuming VLANs are not configured, which of the following is true about traffic
from a virtual machine connected to a port group on a vNetwork Standard Switch with no
uplinks?
Option Available

 Virtual machines on any virtual switch on the same ESX Server can receive the traffic
 The virtual switch will drop the packets if no uplink is present
 Only virtual machines in the same port group on the virtual switch can receive the traffic
 Virtual machines in any port group on the virtual switch can receive the trafficYour selected
option : Only virtual machines in the same port group on the virtual switch can receive the
traffic
Link: undefined
References: undefined
Question 35: If you are planning on installing the Cisco Nexus 1000v Distributed Switch on your
vSphere cluster, which Licensing package would you need to purchase?
Option Available

 Advanced
 Enterprise
 Enterprise Plus
 StandardYour selected option : Enterprise
Link: undefined
References: undefined
Question 36: In vSphere 4 what is the Maximum amount of ports supported on a vSwitch?
Option Available

 1016
 256
 4088
 UnlimitedYour selected option : 256
Link: undefined
References: undefined
Question 37: The following connection type can all be configured on a single vSwitch?
Option Available

 Service Console and 2 VMkernel port groups


 Service Console and 2 virtual machine port groups
 Service Console, virtual machine and VMkernel port groups
 VMkernel, virtual machine and no Service Console port groupsYour selected option :
VMkernel, virtual machine and no Service Console port groups
Link: undefined
References: undefined
Question 38: The VMXNET 3 adapter is only supported on which virtual machine hardware
version?
Option Available

 Version 6
 Version 4
 Version 7
 All VersionsYour selected option : Not Answered
Link: undefined
References: undefined
Question 39: The vSwitch or vSwitch port group policy setting that allows a virtual machine to
listen to traffic other than that which is specifically destined for the given VM is?
Option Available

 Forged Transmits
 MAC Address Changes
 Promiscuous Mode
 Traffic ShapingYour selected option : Traffic Shaping
Link: undefined
References: undefined
Question 40: vSphere virtual switches are configured, based on the number of physical uplinks
bound, in which of the following methods?
Option Available

 vSwitch with a binding to another vSwitch and one or more NICs


 vSwitch with none, one or more NICs
 vSwitch with bindings to a virtual machine, and HBA and the Service Console
 vSwitch with one, two or more NICsYour selected option : vSwitch with a binding to another
vSwitch and one or more NICs
Link: undefined
References: undefined
Question 41: What is a requirement for enabling NIC teaming?
Option Available

 A physical NIC is linked to multiple virtual switches


 All physical NICs must be of the same type
 Multiple physical NICs are linked to a single virtual switch
 All virtual NICs must be of the same typeYour selected option : All physical NICs must be of
the same type
Link: undefined
References: undefined
Question 42: What is the minimum number of network adapters required for an ESX4 Host?
Option Available

 4
 2
 1
 10Your selected option : 2
Link: undefined
References: undefined
Question 43: An administrator currently has Secure Gateway and web interface on the same
server in the DMZ. After learning about Access Gateway the administrator decided to purchase
two units for redundancy that will be located in the DMZ and implement the increased
functionality that Access Gateway offers. Two new Interface servers will be introduced. Where
should the administrator place the web interface servers?
Option Available

 Both Web Interface servers should be placed in the DMZ


 One Web interface server should be placed on the internal network and one web interface
server should be placed on the external network
 Both Web Interface servers should be placed on the internal network
 One web interface server should be placed in the DMZ and one web interface server should
be placed on the internal networkYour selected option : One Web interface server should be
placed on the internal network and one web interface server should be placed on the external
network
Link: undefined
References: undefined
Question 44: An administrator decided to make a number of video-based training packages
available to the Finance department through Citrix XenApp. The Citrix XenApp farm silos its
applications and all Finance Applications are in the Finance Application silo. Other application
silos include Technical Sales and workflow. Where can an administrator enable multimedia
optimization for the finance training applications?
Option Available

 A policy applied to all finance users


 Server properties
 Server farm properties
 A policy applied to all servers in the finance application siloYour selected option : Server
farm properties
Link: undefined
References: undefined
Question 45: What should an administrator use to confirm the name of a Citrix License Server?
Option Available

 The hostname command in a command prompt


 The basic information screen in the Windows 2008 system applet
 The query command in a command prompt
 The server information screen in the Access Management ConsoleYour selected option : The
server information screen in the Access Management Console
Link: undefined
References: undefined
Question 46: An administrator configured a session bandwidth policy. The administrator set a
maximum bandwidth rule of 200 Kbps and placed a 50 Kbps and a 30% restriction on the audio
channel. The effective bandwidth for the audio channel will be _______________ kbps?
(Choose the correct option to complete the sentence.)
Option Available

 50
 60
 15
 200Your selected option : 15
Link: undefined
References: undefined
Question 47: To which Citrix service does Web Interface forward a users logon credentials?
Option Available

 MFCOM
 Independent Management Architecture
 WMI
 XMLYour selected option : XML
Link: undefined
References: undefined
Question 48: How can an administrator turn off a policy rule without having to edit every policy
that contains that rule?
Option Available

 Lower the priority of the policy


 Change the Policy to deny
 Delete the Policy
 Change the rule in the highest priority policy to disabledYour selected option : Delete the
Policy
Link: undefined
References: undefined
Question 49: Several new policies were recently created in a Citrix XenApp farm. A user has
called stating that he cannot see client drivers or printers when connecting to the farm since the
polices were implemented. What could an administrator use to determine which policies are
conflicting?
Option Available

 Policies Search Engine


 Report Center
 Event Viewer
 Diagnostic FacilityYour selected option : Policies Search Engine
Link: undefined
References: undefined
Question 50: What should an administrator install to secure communication between the Web
Interface server and Secure Gateway server?
Option Available

 Secure Gateway Proxy in the DMZ


 Secure Gateway Service on a Citrix XenApp server in the internal network
 Web Interface server on the Citrix XenApp server in the internal network
 SSL Server certificate on the Web Interface serverYour selected option : Web Interface
server on the Citrix XenApp server in the internal network
Link: undefined
References: undefined
Set 4:

Answer Report
Question 1: Which server role is responsible for merging your VOIP infrastructure with your
Exchange organization ?
Option Available

 Unified Messaging
 Mailbox
 Hubtransport
 EdgeServerYour selected option : Hubtransport
Link: undefined
References: undefined
Question 2: How we can sync AD with the Edge Transport server?
Option Available

 DNS
 ADAM
 DHCP
 ACMDYour selected option : DNS
Link: undefined
References: undefined
Question 3: Which secure connection establish between a Hub Transport server and an Edge
Transport serve?
Option Available

 LDAP
 TLS
 EFS
 IPSecYour selected option : LDAP
Link: undefined
References: undefined
Question 4: Which server role processes all messages that are sent inside the Exchange 2007
organization before the messages are delivered to a recipient's Inbox or are routed to users
outside the organization ?
Option Available

 Client Access
 Mailbox
 Hubtransport
 EdgeServerYour selected option : Hubtransport
Link: undefined
References: undefined
Question 5: Which server role responsible for Autodiscover web service in exchnage 2007?
Option Available

 Client Access
 Mailbox
 Hubtransport
 EdgeServerYour selected option : Client Access
Link: undefined
References: undefined
Question 6: Which feature is the not the part of the high availability in exchange 2007?
Option Available

 CCR
 LCR
 SCR
 MCRYour selected option : CCR
Link: undefined
References: undefined
Question 7: What method can you use to ensure that user mailboxes do not exceed a specified
size?
Option Available

 Configure NTFS Quotas


 Configure User Account properties.
 Configure Mailbox Database properties
 Configure Storage Group properties.Your selected option : Configure Mailbox Database
properties
Link: undefined
References: undefined
Question 8: Which server role only support cluster in exchnge 2007?
Option Available

 Client Access
 Mailbox
 Hubtransport
 EdgeServerYour selected option : EdgeServer
Link: undefined
References: undefined
Question 9: Which high availability feature is single server solution ?
Option Available

 LCR
 CCR
 SCC
 SCRYour selected option : LCR
Link: undefined
References: undefined
Question 10: which is a non-shared storage failover cluster solution in high availability?
Option Available

 LCR
 CCR
 SCC
 SCRYour selected option : CCR
Link: undefined
References: undefined
Question 11: which feature uses built-in asynchronous log shipping technology to create and
maintain a copy of a storage group on a second set of disks that are connected to the same server
as the production storage group?
Option Available

 LCR
 CCR
 SCC
 SCRYour selected option : SCR
Link: undefined
References: undefined
Question 12: Which of the use to ensure that the configuration of an Edge Transport server is not
lost in the event of catastrophic hardware failure?
Option Available

 System state backup


 Setup /m:RecoverServer
 EdgeSync
 Internet Information Services (IIS) metabase backupYour selected option : EdgeSync
Link: undefined
References: undefined
Question 13: Which of the tools should you use to configure a computer running Exchange
Server 2007 with the smallest possible attack surface?
Option Available

 Security Configuration Wizard


 Windows Software Update Services
 Microsoft Baseline Security Analyzer
 Exchange Best Practices AnalyzerupYour selected option : Microsoft Baseline Security
Analyzer
Link: undefined
References: undefined
Question 14: Public folder database located in the first storage group on a mailbox server. This
public folder database hosts five public folders. want to remove the public folder database.
Which of the actions do you need to take to accomplish this goal?
Option Available

 Dismount the public folder database and then remove it.


 Remove the public folders and then remove the database
 Remove the public folder database.
 Remove the public folders.Your selected option : Remove the public folder database.
Link: undefined
References: undefined
Question 15: Which is not a feature of the in Exchange 2007 SP1
Option Available
 Transport dumpster improvements
 Reporting and monitoring improvements
 Exchange Management Console improvements
 change in message flowYour selected option : Transport dumpster improvements
Link: undefined
References: undefined
Question 16: Messages inside the organization not enter the transport pipeline on a Hub
Transport server?
Option Available

 Through a Receive connector


 From the Pickup directory
 Store driver
 from ADYour selected option : From the Pickup directory
Link: undefined
References: undefined
Question 17: From where the categorizer picksup one message at a time for categorization
Option Available

 Submission
 Store driver
 receive connector
 public folderYour selected option : receive connector
Link: undefined
References: undefined
Question 18: categorizer does not completes the steps.
Option Available

 Content conversion
 Recipient resolution
 Routing resolution
 message delievryYour selected option : Routing resolution
Link: undefined
References: undefined
Question 19: which is not provided by Service process is MSExchangeTransport.exe
Option Available

 Starts Worker Process (EdgeTransport.exe)


 Accepts incoming TCP Connections
 Passes connections to Worker Process
 Message flowYour selected option : Passes connections to Worker Process
Link: undefined
References: undefined
Question 20: The object appears in the global address list,which allows other people in the
organization to easily locate or send a message to that person,but the administrator does not need
to manage an unnecessary mailbox,called?
Option Available

 mail-enabled object
 mail-box object
 Contact
 GroupYour selected option : Group
Link: undefined
References: undefined
Question 21: A policy that is applied to mail-enabled objects to generate e-mail
addresses,called ?
Option Available

 recipient function
 system policy
 recipient policy
 mailbox policyYour selected option : mailbox policy
Link: undefined
References: undefined
Question 22: An event that can be registered for a parent folder as well as for any child
folders,called ?
Option Available

 cursive event
 system event
 application event
 recursive eventYour selected option : recursive event
Link: undefined
References: undefined
Question 23: A data structure that contains information about the security attributes for an
Exchange store resource,including a list of users and groups that have access permissions to the
resource,called ?
Option Available

 system descriptor
 security descriptor
 secure descriptor
 security diskYour selected option : security disk
Link: undefined
References: undefined
Question 24: A set of independent operations that are bundled together and performed as an
atomic operation; the operations succeed or fail as a whole,called ?
Option Available

 transaction
 transfer
 move
 system transactionYour selected option : transaction
Link: undefined
References: undefined
Question 25: A name used to access the contents of any Exchange store using a Web
browser,called ?
Option Available

 directory
 virtual directory
 virtual server
 virtual folderYour selected option : directory
Link: undefined
References: undefined
Question 26: In which of the following network locations should you deploy an Edge Transport
server?
Option Available

 Direct connection to the Internet


 Perimeter network
 Internal network
 Encrypted networkYour selected option : Internal network
Link: undefined
References: undefined
Question 27: Which server role is responsible for merging your VOIP infrastructure with your
Exchange organization ?
Option Available

 Unified Messaging
 Mailbox
 Hubtransport
 EdgeServerYour selected option : Mailbox
Link: undefined
References: undefined
Question 28: How we can sync AD with the Edge Transport server?
Option Available

 DNS
 ADAM
 DHCP
 ACMDYour selected option : DHCP
Link: undefined
References: undefined
Question 29: Which secure connection establish between a Hub Transport server and an Edge
Transport serve?
Option Available

 LDAP
 TLS
 EFS
 IPSecYour selected option : EFS
Link: undefined
References: undefined
Question 30: What method can you use to ensure that user mailboxes do not exceed a specified
size?
Option Available

 Configure NTFS Quotas


 Configure User Account properties.
 Configure Mailbox Database properties
 Configure Storage Group properties.Your selected option : Configure NTFS Quotas
Link: undefined
References: undefined
Question 31: When backing up a mail server,which of the backup types will back up all selected
files but will not delete any log files at the completion of the backup?
Option Available

 Incremental backup
 Full backup
 Differential backup
 Copy backupYour selected option : Full backup
Link: undefined
References: undefined
Question 32: Several users have complained that their messages do not appear to be being
received by the people they are sending them to. Your organization has an Edge Transport server
and a Hub Transport server. Which of the cmdlets can you use in a command to determine
whether the messages are stalling on the Hub Transport server or Edge Transport server?
Option Available

 Get-Message
 Get-Queue
 Resume-Queue
 Retry-QueueYour selected option : Resume-Queue
Link: undefined
References: undefined
Question 33: Which of the actions must be taken before the Developers universal security group
can be mail-enabled?
Option Available

 The security group scope needs to be converted to domain local


 Terry and Alex's user accounts need to be mail-enabled
 No actions need to be taken
 Terry and Alex's user accounts need to be removedYour selected option : The security group
scope needs to be converted to domain local
Link: undefined
References: undefined
Question 34: The Hub Transport server role resides on an Exchange Server 2007 computer
named Exch Hub1. Message tracking is enabled. Written company privacy policy states that the
subject line of e-mail messages should not be stored in the tracking log. You need to track e-mail
messages from ExchHub1 while complying with company policy. Which cmdlet should you
run?
Option Available

 Set- TransportServer Exch Hub1 - MessageTrackingLogEnabled : $false


 Set- TransportServer Exch Hub1 C MessageTrackingLogSubjectLoggingEnabled : $false
 Set- ReceiveConnector - ProtocolLoggingLevel None
 Get- MessageTrackingLog -Subject NoneYour selected option : Set- TransportServer Exch
Hub1 - MessageTrackingLogEnabled : $false
Link: undefined
References: undefined
Question 35: Your Exchange Server 2007 organization contains two load balanced Client Access
servers . Outlook Anywhere users on the corporate network have access to availability
information. You need to allow access to availability information for users outside the corporate
network who connect by using Outlook Anywhere. What should you do?
Option Available

 Run the Set-CASMailbox cmdlet with the appropriate parameters on each of the Client
Access servers
 Add a replica of the Exchange organizations Free/Busy public folder to at least one of the
Mailbox servers in the same site as the Client Access servers
 Add the Full Details read permission to each users calendar properties by using the
Microsoft Office Outlook client
 Set the external URL by running the Set-WebServicesVirtualDirectory cmdlet on each of the
Client Access serversYour selected option : Add a replica of the Exchange organizations
Free/Busy public folder to at least one of
the Mailbox servers in the same site as the Client Access servers
Link: undefined
References: undefined
Question 36: There is a Mailbox server named S01 in the company. On S01,the mailbox
transaction log volume has very little free disk space remaining. At the time that you move
several large mailboxes to another Mailbox server,no additional free disk space is made available
on the mailbox transaction log volume on S01. You plan to increase the amount of free disk
space on the mailbox trans action log volume on S01. So what action should you perform?
Option Available

 A full backup of the database should be performed


 The deleted item retention period should be decreased.
 An online defragmentation of the database should be run.
 An offline defragmentation of the database should be runYour selected option : A full
backup of the database should be performed
Link: undefined
References: undefined
Question 37: You are responsible for managing the Exchange network for Wiikigo. You work
under the environment of Exchange Server 2007. Now you receive an order from the company.
You are asked to convert multiple shared mailboxes to resource mailboxes. So what action
should you perform?
Option Available

 Run the Set-Mailbox cmdlet


 Run the Connect-Mailbox cmdlet
 Run the Set-ResourceConfig cmdlet.
 Use the Exchange Management ConsoleYour selected option : Run the Set-Mailbox cmdlet
Link: undefined
References: undefined
Question 38: Your network contains an Exchange Server 2010 server. All users access their
mailboxes by using only Microsoft Office Outlook 2007. You configure a policy to archive all e-
mail messages located in the Entire Mailbox 365 days after they are receiveD) You need to
ensure that all members of a department named Sales can retain some e-mail messages for five
years. What should you create first?
Option Available

 a linked mailbox
 a managed custom folder
 a message classification
 an Outlook Protection RuleYour selected option : a managed custom folder
Link: undefined
References: undefined
Question 39: Your network contains Mailbox servers that run Exchange Server 2007 and
Exchange Server 2010. You need to ensure that all e-mail messages located in the Inbox folders
of all users are deleted after 120 days. What should you create first?
Option Available

 a new managed custom folder


 a new message classification
 a new retention policy
 new managed content settingsYour selected option : a new retention policy
Link: undefined
References: undefined
Question 40: You have an Exchange Server 2010 Mailbox server. All users use Microsoft Office
Outlook 2010 to access their mailboxes. You implement a policy that automatically deletes e-
mail messages that are older than 90 days. You need to provide users with an alternate location
to store email messages that are older than 90 days. Administrators must be able to find the
messages in both locations when they perform multi-mailbox searches. What should you create?
Option Available

 a .pst file for each user that is stored in a shared folder


 a Personal Archive for each user
 a journal rule
 a Retention PolicyYour selected option : a .pst file for each user that is stored in a shared
folder
Link: undefined
References: undefined
Question 41: You have an Exchange Server 2010 organization. You need to create Personal
Archives. Which tool should you use?
Option Available

 Active Directory Users and Computers


 Exchange Control Panel (ECP)
 Exchange Management Console (EM
 Microsoft Office OutlookYour selected option : Exchange Management Console (EM
Link: undefined
References: undefined
Question 42: You have an Exchange Server 2010 organization that contains three Mailbox
servers named MBX1,MBX2,and MBX3. You configure a journaling mailbox on a server named
MBX3. You configure journaling on several mailboxes located on MBX1 and MBX2. You need
to ensure that journaling occurs if MBX3 fails. What should you do?
Option Available

 Configure an alternate journaling mailbox on MBX2.


 Configure a second e-mail address for the journaling mailbox.
 Configure the shadow redundancy settings in the organization.
 Create a retention tag and then assign it to a new retention policy.Your selected option :
Configure an alternate journaling mailbox on MBX2.
Link: undefined
References: undefined
Question 43: Your company has an Exchange Server 2010 Hub Transport server named Hub1.
Hub1 receives all e-mail sent to the company from the Internet. You install the anti-spam agents
on Hub1. You need to ensure that Hub1 only accepts messages sent to e-mail addresses listed in
Active Directory. What should you do?
Option Available

 Modify the properties of the Sender Filtering agent.


 Modify the properties of the Recipient Filtering agent.
 Modify the properties of the default Accepted Domain.
 Modify the properties of the default Receive Connector.Your selected option : Modify the
properties of the Sender Filtering agent.
Link: undefined
References: undefined
Question 44: You have an Exchange 2010 Edge Transport server named Server1. You need to
ensure that e-mail messages sent to e-mail addresses that do not exist in your organization are
automatically rejecteD) Which feature should you configure?
Option Available

 content filtering
 recipient filtering
 sender filtering
 sender reputationYour selected option : content filtering
Link: undefined
References: undefined
Question 45: You have an Exchange 2010 organization. Your companys security policy states
that all connections to Outlook Web App (OWA) must use smart card authentication. You need
to recommend a solution to meet the security policy requirements. Which two possible ways to
achieve this goal should you recommend?
Option Available

 Require certificate-based authentication for all Internet-facing Client Access servers.


 Require Windows Integrated Authentication for all Internet-facing Client Access servers.
 Deploy an Edge Transport server,and then disable Windows Integrated Authentication.
 Deploy a server that runs Microsoft Internet Security and Acceleration (IS ServerYour
selected option : Deploy an Edge Transport server,and then disable Windows Integrated
Authentication.
Link: undefined
References: undefined
Question 46: You have an Exchange Server 2010 organization. Your companys security policy
states that users must not be able to encrypt e-mail messages by using Outlook Web App
(OWA). You need to recommend a client access solution that meets the requirements of the
security policy. What should you include in the solution?
Option Available

 managed folder mailbox policies


 multiple OWA virtual directories
 OWA segmentation
 WebReady Document ViewingYour selected option : OWA segmentation
Link: undefined
References: undefined
Question 47: You have an Exchange Server 2010 organization that contains five Hub Transport
servers,five Mailbox servers and one Edge Transport server. You need to provide a solution to
ensure that users can prevent legitimate inbound e-mail messages from being classified as spam.
What should you do?
Option Available

 Enable sender filtering.


 Enable Sender ID filtering.
 Configure a custom MailTip.
 Configure safelist aggregation.Your selected option : Enable sender filtering.
Link: undefined
References: undefined
Question 48: You have an Exchange Server 2010 organization. You plan to delegate Exchange
administrative rights to some users in the organization. You need to recommend a solution that
tracks all changes made to the Exchange organization. What should you include in the solution?
Option Available

 administrator audit logging


 circular logging
 diagnostic logging
 Windows Security AuditingYour selected option : diagnostic logging
Link: undefined
References: undefined
Question 49: You have an Exchange Server 2010 organization. The organization contains a
global security group named Group1. You plan to deploy a monitoring solution for the Exchange
servers in your organization. You need to recommend a solution that allows members of Group1
to monitor the performance of Exchange Server 2010 servers. Your solution must prevent
members of Group1 from modifying the configurations of the Exchanges Server 2010
organization. What should you include in the solution?
Option Available

 Delegation of Control Wizard


 Federation Trusts
 Reliability Monitor
 Role Based Access Control (RBAYour selected option : Role Based Access Control (RBA
Link: undefined
References: undefined
Question 50: Your company has a main office and 10 branch offices. You have an Exchange
Server 2010 organization. All Exchange servers are installed on virtual machines. You need to
create a monitoring plan for the Exchange servers that meets the following
requirements: .Identify Exchange server errors .Provide alerts when Exchange services are
stopped .Produce statistical analysis and reporting Which tool should you include in the plan?
Option Available

 Microsoft System Center Service Manager


 Role Based Access Control (RBA
 Microsoft System Center Configuration Manager
 Microsoft System Center Virtual Machine ManagerYour selected option : Microsoft System
Center Service Manager
Link: undefined
References: undefined

Set 5:

so1 of 50

Windows clustering provides which of the following benefits?

a) High-availability

b) Network load balancing

c) Component load balancing

d) All of the above

Question2 of 50

A 10BaseT network must be terminated with (?)-ohm terminators.

a) 50

b) 58

c) 75

d) None of the above

Question3 of 50

Which of the following network devices sends packets from a central point based upon MAC addresses?
a) Repeater

b) Switch

c) Bridge
d) Router

Question4 of 50

Which of the following media has the lowest susceptiblity to eavesdropping?

a) RG-8 coaxial cable

b) STP

c) fiber optic

d) infrared

Question5 of 50

Which access method is used for network access by Ethernet?

a) Token Ring

b) CSMA/CA

c) CSMA/CD

d) CTS / RTS

Question6 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Remote Access Service role service installed. Server1 is configured as a VPN server. You need to ensure
that you can configure Server1 as a Network Address Translation (NAT) server. What should you do first
on Server1?

a) Enable IPv4 routing

b) Enable IPv6 routing

c) Add a new routing protocol

d) Add the Routing role service

Question7 of 50

Which standard divides the data link layer into the LLC and the MAC sublayers?

a) 802.1

b) 802.2

c) 802.3
d) 802.4

Question8 of 50

You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?

a) Assign each office a new class C private IP address range

b) Assign each office a new class B private IP address range

c) Assign each office a subnet from a new class B private IP address range

d) Assign each office a subnet from the current class C private IP address range

Question9 of 50

You want to specify a permanent address for a printer in the first floor through DHCP server . How you
will do it

a) Server options

b) Simple scope

c) Scope options

d) Reserved options

Question10 of 50

You are the administrator of a Windows Server 2003 network. Your network includes 75 Windows XP
Professional computers. You are adding 50 new PXE-compliant computers to the network. The hardware
on each computer is configured identically. You are using a RIS image to deploy Windows XP
Professional to the 50 computers. You successfully install Windows XP Professional on the first 10
computers. However, you cannot install Windows XP Professional on remaining 40 computers. What
should you do?

a) Configure the DHCP scope to add additional IP addresses.

b) Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.

c) Modify the startup sequence in the CMOS of the remaining computers.


d) Create computer accounts on the remaining computers in the Active Directory.

Question11 of 50

What is the main purpose of SRV records?

a) FQDN resolution into IP addresses

b) Domain controller NetBIOS name resolution into IP addresses

c) SRV records are used to locate network services

d) Using additional SRV records, you can add new domain controllers in the network

Question12 of 50

Which one of the following commands can be used to empty the DNS cache on a DNS client?

a) ipconfig /all

b) nbtstat -RR

c) ipconfig /flushdns

d) ipconfig /emptydns

Question13 of 50

You want to ensure that DNS zone content is always accurate. You employ dynamic DNS, and you are
concerned that many clients may not be deregistering accurately. What should you do to address this
concern?

a) Verify content of the zones weekly

b) Periodically re-import zones from an export that contains server records only

c) Configure DNS scavenging

d) Configure DHCP to remove DNS entries when leases expire

Question14 of 50

Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?

a) Configure a secondary zone on the DNS server in the branch office


b) Configure a stub zone on the DNS server in the branch office

c) Configure a stub zone on the DNS server in the main office

d) Configure a primary zone on the DNS server in the branch office

Question15 of 50

The commands used to troubleshoot DNS activity are

a) NSLOOKUP

b) IPCONFIG /registerdns

c) IPCONFIG /displaydns

d) All the Option

Question16 of 50

When would you use the WINS Service?

a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.

b) When you need to resolve host an IP address

c) When you need to give each host an IP address

d) When you need to resolve NetBIOS names to IP address dynamically.

Question17 of 50

which service helps in resolving NetBIOS name into IP address

a) DHCP

b) DFS

c) WINS

d) IIS

Question18 of 50

You have just installed two Windows Server 2003 computers. You configure the servers as a two node
server cluster. You install WINS on each Node of the cluster. You create a new virtual server to support
WINS. You create a new cluster group named WINSgroup. When you attempt to create the Network
Name resource, you receive an error message. You need to make the proper changes to the cluster to
complete the installation of WINS. What should you do?

a) Create a Generic Service resource in the WINSgroup cluster group

b) Configure the network priorities for the cluster

c) Create an IP address resource in the WINSgroup cluster group

d) Add the proper DNS name for the WINS Server in the DNS database

Question19 of 50

Your network consists of one Active Directory domain. Your company has an intranet. You deploy
Terminal Services terminal servers that run Windows Server 2008. You plan to make applications
available to users on the intranet. You need to recommend a solution to ensure that each user session
receives an equal share of the CPU resources on the terminal servers. What should you recommend?

a) Install and configure the Network Load Balancing feature on all terminal servers

b) Install and configure the Terminal Services server role with the Terminal Services Session Broker (TS
Session Broker) services role on all terminal servers

c) Install the Windows System Resource Manager (WSRM) feature on all terminal servers. Set the
resource-allocation policy

d) Install the Network Policy and Access Services (NPAS) server role on another server. Define and apply
a new policy by using Network Policy Server (NPS)

Question20 of 50

You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?

a) From Terminal Services Manager, create a new group.

b) From Terminal Services Manager, delete the inactive sessions.

c) From Terminal Services Configuration, modify the RDP-Tcp settings.

d) From Terminal Services Configuration, modify the User logon mode setting

Question21 of 50

Your network includes a TS Gateway server named TSG1. TSG1 has installed a self-signed server
certificate that it uses for SSL communications. You want to use a computer running ISA Server as an SSL
endpoint for TS Gateway connections. Which of the following steps must you take to ensure that ISA
Server can communicate with TS Gateway?
a) Export the SSL certificate of ISA Server to TS Gateway.

b) Export the SSL certificate of TS Gateway to ISA Server

c) Open TCP port 443 on the computer running ISA Server.

d) Enable HTTPS-HTTP bridging between ISA Server and TS Gateway.

Question22 of 50

Which are the IIS services that can use SSL communication?

a) News

b) Mail

c) WWW

d) FTP

Question23 of 50

When connecting IIS to an external data source through ODBC (Open Data Base Connector), which type
of ODBC DSN must be specified?

a) System

b) File

c) Server

d) User

Question24 of 50

MMC is an acronym for:

a) Microsoft Management Console

b) Multimedia Management and Control

c) Microsoft Media Console

d) Microsoft Motion Control

Question25 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN
packets. The solution must minimize the amount of data collected. What should you do?
a) From RRAS, create an inbound packet filter

b) From Network Monitor, create a capture filter

c) From the Registry Editor, configure file tracing for RRAS.

d) At the command prompt, run netsh.exe ras set tracing rasauth enabled

Question26 of 50

In Windows 2003, a workgroup is referred as

a) Client/server network

b) peer network

c) domain

d) all of the above

Question27 of 50

Your network contains a six-node Microsoft Clustering Service (MSCS) cluster that has a shared quorum.
Each of the six nodes runs Windows Server 2003. You need to recommend a solution to transition the
cluster to Windows Server 2008. The solution must maintain the availability of cluster services during
the transition. What should you recommend?

a) Evict one node at a time and rebuild the cluster by using Windows Server 2008

b) Evict five nodes from the cluster. Install Windows Server 2008 on the remaining node. Add five new
Windows Server 2008 nodes

c) On each node, run the Windows Server 2008 installation program

d) On the MSCS, change the quorum type to a Majority Node Set (MNS) quorum. Install Windows
Server 2008 on all nodes

Question28 of 50

Your network contains an Active Directory domain. The domain contains 20 member servers. The
domain contains have two servers named Server1 and Server2 that run Windows Server 2008 R2. You
connect Server1 and Server2 to a logical unit number (LUN) on a Storage Area Network (SAN). You
create a failover cluster named Cluster1. You add Server1 and Server2 as nodes to Cluster1. You discover
that there are no cluster disks available for a new clustered file server service on Cluster1. You need to
ensure that you can add a clustered file server service to Cluster1. What should you do?

a) Enable cluster shared volumes


b) Run the Provision Storage Wizard

c) Configure Cluster1 to use a No Majority: Disk Only quorum configuration

d) Configure Cluster1 to use a Node and File Share Majority quorum configuration

Question29 of 50

Server1 has a shared printer named Printer1. You need to track the usage for Printer1. The tracked
information must indicate the user that submitted the print job. You enable auditing for object access on
Server1. What should you do next?

a) From the Performance console, create a counter log.

b) From the properties of Printer1, modify the Device settings.

c) From the properties of Printer1, modify the Security settings.

d) From the Print Server properties, modify the Advanced setting.

Question30 of 50

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You perform a
normal backup of Server1 every Saturday. You need to implement a backup strategy for Server1 to meet
the following requirements: Minimize the time required to back up files. On weekdays, back up files that
have changed since the last backup.? Which type of backup should you perform on weekdays?

a) Copy

b) Daily

c) differential

d) Incremental

Question31 of 50

You plan to use only iSCSI for shared storage that runs Windows 2008. You plan to deploy servers that
run Microsoft SQL Server 2005 on the network. You need to recommend a high-availability solution for
the SQL Server 2005 servers to withstand the failure of any single hardware component. What should
you recommend?

a) Install a two node failover cluster that has multiple network cards.

b) Install a two node failover cluster that has a dual port teamed network card.

c) Install a Network Load Balancing cluster that has multiple network cards.

d) Install a Network Load Balancing cluster that has multiple teamed network cards.
Question32 of 50

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?

a) Configure all access points as RADIUS clients to the Remediation Servers

b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)

c) Create a Network Policy that defines Remote Access Server as a network connection method

d) Create a Network Policy that specifies EAP-TLS as the only available authentication method

Question33 of 50

Your network contains a file server named Server1 that runs Windows Server 2008 R2. You have a folder
named Folder1. You need to ensure that files in Folder1 that are older than 365 days are automatically
moved to an archive folder. What should you create from the File Server Resource Manager console?

a) a file group

b) a file screen

c) a file management task

d) a quota

Question34 of 50

Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 has a
volume named E. From the File Server Resource Manager console, you create a new quota for volume E.
The quota is derived from the 100 MB limit quota template. You need to prevent users from storing
audio and video files on volume E. What should you do?

a) Create a file screen

b) Create a file management task

c) Modify the properties of the quota

d) Modify the properties of the Audio and Video Files file group

Question35 of 50
Your network contains an Active Directory domain. The domain contains a print server named Server1.
Server1 runs Windows Server 2008 R2. You need to ensure that users can locate all shared printers on
Server1 by using Active Directory. What should you do from Server1?

a) Run the pubprn.vbs script

b) Run dism.exe

c) Run the Set-ADObject cmdlet

d) Modify the Print Server properties

Question36 of 50

What is the default share permissions when creating a new share in Microsoft Windows Server?

a) Everyone Group will get no access.

b) Everyone Group will get read access.

c) Everyone Group will get full control.

d) Everyone Group will get special permissions.

Question37 of 50

Your company has one main office and four branch offices. An Active Directory site exists for each office.
The network consists of one Active Directory domain. All servers run Windows Server 2008. The branch
offices are connected to the main office by slow and unreliable wide area network (WAN) links. Users
complain that WAN link failures prevent them from accessing files on remote servers. You need to
recommend a solution to maintain availability of files on the remote servers. The solution must meet the
following requirements: Support scheduling of WAN link traffic. Enable the connection to resume
immediately after a WAN link interruption. What should you recommend?

a) Use DFS Replication and replicate data to each branch office

b) Use the File Server Resource Manager (FSRM) and create file screens

c) Use the File Replication Service (FRS) and replicate data to each branch office

d) Configure separate DFS Namespaces on each branch office server

Question38 of 50

You are the desktop administrator for your company. You want to centrally manage user settings on
your network. How do you achieve this?
a) roaming profile (ans)not sure

b) mandatory profile

c) hardware profile

d) local profile

Question39 of 50

The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?

a) Certification Authority snap-in

b) Certificates snap-in

c) Certificate Templates snap-in

d) Windows Backup

Question40 of 50

You are a network administrator for TestKing. The network consists of a single Active Directory domain
testking.com. All servers run Windows Server 2003. TestKing has a main office and a branch office. Both
offices are connected to the Internet by Network Address Translation (NAT) firewalls and T1 connections
to the companys ISP. Each firewall is configured with a perimeter network. TestKing uses a public key
infrastructure (PKI) for both internal and external authentication. TestKing needs to connect to the main
office to the branch office by using the existing Internet connections. TestKings written security policy
included the following requirements:

1. All Internet communications must use the PKI for all authentication and data encryption.

2. All servers that are required to communicate to or by means of the Internet must be located in a
firewall perimeter network.

You need to connect to the main office to the branch office. You need to comply with the written
security policy. You install Routing and Remote Access servers in the perimeter network at each office.
What else should you do?

a) Configure persistent, two-way initiated PPTP connections with EAP-TLS authentication

b) Configure persistent, two-way initiated PPTP connections with MS-CHAP v2 user authentication

c) Configure persistent, two-way initiated L2TP/IPSec connections with MS-CHAP v2 user authentication

d) Configure persistent, two-way initiated L2TP/IPsec connections with EAP-TLS user and computer
authentication
Question41 of 50

RAID 1 offers what type of fault tolerance?

a) Mirroring

b) Stripping

c) Stripping with parity

d) Hot swap

Question42 of 50

You have a server that runs Windows Server 2008 R2 and has the Hyper-V server role installed.

You create a new virtual machine. You need to configure the virtual machine to meet the following
requirements:

- Allow network communications between the virtual machine and the host system.

-Prevent communications to other network servers.

What should you do first?

a) Install the Microsoft Loopback Adapter

b) Create a new Virtual Network

c) Enable Internet Connection Sharing (ICS)

d) Set the Connection to None for the network interface card

ans b

Question43 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
HyperV server role installed. Server1 hosts a virtual machine (VM) named VM1. You take a snapshot of
VM1 at 05:00 and at 19:00. You use HyperV Manager to delete the snapshot taken at 05:00. You need to
ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1. What
should you do?

a) At the command prompt, run the rmdir.exe command

b) From the HyperV Manager console, shut down VM1

c) From Windows PowerShell, run the RemoveItem cmdlet


d) From the HyperV Manager console, rightclick VM1 and click Revert

Question44 of 50

Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is paused critical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?

a) Change the VHD type of VM1

b) Delete the .avhd files for VM1

c) Increase the free disk space on drive D

d) Increase the free disk space on drive C

Question45 of 50

All domain controllers run Windows Server 2008. You need to prepare the environment to provide a
high-availability solution for a back-end Microsoft SQL Server 2005 data store. What should you do?

a) Install a Windows Server 2003 Network Load Balancing cluster.

b) Install a Windows Server 2008 Network Load Balancing cluster.

c) Install a Windows Server 2008 failover cluster that has shared storage.

d) Install a Windows Server 2008 failover cluster that has direct attached storage.

Question46 of 50

Do all problem solutions need to be mandatorily implemented?

a) Yes, all of them need to be implemented.

b) No, none of them need to be implemented.

c) On a case on case basis, post discussion with the customer.

d) All of the above

Question47 of 50

Incident priority is determined by


a) Impact

b) Urgency

c) Impact & Urgency matrix, usually agreed with the customer as well

d) the user reporting the incident

Question48 of 50

The Problem Management process is intended to reduce both the number and severity of Incidents and
Problems on the business.

a) True

b) False

Question49 of 50

Which of the following are the benefits of Problem Management?

1. Improved IT service quality.

2. Improved organizational learning.

3. Better first-time fix rate at the Service Desk.

4. Incident volume reduction.

a) Only 4

b) 3 & 4

c) 1, 3 & 4

d) All

Question50 of 50

Which of the following is Proactive Problem Management?

a) drawing up a Capacity Plan

b) analyzing trends and identifying potential incidents

c) analyzing incidents that have been reported and solving the underlying cause
d) providing second-line support

Question1 of 50

Write the name of layer of the OSI model that maintains a connection between nodes?

a) Transport Layer

b) Session Layer

c) Physical Layer

d) Network Layer

Question2 of 50

While TCP uses ports, UDP find

a) Also has ports, but is reliable

b) None of the above

c) Uses process IDs and SAPS

d) Also has ports, but is not reliable

Question3 of 50

Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?

a) From the Services snap-in, disable the IP Helper

b) From the Services snap-in, disable the Netlogon service

c) From Windows Firewall, enable the Block all connections option on the Public Profile

d) From Windows Firewall, enable the Block all connections option on the Domain Profile

Question4 of 50

What is the advantage of enabling volume shadow copy?

a) any deleted files can be recovered

b) deleted shared files and folders can be recovered


c) deleted objects can be recovered

d) none of the above

Question5 of 50

Which coaxial cable type would be used with Thicknet?

a) RG-8

b) RG-11

c) RG-58

d) RG-59

Question6 of 50

Under the rules of Telnet option negotiation, a host:

a) Can renegotiate options already established

b) Can begin data exchange even before negotiation is completed

c) Must accept the options proposed

d) Can say no to a proposed option

Question7 of 50

The address mask 255.255.224.0 equals to ________ in binary.

a) 11111111.11111111.11100000.00000000

b) 00000000.00000000.00000000.00000111

c) 11111111.11111111.11111111.11100000

d) 00000000.00000111.11111111.11111111

Question8 of 50

You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?
a) Assign each office a new class C private IP address range

b) Assign each office a new class B private IP address range

c) Assign each office a subnet from a new class B private IP address range

d) Assign each office a subnet from the current class C private IP address range

Question9 of 50

You have a DHCP server named Server1 and an application server named Server2. Both servers run
Windows Server 2008 R2. The DHCP server contains one scope. You need to ensure that Server2 always
receives the same IP address. Server2 must receive its DNS settings and its WINS settings from DHCP.
What should you do?

a) Create a multicast scope

b) Create a DHCP reservation in the DHCP scope

c) Create an exclusion range in the DHCP scope

d) Assign a static IP address to Server2

Question10 of 50

Computers on the Sales subnet run Windows 7. These computers are dynamically assigned IP address
and configuration information from a DHCP server on the subnet. Computers on the development
subnet run Windows XP Professional. These computers are statically assigned IP address and
configuration information. Users on the Sales subnet report that they cannot communicate with users
on the development subnet. A user who works on computer3 reports that he cannot communicate with
computers on either subnet. You want all users to be able to communicate with other users on both
subnets.What should you do?

a) Change the frame type to 802.2 on computer3.

b) Change the default gateway option IP address on the DHCP server.

c) Change the default protocol on the computers on the Sales subnet to NWLink IPX/SPX/NetBIOS
Compatible Transport Protocol.

d) Enable TCP/IP protocol with the default settings on Computer3.

Question11 of 50

At some point during the name resolution process, the requesting party received an authoritative reply.
What further action is likely to be taken after this reply?

a) The request is submitted to the root server


b) The request is submitted to the closest caching server.

c) After receiving the authoritative reply, the resolution process is effectively over

d) Requests are submitted to the remaining authoritative servers to verify the validity of the reply

Question12 of 50

You are the network administrator for the Oslo branch office of Miracleinfocom. The Oslo office has a
Windows Server 2003 DNS server named Miracleinfocom3. Miracleinfocom3 hosts a DNS primary zone
named Miracleinfocom.com. All computers in the Oslo office are configured to use Miracleinfocom3 as
their preferred DNS server. The Budapest branch office of Miracleinfocom has a UNIX DNS server named
Miracleinfocom4. Miracleinfocom4 hosts a primary zone named engineering.Miracleinfocom.com. The
refresh interval of the engineering.Miracleinfocom.com zone is set to 24 hours. In the Budapest office, a
firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all
computers from the Oslo office network, except Miracleinfocom3, from performing DNS lookups against
Miracleinfocom4. There is a business requirement that no delay should occur between the time that a
new record is created n the engineering.Miracleinfocom.com zone and the time that the record can be
resolved from any computers in the Oslo office. All computers in the Oslo office must be able to resolve
names in the enginnering.Miracleinfocom.com namespace. You need to configure DNS on
Miracleinfocom3 to meet the requirements. What should you do?

a) Set up a stub zone named engineering.Miracleinfocom.com.

b) Set up conditional forwarding to Miracleinfocom4 for the engineering.Miracleinfocom.com


namespace.

c) In the Miracleinfocom.com zone, set up a delegation to the enginnering.Miracleinfocom.com zone on


Miracleinfocom4.

d) Set up a secondary zone named engineering.Miracleinfocom.com that has Miracleinfocom4 as its


master.

Question13 of 50

Your network contains an Active Directory domain named contoso.com. The network has DirectAccess
deployed. You deploy a new server named Server1 that hosts a management application. You need to
ensure that Server1 can initiate connections to DirectAccess client computers. Which settings should you
modify from the DirectAccess Setup console?

a) Application Servers

b) DirectAccess Server

c) Infrastructure Servers

d) Remote Clients
Question14 of 50

Your DNS zones are configured as AD-integrated. You must ensure that regular users are not allowed to
write to zones. What should you do?

a) Secure zones against pollution

b) Configure all servers as secondary

c) Remove Authenticated Users from the Zone Security tab

d) Do nothing, as Authenticated Users already have read-only access.

Question15 of 50

Your network contains a DNS server named Server1 that runs Windows Server 2008 R2. You need to
ensure that client computers can resolve IPv6 addresses to fully qualified domain names (FQDNs). Which
type of resource record should you create?

a) Alias (CNAME)

b) Host (A) Record

c) Pointer (PTR)

d) Host (AAA

Question16 of 50

You have a WINS server that runs Windows Server 2003 Service Pack 2 (SP2). You need to schedule a
backup of the WINS database whenever the WINS service stops. What should you do?

a) Create a scheduled task that runs Wins.exe.

b) Create a scheduled task that runs Netsh.exe.

c) Modify the General options from the WINS snap-in.

d) Schedule a system state backup by using Windows Backup.

Question17 of 50

You install Windows Server 2003 on a computer that has a Non-Plug and Play video adapter. You want
to configure the video adapter to use 16-bit color and 1024 x 768 resolution. The color setting for the
video adapter is set to 16 colors, and you cannot change that setting. What should you do?

a) Change the adapter refresh rate to 60Mhz.


b) Change the monitor drivers to be WDM-compliant drivers.

c) Use List All Modes to select the adapter default mode.

d) Install the WDM-compliant video adapter and monitor drivers.

Question18 of 50

Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?

a) Start the computer in Safe Mode, and reformat the hard disk

b) Start the computer in debug mode, and reformat the hard disk

c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor

d) Start the computer by using the Windows Server 2003 CD-ROM

Question19 of 50

Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote
Assistance connections to all computers without a Remote Assistance invitation. Which group policy
setting should you configure?

a) Offer Remote Assistance

b) Solicited Remote Assistance

c) Allow users to connect remotely using Terminal Services

d) Sets rules for remote control of Terminal Services user sessions

Question20 of 50

You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?

a) From Terminal Services Manager, create a new group.

b) From Terminal Services Manager, delete the inactive sessions.

c) From Terminal Services Configuration, modify the RDP-Tcp settings.

d) From Terminal Services Configuration, modify the User logon mode setting

Question21 of 50
You want to enable Remote Desktop on a Server Core installation of Windows Server 2008 and then
enable the server to accept connections from clients configured with RDP versions prior to 6.0. Which
commands should you use?

a) cscript scregedit.wsf /AR 1

b) cscript scregedit.wsf /AR 0 and cscript scregedit.wsf /CS 0

c) cscript scregedit.wsf /CS 1

d) None of the above

Question22 of 50

You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?

a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.

b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.

c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.

d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.

Question23 of 50

You are a help desk technician for your company. An employee named Marc is attempting to open a
Microsoft Word document Phonelist.doc by using Internet Explorer. However, when he types
http://Server1/Files/Phonelist.doc into the address bar in Internet Explorer, he receives the following
error message: 404: Page not found?!You verify that Phonelist.doc exists in a shared folder named Files
on Server1. You need to ensure that Marc can access Phonelist.doc by using Internet Explorer. What
should you do?

a) Instruct Marc to run the IPconfig/flushdns command on his computer.

b) Grant Marcs domain user account Allow-Read permission on the File shared folder.

c) Grant Marcs domain user account Allow-Read permission on Phonelist.do

d) Instruct Marc to type file:\\server1\File\Phonelist.doc into the address bar in Internet Explorer

Question24 of 50
Your network consists of a single Active Directory domain. All domain controllers run Windows Server
2008. You need to capture all replication errors from all domain controllers to a central location. What
should you do?

a) Start the System Performance data collector set

b) Configure event log subscriptions

c) Start the Active Directory Diagnostics data collector set

d) Install Network Monitor and create a new a new capture

Question25 of 50

Which is the default Backup tool used in windows 2003 server?

a) Ntback

b) TSM

c) Ntbackup

d) Veritas

Question26 of 50

Which of the following server service is not provided by Windows 2000?

a) Print Server

b) File Server

c) Application Server

d) Web Server

Question27 of 50

Windows 2003 Standard Edition can support Maximum RAM?

a) 8 GB

b) 5 GB

c) 16 GB

d) 4 GB

Question28 of 50
Your network contains two servers named Server1 and Server2. Server1 runs Windows Server 2008 R2.
Server2 runs Windows Server 2008. You need to ensure that you can initiate a full server backup of
Server2 from Server1. What should you do?

a) Install Windows Server Backup on Server2

b) Upgrade Server2 to Windows Server 2008 R2

c) Add an exception to Windows Firewall on Server2

d) Add your user account to the Backup Operators group on Server2

Question29 of 50

What are the different types of AppLocker rule condition?

a) The types of cmd command with the conditions are AppLocker: publisher, path, and file hash.

b) The types of AppLocker rule conditions are AppLocker: publisher, path, and file hash.

c) The types of Appbit Locker rule conditions are AppLocker: publisher, path, and file hash.

d) None of the above

Question30 of 50

You currently automate backups of the System State data on the servers in your network by using
NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup
of the System State data. You need to select the correct method for performing a restoration of a
backup of the System State data. What should you do?

a) Run the following command: ntbackup.exe backup / "File Name"

b) Run the following command: ntbackup.exe backup systemstate /F "file Name"

c) In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.

d) Use NTBackup interactively.

Question31 of 50

You are the administrator of ABC.com which has a 3 Node Active/Active/Passive Windows 2008 Cluster
for SQL Database using Disk and Node Majority Quorum Type . The Quorum disk is presented from an
EMC Storage. Due to Raid Group failure in the Storage, the disk presented for Quorum went down.
Cluster status will be?

a) Cluster will fail as the Quorum disk is unavailable


b) Cluster Resource group will failover to passive node.

c) Cluster will be online and no impact as Majority of the Node is available for Vote

d) None of the above

Question32 of 50

You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?

a) Modify the quota template

b) Delete and recreate the quota template

c) Create a new quota template. Modify the quota for each folder

d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders

Question33 of 50

The acronym RFC stands for_________

a) Requested File Control

b) Requesting Further Clarification

c) Revised for Comments

d) Request for Comments

Question34 of 50

Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?

a) Run the dfscmd.exe \\FS1\dfs /restore command on FS1

b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group
c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group

d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner

Question35 of 50

Your company has a main office and two branch offices. Each office has a domain controller and file
servers. Your network consists of a single Active Directory domain. All servers run Windows Server 2008.

You need to plan the deployment of Distributed File System (DFS) to meet the following requirements:

Ensure that users see only the folders to which they have access

Ensure that users can access the data locally

Minimize the bandwidth required to replicate data.

What should you include in your plan?

a) Deploy a domain-based DFS namespace and use DFS Replication. Modify each share to be a hidden
share

b) Deploy a domain-based DFS namespace and use File Replication Service (FRS). Modify each share to
be a hidden share

c) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use File Replication
Service (FRS)

d) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use DFS Replication

Question36 of 50

You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?

a) Configure the Disk Quota and file screening policy.

b) Recommen for thirdparty file server solution like filers and configure the policy.

c) Control the usage through disk quota and access control.

d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.

Question37 of 50

The features of NTFS file system are


a) Security

b) Compression

c) Disk quota

d) All the options

Question38 of 50

What does DFS stands for?

a) Domain FSMO Server

b) Distributed File System

c) Domain File Server

d) Domain File System

Question39 of 50

How would you back up a Certificate Authority installation?

a) Use the certutil -backup command

b) Perform a Copy backup

c) Create a new AD DS snapshot

d) Use the certmgmt -backup command

Question40 of 50

You network contains one Active Directory domain. All domain controllers run Windows Server 2008.
The network has 100 servers and 5,000 client computers. Client computers run either Windows XP
Service Pack 2 (SP2) or Windows Vista Service Pack 1 (SP1). You need to plan the deployment of
Certificate Services on the network to support the following requirements: Automatic certificate
enrollment Supported certificates for all client computers What should you include in your plan?

a) Deploy a stand-alone certification authority (C. Create V2 templates

b) Deploy a stand-alone certification authority (C. Create V3 templates

c) Deploy an enterprise certification authority (C. Create V2 templates

d) Deploy an enterprise certification authority (C. Create V3 templates

Question41 of 50
RAID 1 offers what type of fault tolerance?

a) Mirroring

b) Stripping

c) Stripping with parity

d) Hot swap

Question42 of 50

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is
configured to use a 127GB dynamically expanding virtual hard disk (VH. You need to add 500 GB of disk
space to VM1. The solution must minimize the amount of downtime for VM1. What should you do?

a) Increase the size of the VHD drive

b) Convert the VHD to a fixedsize disk

c) Add a new VHD drive to a SCSI controller

d) Add a new VHD drive to an IDE controller

Question43 of 50

Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?

a) From HyperV Manager, reset VM1

b) Run the ExportVM PowerShell cmdlet

c) Run the UnmountVHD PowerShell cmdlet

d) From HyperV Manager, pause VM1

Question44 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. You plan to create an
image of Server1 to deploy to additional servers. You need to identify how many more times you can
rearm the Windows activation clock. What should you run on Server1?

a) msinfo32.exe

b) slmgr.vbs /dlv
c) slui.exe

d) winrm.vbs enumerate

Question45 of 50

Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V.VS1 hosts
10 virtual machines. You need to configure VS1 to shut down each virtual machine before the server
shuts down. What should you do?

a) Create a shutdown script on each virtual machine.

b) Install Integration Services on each virtual machine.

c) Enable the Turn off the virtual machine option in the Automatic stop action properties on each virtual
machine.

d) Enable the Turn off the virtual machine option in the Automatic stop action properties on each VM

Question46 of 50

Incident priority is determined by

a) Impact

b) Urgency

c) Impact & Urgency matrix, usually agreed with the customer as well

d) the user reporting the incident

Question47 of 50

When the cause of one or more incidents is not known, additional resources are assigned to identify the
cause. Which ITIL process is responsible for this?

a) Capacity Management

b) Incident Management

c) Problem Management

d) Service Level Management

Question48 of 50

Which ITIL process provides change proposals in order to eliminate recurring incidents?

a) IT Service Continuity Management


b) Availability Management

c) Event Management

d) Problem Management

Question49 of 50

Which of the following are the two types of problem management?

a) Reactive and Informative

b) Preventive and Retrospective

c) Reactive and Proactive

d) Retrospective and Proactive

Question50 of 50

Which of the following is NOT a Service Operation process?

a) A)Problem management

b) B)Change Management

c) C)Access management

d) D)Event management

http://www.aiotestking.com/microsoft/2011/08/which-tool-should-you-use-25/

http://class10e.com/Microsoft?s=Which+coaxial+cable+type+would+be+used+with+Thicknet%3F+

http://tailieu.nhatnghe.com/resource/5.%5BEbooks%20Tieng%20Anh%5D/70-646.pdf

http://certificationpath.com/view/microsoft-70-643-practice-exam/questions

Set 6:
1 of 50
Windows clustering provides which of the following benefits?
a) High-availability
b) Network load balancing
c) Component load balancing
d) All of the above

Question2 of 50
What is the middle layer of the OSI reference model?
a) Application
b) Session
c) Transport
d) Data Link

Question3 of 50
A message is associated with which layer of the OSI reference model?
a) Application
b) Transport
c) Network
d) Data Link

Question4 of 50
Which of the following IRQs are used for LPT1?
a) 1
b) 3
c) 5
d) 7

5 of 50
What is another name for 10Base5 ?
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet

Question6 of 50
Under the rules of Telnet option negotiation, a host:
a) Can renegotiate options already established
b) Can begin data exchange even before negotiation is completed
c) Must accept the options proposed
d) Can say no to a proposed option
Question7 of 50
Which layer(s) of the OSI model is/are included in the NDIS specification?
a) 1
b) 2
c) 3
d) 4

Question8 of 50
Assume that you are the administrator of your companys network, which serves a single site
with 150 users. The network includes eight servers running Windows 2008 servers. One server
hosts your internal web site. All servers have static IP addresses in the range from 10.1.1.2
through 10.1.1.10. All client computers run Windows XP Professional and are DHCP clients,
using an address range of 10.1.1.11 through 10.1.1.200. You need to provide internet access to
internal users. To do so, you plan to use a pool of 100 IP addresses supplied by a contracted
internet service provider. Your solution must involve the least possible administrative effort.
What should you do?

a) Allow all client computers to use automatic Private IP addressing for IP address
assignment.Configure all servers to use static IP addresses in the 192.168.0.0 subnet.
b) Install a server for network address translation. Add the IP address of the private interface of
this server to the excluded range on your DHCP server. Change the IP address of the private
interface for the network address translation protocol to 10.1.1.201.
c) Install a server for network address translation and enable the default DHCP allocator. Add
the existing server addresses to the excluded range. Change the IP address of the private
interface for the network Address Translation protocol to 10.1.1.201
d) Map internal addresses and port numbers of your servers to the pool of IP addresses and
port numbers assigned by your internet service provider.

Question9 of 50
You are the desktop administrator for your company. You are using RIS to install Windows XP
Professional on a new computer. You start the computer, but instead of connecting to your
network RIS server, your computer returns the following error message, Operating system not
found ᄑ. You verify that the computer contains a PXE-compliant network adapter that is
connected to your network. You need to start the computer and connect to your network RIS
server.What should you do?
a) Ask a network administrator to modify the network DHCP server to include a DHCP
reservation for the computer.
b) Ask a network administrator to modify the RIS server permissions to grant your domain user
account Allow-Read permission on the RIS images.
c) Modify the computers BIOS settings, and ensure that the computer is configured to boot
from the network.
d) Modify the computers BIOS settings, and ensure that the computers boot password is the
same as the RIS servers Administrator password
Question10 of 50
You want to install windows 7 on 30 PXE-compliant computers and 35 non-PXE-compliant
computers. All 65 computers are included on the current hardware compatibility list (HCL). You
create a RIS image. You load the Image on the RIS server. You then start the 65 computers. You
find that the 30 PXE-Compliant computers can connect to the RIS server. However, the 35 non-
PXE-compliant computers are not able to connect to the RIS server. You want the 35 non-PXE
compliant computers to connect to the RIS server. What should you do?
a) Run Rbfg.exe to create a Non-PXE-compliant startup disk
b) Run Riprep.exe to create a non-PXE complaint startup disk
c) Grant the everyone group NTFS Read permission for the RIS image
d) Grant the Administrators group NTFS Read permission for the RIS image

Question11 of 50
What is the main purpose of a DNS server?
a) To resolve IPX addresses into NetBIOS names
b) To resolve IP addresses into NetBIOS names
c) To resolve IP addresses into FQDN names
d) To resolve FQDN names into NetBIOS names

Question12 of 50
Your network contains a single Active Directory domain named contoso.com. The domain
contains a DNS server named Server1 that hosts the contoso.com zone. The network is
connected to the network of a partner company. The partner companys network contains a
DNS server that hosts a zone named nwtraders.com. You need to ensure that computers in
contoso.com can resolve the names of computers in nwtraders.com. The solution must not
require any changes to the zone configuration of nwtraders.com. What should you configure on
Server1?
a) a conditional forwarder
b) a GlobalNames zone
c) a secondary zone
d) a zone delegation

Question13 of 50
Your network contains an Active Directory domain named contoso.com. The domain contains
two domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 hosts a
primary zone for contoso.com. DC2 hosts a secondary zone for contosto.com. You need to
ensure that DNS zone data is encrypted when the data replicates across the network. DC2 must
provide authoritative responses to client computers. What should you do?
a) Convert the contoso.com zone to an Active Directory-integrated zone
b) Configure the contoso.com zone to use DNSSEC
c) Create a new delegation in the contoso.com zone
d) Modify the zone transfer settings of the contoso.com zone

Question14 of 50
The different records held by primay DNS server are?
a) PTR
b) All of the options
c) NS
d) MX

Question15 of 50
Which Service is mandatory for a File and Print server?
a) File replication service
b) Server
c) Print spooler
d) All the Above

Question16 of 50
To communicate between DNS client and a WINS Client, what parameter you will configure?
a) Not possible to communicate
b) DNS parameter in WINS
c) WINS parameter in DNS
d) all the options

Question17 of 50
When would you use the WINS Service?
a) When you need to resolve NetBIOS names to IP address dynamically and When you need to
resolve NetBIOS names to IP address statically.
b) When you need to resolve host an IP address
c) When you need to give each host an IP address
d) When you need to resolve NetBIOS names to IP address dynamically.

Question18 of 50
You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?
a) Windows Explorer
b) Efsinfo
c) Syskey
d) Cipher

Question19 of 50
You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
Occasionally, users report that they cannot connect to the terminal server. You need identify
user accounts that have multiple Terminal Services connections to Server1. Which tool should
you use?
a) Remote Desktop
b) Terminal Server Licensing
c) Terminal Services Configuration
d) Terminal Services Manager

Question20 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to
end any sessions that are inactive for more than one hour. What should you do?
a) From Terminal Services Manager, create a new group.
b) From Terminal Services Manager, delete the inactive sessions.
c) From Terminal Services Configuration, modify the RDP-Tcp settings.
d) From Terminal Services Configuration, modify the User logon mode setting

Question21 of 50
You have recently created and distributed RDP files for a certain RemoteApp program.
However, you find that the application performs poorly and needs to be migrated to a more
powerful server. What should you do to ensure that users can connect to the RemoteApp
program after it is migrated?
a) Create a new TS Web Access site for the new terminal server and publish the application to
the new site and Re-create an RDP file for the RemoteApp program after the migration and
distribute the file to users
b) TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so
that the server name listed is the new terminal serve
c) Modify the properties of the existing RDP file and re-distribute the file to users
d) All the above
AB

Question22 of 50
Your network consists of one Active Directory domain. All servers run Windows Server 2008.
You plan to publish a Web site on two Web servers. You need to recommend a solution for the
deployment of the two Web servers. The solution must provide the following requirements:
Session-state information for all users Access to the Web site if a single server fails Scalability to
as many as seven Web servers Support for multiple dedicated IP addresses for each Web server
What should you recommend?
a) Install failover clustering on each Web server
b) Install Network Load Balancing on each Web server
c) Assign multiple bindings in Internet Information Services (IIS) 7.0
d) Create managed handler mappings in Internet Information Services (IIS) 7.0

Question23 of 50
Your organization includes two servers named Server1 and Server2 that run Windows Server
2003 Service Pack 2 (SP2). Server1 and Server2 host the same Web sites. You need to back up
the server configuration on Server1 every hour and then apply the configuration to Server2.
Which command should you use?
a) IISBack.vbs /backup
b) IISBack.vbs /list
c) IISCnfg.vbs /copy
d) IISCnfg.vbs /save

Question24 of 50
Which of the following statement about user environment policies is correct?
a) User policies are only applicable to Windows 2003/XP clients
b) User policies are applied only upon user logon, whereas computer policies are applied at the
end of the boot process and upon user logon
c) User policies are applied only upon user logon, whereas computer policies are applied at the
end of the boot process
d) None of them

Question25 of 50
Your network contains a Windows Server Update Services (WSUS) server named Server1. You
need to configure all WSUS client computers to download approved updates directly from the
Microsoft Update servers. The solution must ensure that all WSUS client computers report
successful installation of updates to Server1. What should you do?
a) From Active Directory, deploy a Group Policy object (GPO)
b) From Server1, modify the Update Source and Proxy options
c) From the WSUS client computers, modify the local computer policy
d) From Server1, modify the Update Files and Languages options

Question26 of 50
In Windows 2003, a workgroup is referred as
a) Client/server network
b) peer network
c) domain
d) all of the above

Question27 of 50
What type of memory needs a constant refresh?

a) ROM
b) Harddisk
c) DRAM
d) SRAM

Question28 of 50
Your network contains two servers named Server1 and Server2. Server1 runs Windows Server
2008 R2. Server2 runs Windows Server 2008. You need to ensure that you can initiate a full
server backup of Server2 from Server1. What should you do?
a) Install Windows Server Backup on Server2
b) Upgrade Server2 to Windows Server 2008 R2
c) Add an exception to Windows Firewall on Server2
d) Add your user account to the Backup Operators group on Server2

Question29 of 50
Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core? If yes, how can you use it for remote management?
a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core
b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely
manage Windows Server 2008 R2 Server Core
c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core enable by using the SConfig tool.
d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core and enable by using the SConfig tool. ()

Question30 of 50
You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
You need to track all authentication attempts on Server1. What should you do?
a) Enable auditing of logon event events in Server1s local policy.
b) Enable auditing of logon event events in the Default Domain Controller Policy.
c) Enable auditing of account logon event events in Server1s local policy.
d) Enable auditing of account logon event events in the Default Domain Controller Policy.

Question31 of 50
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to
monitor the performance of the VPN server for one day. What should you do?
a) From the Performance console, create a trace log.
b) From the Performance console, create a counter log.
c) Install Network Monitor Tools. From Network Monitor create a new capture.
d) Install Network Monitor Tools. From Network Monitor create a new parser file.

Question32 of 50
Your network contains one Active Directory domain. You have a member server that runs
Windows Server 2008 R2. You need to immediately disable all incoming connections to the
server. What should you do?
a) From the Services snap-in, disable the IP Helper
b) From the Services snap-in, disable the Netlogon service
c) From Windows Firewall, enable the Block all connections option on the Public Profile
d) From Windows Firewall, enable the Block all connections option on the Domain Profile

Question33 of 50
What is the primary purpose of an ACL?
a) It controls access to resources.
b) It explicitly allows or denies access to a particular resource.
c) It explicitly defines users and their respective access rights to a particular resource.
d) All of them

Question34 of 50
Assume that you are the administrator of your companys network. You receive a request from
Stephens manager to disable Stephens access to a network share named Financial. Stephens
user account is the only member in a group named Reports. The Reports group has Full Control
permission to the Financial share. You delete the Reports group. You later find out that the
manager was in error and that Stephen should have his access to Financial share restore What
should you do?
a) Re-create Reports and re-create Stephens user account. Use existing NTFS permissions.
b) Re-Create Reports and grant Reports NTFS Full Control permission to Financial. Stephens
user account will still be a member of Reports.
c) Re-create Reports and grant Reports Full Control permission to Financial. Add Stephens user
account to Reports.
d) Re-Create Reports and add Stephens existing user account to Reports. Use existing NTFS
permissions.

Question35 of 50
Your network contains a domain-based Distributed File System (DFS) namespace named \\
contoso.com\dfs. \\contoso.com\\dfs is configured to use Windows 2000 Server mode. The
domain contains two servers named Server1 and Server2 that run Windows Server 2008 R2.
Server1 is configured as a namespace server for \\contoso.com\dfs. You need to migrate \\
contoso.com\dfs to Windows Server 2008 mode. You install the Distributed File System role
service on Server2. What should you do next?
a) At the command prompt, run dfsutil root export \\contoso.com\dfs c:\dfs.xml
b) Configure Server2 as a namespace server for \\contoso.com\dfs
c) At the command prompt, run dfsutil root adddom \\contoso.com\dfs v2
d) Create a new shared folder named DFS on Server2

Question36 of 50
Your company has a main office and two branch offices. Each office has a domain controller and
file servers. Your network consists of a single Active Directory domain. All servers run Windows
Server 2008.
You need to plan the deployment of Distributed File System (DFS) to meet the following
requirements:
Ensure that users see only the folders to which they have access
Ensure that users can access the data locally
Minimize the bandwidth required to replicate data.
What should you include in your plan?
a) Deploy a domain-based DFS namespace and use DFS Replication. Modify each share to be a
hidden share
b) Deploy a domain-based DFS namespace and use File Replication Service (FRS). Modify each
share to be a hidden share
c) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use File
Replication Service (FRS)
d) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use DFS
Replication

Question37 of 50
What Command is used to view all the share folders in a system?
a) net share c:
b) net share
c) net share test
d) All the Options

Question38 of 50
You are the desktop administrator for your company. You want to centrally manage user
settings on your network. How do you achieve this?
a) roaming profile
b) mandatory profile
c) hardware profile
d) local profile

Question39 of 50
How would you back up a Certificate Authority installation?
a) Use the certutil -backup command
b) Perform a Copy backup
c) Create a new AD DS snapshot
d) Use the certmgmt -backup command

Question40 of 50
The server contains one volume. You install Certificate Services. You need to back up the
Certificates Services database by using the minimum amount of storage space. Which tool
should you use?
a) Certification Authority snap-in
b) Certificates snap-in
c) Certificate Templates snap-in
d) Windows Backup

Question41 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role
installed. You create a new virtual machine and perform an installation of Windows Server 2003
on the virtual machine. You configure the virtual machine to use the physical network card of
the host server. You notice that you are unable to access network resources from the virtual
machine. You need to ensure that the virtual host can connect to the physical network. What
should you do?
a) On the host server, install the Microsoft Loopback adapter
b) On the host server, enable the Multipath I/O feature
c) On the virtual machine, install the Microsoft Loopback adapter
d) On the virtual machine, install Microsoft Hyper-V Integration Components

Question42 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role
installed. You need to merge a differencing disk and a parent disk. What should you do?
a) Edit the parent disk
b) Inspect the parent disk
c) Edit the differencing disk
d) Inspect the differencing disk

Question43 of 50
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2008 R2. A server named Server1 has the Windows Deployment Services
(WDS) server role installed. A custom Windows 7 image is available for download from Server1.
A server named Server2 has the Hyper-V server role installed. You create a virtual machine
(VM) named VM1 on Server2. You need to deploy the Windows 7 image from Server1 to VM1.
What should you do first?
a) On Server1, configure a multicast transmission
b) On Server1, adjust the PXE Response Delay setting
c) From the properties of VM1, install a legacy network adapter
d) From the properties of VM1, install a synthetic network adapter

Question44 of 50
Which level of RAID provides mirroring only?
a) 0
b) 1
c) 2
d) 3

Question45 of 50
Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-
V.VS1 hosts 10 virtual machines. You need to configure VS1 to shut down each virtual machine
before the server shuts down. What should you do?
a) Create a shutdown script on each virtual machine.
b) Install Integration Services on each virtual machine.
c) Enable the Turn off the virtual machine option in the Automatic stop action properties on
each virtual machine.
d) Enable the shut down the virtual machine option in the Automatic stop action properties on
each VM
Question46 of 50
Do all problem solutions need to be mandatorily implemented?
a) Yes, all of them need to be implemented.
b) No, none of them need to be implemented.
c) On a case on case basis, post discussion with the customer.
d) All of the above

Question47 of 50
Incident and Service requests are the same
a) Yes
b) Yes, both are reported to the Service desk
c) No, although both may be reported to the service desk
d) None of the above

Question48 of 50
The Problem Management process is intended to reduce both the number and severity of
Incidents and Problems on the business.
a) True
b) False

Question49 of 50
Which of the following are the two types of problem management?
a) Reactive and Informative
b) Preventive and Retrospective
c) Reactive and Proactive
d) Retrospective and Proactive

Question50 of 50
Which of the following is NOT a Service Operation process?
a) A)Problem management
b) B)Change Management
c) C)Access management
d) D)Event management

Which layer of the OSI reference model uses the hardware address of a device to ensure
message delivery to the proper host on a LAN?

A.
physical

B.
data link
C.
network

D.
transport

Which layer in the OSI model is used to verify that data was delivered without error?

A.
Physical

B.
Data Link

C.
Network

D.
Transport

Set 7:

1.Assume that you are the administrator of your companys network. Your web server is configured to
run a third party Web application for users on your network. Another network administrator in your
company has recently made some configuration changes to secure the server. Users report that each
time they try to connect to a secure web server, they receive the following error message, Web page
requested is not available? n Users have no problem connecting to FTP, and you have verified that the
web service has started You want to discover why users are receiving the error message. What should
you do to diagnose the problem?

a) Verify that port 21 and port 20 are permitted in your TCP/IP filter.

b) Verify that port 443 is permitted in your TCP/IP filter.

c) Verify that the connect NTFS file permissions are on the web pages.
d) Verify that the port 80 is permitted in your TCP/IP filter.

Ans:

2.Which of the following IRQs are used for LPT1?

a) 1

b) 3

c) 5

d) 7

ans: d)

3.Which coaxial cable type would be used with Thicknet?

a) RG-8

b) RG-11

c) RG-58

d) RG-59

ans: a)

4.Which of the following network devices translates between data formats?

a) Repeater

b) Switch

c) Bridge

d) Gateway

ans: d)

5.Another name for 10Base2?

a) Baseband
b) Broadband

c) Thicknet

d) Thinnet

ans: d)

6.The mask 255.255.255.240 is equivalent to a mask length of_______.

a) 24 bits

b) 28 bits

c) 32 bits

d) None of the above

ans: b)

7.Which standard divides the data link layer into the LLC and the MAC sublayers?

a) 802.1

b) 802.2

c) 802.3

d) 802.4

ans: b)

Question8 of 50

Write the name of layer of the OSI model that maintains a connection between nodes?

a) Transport Layer

b) Session Layer

c) Physical Layer

d) Network Layer
ans: b)

Question9 of 50

Your network has a DHCP server that runs the 64-bit version of Windows Server 2008. The network only
uses IPv4. You plan to deploy 50 new Windows Server 2008 servers. Some of the new servers contain
64-bit hardware and some of the servers contain 32-bit hardware. All of the new server hardware
supports Pre-Boot Execution Environment (PXE). You need to plan for the automated deployment of the
new servers. You want to achieve this goal while minimizing hardware costs. What should you include in
your plan?

a) Deploy Windows Deployment Services (WDS) on the DHCP server

b) Deploy Remote Installation Services (RIS) on a 64-bit server that runs Windows Server 2003

c) Deploy Windows Deployment Services (WDS) on two servers that run Windows Server 2008. One of
the servers is a 64-bit server, and the other server is a 32-bit server

d) Deploy Remote Installation Services (RIS) on two servers that run Windows Server 2003 Service Pack
2. One of the servers is a 64-bit server, and the other server is a 32-bit server

ans: a)

Question10 of 50

Reserved address always will have least priority

a) TRUE

b) false

Question11 of 50

Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. You need to
ensure that DNS1 only responds to DNS queries from computers that are located in the same subnet.
What should you configure?

a) Interfaces from DNS Manager

b) Security from DNS Manager

c) Trust Anchors

d) Windows Firewall
ans: D)

Question12 of 50

You want to ensure that DNS zone content is secured and that no user can write to DNS zones.

How should you configure your zones?

a) Secondary

b) Caching

c) Stub

d) AD-integrated

ans: d)

Question13 of 50

You want to perform maintenance task on a domain controller but you want the services of DNS and
DHCP available. Servers must have the less down time possible. What should you do?

a) Run the ntdsutil (NAS)

b) Disable Netlogon service

c) Stop the NTDS service

d) Run the DC in the Directory Services Restore mode

ans: a)

Question14 of 50

You have a domain controller that runs Windows Server 2008 and is configured as a DNS server. You
need to record all inbound DNS queries to the server. What should you configure in the DNS Manager
console?

a) Enable debug logging

b) Enable automatic testing for simple queries

c) Enable automatic testing for recursive queries

d) Configure event logging to log errors and warnings


ans: a)

Question15 of 50

Your network contains a DNS server named Server1 that runs Windows Server 2008 R2. You need to
ensure that client computers can resolve IPv6 addresses to fully qualified domain names (FQDNs). Which
type of resource record should you create?

a) Alias (CNAME)

b) Host (A) Record

c) Pointer (PTR)

d) Host (AAA

ans: C)

Question16 of 50

The best example for Dynamic NetBIOS name resolving service is

a) DHCP

b) WINS

c) DNS

d) IIS

ans: b)

Question17 of 50

NetBEUI could be used in?

a) small, department-sized networks

b) large multi-building networks

c) WANs

d) MANs
ans: a)

Question18 of 50

You install Windows Server 2003 on a computer that has a Non-Plug and Play video adapter. You want
to configure the video adapter to use 16-bit color and 1024 x 768 resolution. The color setting for the
video adapter is set to 16 colors, and you cannot change that setting. What should you do?

a) Change the adapter refresh rate to 60Mhz.

b) Change the monitor drivers to be WDM-compliant drivers.

c) Use List All Modes to select the adapter default mode.

d) Install the WDM-compliant video adapter and monitor drivers.

Ans: d)

Question19 of 50

One of the advantage of terminal service is

a) Remote administration

b) Deployment of application

c) Remote administration and Deployment of application and Multiple desktop environment

d) Multiple desktop environment

ans: c)

Question20 of 50

Five Windows Server 2008 servers that have Terminal Services installed. You plan to establish a
Terminal Services server farm. You need to ensure that the server farm meets the following
requirements: New users automatically connect to the terminal server that has the fewest active
sessions. Disconnected users are redirected to the server that contains their previous session. What
should you implement?

a) Network Load Balancing (NL)

b) Round-robin DNS

c) Terminal Services Gateway (TS Gateway)


d) Terminal Services Session Broker (TS Session Broker)

ans: d)

Question21 of 50

You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. All network servers run Windows Server 2008. Terminal Services installed on three servers
running Windows 2008 Server. You need to ensure that uses can access the application installed in
Terminal Servers during RDP/terminal session, at the same time you need to ensure the load
distribution to all three Terminal Servers. You also need to ensure that user should be able to connect
back to his session if he disconnects by mistakenly disconnection due to time out.

a) Configure the Windows Cluster Services on each terminal server

b) Install and configure Terminal Server Load distribution thrpough Hardware Load balancer as it doesnt
support NLBS.

c) Install and configure round robin DNS

d) Install and configure all three Windows Servers using Windows NLBS and configure the TS session
broker service to achieve the goal.

Ans: d)

Question22 of 50

Your network consists of one Active Directory domain. All servers run Windows Server 2008. You plan to
publish a Web site on two Web servers. You need to recommend a solution for the deployment of the
two Web servers. The solution must provide the following requirements: Session-state information for
all users Access to the Web site if a single server fails Scalability to as many as seven Web servers
Support for multiple dedicated IP addresses for each Web server What should you recommend?

a) Install failover clustering on each Web server

b) Install Network Load Balancing on each Web server

c) Assign multiple bindings in Internet Information Services (IIS) 7.0

d) Create managed handler mappings in Internet Information Services (IIS) 7.0

ans: B)
Question23 of 50

You are working as a system administrator for Wipro.com. You got a complaint that none of the people
could be able to upload the files but they can download the files from the FTP site which you have
created. What could be reason behind it?

a) Read permission is not given to the FTP site

b) Write permission is not given to the FTP site

c) Modify permission is not set on the FTP site

d) All the Above

ans: b)

Question24 of 50

Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1 runs
Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site
to use SSL. You need to configure a Group Policy object (GPO) to specify the intranet update locations.
Which URL should you use?

a) http: //SERVER1

b) http: //SERVER1:8080

c) https: //SERVER1:8080

d) https: //SERVER1

ans: d)

Question25 of 50

How you can edit the boot.ini file ?

a) Regedit

b) clicking the Boot.ini tab in the System Configuration Utility window

c) Sysinfo
d) by using the manage computer Properties

ans: b)

Question26 of 50

You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2).
Server1 is the site license server for the Default-First-Site-Name site. You need to configure Server2 to
be the site license server. What should you do?

a) From the Licensing console on Server1, modify the Products View configuration.

b) From the Licensing Control Panel applet on Server2, modify the Replication configuration.

c) From the Active Directory Sites and Services console, modify the Licensing Site Settings.

d) From the Active Directory Users and Computers console, modify the AdminSDHolder object.

Ans: c)

Question27 of 50

Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core? If yes, how can you use it for remote management?

a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core

b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core

c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core enable by using the SConfig tool.

d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core and enable by using the SConfig tool.

Ans: d)

Question28 of 50

You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster.
All nodes have access to a SAN, and adequate storage is available. Which of the following options should
you choose for your quorum configuration?
a) Node And File Share Majority

b) Node And Disk Majority

c) No Majority: Disk Only

d) Node Majority

ans:b)

Question29 of 50

You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?

a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.

b) Restore the Documents and Settings folder that contains the WorkProduct folder.

c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.

d) Restore Peters WorkProduct folder, and choose the original location for the restoration.

Ans: d)

Question30 of 50

You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to
implement a backup schedule on Server1 to meet the following requirements: Everyday, back up all files
and folders to disk. Every Friday, back up all files and folders to tape Every Sunday, Tuesday, and
Thursday, back up only the files and folders that have changed since the previous Fridays backup to
tape. Which backup jobs should you create?

a) a normal backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday, and Thursday

b) a normal backup to disk everyday a normal backup to tape on Friday an incremental backup to tape
on Sunday, Tuesday, and Thursday

c) a copy backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday and, Thursday
d) a copy backup to disk everyday a normal backup to tape on Friday an incremental backup to tape on
Sunday, Tuesday and, Thursday

ans: c)

Question31 of 50

You want to make Dinesh a member of the Backup Operators group. Which of the following statements
about the Backup Operators group is correct?

a) By default, only Administrators and Power Users can be members of the Backup Operators group.

b) Backup Operators do not require any additional permissions to NTFS file systems in order to back up
and restore the file system

c) Backup Operators have full access to the NTFS file system

d) Backup Operators can modify any services that relate to system backup

ans: b)

Question32 of 50

Your network contains a file server named Server1 that runs Windows Server 2008 R2. You have a folder
named Folder1. You need to ensure that files in Folder1 that are older than 365 days are automatically
moved to an archive folder. What should you create from the File Server Resource Manager console?

a) a file group

b) a file screen

c) a file management task

d) a quota

ans: c)

Question33 of 50

Your network contains a file server named Server1 that runs Windows Server 2008 R2. On Server1, you
create a disk quota for volume E that limits storage to 200 MB for all users. You need to ensure that a
user named User1 can store files that are larger than 200 MB on volume What should you do?
a) From File Server Resource Manager, create a file screen exception

b) From a command prompt, run dirquota.exe

c) From Disk Management, create a new quota entry

d) From Windows Explorer, modify the security properties of the volume

ans: c)

Question34 of 50

You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?

a) Modify the quota template

b) Delete and recreate the quota template

c) Create a new quota template. Modify the quota for each folder

d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders

ans: a)

Question35 of 50

Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode
enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are
displayed. What should you do?

a) Disable referrals

b) Modify the system access control list

c) Enable access-based enumeration (ABE)

d) Modify the discretionary access control list

ans: c)

Question36 of 50
Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\
DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for \\
contoso.com\DFS1. You need to verify that the DFS namespace replicates successfully between Server1
and Server2. Which tool should you use?

a) Dfscmd

b) Dfsdiag

c) Dfsrdiag

d) Dfsutil

ans: c)

Question37 of 50

Your network contains a file server that runs Windows Server 2008 R2. You create a shared folder on the
server. You need to ensure that an administrator is notified whenever a user saves .exe files to the
shared folder. What should you do?

a) Configure access-based enumeration (ABE)

b) Create a file screen

c) Modify the NTFS permissions and the share permissions

d) Create a soft quota

ans: b)

Question38 of 50

The features of NTFS file system are

a) Security

b) Compression

c) Disk quota

d) All the options

ans: d)
Question39 of 50

Which ONE of the following is a valid reason to implement a subordinate CA?

a) Improve security of your CA system

b) Implement a CA system that is free from single points of failure

c) Both A & B

d) Neither A nor B

ans: c)

Question40 of 50

You are a network administrator for TestKing. The network consists of a single Active Directory domain
testking.com. All servers run Windows Server 2003. TestKing has a main office and a branch office. Both
offices are connected to the Internet by Network Address Translation (NAT) firewalls and T1 connections
to the companys ISP. Each firewall is configured with a perimeter network. TestKing uses a public key
infrastructure (PKI) for both internal and external authentication. TestKing needs to connect to the main
office to the branch office by using the existing Internet connections. TestKings written security policy
included the following requirements:

1. All Internet communications must use the PKI for all authentication and data encryption.

2. All servers that are required to communicate to or by means of the Internet must be located in a
firewall perimeter network. You need to connect to the main office to the branch office. You need to
comply with the written security policy. You install Routing and Remote Access servers in the perimeter
network at each office. What else should you do?

a) Configure persistent, two-way initiated PPTP connections with EAP-TLS authentication

b) Configure persistent, two-way initiated PPTP connections with MS-CHAP v2 user authentication

c) Configure persistent, two-way initiated L2TP/IPSec connections with MS-CHAP v2 user authentication

d) Configure persistent, two-way initiated L2TP/IPsec connections with EAP-TLS user and computer
authentication

ans: d)
Question41 of 50

Which RAID level is also called mirroring?

a) 0

b) 1

c) 3

d) 5

ans: b)

Question42 of 50

Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is paused critical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?

a) Change the VHD type of VM1

b) Delete the .avhd files for VM1

c) Increase the free disk space on drive D

d) Increase the free disk space on drive C

ans: d)

Question43 of 50

Your network contains two servers that have the HyperV server role installed. You install the Failover
Clustering feature on both servers. You add both servers as nodes in the cluster. You need to ensure
that you can perform live migrations of individual virtual machines (VMs) between the nodes. The
solution must minimize the number of volumes required to host the VMs. What should you do first?

a) From Failover Cluster Manager, enable Cluster Shared Volumes

b) From HyperV Manager on each server, modify the default location for the virtual hard disks (VHDs)

c) From Failover Cluster Manager, modify the quorum settings of the cluster
d) From HyperV Manager on each server, modify the default location for the virtual machine
configuration files

and: a)

Question44 of 50

Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?

a) 64-bit guest support.

b) On multiprocessor hosts, the ability to assign a host processor to a virtual machine

c) Network load balancing support

d) 64-bit host support

ans: a)

Question45 of 50

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1. You add an additional hard disk to Server1. The hard disk is
configured as a basic disk. You need to configure VM1 to use the new hard disk as a passthrough disk.
What should you do before you configure the passthrough disk?

a) Create a simple volume

b) Convert the new hard disk to a GPT disk

c) Convert the new hard disk to a dynamic disk

d) Take the new hard disk offline

ans: D)

Question46 of 50

Incident management is the process responsible for managing the lifecycle of all incidents

a) TRUE
b) FALSE

ans: a)

Question47 of 50

Incident priority is determined by

a) Impact

b) Urgency

c) Impact & Urgency matrix, usually agreed with the customer as well

d) the user reporting the incident

ans: c)

Question48 of 50

ITIL defines a Problem as the

a) temporary disruption to agreed services

b) high priority incident

c) unknown underlying cause of one or more incidents

d) none of the above

ans: c)

Question49 of 50

The cash registers in a supermarket experience network disruptions daily between 4 p.m. and 6 p.m
REPEATEDLY. Which ITIL process is responsible for solving these difficulties?

a) Availability Management

b) Capacity Management

c) Incident Management

d) Problem Management

ans: d)
Question50 of 50

Which of the following is Proactive Problem Management?

a) drawing up a Capacity Plan

b) analyzing trends and identifying potential incidents

c) analyzing incidents that have been reported and solving the underlying cause

d) providing second-line support

ans: b)

Set 8:

Question1 of 50

A message is associated with which layer of the OSI reference model?

a) Application

b) Transport

c) Network

d) Data Link

ans: a)

Question2 of 50

Why will you use netdiag?

a) This command-line diagnostic tool helps to isolate networking and connectivity problems by
performing a series of tests to determine the state of your network client. These tests and the key
network status information they expose give network administrators and support personnel a more
direct means of identifying and isolating network problems b) This GUI diagnostic tool helps to isolate
networking and connectivity problems by performing a series of tests to determine the state of your
network client. These tests and the key network status information they expose give network
administrators and support personnel a more direct means of identifying and isolating network
problems

c) its third part tool and Microsoft suggested not to use this tool in medium and large setup.
d) None of the above

ans: a)

Question3 of 50

What is the advantage of enabling volume shadow copy?

a) any deleted files can be recovered

b) deleted shared files and folders can be recovered

c) deleted objects can be recovered

d) none of the above

ans: b)

Question4 of 50

Which of the following IRQs are used for LPT1?

a) 1

b) 3

c) 5

d) 7

ans: d)

Question5 of 50

What is another name for 10Base5 ?

a) Baseband

b) Broadband

c) Thicknet

d) Thinnet

ans: c)

Question6 of 50

Which of the following modules manages bindings in NDIS?


a) Protocol manager

b) Binding manager

c) Redirector

d) The registry

Ans:a

Question7 of 50

Which standard divides the data link layer into the LLC and the MAC sublayers?

a) 802.1

b) 802.2

c) 802.3

d) 802.4

Ans:b

Question8 of 50

What network evolved from the Defense Departments ARPANET?

a) MILNET

b) ARP/RARP

c) TCP/IP

d) Internet

Ans:d

Question9 of 50

Your company has one office in Montreal and one office in New York. Each office has 2,000 client
computers configured as DHCP clients. DHCP relay is not supported on the network routers. The
network consists of one Active Directory domain. You need to recommend a DHCP addressing solution
for both offices. The solution must meet the following requirements: Minimize traffic between offices.
Be available if a single server fails. What should you recommend?

a) In each office, install a DHCP server that has two scopes

b) In each office, install a DHCP instance on a two node failover cluster


c) In the Montreal office, install a DHCP server. In the New York office, install a DHCP Relay Agent

d) In the Montreal office, install a DHCP instance on a two node failover cluster. In the New York office,
install a DHCP Relay Agent

ans: b)

Question10 of 50

Reserved address always will have least priority

a) TRUE

b) false

c) NA

d) Not sure

Question11 of 50

What is the main purpose of a DNS server?

a) To resolve IPX addresses into NetBIOS names

b) To resolve IP addresses into NetBIOS names

c) To resolve IP addresses into FQDN names

d) To resolve FQDN names into NetBIOS names

ans: c)

Question12 of 50

You want to ensure that DNS zone content is secured and that no user can write to DNS zones.

How should you configure your zones?

a) Secondary

b) Caching

c) Stub

d) AD-integrated

ans: d)

Question13 of 50
You configured a DNS zone on the primary server and now would like to set up a transfer to a secondary
server. However, during secondary zone initiation on another server attempts to load the zone
consistently fail. What should you do to correct the problem?

a) Allow zone transfers to any server (Zone Transfer tab in zone properties)

b) Allow zone transfers to servers listed in the Name Servers tab (Zone Transfer tab in zone properties)
and add the secondary server to the NS of the zone

c) Allow zone transfers to selected servers (Zone Transfer tab in server properties)

d) Uncheck the Secure cache against pollution

ans: b)

Question14 of 50

Your company has a domain controller named Server1 that runs Windows Server 2008 R2. Server1 has
the DNS Server server role installed. You need to configure the DNS server to resolve IP addresses to
host names. Which record should you create?

a) Pointer (PTR)

b) Host Info (HINFO)

c) Service Location (SRV)

d) Canonical Name (CNAME)

Question15 of 50

The different records held by primay DNS server are?

a) PTR

b) All of the options

c) NS

d) MX

Question16 of 50

To communicate between DNS client and a WINS Client, what parameter you will configure?

a) Not possible to communicate

b) DNS parameter in WINS


c) WINS parameter in DNS

d) all the options

Question17 of 50

When would you use the WINS Service?

a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.

b) When you need to resolve host an IP address

c) When you need to give each host an IP address

d) When you need to resolve NetBIOS names to IP address dynamically.

Question18 of 50

You want to install Windows XP Professional on 10 non-PXE-compliant computers on the marketing


segment of your network. The 10 computers do not have operating systems installed. You attempt to
load the computers by using an existing RIS image that is on the RIS server. You find that the 10
computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers, including the RIS server. You then check the network servers and find
that the Windows Server 2003 computer running WINS has stopped responding due to hard disk failure.
You want to enable the computers to connect to the RIS server. What should you do?

a) Repair and restart the WINS server.

b) Repair the WINS server and upgrade the server to Windows 2008 Server.

c) Configure the Active Directory server to run DHCP

d) Configure a static entry in WINS that points to the RIS server.

Question19 of 50

How will you administer Windows Server 2008 R2 from the workstation where you cannot install
Windows Server Remote Administration Tools?

a) You can not use Remote Desktop for remote administration

b) You can still use Remote Desktop for remote administration, if it is disabled on the target server, if
you have permissions and firewall is blocking the connection.

c) You can still use Remote Desktop for remote administration, if it is enabled on the target server, if
you have permissions and firewall is not blocking the connection.
d) None of the above

Question20 of 50

You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS
Gateway) role service installed. You need to provide a security group access to the TS Gateway server.
What should you do?

a) Add the security group to the Remote Desktop Users group.

b) Add the security group to the TS Web Access Computers group.

c) Add the security group to the TS Web Access Computers group.

d) Create and configure a Connection Authorization Policy.

Question21 of 50

You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?

a) From Terminal Services Manager, create a new group.

b) From Terminal Services Manager, delete the inactive sessions.

c) From Terminal Services Configuration, modify the RDP-Tcp settings.

d) From Terminal Services Configuration, modify the User logon mode setting

Question22 of 50

You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?

a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.

b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.

c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.
d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.

Question23 of 50

Which of the following operating systems is ideal for Web servers?

a) Windows 2003 Server

b) Windows 2000 Professional

c) Windows 2000 Print Server

d) Windows 2000 File Server

Question24 of 50

Where is the Print job stored

a) Printer properties

b) Spooler Printer

c) Print Spool

d) Print Spooler

Question25 of 50

Which of the following operations cannot be performed in My computer folder?

a) Format

b) Sharing

c) Delete

d) Copy

Question26 of 50

Which of the following server service is not provided by Windows 2000?


a) Print Server

b) File Server

c) Application Server

d) Web Server

Question27 of 50

Windows 2003 Enterprise Edition can support Maximum multiprocessor?

a) 8

b) 32

c) 16

d) 9

Question28 of 50

What is the advantage that the 64-bit environment has over the 32-bit environment?

a) Price

b) Performance

c) Application Support

d) Ease of Management and Maintenance

Question29 of 50

All servers run Windows Server 2003. A network server named Server1 functions as the main file server.
Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by
using the Backup utility. You discover that files that are open during the backup process are not being
backed up. You need to ensure that open files should be backed up successfully. What should you do?

a) Enable volume shadow copies on the partitions that are being backed up

b) Disable volume shadow copies on the partitions that are being backed up.

c) Select the Verify data after backup check box in the Advanced backup options of the backup job.
d) Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.

Question30 of 50

Your network consists of one Active Directory domain named ABC.COM. The domain contains three
Windows Server 2008 servers named Server1, Server2, and Server3. Server1 runs Active Directory
Certificate Services (AD CS) and is configured as an enterprise root certification authority. Server2 hosts
an internal Web site. Users currently connect to the Web site by using the URL https://server2.abc.com.
You plan to replicate the Web site from Server2 to Server3. You need to recommend a solution to
enable users to connect to the Web site through HTTPS on either Server2 or Server3 by using a single
URL. The solution must meet the following requirements: Users must be able to use the
https://www.abc.com URL to connect to the Web site. Incoming connections must be dynamically
balanced between Server2 and Server3. What should you recommend?

a) Add both servers to a Network Load Balancing cluster. Export the Web server certificate on Server2
to Server3

b) Add both servers to a failover cluster. Issue a Web server certificate for www.abc.com. Install the
certificate on Server2

c) Add both servers to a Network Load Balancing cluster. Issue a Web server certificate for
www.abc.com. Install the certificate on Server2 and Server3

d) Add both servers to a failover cluster. Issue a Web server certificate for server2.abc.com and install
the certificate on Server2. Issue a Web server certificate for server3.abc.com and install the certificate
on Server3

Question31 of 50

Maximum number of Nodes supported in Windows 2008 standard server Load Balancing and cluster

a) 16 Nodes in cluster and 32 Nodes in Load Balancing

b) Zero Nodes in cluster and 32 Nodes in Load Balancing

c) 16 Nodes in cluster and 16 Nodes in Load Balancing

d) 32 Nodes in cluster and 32 Nodes in Load Balancing

Question32 of 50
Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?

a) From the Services snap-in, disable the IP Helper

b) From the Services snap-in, disable the Netlogon service

c) From Windows Firewall, enable the Block all connections option on the Public Profile

d) From Windows Firewall, enable the Block all connections option on the Domain Profile

Question33 of 50

What is the primary purpose of an ACL?

a) It controls access to resources.

b) It explicitly allows or denies access to a particular resource.

c) It explicitly defines users and their respective access rights to a particular resource.

d) All of them

Question34 of 50

You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?

a) Attrib.exe

b) Cacls.exe

c) Dsacls.exe

d) Dsmod.exe

Question35 of 50

You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?
a) Configure the Disk Quota and file screening policy.

b) Recommen for thirdparty file server solution like filers and configure the policy.

c) Control the usage through disk quota and access control.

d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media
files.

Question36 of 50

Stand alone DFS root will use Active Directory ?

a) TRUE

b) false

c) NA

d) NOT SURE

Question37 of 50

The features of NTFS file system are

a) Security

b) Compression

c) Disk quota

d) All the options

Question38 of 50

What Command is used to view all the share folders in a system?

a) net share c:

b) net share

c) net share test

d) All the Options


Question39 of 50

You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?

a) Configure the Online Responder Role Service on a member server

b) Configure the Online Responder Role Service on a domain controller

c) Configure the Certification Authority Web Enrollment Role Service on a member server

d) Configure the Certification Authority Web Enrollment Role Service on a domain controller

Question40 of 50

You have added the AD CS role to your server and configured group policy to enroll users

automatically. What else must you do in order to start issuing certificates?

a) No further action is required

b) Configure OCSP responders

c) Configure certificate templates

d) Configure NDES services

Question41 of 50

You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You need to merge a differencing disk and a parent disk. What should you do?

a) Edit the parent disk

b) Inspect the parent disk

c) Edit the differencing disk

d) Inspect the differencing disk

Question42 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:

- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.

- The number of virtual network connections must be minimized.

What should you do?

a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network

b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network

c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network

d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network

Question43 of 50

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is
configured to use a 127GB dynamically expanding virtual hard disk (VH. You need to add 500 GB of disk
space to VM1. The solution must minimize the amount of downtime for VM1. What should you do?

a) Increase the size of the VHD drive

b) Convert the VHD to a fixedsize disk

c) Add a new VHD drive to a SCSI controller

d) Add a new VHD drive to an IDE controller

Question44 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
HyperV server role installed. Server1 hosts a virtual machine (VM) named VM1. You take a snapshot of
VM1 at 05:00 and at 19:00. You use HyperV Manager to delete the snapshot taken at 05:00. You need to
ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1. What
should you do?

a) At the command prompt, run the rmdir.exe command

b) From the HyperV Manager console, shut down VM1

c) From Windows PowerShell, run the RemoveItem cmdlet

d) From the HyperV Manager console, rightclick VM1 and click Revert

Question45 of 50

Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?

a) 64-bit guest support.

b) On multiprocessor hosts, the ability to assign a host processor to a virtual machine

c) Network load balancing support

d) 64-bit host support

Question46 of 50

"Warranty of a service" means which of the following?

a) The service is fit for purpose

b) There will be no failures in applications and infrastructure associated with the service

c) All service-related problems are fixed free of charge for a certain period of time

d) Customers are assured of certain levels of availability,capacity,continuity and security

Question47 of 50

Which of the following statements is true about the term Event?


a) A change of state which has significance for the management of a Configuration Item or IT service.

b) The term Event is also used to mean an Alert or notification created by any IT Service,configuration
Item or Monitoring tool.

c) Events typically require IT Operations personnel to take actions,and often lead to Incidents being
logged

d) All of above

Question48 of 50

Which of the following statements about Supplier and Contract Database (SC are correct?

1. A database or structured Document used to manage Supplier Contracts throughout their Lifecycle.

2. The SCD contains key Attributes of all Contracts with Suppliers

3. Its never part of the Service Knowledge Management System.

4. Maintaining it is responsibility of Supplier management process

a) 1 & 2 only

b) 1,2 & 3

c) 1,2 & 4

d) All of above

Question49 of 50

In which core publication can you find detailed descriptions of the following?

1. Service Portfolio Management

2. Demand Management

3. Financial Management

a) Service Operations
b) Service Strategy

c) Service Transition

d) Continual Service Improvement

Question50 of 50

Why is baseline established?

a) To standardize operation

b) For knowing the cost of services provided

c) For clear roles and responsibility

d) Comparing at a later point in time.

Set 9:

Jan 31 2013 | Logged in as : 219731Time remaining: 01:34:22Block 2 of 3

Question1 of 50

You suspect that a stale record is incorrectly returned by your internal DNS server, and you wish to
empty the server cache. Which ONE of the following action will achieve this?

a) The ipconfig /flushdns command on the server

b) The ipconfig /flushdns command on the client

c) Restart the DNS service on the server

d) All of them
Ans-b

Question2 of 50

Which ITIL process handles the implementation of the policy for access management and access to
information systems?

a) Availability Management

b) Incident Management

c) Release Management

d) Security Management

Ans-d

Question3 of 50

Your network contains an Active Directory domain named contoso.com. The network has DirectAccess
deployed. You deploy a new server named Server1 that hosts a management application. You need to
ensure that Server1 can initiate connections to DirectAccess client computers. Which settings should you
modify from the DirectAccess Setup console?

a) Application Servers

b) DirectAccess Server

c) Infrastructure Servers

d) Remote Clients

Ans-c
Question4 of 50

You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
Occasionally, users report that they cannot connect to the terminal server. You need identify user
accounts that have multiple Terminal Services connections to Server1. Which tool should you use?

a) Remote Desktop

b) Terminal Server Licensing

c) Terminal Services Configuration

d) Terminal Services Manager

Ans-d

Question5 of 50

You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?

a) From Terminal Services Manager, create a new group.

b) From Terminal Services Manager, delete the inactive sessions.

c) From Terminal Services Configuration, modify the RDP-Tcp settings.

d) From Terminal Services Configuration, modify the User logon mode setting

Ans-c

Question6 of 50
Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?

a) Configure a secondary zone on the DNS server in the branch office

b) Configure a stub zone on the DNS server in the branch office

c) Configure a stub zone on the DNS server in the main office

d) Configure a primary zone on the DNS server in the branch office

Ans-b

Question7 of 50

Which tools can you use to manage printers on Windows 2000/2003 computers?

a) The Printers Folder

b) Internet Explorer

c) Internet Services Manager

d) 1 and 2

Ans-a

Question8 of 50
You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). You need to track the
amount of disk space used by each user on the server. What should you do?

a) From Performance console, create a counter log.

b) From the properties of each volume, enable quotas.

c) From the Event Viewer console, create a new log view.

d) From the Local Security Policy, enable auditing for object access.

Ans-b

Question9 of 50

Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode
enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are
displayed. What should you do?

a) Disable referrals

b) Modify the system access control list

c) Enable access-based enumeration (ABE)

d) Modify the discretionary access control list

Ans-c

Question10 of 50

What is a MAC address in an Ethernet network?


a) The address assigned by DHCP

b) A TCP/IP address

c) The physical address assigned by the NIC manufacturer

d) A logical address created by the network administrator

Ans-c

Question11 of 50

Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB
of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to
prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS
replication traffic is minimized. Which tool should you use to prestage the Folder1 data?

a) Dfscmd

b) Dfsrmig

c) Dfsutil

d) Wbadmin

Ans-d

Question12 of 50
Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?

a) Start the computer in Safe Mode, and reformat the hard disk

b) Start the computer in debug mode, and reformat the hard disk

c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor

d) Start the computer by using the Windows Server 2003 CD-ROM

Ans-c

Question13 of 50

You want to see if any broken links are there in your Web site. Which tool do you use?

a) NT Explorer

b) Site Server Express

c) User Manager

d) Performance Monitor

Ans-b

Question14 of 50
Which command launches the file signature verification tool that is used to identify unsigned drivers
installed on a windows 2003 Server?

a) Winmsexe

b) Fsutil.exe

c) Sigverif.exe

d) Regedit.exe

Ans-c

Question15 of 50

Your network contains two servers named Server1 and Server2 that run Windows Server 2008.
Microsoft System Center Operations Manager (SCOM) 2007 is installed on Server2. The Hyper-V role is
installed on Server1. Server1 hosts five child virtual machines that run Windows Server 2003. You need
to recommend a solution that enables administrators to monitor the child virtual machines. The solution
must gather the following data from the virtual machines: Performance statistics Event data from the
application log What should you recommend?

a) On Server1, install a SCOM agent

b) On each child virtual machine, install a SCOM agent

c) On Server2, install the Microsoft Virtual Server 2005 R2 Management Pack

d) On Server2, install Microsoft System Center Virtual Machine Manager (SCVMM) 2007

Ans-b

Question16 of 50
Which of the following is a transport-layer protocol?

a) NetBEUI

b) NetBIOS

c) NDOS

d) PPP

Ans-a

Question17 of 50

The rights required to share a folder on a domain controller for a user jack is

a) Jack should be member of power users

b) Jack should be member of server operators

c) Jack should be member of domain controller

d) Jack should be member of Print operators

Ans-c

Question18 of 50
You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?

a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.

b) Restore the Documents and Settings folder that contains the WorkProduct folder.

c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.

d) Restore Peters WorkProduct folder, and choose the original location for the restoration.

Ans-d

Question19 of 50

When connecting IIS to an external data source through ODBC (Open Data Base Connector), which type
of ODBC DSN must be specified?

a) System

b) File

c) Server

d) User

Ans-a

Question20 of 50
How would you back up a Certificate Authority installation?

a) Use the certutil -backup command

b) Perform a Copy backup

c) Create a new AD DS snapshot

d) Use the certmgmt -backup command

Ans-a

Question21 of 50

Your network contains a server that has the SNMP Service installed. You need to configure the SNMP
security settings on the server. Which tool should you use?

a) Local Security Policy

b) Scw

c) Secedit

d) Services Console

Ans-d

Question22 of 50

Which of the following categories for UTP has the least expensive cable?
a) 1

b) 2

c) 3

d) 4

Ans-d

Question23 of 50

Which of the following will complete the Four Ps of Service Design? 1. Perspectives 2. Positioning 3. Plan
4. ???

a) People

b) Product

c) Patterns

d) Partners

Ans-c

Question24 of 50

The primary goal of which process is to provide the rights for users to be able to access a service or
group of services,while preventing access to non-authorized users.
a) Configuration Management

b) Availability Management

c) Access Management

d) Change Management

Ans-c

Question25 of 50

What is the default share permissions when creating a new share in Microsoft Windows Server?

a) Everyone Group will get no access.

b) Everyone Group will get read access.

c) Everyone Group will get full control.

d) Everyone Group will get special permissions.

Ans-b

Question26 of 50

Which of the following is the most appropriate approach to carrying out Service Operations?

a) The internal IT view is most important as Service Operations has to monitor and manage the
infrastructure
b) Service Operations should maintain a balance between an internal IT view and an external business
view

c) The external business view is most important as Service Operations is the place where value is
realized and the customer obtains the benefit of the services

d) IT Operations does not take an internal or external view as they execute processes defined by Service
Design

Ans-b

Question27 of 50

You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?

a) Configure the Online Responder Role Service on a member server

b) Configure the Online Responder Role Service on a domain controller

c) Configure the Certification Authority Web Enrollment Role Service on a member server

d) Configure the Certification Authority Web Enrollment Role Service on a domain controller

Ans-c

Question28 of 50

Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core? If yes, how can you use it for remote management?
a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core

b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core

c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core enable by using the SConfig tool.

d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core and enable by using the SConfig tool.

Ans-d

Question29 of 50

ITIL V3 talks about "aligning IT with business".

a) TRUE

b) false

Ans-b

Question30 of 50

Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?

a) From HyperV Manager, reset VM1

b) Run the ExportVM PowerShell cmdlet


c) Run the UnmountVHD PowerShell cmdlet

d) From HyperV Manager, pause VM1

Ans-d

Question31 of 50

Which network service must be present to use RIS?

a) Telnet

b) DHCP

c) BOOTP

d) RAS

Ans-b

Question32 of 50

What type of disk partition must be used to boot an operating system?

a) Level0

b) Extended

c) Level1

d) Primary
Ans-d

Question33 of 50

You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?

a) Windows Explorer

b) Efsinfo

c) Syskey

d) Cipher

Ans-d

Question34 of 50

Your network contains a computer named Computer1. Computer1 is assigned an IP address of


192.168.1.112/26. Your companys corporate policy states that the first usable address in each subnet is
allocated to the default gateway. You need to configure the default gateway for Computer1.

Which address should you choose?

a) 192.168.1.1

b) 192.168.1.63

c) 192.168.1.65

d) 192.168.1.93

Ans-c
Question35 of 50

You have been given a task to set per user 10 GB of Hard disk space on a file server. How you will do
this?

a) Ensure the File system on the File server is FAT

b) Ensure File System on the File server is NTFS

c) Enable Disk quota and set 10 GB for each user

d) All the Above

Ans-c

Question36 of 50

How can you ensure that an application installed on a computer running Terminal Services can support
multiple users?

a) Use the Qappsrv command.

b) Use the Change logon command.

c) Use the Chguser command.

d) Use the Mstsc command.

Ans-a

Question37 of 50
Windows clustering provides which of the following benefits?

a) High-availability

b) Network load balancing

c) Component load balancing

d) All of the above

Ans-d

Question38 of 50

To resolve host name to IP address DNS server will use

a) Forward zone

b) Reverse zone

c) Forward lookup zone

d) Reverse lookup zone

Ans-d

Question39 of 50

What is the Kerberos version used in windows 2008?


a) 5

b) 6

c) 7

d) 4

Ans-a

Question40 of 50

A 10BaseT network must be terminated with (?)-ohm terminators.

a) 50

b) 58

c) 75

d) None of the above

Ans-d

Question41 of 50

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:

- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.

- The number of virtual network connections must be minimized.

What should you do?


a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network

b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network

c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network

d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network

Ans-b

Question42 of 50

Which of the following media has the highest EMI?

a) UTP

b) STP

c) Coaxial cable (thin)

d) Radio

Ans-d

Question43 of 50

In windows 2003 which of the following version supports 64bit?


a) Web Edition

b) Standard Edition

c) Enterprise Edition

d) Both Web and Standard Edition

Ans-c

Question44 of 50

You have a DHCP server that runs Windows Server 2008 R2. You need to reduce the size of the DHCP
database. What should you do?

a) From the DHCP snap-in, reconcile the database

b) From the folder that contains the DHCP database, run jetpack.exe dhcp.mdb temp.mdb

c) From the properties of the dhcp.mdb file, enable the File is ready for archiving attribute

d) From the properties of the dhcp.mdb file, enable the Compress contents to save disk space attribute

Ans-b

Question45 of 50

You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual
machine. You configure the virtual machine to use the physical network card of the host server. You
notice that you are unable to access network resources from the virtual machine. You need to ensure
that the virtual host can connect to the physical network. What should you do?
a) On the host server, install the Microsoft Loopback adapter

b) On the host server, enable the Multipath I/O feature

c) On the virtual machine, install the Microsoft Loopback adapter

d) On the virtual machine, install Microsoft Hyper-V Integration Components

Ans-d

Question46 of 50

You are the network administrator for TestKing. TestKing is deploying a public Web server farm on
Windows Server 2008 computers. This Web server farm will allow the public to view company
information. The Web servers in the Web server farm will be placed in TestKings perimeter network,
which uses a public Internet address space. TestKing wants to reduce the probability of external
unauthorized users breaking into the public Web servers. You need to make the Web servers less
vulnerable to attack. You also want to ensure that the public will be able to view information that is
placed in TestKings perimeter network. What should you do?

a) Configure each Web servers IP address to a private reserved Internet address

b) Configure the Web servers to allow only IPSec communications

c) Disable any unneeded services on the Web servers

d) Disable TCP/IP filtering on all adapters in the Web servers

Ans-b

Question47 of 50

To configure Network printer which port we have to select


a) LPT port

b) Network Port

c) TCP/IP port

d) Standard TCP/IP port

Ans-d

Question48 of 50

Your network consists of one Active Directory forest that contains one root domain and 10 child
domains. Administrators of the child domains frequently modify the records for authoritative DNS
servers for the child domain DNS zones. You need to recommend a solution to minimize the amount of
manual configuration steps required to maintain name resolution on the network. What should you
recommend?

a) On the child domain DNS servers, create stub zones for the root domain zone

b) On the child domain DNS servers, configure conditional forwarders for the parent domain

c) On the root domain DNS servers, configure delegation subdomain records for the child domains

d) On the root domain DNS servers, create stub zones for the child domain zones

Ans-d

Question49 of 50

You manage a server that runs Windows Server 2008 R2. The D:\Payroll folder is corrupted. The most
recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:\Payroll folder back
to the most recent backup version without affecting other folders on the server. What should you do on
the server?
a) Run the Recover d:\payroll command

b) Run the Wbadmin restore catalog -backuptarget:D: -version:10/29/2007-09:00 -quiet command

c) Run the Wbadmin start recovery -backuptarget:D: -version:10/29/2007-09:00 -overwrite -quiet


command

d) Run the Wbadmin start recovery -version:10/29/2007-09:00 -itemType:File -items:d:\Payroll -


overwrite -recursive -quiet command

Ans-d

Question50 of 50

All domain controllers run Windows Server 2008. You need to prepare the environment to provide a
high-availability solution for a back-end Microsoft SQL Server 2005 data store. What should you do?

a) Install a Windows Server 2003 Network Load Balancing cluster.

b) Install a Windows Server 2008 Network Load Balancing cluster.

c) Install a Windows Server 2008 failover cluster that has shared storage.

d) Install a Windows Server 2008 failover cluster that has direct attached storage.

Ans-c

Set3:

Question1 of 50

Which of the following is NOT a step in the Continual Service Improvement (CSI) model?

a) What is the vision?


b) Did we get there?

c) Is there budget?

d) Where are we now?

ANS: C

Question2 of 50

Your network contains a file server named Server1 that runs Windows Server 2008 R2. You have a folder
named Folder1. You need to ensure that files in Folder1 that are older than 365 days are automatically
moved to an archive folder. What should you create from the File Server Resource Manager console?

a) a file group

b) a file screen

c) a file management task

d) a quota

ANS: C

Question3 of 50

Which of the following media has the highest EMI?

a) UTP

b) STP

c) Coaxial cable (thin)

d) Radio

ANS: D

Question4 of 50

The Active Directory requires which of the following?

a) TCP/IP and DHCP

b) TCP/IP and DNS

c) DNS and NetBIOS

d) DNS and DHCP


ANS: B

Question5 of 50

Microsoft IIS7.0 doesn’t support which of the following service.

a) News

b) Mail

c) Gopher

d) WWW

ANS: D

Question6 of 50

Your network consists of one Active Directory domain. All servers run Windows Server 2008. You need
to plan access restriction policies for the network. The plan must support the following restrictions: Only
computers that run Windows Vista must be able to access the network. Only computers that have
Windows Firewall enabled must be able to access the network. What should you include in your plan?

a) Implement Authorization Manager

b) Implement Network Access Protection (NAP) on a single server in the domain

c) Create a Group Policy object (GPO) linked to the domain. Enable the Windows Firewall settings in the
GPO

d) Create a Group Policy object (GPO) linked to the Domain Controllers organizational unit (OU). Enable
the Windows Firewall settings in the GPO

ANS: B

Question7 of 50

Which of the following categories for UTP has the least expensive cable?

a) 1

b) 2

c) 3

d) 4

ANS: D
Question8 of 50

Your network contains a single Active Directory domain named contoso.com. The domain contains a
DNS server named Server1 that hosts the contoso.com zone. The network is connected to the network
of a partner company. The partner companys network contains a DNS server that hosts a zone named
nwtraders.com. You need to ensure that computers in contoso.com can resolve the names of computers
in nwtraders.com. The solution must not require any changes to the zone configuration of
nwtraders.com. What should you configure on Server1?

a) a conditional forwarder

b) a GlobalNames zone

c) a secondary zone

d) a zone delegation

ANS: A

Question9 of 50

Which of the following events in Event Viewer would warrant immediate attention from a user or
administrator?

a) Error

b) Information

c) Warning

d) Both A and C

ANS: D

Question10 of 50

Which of the following is not part of the 5 core volumes of ITIL V3?

a) Service Strategy

b) Service Strategic Design

c) Service Operation

d) Continual Service Improvement

ANS: C

Question11 of 50
How does an organization use Resources and Capabilities in creating value?

a) They are used to create value in the form of output for production management

b) They are used to create value in the form of goods and services

c) They are used to create value to the IT organization for Service Support

ANS: A

Question12 of 50

Which tools can be used to convert a disk from basic to dynamic?

a) Disk defragmenter snap-in

b) Diskpart.exe

c) Disk management snap-in

d) None of the above

ANS: C

Question13 of 50

You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?

a) Configure the Disk Quota and file screening policy.

b) Recommen for thirdparty file server solution like filers and configure the policy.

c) Control the usage through disk quota and access control.

d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.

ANS: D

Question14 of 50

You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. Network Administrator decides to implement a floorwise VLAN and asked you to configure
the DHCP structure accordingly. You have a Windows 2008 DHCP Server in 10.0.10.x segment.Now you
need to ensure that users in other segment like 10.0.11.X , 10.0.12.X ,10.0.13.x can get the IP address
from DHCP Server.

a) Install and configure a Windows 2008 Server in each VLAN as a DHCP Server for respective VLAN.
b) Ask your Network Administrator to configure the static routing between all VLANs to communicate
wih DHCP Server.

c) Install and configure the DHCP relay agent and configure the DHCP Server with scope for all VLAN.
Relay agent will ensure the DHCP service to all VLAN clients.

d) Configure the DHCP in router

ans c

Question15 of 50

which service helps in resolving NetBIOS name into IP address

a) DHCP

b) DFS

c) WINS

d) IIS

Question16 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. You plan to create an
image of Server1 to deploy to additional servers. You need to identify how many more times you can
rearm the Windows activation clock. What should you run on Server1?

a) msinfo32.exe

b) slmgr.vbs /dlv

c) slui.exe

d) winrm.vbs enumerate

Question17 of 50

You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?
a) Assign each office a new class C private IP address range

b) Assign each office a new class B private IP address range

c) Assign each office a subnet from a new class B private IP address range

d) Assign each office a subnet from the current class C private IP address range

ans d

Question18 of 50

The interface which guides a user through a RIS installation is called?

a) Client Installation Wizard (CIW)

b) Remote Server Wizard (RSW)

c) Remote Client Wizard (RCW)

d) Remote Operating System Installation (ROSI)

Question19 of 50

The counter logs in windows 2003 are used to

a) To gather the performance of the subsystems over a period of time

b) To measure the performance of the objects under peak loads

c) Measure the performance of objects on the current activity

d) All the options

Question20 of 50

Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is
deployed on the network. Server1 will be used to collect events from the Security event logs of the
other servers on the network. You need to define the Custom Event Delivery Optimization settings on
Server1. Which tool should you use?

a) Event Viewer

b) Task Scheduler

c) Wecutil

d) Wevtutil
Question21 of 50

Which ONE of the following is a valid reason to implement a subordinate CA?

a) Improve security of your CA system

b) Implement a CA system that is free from single points of failure

c) Both A & B

d) Neither A nor B

ans c

Question22 of 50

You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?

a) Attrib.exe

b) Cacls.exe

c) Dsacls.exe

d) Dsmod.exe

Question23 of 50

Which security model is used in a peer-to-peer network?

a) Access Control Lists (ACLs)

b) Access Control Entries (ACEs)

c) Password-protected Shares

d) Share-level Security

ans d(not sure)

Question24 of 50

You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?

a) Windows Explorer
b) Efsinfo

c) Syskey

d) Cipher

ans d

Question25 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN
packets. The solution must minimize the amount of data collected. What should you do?

a) From RRAS, create an inbound packet filter

b) From Network Monitor, create a capture filter

c) From the Registry Editor, configure file tracing for RRAS.

d) At the command prompt, run netsh.exe ras set tracing rasauth enabled

Question26 of 50

Your network contains a Windows Server Update Services (WSUS) server. You need to ensure that the
WSUS server automatically downloads service packs. What should you do first?

a) From the Automatic Approvals options, modify the Update Rules list

b) From the Automatic Approvals options, modify the Advanced settings

c) From the Products and Classifications options, modify the Products settings

d) From the Products and Classifications options, modify the Classifications settings

Question27 of 50

You have multiple client computers on which you need to deploy the same image by using multicast.
Some of these computers are slower than others. Will slow clients bring down the speed of multicast
transmission?

a) No, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed
b) Yes, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed

c) Yes, WDS in Windows Server 2008 has the ability to divide multicast transmissions into multiple
streams based on the client speed

d) No, WDS in Windows Server 2008 Standard edtion has the ability to divide multicast transmissions
into multiple streams based on the client speed

Question28 of 50

What is the primary purpose of an ACL?

a) It controls access to resources.

b) It explicitly allows or denies access to a particular resource.

c) It explicitly defines users and their respective access rights to a particular resource.

d) All of them

Question29 of 50

You have Server that runs Windows 2008.You need to prevent the Server from establishing
communication session to other computers using TCP port 25. What should you do?

a) From Windows firewall add an exception

b) From Windows firewall,enable the block all incoming connection option.

c) From Windows firewall with advanced security snap-in create an inbound rule.

d) From Windows firewall with advanced security snap-in create an outbound rule.

Question30 of 50

Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote
Assistance connections to all computers without a Remote Assistance invitation. Which group policy
setting should you configure?

a) Offer Remote Assistance

b) Solicited Remote Assistance

c) Allow users to connect remotely using Terminal Services

d) Sets rules for remote control of Terminal Services user sessions

Question31 of 50
You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?

a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.

b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.

c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.

d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.

Question32 of 50

Network contains a DNS server that runs a Server Core installation of Windows Server 2008. The domain
administrators use client computers that run Windows Vista. You need to recommend a strategy that
allows the administrators to manage DNS from their Windows 7 client computers. What should you
recommend?

a) On the DNS server, set the Remote Access Connection Manager service to automatic.

b) On the Windows Vista client computers, install Remote Server Administration Tools (RSAT).

c) On the Windows Vista client computers, run Setup.exe /u from the Windows Server 2008 installation
media.

d) On the Windows Vista client computers, create a custom Microsoft Management Console, and then
add the Component Services snap-in.

Question33 of 50

The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?

a) Certification Authority snap-in

b) Certificates snap-in

c) Certificate Templates snap-in

d) Windows Backup
Question34 of 50

What is the default share permissions when creating a new share in Microsoft Windows Server?

a) Everyone Group will get no access.

b) Everyone Group will get read access.

c) Everyone Group will get full control.

d) Everyone Group will get special permissions.

Question35 of 50

Your network contains a server that has the HyperV server role installed. The server hosts a virtual
machine (VM) named VM1. VM1 runs Windows Server 2008 R2 and has the file server role installed. You
need to add more disk space to VM1. The solution must minimize the amount of downtime for VM1.
What should you do first on VM1?

a) Add a virtual disk to IDE controller 0

b) Add a virtual disk to the SCSI controller

c) Add a virtual disk to IDE controller 1

d) Add a passthrough disk to IDE controller 0

Question36 of 50

Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is paused critical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?

a) Change the VHD type of VM1

b) Delete the .avhd files for VM1

c) Increase the free disk space on drive D

d) Increase the free disk space on drive C

Question37 of 50
You manage a member server that runs Windows Server 2008. The server runs the Terminal Server
Gateway (TS Gateway) role service. You need to find out whether a user named User1 has ever
connected to his office workstation through the TS Gateway server. What should you do?

a) View the events in the Monitoring folder from the TS Gateway Manager console.

b) View the events in the Monitoring folder from the TS Gateway Manager console.

c) View the Event Viewer Application log.

d) View the Event Viewer Terminal Services-Gateway log.

Question38 of 50

Windows clustering provides which of the following benefits?

a) High-availability

b) Network load balancing

c) Component load balancing

d) All of the above

Question39 of 50

You have prepared a standard workstation image for your environment and now you want to deploy the
image to multiple computers. What should you do?

a) first need to generalize the workstations by using computer management Then, prepare a capture
media on the WDS server and then boot the workstation with the capture media.

b) first need to generalize the workstations by using ndtsutil Then, prepare a capture media on the WDS
server and then boot the workstation with the capture media.

c) first need to generalize the workstations by using Sysprep. Then, prepare a capture media on the
WDS server and then boot the workstation with the capture media.

d) first need to generalize the workstations by using dcdiag Then, prepare a capture media on the WDS
server and then boot the workstation with the capture media.

Question40 of 50

Which of the following server service is not provided by Windows 2000?

a) Print Server

b) File Server
c) Application Server

d) Web Server

ans c

Question41 of 50

Your network contains an Active Directory domain named contoso.com. The domain contains two
domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 hosts a primary zone for
contoso.com. DC2 hosts a secondary zone for contosto.com. You need to ensure that DNS zone data is
encrypted when the data replicates across the network. DC2 must provide authoritative responses to
client computers. What should you do?

a) Convert the contoso.com zone to an Active Directory-integrated zone

b) Configure the contoso.com zone to use DNSSEC

c) Create a new delegation in the contoso.com zone

d) Modify the zone transfer settings of the contoso.com zone

Question42 of 50

Which of the following is NOT an advantage of organizing Continual Service Improvement (CSI) using the
RACI model?

a) Facilitates clear communication and workflow practice across all parties involved in the CSI program

b) Clarifies the roles and responsibilities of individual in the CSI program which could otherwise be
overlapping and confusing

c) Identifies where internal Service Level Agreements (SLAs) can be established to implement CSI

d) Provides a clear focus for matching the CSI processes to financial planning

ans d

Question43 of 50

You are the network administrator for TestKing.com. The network consists of a single Active Directory
domain named testking.com. All network servers run Windows Server 2003, and all client computers run
Windows XP Professional. XML Web services for the internal network run on a member server named
TK1, which is configured with default settings. You are a member of the local Administrators group on
TK1.
You need the ability to remotely manage TK1. You have no budget to purchase any additional licensing
for your network until the next fiscal year. How should you reconfigure TK1?

a) In the System Properties dialog box, enable Remote Desktop

b) Add your user account to the Remote Desktop Users local group

c) In the System Properties dialog box, enable Remote Assistance

d) Install Terminal Services by using Add or Remove Programs

ans a

Question44 of 50

Which of the following statements about Supplier Management is INCORRECT?

a) Supplier Management negotiates internal and external agreements to support the delivery of
services

b) Supplier Management ensures that suppliers meet business expectations

c) Supplier Management maintains information in a Supplier and Contracts Database

d) Supplier Management should be involved in all stages of the service lifecycle,from Strategy through
Design and Transition to Operations and Improvement

ans a

Question45 of 50

Assume that you are the administrator of your companys network, which serves a single site with 150
users. The network includes eight servers running Windows 2008 servers. One server hosts your internal
web site. All servers have static IP addresses in the range from 10.1.1.2 through 10.1.1.10. All client
computers run Windows XP Professional and are DHCP clients, using an address range of 10.1.1.11
through 10.1.1.200. You need to provide internet access to internal users. To do so, you plan to use a
pool of 100 IP addresses supplied by a contracted internet service provider. Your solution must involve
the least possible administrative effort. What should you do? a) Allow all client computers to use
automatic Private IP addressing for IP address assignment. Configure all servers to use static IP
addresses in the 192.168.0.0 subnet.

b) Install a server for network address translation. Add the IP address of the private interface of this
server to the excluded range on your DHCP server. Change the IP address of the private interface for the
network address translation protocol to 10.1.1.201.
c) Install a server for network address translation and enable the default DHCP allocator. Add the
existing server addresses to the excluded range. Change the IP address of the private interface for the
network Address Translation protocol to 10.1.1.201

d) Map internal addresses and port numbers of your servers to the pool of IP addresses and port
numbers assigned by your internet service provider.

Question46 of 50

What network evolved from the Defense Departments ARPANET?

a) MILNET

b) ARP/RARP

c) TCP/IP

d) Internet

Question47 of 50

You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are
configured as DNS servers. The domain contains one Active Directory-integrated DNS zone. You need to
ensure that outdated DNS records are automatically removed from the DNS zone. What should you do?

a) From the properties of the zone, disable dynamic updates

b) From the properties of the zone, enable scavenging

c) From the properties of the zone, modify the TTL of the SOA record

d) From the command prompt, run ipconfig /flushdns

Question48 of 50

You manage a server that runs Windows Server 2008 R2. The D:\Payroll folder is corrupted. The most
recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:\Payroll folder back
to the most recent backup version without affecting other folders on the server. What should you do on
the server? a) Run the Recover d:\payroll command

b) Run the Wbadmin restore catalog -backuptarget:D: -version:10/29/2007-09:00 -quiet command

c) Run the Wbadmin start recovery -backuptarget:D: -version:10/29/2007-09:00 -overwrite -quiet


command

d) Run the Wbadmin start recovery -version:10/29/2007-09:00 -itemType:File -items:d:\Payroll -


overwrite -recursive -quiet command
Question49 of 50

Your network contains two servers that run Windows Server 2008 R2. The servers are located on
different IP subnets. You plan to configure the servers in a two node failover cluster. You need to select
the quorum model for the cluster. The solution must ensure that users can access the cluster resources
if a single node fails. Which quorum model should you select?

a) No Majority: Disk Only

b) Node and File Share Majority

c) Node and Disk Majority

d) Node Majority

Question50 of 50

You have recently created and distributed RDP files for a certain RemoteApp program. However, you
find that the application performs poorly and needs to be migrated to a more powerful server. What
should you do to ensure that users can connect to the RemoteApp program after it is migrated?

a) Create a new TS Web Access site for the new terminal server and publish the application to the new
site and Re-create an RDP file for the RemoteApp program after the migration and distribute the file to
users

b) TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so that the
server name listed is the new terminal serve

c) Modify the properties of the existing RDP file and re-distribute the file to users

d) All the above

ans a and b

http://www.aiotestking.com/microsoft/2011/08/what-should-you-do-662/

Set 9:

Question1 of 50

You need to configure a static IPv6 address for a server that runs a Server Core installation of Windows
Server 2008 R2. Which tool should you use?

a) ocsetup
b) netsh

c) servermanagercmd

d) Ipconfig

Question2 of 50

What network component will holds the Physical Address?

a) Client

b) Service

c) Protocol

d) NIC

Question3 of 50

Which of the following categories for UTP has the least expensive cable?

a) 1

b) 2

c) 3

d) 4

Question4 of 50

Which coaxial cable type would be used with Thicknet?

a) RG-8

b) RG-11

c) RG-58

d) RG-59
Question5 of 50

What is another name for 10Base5 ?

a) Baseband

b) Broadband

c) Thicknet

d) Thinnet

Question6 of 50

Which layer(s) of the OSI model is/are included in the NDIS specification?

a) 1

b) 2

c) 3

d) 4

Question7 of 50

Which IEEE standard defines internetworking and the OSI model?

a) 802.1

b) 802.2

c) 802.3

d) 802.4

Question8 of 50

Which of the following is a transport-layer protocol?

a) NetBEUI
b) NetBIOS

c) NDOS

d) PPP

Question9 of 50

Assume that You are the network administrator for Miracleinfocom. All client computers on the
network run Windows NT Workstation 4.0. The new written company network policy requires you to
change all network computers from static IP configuration to dynamically assigned IP configuration. The
network policy requires a Windows Server 2003 DHCP server to dynamically assign the addresses. You
anticipate the possibility that some of the client computers in the company will be overlooked and will
continue to use static IP configuration. If this occurs, you want to ensure that the DHCP server will not
lease an address that is already statically configured on another computer. You want to configure the
DHCP servers to lease only IP addresses that are not already in use. Also, you do not want to increase
network traffic any more than necessary, and you want to minimize the amount of time DHCP clients
wait for an IP address lease. What should you do?

a) Configure the DHCP server Conflict detection attempts to 1.

b) Configure the DHCP server Conflict detection attempts to 3.

c) Configure client reservations for each client computer MAC address.

d) Activate and reconcile the scopes.

Question10 of 50

You have a DHCP server named Server1 and an application server named Server2. Both servers run
Windows Server 2008 R2. The DHCP server contains one scope. You need to ensure that Server2 always
receives the same IP address. Server2 must receive its DNS settings and its WINS settings from DHCP.
What should you do?

a) Create a multicast scope

b) Create a DHCP reservation in the DHCP scope

c) Create an exclusion range in the DHCP scope

d) Assign a static IP address to Server2


Question11 of 50

Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. You need to
ensure that DNS1 only responds to DNS queries from computers that are located in the same subnet.
What should you configure?

a) Interfaces from DNS Manager

b) Security from DNS Manager

c) Trust Anchors

d) Windows Firewall

Question12 of 50

Which network ports must be open between external and internal DNS servers for external name
resolution to function properly?

a) 53/tcp and 135/tcp

b) 53/udp and 139/tcp

c) 53/tcp and 53/udp

d) 53/udp and 135/tcp

Question13 of 50

You want to ensure that DNS zone content is secured and that no user can write to DNS zones. How
should you configure your zones?

a) Secondary

b) Caching

c) Stub

d) AD-integrated

Question14 of 50

Your network contains an Active Directory domain named contoso.com. The domain contains two
domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 hosts a primary zone for
contoso.com. DC2 hosts a secondary zone for contosto.com. You need to ensure that DNS zone data is
encrypted when the data replicates across the network. DC2 must provide authoritative responses to
client computers. What should you do?

a) Convert the contoso.com zone to an Active Directory-integrated zone

b) Configure the contoso.com zone to use DNSSEC

c) Create a new delegation in the contoso.com zone

d) Modify the zone transfer settings of the contoso.com zone

Question15 of 50

What type of DNS domain microsoft.Com is?

a) Second-level domain

b) Root domain

c) Top-level domain

d) Third-level domain

Question16 of 50

You have a WINS server that runs Windows Server 2003 Service Pack 2 (SP2). You need to schedule a
backup of the WINS database whenever the WINS service stops. What should you do?

a) Create a scheduled task that runs Wins.exe.

b) Create a scheduled task that runs Netsh.exe.

c) Modify the General options from the WINS snap-in.

d) Schedule a system state backup by using Windows Backup.

Question17 of 50

NetBEUI could be used in?

a) small, department-sized networks


b) large multi-building networks

c) WANs

d) MANs

Question18 of 50

You want to install Windows XP Professional on 10 non-PXE-compliant computers on the marketing


segment of your network. The 10 computers do not have operating systems installed. You attempt to
load the computers by using an existing RIS image that is on the RIS server. You find that the 10
computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers, including the RIS server. You then check the network servers and find
that the Windows Server 2003 computer running WINS has stopped responding due to hard disk failure.
You want to enable the computers to connect to the RIS server. What should you do?

a) Repair and restart the WINS server.

b) Repair the WINS server and upgrade the server to Windows 2008 Server.

c) Configure the Active Directory server to run DHCP

d) Configure a static entry in WINS that points to the RIS server.

Question19 of 50

You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent
users from establishing multiple Remote Desktop connections to the server. What should you do?

a) Install and configure Terminal Server Licensing.

b) From Terminal Services Manager, modify the user sessions.

c) From Terminal Services Configuration, modify the server settings.

d) From Active Directory Users and Computers, modify the Sessions settings for each user account.

Question20 of 50

The domain contains 13 member servers. The member servers run Windows Server 2003 Service Pack 2
(SP2). The computer accounts for all member servers are located in an organizational unit (OU) named
Servers. You need to prevent remote desktop connections to the member servers. What should you do?
a) On each server, remove all users from the Remote Desktop Users group.

b) On each server, run the Terminal Services Configuration console. From the RDP-TCP connection
permissions properties, set the Full Control permission for the Remote Desktop Users group to deny.

c) Use a Group Policy Object (GPO) to disable the Allow users to connect remotely using Terminal
Services setting.

d) Use a Group Policy Object (GPO) to configure the Sets rules for remote control of Terminal Services
user sessions setting to No Remote Control.

Question21 of 50

You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users
report that they occasionally receive an error message indicating that Terminal Server has reached the
maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop
connections to the concurrently. What should you do?

a) From Add or Remove Programs, add the Terminal Server component.

b) From Add or Remove Programs, add the Connection Point Services component.

c) From the Terminal Services Configuration console, modify the Maximum connections setting.

d) From the Terminal Services Configuration console, modify the Restrict each user to one session
setting.

Question22 of 50

When connecting IIS to an external data source through ODBC (Open Data Base Connector), what type
of ODBC DSN must be specified?

a) System

b) File

c) Server

d) User

Question23 of 50

Which are the IIS services that can use SSL communication?

a) News

b) Mail
c) WWW

d) FTP

Question24 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN
packets. The solution must minimize the amount of data collected. What should you do?

a) From RRAS, create an inbound packet filter

b) From Network Monitor, create a capture filter

c) From the Registry Editor, configure file tracing for RRAS.

d) At the command prompt, run netsh.exe ras set tracing rasauth enabled

Question25 of 50

In windows 2003 which of the following version supports 64bit?

a) Web Edition

b) Standard Edition

c) Enterprise Edition

d) Both Web and Standard Edition

Question26 of 50

To configure Network printer which port we have to select

a) LPT port

b) Network Port

c) TCP/IP port

d) Standard TCP/IP port


Question27 of 50

How you can edit the boot.ini file ?

a) Regedit

b) clicking the Boot.ini tab in the System Configuration Utility window

c) Sysinfo

d) by using the manage computer Properties

Question28 of 50

Which of the following is supported by every version of Windows?

a) FAT 32

b) FAT 16

c) USB

d) NTFS

Question29 of 50

Windows 2003 Standard Edition can support Maximum RAM?

a) 8 GB

b) 5 GB

c) 16 GB

d) 4 GB

Question30 of 50

Your network contains a print server named Server1. Server1 has three shared printers named Printer1,
Printer2, and Printer3. Each shared printer uses a different driver. You need to ensure that if Printer1
causes an exception, users can still print to Printer2 and Printer3. What should you do?

a) Add a driver filter


b) Add a printer filter

c) Modify the print processor options

d) Modify the driver isolation settings

Question31 of 50

Windows 2008 Enterprise Edition can support Maximum Physical Process and RAM?

a) 8 Physical Process and Upto 1TB

b) 8 Physical Process and Upto 2 TB

c) 2 Physical Process and Upto 2 TB

d) 8 Physical Process and Upto 4 TB

Question32 of 50

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?

a) Configure all access points as RADIUS clients to the Remediation Servers

b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)

c) Create a Network Policy that defines Remote Access Server as a network connection method

d) Create a Network Policy that specifies EAP-TLS as the only available authentication method

Question33 of 50

Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?

a) From the Services snap-in, disable the IP Helper


b) From the Services snap-in, disable the Netlogon service

c) From Windows Firewall, enable the Block all connections option on the Public Profile

d) From Windows Firewall, enable the Block all connections option on the Domain Profile

Question34 of 50

You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?

a) Modify the quota template

b) Delete and recreate the quota template

c) Create a new quota template. Modify the quota for each folder

d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders

Question35 of 50

Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?

a) Run the dfscmd.exe \\FS1\dfs /restore command on FS1

b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group

c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group

d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner

Question36 of 50
To Implement the DFS Topology we need to create?

a) DFS link

b) DFS root

c) link replica

d) 1 and 2

Question37 of 50

You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?

a) Configure the Disk Quota and file screening policy.

b) Recommen for thirdparty file server solution like filers and configure the policy.

c) Control the usage through disk quota and access control.

d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.

Question38 of 50

What Command is used to view all the share folders in a system?

a) net share c:

b) net share

c) net share test

d) All the Options

Question39 of 50

Your company uses a Windows 2008 Enterprise certificate authority (CA) to issue certificates. You need
to implement key archival. What should you do?

a) Archive the private key on the server

b) Apply the Hisecdc security template to the domain controllers

c) Configure the certificate for automatic enrollment for the computers that store encrypted files

d) Install an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files
Question40 of 50

The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?

a) Certification Authority snap-in

b) Certificates snap-in

c) Certificate Templates snap-in

d) Windows Backup

Question41 of 50

What is the another name for Raid 1?

a) Stripping

b) Mirroring

c) Hot swappable

d) Warm swappable

Question42 of 50

Your network contains two servers named Server1 and Server2. The network contains a Storage Area
Network (SAN). Server1 and Server2 each connect to two logical unit numbers (LUNs) on the SAN. You
create a failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. One of the LUNs is
used as a witness disk. You plan to create 10 virtual machine (VM) instances in Cluster1. You need to
ensure that each VM instance can be moved between nodes independently of the other VMs. How
should you configure Cluster1?

a) Enable cluster shared volumes

b) Modify the quorum configuration

c) Create a clustered Generic Service instance

d) Create a clustered Microsoft Distributed Transaction Coordinator (MSDT resource


Question43 of 50

Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is pausedcritical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?

a) Change the VHD type of VM1

b) Delete the .avhd files for VM1

c) Increase the free disk space on drive D

d) Increase the free disk space on drive C

Question44 of 50

Which RAID level is also called duplexing?

a) 0

b) 1

c) 3

d) 5

Question45 of 50

Your network contains two servers that have the HyperV server role installed. You install the Failover
Clustering feature on both servers. You add both servers as nodes in the cluster. You need to ensure
that you can perform live migrations of individual virtual machines (VMs) between the nodes. The
solution must minimize the number of volumes required to host the VMs. What should you do first?

a) From Failover Cluster Manager, enable Cluster Shared Volumes

b) From HyperV Manager on each server, modify the default location for the virtual hard disks (VHDs)

c) From Failover Cluster Manager, modify the quorum settings of the cluster
d) From HyperV Manager on each server, modify the default location for the virtual machine
configuration files

Question46 of 50

Incident management is the process responsible for managing the lifecycle of all incidents

a) TRUE

b) FALSE

Question47 of 50

Incidents may be detected or reported by

1. users

2. event monitoring tools

3. technical staff

4. third party like partners/ suppliers etc.,

a) only 1 and 2

b) only 1, 2 and 3

c) only 1 and 3

d) All of the above

Question48 of 50

The purpose of incident management is to

1. restore normal service operation as quickly as possible and minimize adverse impact on business
operations

2. identify the root cause of the incident


a) 1 & 2

b) only 2

c) only 1

d) None of the above

Question49 of 50

User is not available to provide the clarification required for an incident diagnosis. As an Incident
Manager, you would ________

a) highlight it to the Capacity Manager for further investigation

b) highlight it to the Problem Manager so that (s)he can update the problem impact and either reinitiate
or speed up the problem investigation

c) highlight it to the Service Level Manager to call out a risk

d) None of the above

Question50 of 50

Which of the following is NOT one of the ITIL core publications?

a) A)Service Optimization

b) B)Service Transition

c) C)Service Design

d) D)Service Strategy

Set 10:

Feb 21 2013 | Logged in as : 219731Time remaining: 01:34:03Block 2 of 3

Question1 of 50

What is the primary purpose of an ACL?

a) It controls access to resources.

b) It explicitly allows or denies access to a particular resource.


c) It explicitly defines users and their respective access rights to a particular resource.

d) All of them

Question2 of 50

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You perform a
normal backup of Server1 every Saturday. You need to implement a backup strategy for Server1 to meet
the following requirements: Minimize the time required to back up files. On weekdays, back up files that
have changed since the last backup.? Which type of backup should you perform on weekdays?

a) Copy

b) Daily

c) differential

d) Incremental

Question3 of 50

All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows
XP Professional Service Pack 3 (SP3). You need to ensure that users personal settings are the same when
they log on to different client computers in the domain. What should you do?

a) From the properties of each user account, configure a profile path.

b) From the properties of each user account, configure a home folder path

c) From the Default Domain Policy, configure a logon script that runs Loadstate.exe.

d) From the Default Domain Policy, configure a logon script that runs Scanstate.exe.

Question4 of 50

Your network consists of one Active Directory forest that contains 20 domain trees. All DNS servers run
Windows Server 2008. The network is configured as an IPv4 network. Users connect to network
applications in all domains by using a NetBIOS name. You plan to migrate to an IPv6-enabled only
network. You need to recommend a solution to migrate the network to IPv6. The solution must not
require any changes to client computers. What should you recommend?

a) On the DNS servers, add all domain zones to the ForestDNSZones partition
b) On the DNS servers, configure GlobalNames zones

c) On a new server, install and configure a Windows Server 2008 WINS server

d) On a new server, install and configure a Windows Server 2003 WINS server

Question5 of 50

You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. All network servers run Windows Server 2003. Terminal Services installed on three servers
running Windows 2003 Server. Remote users use the terminal servers to access the company intranet so
they can read e-mail and submit time sheets. To make a connection, users choose a terminal server from
a list. This process generates help desk requests. Over time, the remote user load increases. The existing
terminal server cannot support the number of concurrent connections. You need to create a new
terminal server to assist in handling the load. However, you must not add any new server names to the
list of terminal servers. What should you do?

a) Create a Session Directory terminal server farm

b) Configure the Windows Cluster Services on each terminal server

c) Install and configure Network Load Balancing

d) Install and configure round robin DNS

Question6 of 50

Which of the following is NOT one of the ITIL core publications?

a) Service Optimization

b) Service Transition

c) Service Design

d) Service Strategy

Question7 of 50

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server
2008 R2. A server named Server1 has the Windows Deployment Services (WDS) server role installed. A
custom Windows 7 image is available for download from Server1. A server named Server2 has the
Hyper-V server role installed. You create a virtual machine (VM) named VM1 on Server2. You need to
deploy the Windows 7 image from Server1 to VM1. What should you do first?

a) On Server1, configure a multicast transmission


b) On Server1, adjust the PXE Response Delay setting

c) From the properties of VM1, install a legacy network adapter

d) From the properties of VM1, install a synthetic network adapter

Question8 of 50

You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users
report that they occasionally receive an error message indicating that Terminal Server has reached the
maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop
connections to the server concurrently. What should you do?

a) From Add or Remove Programs, add the Terminal Server component.

b) From Add or Remove Programs, add the Connection Point Services component.

c) From the Terminal Services Configuration console, modify the Maximum connections setting.

d) From the Terminal Services Configuration console, modify the Restrict each user to one session
setting.

Question9 of 50

Your company has one office in San Diego and one office in New York. The network consists of one
Active Directory forest that contains one domain named contoso.com and one domain named
newyork.contoso.com. All servers run Windows Server 2008. All domain controllers for contoso.com are
located in San Diego. All domain controllers for newyork.contoso.com are located in New York.
Contoso.com contains two domain controllers named Server1 and Server2. Newyork.contoso.com
contains two domain controllers named Server3 and Server4. All domain controllers host Active
Directory-integrated DNS zones for their respective domains. You need to ensure that users from each
office can resolve computer names for both domains from a local DNS server. What should you do?

a) Create a stub DNS zone for contoso.com on Server3. Create a stub DNS zone for newyork.contoso.
com on Server1

b) Add the contoso.com and the newyork.contoso.com DNS zones to the ForestDNSZones partition

c) Create a standard primary DNS zone named contoso.com on Server3. Create a standard primary DNS
zone named newyork.contoso.com on Server1

d) Configure conditional forwarders on Server1 to point to Server3. Configure conditional forwarders on


Server3 to point to Server1
Question10 of 50

A Windows 2008 cluster that has a quorum based on local disks in each node, rather than a shared disk
is called as?

a) Node Majority Cluster

b) Disk Majority Cluster

c) Node and Disk Majority Cluster

d) None of the above

Question11 of 50

How would you back up a Certificate Authority installation?

a) Use the certutil -backup command

b) Perform a Copy backup

c) Create a new AD DS snapshot

d) Use the certmgmt -backup command

Question12 of 50

You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are
configured as DNS servers. The domain contains one Active Directory-integrated DNS zone. You need to
ensure that outdated DNS records are automatically removed from the DNS zone. What should you do?

a) From the properties of the zone, disable dynamic updates

b) From the properties of the zone, enable scavenging

c) From the properties of the zone, modify the TTL of the SOA record

d) From the command prompt, run ipconfig /flushdns

Question13 of 50
You want to install Windows XP Professional on 10 non-PXE-compliant computers on the marketing
segment of your network. The 10 computers do not have operating systems installed. You attempt to
load the computers by using an existing RIS image that is on the RIS server. You find that the 10
computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers, including the RIS server. You then check the network servers and find
that the Windows Server 2003 computer running WINS has stopped responding due to hard disk failure.
You want to enable the computers to connect to the RIS server. What should you do?

a) Repair and restart the WINS server.

b) Repair the WINS server and upgrade the server to Windows 2008 Server.

c) Configure the Active Directory server to run DHCP

d) Configure a static entry in WINS that points to the RIS server.

Question14 of 50

The software update services is used to deploy ?

a) Service Pack

b) Office package

c) Hot fixes and Service Pack

d) All the options

Question15 of 50

Which layer(s) of the OSI model is/are included in the NDIS specification?

a) 1

b) 2

c) 3

d) 4

Question16 of 50
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the
performance of the VPN server for one day. What should you do?

a) From the Performance console, create a trace log.

b) From the Performance console, create a counter log.

c) Install Network Monitor Tools. From Network Monitor create a new capture.

d) Install Network Monitor Tools. From Network Monitor create a new parser file.

Question17 of 50

What is the middle layer of the OSI reference model?

a) Application

b) Session

c) Transport

d) Data Link

Question18 of 50

The Terminal Services role is installed on the Windows 2008 server. You deploy a new application on the
server. The application creates files that have an extension of .xyz. You need to ensure that users can
launch the remote application from their computers by double-clicking a file that has the .xyz extension.
What should you do?

a) Configure the Remote Desktop Connection Client on the users computers to point to the server

b) Configure the application as a published application by using a Remote Desktop Program file.

c) Configure the application as a published application by using a Windows Installer package file.

d) Configure the application as a published application by using a Terminal Server Web Access Web site.

Question19 of 50

You network contains one Active Directory domain. All domain controllers run Windows Server 2008.
The network has 100 servers and 5,000 client computers. Client computers run either Windows XP
Service Pack 2 (SP2) or Windows Vista Service Pack 1 (SP1). You need to plan the deployment of
Certificate Services on the network to support the following requirements: Automatic certificate
enrollment Supported certificates for all client computers What should you include in your plan?
a) Deploy a stand-alone certification authority (C. Create V2 templates

b) Deploy a stand-alone certification authority (C. Create V3 templates

c) Deploy an enterprise certification authority (C. Create V2 templates

d) Deploy an enterprise certification authority (C. Create V3 templates

Question20 of 50

Which of the following statements is true about Access Management?

a) The Process responsible for allowing Users to make use of IT Services,data,or other Assets.

b) Access Management helps to protect the Confidentiality,Integrity and Availability of Assets by


ensuring that only authorized Users are able to access or modify the Assets.

c) Access Management is sometimes referred to as Rights Management or Identity Management.

d) All of above

Question21 of 50

Windows 2003 Enterprise Edition can support Maximum multiprocessor?

a) 8

b) 32

c) 16

d) 9

Question22 of 50

NetBEUI could be used in?

a) small, department-sized networks

b) large multi-building networks

c) WANs
d) MANs

Question23 of 50

Which coaxial cable type would be used with Thicknet?

a) RG-8

b) RG-11

c) RG-58

d) RG-59

Question24 of 50

You want to ensure that DNS zone content is secured and that no user can write to DNS zones. How
should you configure your zones?

a) Secondary

b) Caching

c) Stub

d) AD-integrated

Question25 of 50

During a RIS installation, after the client system boots, it initiates a-

a) TFTP download

b) DHCP request

c) Telnet Session

d) ROSI protocol

Question26 of 50

What is the maximum segment length on 10Base5 media?


a) 100 meters

b) 185 meters

c) 500 meters

d) 1024 meters

Question27 of 50

Which version of Kerberos protocol we use in Windows 2003?

a) V6

b) V7

c) V9

d) V5

Question28 of 50

The features of NTFS file system are

a) Security

b) Compression

c) Disk quota

d) All the options

Question29 of 50

Your network contains a print server named Server1. Server1 has three shared printers named Printer1,
Printer2, and Printer3. Each shared printer uses a different driver. You need to ensure that if Printer1
causes an exception, users can still print to Printer2 and Printer3. What should you do?

a) Add a driver filter

b) Add a printer filter


c) Modify the print processor options

d) Modify the driver isolation settings

Question30 of 50

Your network consists of one Active Directory domain. All domain controllers run Windows Server 2008.
You need to prepare the environment to provide a high-availability solution for a back-end Microsoft
SQL Server 2005 data store. What should you do?

a) Install a Windows Server 2003 Network Load Balancing cluster

b) Install a Windows Server 2008 Network Load Balancing cluster

c) Install a Windows Server 2008 failover cluster that has shared storage

d) Install a Windows Server 2008 failover cluster that has direct attached storage

Question31 of 50

You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?

a) Assign each office a new class C private IP address range

b) Assign each office a new class B private IP address range

c) Assign each office a subnet from a new class B private IP address range

d) Assign each office a subnet from the current class C private IP address range

Question32 of 50

Which layer(s) of the OSI model is/are included in the NDIS specification?

a) 1

b) 2
c) 3

d) 4

Question33 of 50

Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?

a) Run the dfscmd.exe \\FS1\dfs /restore command on FS1

b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group

c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group

d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner

Question34 of 50

Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 hosts a
shared folder that stores Microsoft Excel spreadsheets. A new Excel spreadsheet is created each day.
You need to ensure that all Excel spreadsheets that are older than one month are automatically moved
to a different folder. What should you do?

a) Create an Active Directory Rights Management Services (AD RMS) policy template

b) Create a quota for the shared folder

c) Create a file management task

d) Modify the archive attribute of the shared folder

Question35 of 50

What network evolved from the Defense Departments ARPANET?


a) MILNET

b) ARP/RARP

c) TCP/IP

d) Internet

Question36 of 50

When connecting IIS to an external data source through ODBC (Open Data Base Connector), what type
of ODBC DSN must be specified?

a) System

b) File

c) Server

d) User

Question37 of 50

DHCP server can provide?

a) IP address to DHCP clients

b) Gateway Address

c) DNS server address

d) All the options

Question38 of 50

Which of the following operating systems is ideal for Web servers?

a) Windows 2003 Server

b) Windows 2000 Professional

c) Windows 2000 Print Server

d) Windows 2000 File Server


Question39 of 50

You want to specify a permanent address for a printer in the first floor through DHCP server . How you
will do it

a) Server options

b) Simple scope

c) Scope options

d) Reserved options

Question40 of 50

You have Server that runs Windows 2008.You need to prevent the Server from establishing
communication session to other computers using TCP port 25. What should you do?

a) From Windows firewall add an exception

b) From Windows firewall, enable the block all incoming connection option.

c) From Windows firewall with advanced security snap-in create an inbound rule.

d) From Windows firewall with advanced security snap-in create an outbound rule.

Question41 of 50

Which Service is mandatory for a File and Print server?

a) File replication service

b) Server

c) Print spooler

d) All the Above

Question42 of 50

You install the Windows Deployment Services (WDS) role on a server that runs Windows Server 2008.
You plan to install Windows 7 on a computer that does not support Preboot Execution Environment
(PXE). You have a Windows 7 image that is stored on the WDS server. need to start the computer to
install the image that is stored on the WDS server. What should you create?

a) a capture image

b) a CD-ROM that contains PXE drivers

c) a discover image

d) an install image

Question43 of 50

Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?

a) 64-bit guest support.

b) On multiprocessor hosts, the ability to assign a host processor to a virtual machine

c) Network load balancing support

d) 64-bit host support

Question44 of 50

Which process reviews Operational Level Agreements (OLAs) on a regular basis?

a) Supplier Management

b) Service Level Management

c) Service Portfolio Management

d) Contract Management

Question45 of 50

In windows 2003 which of the following version supports 64bit?

a) Web Edition

b) Standard Edition

c) Enterprise Edition

d) Both Web and Standard Edition


Question46 of 50

The Design Manager Is responsible for the overall coordination and deployment of quality solution
designs for services and processes. Which of the following are NOT responsibilities included In this role?

a) Produce and maintain all necessary Service Transition Packages

b) Produce quality,secure and resilient designs for new or improved services,technology


architecture,processes or measurement systems that meet all the agreed current and future IT
requirements of the organization

c) Take the overall Service Strategies and ensure they are reflected in the Service Design process and
the service designs that are produced

d) Measuring the effectiveness and efficiency of the Service Design and supporting processes

Question47 of 50

Application Management is NOT responsible for?

a) Documenting and maintaining the technical skills required to manage and support Applications

b) Managing applications through their lifecycle

c) Assisting in the decision to build or buy new software

d) Developing operational functionality required by the business

Question48 of 50

Your company has a main office and two branch offices. Each office has a domain controller and file
servers. Your network consists of a single Active Directory domain. All servers run Windows Server 2008.
You need to plan the deployment of Distributed File System (DFS) to meet the following requirements:
Ensure that users see only the folders to which they have access

Ensure that users can access the data locally

Minimize the bandwidth required to replicate data.


What should you include in your plan?

a) Deploy a domain-based DFS namespace and use DFS Replication. Modify each share to be a hidden
share

b) Deploy a domain-based DFS namespace and use File Replication Service (FRS). Modify each share to
be a hidden share

c) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use File Replication
Service (FRS)

d) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use DFS Replication

Question49 of 50

Which command-line tool would you use to add an instance of AD LDS to an existing Core Server
installation?

a) ADAMInstall.exe

b) ldsinstall.exe

c) oclist.exe

d) ocsetup.exe

Question50 of 50

What is the main purpose of a DNS server?

a) To resolve IPX addresses into NetBIOS names

b) To resolve IP addresses into NetBIOS names

c) To resolve IP addresses into FQDN names

d) To resolve FQDN names into NetBIOS names


Set 11:

Question1 of 50

Another name for 10Base2?

a) Baseband

b) Broadband

c) Thicknet

d) Thinnet

Question2 of 50

Write the name of layer of the OSI model that maintains a connection between nodes?

a) Transport Layer

b) Session Layer

c) Physical Layer

d) Network Layer

Question3 of 50

Your network is connected to the Internet through a firewall. Remote users connect to Microsoft
Windows SharePoint Services (WSS) located on the internal network by using HTTPS. Users require
access to file servers located on the internal network. You need to ensure that remote users can connect
to the file servers. The solution must not require that any additional TCP ports be opened on the
firewall. What should you do?

a) Implement a PPTP virtual private network (VPN) solution

b) Implement an L2TP virtual private network (VPN) solution

c) Implement a Secure Socket Tunneling Protocol (SSTP) virtual private network (VPN) solution

d) Implement a Terminal Services Web Access (TS Web Access) solution


Question4 of 50

Which of the following media has the highest EMI?

a) UTP

b) STP

c) Coaxial cable (thin)

d) Radio

Question5 of 50

CSMA/CD stands for?

a) Complete System for Media Attenuation and Collision Detection

b) Collision Signaling - Message Access / Collision Detection

c) Collision Sense Multiple Access / Common Deferment

d) Carrier Sense Multiple Access/Collision Detection

Question6 of 50

What is the middle layer of the OSI reference model?

a) Application

b) Session

c) Transport

d) Data Link

Question7 of 50

Which IEEE standard defines internetworking and the OSI model?

a) 802.1
b) 802.2

c) 802.3

d) 802.4

Question8 of 50

Assume that you are the administrator of your companys network, which serves a single site with 150
users. The network includes eight servers running Windows 2008 servers. One server hosts your internal
web site. All servers have static IP addresses in the range from 10.1.1.2 through 10.1.1.10. All client
computers run Windows XP Professional and are DHCP clients, using an address range of 10.1.1.11
through 10.1.1.200. You need to provide internet access to internal users. To do so, you plan to use a
pool of 100 IP addresses supplied by a contracted internet service provider. Your solution must involve
the least possible administrative effort. What should you do?

a) Allow all client computers to use automatic Private IP addressing for IP address assignment.
Configure all servers to use static IP addresses in the 192.168.0.0 subnet.

b) Install a server for network address translation. Add the IP address of the private interface of this
server to the excluded range on your DHCP server. Change the IP address of the private interface for the
network address translation protocol to 10.1.1.201.

c) Install a server for network address translation and enable the default DHCP allocator. Add the
existing server addresses to the excluded range. Change the IP address of the private interface for the
network Address Translation protocol to 10.1.1.201

d) Map internal addresses and port numbers of your servers to the pool of IP addresses and port
numbers assigned by your internet service provider.

Question9 of 50

You are working as a system admin in an organization wipro.com, You have received a complaint one of
the client PC could not able to get IP address from the DHCP server. When you checked up DHCP server
you could able to see blue exclamatory marks on the server and scope. What is the reason behind it ?

a) Scope range is medium

b) Scope range is High

c) Scope range is exhausted

d) Scope rage is low


Question10 of 50

You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. Network Administrator decides to implement a floorwise VLAN and asked you to configure
the DHCP structure accordingly. You have a Windows 2008 DHCP Server in 10.0.10.x segment. Now you
need to ensure that users in other segment like 10.0.11.X , 10.0.12.X ,10.0.13.x can get the IP address
from DHCP Server.

a) Install and configure a Windows 2008 Server in each VLAN as a DHCP Server for respective VLAN.

b) Ask your Network Administrator to configure the static routing between all VLANs to communicate
wih DHCP Server.

c) Install and configure the DHCP relay agent and configure the DHCP Server with scope for all VLAN.
Relay agent will ensure the DHCP service to all VLAN clients.

d) Configure the DHCP in router

Question11 of 50

Your network contains a single Active Directory domain named contoso.com. The domain contains a
DNS server named Server1 that hosts the contoso.com zone. The network is connected to the network
of a partner company. The partner companys network contains a DNS server that hosts a zone named
nwtraders.com. You need to ensure that computers in contoso.com can resolve the names of computers
in nwtraders.com. The solution must not require any changes to the zone configuration of
nwtraders.com. What should you configure on Server1?

a) a conditional forwarder

b) a GlobalNames zone

c) a secondary zone

d) a zone delegation

Question12 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is configured
as a DNS server. You need to ensure that Server1 only resolves queries issued from client computers in
the same subnet as Server1. The solution must ensure that Server1 can resolve Internet host names.
What should you do on Server1?
a) Configure Windows Firewall

b) Modify the routing table

c) Create a conditional forwarder

d) Create a trust anchor

Question13 of 50

Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?

a) Configure a secondary zone on the DNS server in the branch office

b) Configure a stub zone on the DNS server in the branch office

c) Configure a stub zone on the DNS server in the main office

d) Configure a primary zone on the DNS server in the branch office

Question14 of 50

Network contains a DNS server that runs a Server Core installation of Windows Server 2008. The domain
administrators use client computers that run Windows Vista. You need to recommend a strategy that
allows the administrators to manage DNS from their Windows 7 client computers. What should you
recommend?

a) On the DNS server, set the Remote Access Connection Manager service to automatic.

b) On the Windows Vista client computers, install Remote Server Administration Tools (RSAT).

c) On the Windows Vista client computers, run Setup.exe /u from the Windows Server 2008 installation
media.

d) On the Windows Vista client computers, create a custom Microsoft Management Console, and then
add the Component Services snap-in.

Question15 of 50

What type of DNS domain microsoft.Com is?


a) Second-level domain

b) Root domain

c) Top-level domain

d) Third-level domain

Question16 of 50

After installing SP2 on a Windows XP professional on a desktop system you discover that a critical
application does not wordk properly. The application vendor indicates that the application is not
compatible with SP2, so you decide to uninstall the SP. Which is a valid method?

a) From the command prompt, change to the %systemroot%\$NtservicepackUninstall$\spuninst folder.


Type spuninst.exe -u

b) From the command prompt, change to the %systemroot%\$NtservicepackUninstall$\spuninst folder.


Type spuninst.exe -f

c) From the command prompt, change to the %systemroot%\$NtservicepackUninstall$\spuninst folder.


Type Update -n

d) From the command prompt, change to the %systemroot%\$NtservicepackUninstall$\spuninst folder.


Type Update -u

Question17 of 50

You want to install Windows XP Professional on 10 non-PXE-compliant computers on the marketing


segment of your network. The 10 computers do not have operating systems installed. You attempt to
load the computers by using an existing RIS image that is on the RIS server. You find that the 10
computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers, including the RIS server. You then check the network servers and find
that the Windows Server 2003 computer running WINS has stopped responding due to hard disk failure.
You want to enable the computers to connect to the RIS server. What should you do?

a) Repair and restart the WINS server.

b) Repair the WINS server and upgrade the server to Windows 2008 Server.

c) Configure the Active Directory server to run DHCP

d) Configure a static entry in WINS that points to the RIS server.


Question18 of 50

You are the network administrator for Testking.com. The company operates a main office and two
branch offices. The network consists of a single Active Directory domain named testking.com. All
network servers run Windows Server 2003, and all client computers run Windows XP Professional. A
server named TestKingSrvA is located in one of the branch offices, where it is a member of a workgroup.
TestKingSrvA is configured with default operating system settings. Remote Desktop and Remote
Assistance are enabled, and Windows Messenger is installed. The company intranet site is hosted on this
server. Mr King is the local administrator who manages the intranet site. He requests your assistance in
installing an application on TestKingSrvA. You need the ability to view Mr Kings desktop during the
installation process. What should you do?

a) From your computer, open a Remote Desktop connection with TestKingSrvA

b) Direct Mr King to create and send an invitation for Remote Assistance from TestKingSrvA

c) From your computer, offer Remote Assistance to TestKingSrvA

d) Direct Mr King to start Application Sharing from Windows Messenger

Question19 of 50

You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent
users from establishing multiple Remote Desktop connections to the server. What should you do?

a) Install and configure Terminal Server Licensing.

b) From Terminal Services Manager, modify the user sessions.

c) From Terminal Services Configuration, modify the server settings.

d) From Active Directory Users and Computers, modify the Sessions settings for each user account.

Question20 of 50

The Terminal Services role is installed on the Windows 2008 server. You deploy a new application on the
server. The application creates files that have an extension of .xyz. You need to ensure that users can
launch the remote application from their computers by double-clicking a file that has the .xyz extension.
What should you do?

a) Configure the Remote Desktop Connection Client on the users computers to point to the server
b) Configure the application as a published application by using a Remote Desktop Program file.

c) Configure the application as a published application by using a Windows Installer package file.

d) Configure the application as a published application by using a Terminal Server Web Access Web site.

Question21 of 50

You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. All network servers run Windows Server 2003. Terminal Services installed on three servers
running Windows 2003 Server. Remote users use the terminal servers to access the company intranet so
they can read e-mail and submit time sheets. To make a connection, users choose a terminal server from
a list. This process generates help desk requests. Over time, the remote user load increases. The existing
terminal server cannot support the number of concurrent connections. You need to create a new
terminal server to assist in handling the load. However, you must not add any new server names to the
list of terminal servers. What should you do?

a) Create a Session Directory terminal server farm

b) Configure the Windows Cluster Services on each terminal server

c) Install and configure Network Load Balancing

d) Install and configure round robin DNS

Question22 of 50

You install the Web Server (IIS) role on and the SMTP Server feature on a server that runs Windows
Server 2008. You need to configure the new SMTP server to forward mail to the mail server of the
Internet Service Provider (ISP). What should you do?

a) Configure the smart host setting to use the local host.

b) Configure the smart host setting to use the mail server of the ISP.

c) Run the appcmd /delivery method:PickupDirectoryFromIis command.

d) Configure the SMTP delivery setting to Attempt direct delivery before sending to smart host

Question23 of 50

Which are the IIS services that can use SSL communication?
a) News

b) Mail

c) WWW

d) FTP

Question24 of 50

Your network contains a Windows Server Update Services (WSUS) server. A Group Policy object (GPO)
configures all WSUS client computers to detect updates hourly and install updates weekly. You
download a critical update. You need to ensure that the WSUS client computers install the critical
update during the next detection interval. What should you do?

a) From the client computers, run wuauclt.exe /force

b) From the server, configure the deadline settings

c) From the client computers, run gpupdate.exe /force

d) From the server, configure the Synchronization Schedule options

Question25 of 50

The software update services is used to deploy ?

a) Service Pack

b) Office package

c) Hot fixes and Service Pack

d) All the options

Question26 of 50

What is the advantage that the 64-bit environment has over the 32-bit environment?

a) Price

b) Performance

c) Application Support
d) Ease of Management and Maintenance

Question27 of 50

Your network contains a print server named Server1. Server1 has three shared printers named Printer1,
Printer2, and Printer3. Each shared printer uses a different driver. You need to ensure that if Printer1
causes an exception, users can still print to Printer2 and Printer3. What should you do?

a) Add a driver filter

b) Add a printer filter

c) Modify the print processor options

d) Modify the driver isolation settings

Question28 of 50

Your network consists of one Active Directory domain. All domain controllers run Windows Server 2008.
You need to prepare the environment to provide a high-availability solution for a back-end Microsoft
SQL Server 2005 data store. What should you do?

a) Install a Windows Server 2003 Network Load Balancing cluster

b) Install a Windows Server 2008 Network Load Balancing cluster

c) Install a Windows Server 2008 failover cluster that has shared storage

d) Install a Windows Server 2008 failover cluster that has direct attached storage

Question29 of 50

Your network contains a single Active Directory domain. The domain contains two Active Directory sites
named Site1 and Site2. You have a cluster named Cluster1. Cluster1 has two nodes named Server1 and
Server2. Server1 is located in Site1. Server2 is located in Site2. Cluster1 uses a file share witness that is
located in Site1. Cluster1 hosts a clustered application named App1. The network in Site1 fails. You need
to ensure that users can access App1. What should you do?

a) Modify the failover settings for App1

b) Modify the dependencies for App1

c) Enable persistent mode for App1

d) Force quorum on Server2


Question30 of 50

A server application creates report files. The application saves the report files in a folder named Report.
A service account is listed as the owner of all report files. You need to assign ownership of the report
files to a user in a department named Audit. You must achieve this goal by using the minimum amount
of administrative effort. What should you do?

a) Rewrite the application.

b) Create a scheduled task to run Attrib.exe.

c) Create a scheduled task to run Icacls.exe.

d) Use the Advanced Security settings to change the owner of each file.

Question31 of 50

You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?

a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.

b) Restore the Documents and Settings folder that contains the WorkProduct folder.

c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.

d) Restore Peters WorkProduct folder, and choose the original location for the restoration.

Question32 of 50

Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?

a) Run the dfscmd.exe \\FS1\dfs /restore command on FS1


b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group

c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group

d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner

Question33 of 50

Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\
dfs. \\contoso.com\\dfs is configured to use Windows 2000 Server mode. The domain contains two
servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 is configured as a
namespace server for \\contoso.com\dfs. You need to migrate \\contoso.com\dfs to Windows Server
2008 mode. You install the Distributed File System role service on Server2. What should you do next?

a) At the command prompt, run dfsutil root export \\contoso.com\dfs c:\dfs.xml

b) Configure Server2 as a namespace server for \\contoso.com\dfs

c) At the command prompt, run dfsutil root adddom \\contoso.com\dfs v2

d) Create a new shared folder named DFS on Server2

Question34 of 50

Your network contains an Active Directory domain. You have a print server named Server1 that runs
Windows Server 2008 R2. You deploy a new print device and create a shared printer. You need to
ensure that only members of a group named Marketing can print color documents on the new print
device. All other users must only be able to print black and white documents on the new print device.
What should you do?

a) Create a printer port

b) Modify the Active Directory printer object

c) Create a second shared printer

d) Modify the properties of the shared printer


Question35 of 50

All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP
Professional Service Pack 3 (SP3). You have a user account named User1. You need to identify which
permissions User1 has on a file. What should you do?

a) At a command prompt, run Net file.

b) At a command prompt, run Attrib.exe.

c) From the file properties, view the Summary settings.

d) From the file properties, view the Advanced Security settings.

Question36 of 50

You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?

a) Attrib.exe

b) Cacls.exe

c) Dsacls.exe

d) Dsmod.exe

Question37 of 50

Your network contains a server that runs Windows Server 2008 and that functions as a file server. All
client computers are laptop computers that run Windows 7. The network is not connected to the
Internet. Users in the organization save files that they want to share to a shared folder on the server.
You need to provide a solution that allows users to access the shared files when they are disconnected
from the corporate network. What should you recommend?

a) Configure caching on the shared folder.

b) Implement Windows SharePoint Services 3.0.

c) Install the Background Intelligent Transfer Service (BITS) server extensions.


d) Configure the Distributed File System (DFS) role service to host the shared folder

Question38 of 50

What Command is used to view all the share folders in a system?

a) net share c:

b) net share

c) net share test

d) All the Options

Question39 of 50

You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?

a) Configure the Online Responder Role Service on a member server

b) Configure the Online Responder Role Service on a domain controller

c) Configure the Certification Authority Web Enrollment Role Service on a member server

d) Configure the Certification Authority Web Enrollment Role Service on a domain controller

Question40 of 50

Your network consists of one Active Directory domain. All domain controllers run Windows Server 2008.
You need to deploy Certificate Services on the network to support the following requirements:

- Maintain availability if a single server fails. - Delegate the enrollment of certificates for separate groups
of users.

- Restrict the types of certificates that can be issued by a certificate manager.

What should you do?

a) Deploy two servers that run Windows Server 2008 Enterprise Edition. Configure a failover cluster.
Configure an enterprise certification authority (C
b) Deploy two servers that run Windows Server 2008 Enterprise Edition. Configure a failover cluster.
Configure a stand-alone root certification authority (C

c) Deploy two servers that run Windows Server 2008 Enterprise Edition. Configure an enterprise root
certification authority (C and a stand-alone subordinate CA

d) Deploy two servers that run Windows Server 2008 Standard Edition. Configure a stand-alone root
certification authority (C and an enterprise subordinate CA

Question41 of 50

RAID 1 offers what type of fault tolerance?

a) Mirroring

b) Stripping

c) Stripping with parity

d) Hot swap

Question42 of 50

You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual
machine. You configure the virtual machine to use the physical network card of the host server. You
notice that you are unable to access network resources from the virtual machine. You need to ensure
that the virtual host can connect to the physical network. What should you do?

a) On the host server, install the Microsoft Loopback adapter

b) On the host server, enable the Multipath I/O feature

c) On the virtual machine, install the Microsoft Loopback adapter

d) On the virtual machine, install Microsoft Hyper-V Integration Components

Question43 of 50

Which level of RAID provides mirroring only?

a) 0
b) 1

c) 2

d) 3

Question44 of 50

You install the Windows Deployment Services (WDS) role on a server that runs Windows Server 2008.
You plan to install Windows 7 on a computer that does not support Preboot Execution Environment
(PXE). You have a Windows 7 image that is stored on the WDS server. need to start the computer to
install the image that is stored on the WDS server. What should you create?

a) a capture image

b) a CD-ROM that contains PXE drivers

c) a discover image

d) an install image

Question45 of 50

Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V.VS1 hosts
10 virtual machines. You need to configure VS1 to shut down each virtual machine before the server
shuts down. What should you do?

a) Create a shutdown script on each virtual machine.

b) Install Integration Services on each virtual machine.

c) Enable the Turn off the virtual machine option in the Automatic stop action properties on each virtual
machine.

d) Enable the Turn off the virtual machine option in the Automatic stop action properties on each VM

Question46 of 50

The cash registers in a supermarket experience network disruptions daily between 4 p.m. and 6 p.m
REPEATEDLY. Which ITIL process is responsible for solving these difficulties?

a) Availability Management
b) Capacity Management

c) Incident Management

d) Problem Management

Question47 of 50

The Problem Management process is intended to reduce both the number and severity of Incidents and
Problems on the business.

a) True

b) False

Question48 of 50

Which ITIL process is responsible for tracing the underlying cause of errors?

a) Security Management

b) Incident Management

c) Problem Management

d) Capacity Management

Question49 of 50

Which of the following is NOT one of the ITIL core publications?

a) A)Service Optimization

b) B)Service Transition

c) C)Service Design

d) D)Service Strategy

Question50 of 50

Which of the following is Proactive Problem Management?


a) drawing up a Capacity Plan

b) analyzing trends and identifying potential incidents

c) analyzing incidents that have been reported and solving the underlying cause

d) providing second-line support

Set 12:

Question1 of 50

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?

a) Configure all access points as RADIUS clients to the Remediation Servers

b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)

c) Create a Network Policy that defines Remote Access Server as a network connection method

d) Create a Network Policy that specifies EAP-TLS as the only available authentication method

Question2 of 50

Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?

a) From the Services snap-in, disable the IP Helper

b) From the Services snap-in, disable the Netlogon service

c) From Windows Firewall, enable the Block all connections option on the Public Profile

d) From Windows Firewall, enable the Block all connections option on the Domain Profile

Question3 of 50
You plan to move 50 Windows Server 2008 servers from an existing network segment to a new network
segment. You need to recommend a method for changing the TCP/IP addresses on the 50 servers. You
want to achieve this goal by using the minimum amount of administrative effort. What should you
recommend?

a) Visit each server to make the changes.

b) Run the Netsh tool from an administrators client computer.

c) Run the ServerManagerCMD tool from an administrators client computer.

d) Connect to each server by using Remote Desktop to make the changes.

Question4 of 50

Which of the following network devices sends packets from a central point based upon MAC addresses?

a) Repeater

b) Switch

c) Bridge

d) Router

Question5 of 50

What is another name for 10Base5 ?

a) Baseband

b) Broadband

c) Thicknet

d) Thinnet

Question6 of 50

Which layer(s) of the OSI model is/are included in the NDIS specification?

a) 1

b) 2
c) 3

d) 4

Question7 of 50

Which of the following modules manages bindings in NDIS?

a) Protocol manager

b) Binding manager

c) Redirector

d) The registry

Question8 of 50

You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?

a) Assign each office a new class C private IP address range

b) Assign each office a new class B private IP address range

c) Assign each office a subnet from a new class B private IP address range

d) Assign each office a subnet from the current class C private IP address range

Question9 of 50

Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects
the main office to a branch office. All computers in the branch office are configured with static IP
addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that
the portable computers can connect to network resources at the main office and the branch office. How
should you configure each portable computer?
a) Use a static IPv4 address in the range used at the branch office

b) Use an alternate configuration that contains a static IP address in the range used at the main office

c) Use the address that was assigned by the DHCP server as a static IP address

d) Use an alternate configuration that contains a static IP address in the range used at the branch office

Question10 of 50

You are working as a system admin in an organization wipro.com, You have received a complaint one of
the client PC could not able to get IP address from the DHCP server. When you checked up DHCP server
you could able to see blue exclamatory marks on the server and scope. What is the reason behind it ?

a) Scope range is medium

b) Scope range is High

c) Scope range is exhausted

d) Scope rage is low

Question11 of 50

Which one of the following commands can be used to empty the DNS cache on a DNS client?

a) ipconfig /all

b) nbtstat -RR

c) ipconfig /flushdns

d) ipconfig /emptydns

Question12 of 50

You configured a DNS zone on the primary server and now would like to set up a transfer to a secondary
server. However, during secondary zone initiation on another server attempts to load the zone
consistently fail. What should you do to correct the problem?
a) Allow zone transfers to any server (Zone Transfer tab in zone properties)

b) Allow zone transfers to servers listed in the Name Servers tab (Zone Transfer tab in zone properties)
and add the secondary server to the NS of the zone

c) Allow zone transfers to selected servers (Zone Transfer tab in server properties)

d) Uncheck the Secure cache against pollution? option

Question13 of 50

Your network consists of one Active Directory forest that contains one root domain and 10 child
domains. Administrators of the child domains frequently modify the records for authoritative DNS
servers for the child domain DNS zones. You need to recommend a solution to minimize the amount of
manual configuration steps required to maintain name resolution on the network. What should you
recommend?

a) On the child domain DNS servers, create stub zones for the root domain zone

b) On the child domain DNS servers, configure conditional forwarders for the parent domain

c) On the root domain DNS servers, configure delegation subdomain records for the child domains

d) On the root domain DNS servers, create stub zones for the child domain zones

Question14 of 50

Port Number of DNS is?

a) 55

b) 54

c) 52

d) 53

Question15 of 50

The tool used to view the Forest functional levels is


a) Active directory users and computers

b) Active directory sites and services

c) Active directory domains and Trusts

d) All the above

Question16 of 50

You have a WINS server that runs Windows Server 2003 Service Pack 2 (SP2). You need to schedule a
backup of the WINS database whenever the WINS service stops. What should you do?

a) Create a scheduled task that runs Wins.exe.

b) Create a scheduled task that runs Netsh.exe.

c) Modify the General options from the WINS snap-in.

d) Schedule a system state backup by using Windows Backup.

Question17 of 50

Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?

a) Start the computer in Safe Mode, and reformat the hard disk

b) Start the computer in debug mode, and reformat the hard disk

c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Record

d) Start the computer by using the Windows Server 2003 CD-ROM

Question18 of 50

You are the network administrator for TestKing.com. The network consists of a single Active Directory
domain named testking.com. All network servers run Windows Server 2003, and all client computers run
Windows XP Professional. XML Web services for the internal network run on a member server named
TK1, which is configured with default settings. You are a member of the local Administrators group on
TK1.You need the ability to remotely manage TK1. You have no budget to purchase any additional
licensing for your network until the next fiscal year. How should you reconfigure TK1?

a) In the System Properties dialog box, enable Remote Desktop

b) Add your user account to the Remote Desktop Users local group

c) In the System Properties dialog box, enable Remote Assistance

d) Install Terminal Services by using Add or Remove Programs

Question19 of 50

Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote
Assistance connections to all computers without a Remote Assistance invitation. Which group policy
setting should you configure?

a) Offer Remote Assistance

b) Solicited Remote Assistance

c) Allow users to connect remotely using Terminal Services

d) Sets rules for remote control of Terminal Services user sessions

Question20 of 50

You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users
report that they occasionally receive an error message indicating that Terminal Server has reached the
maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop
connections to the server concurrently. What should you do?

a) From Add or Remove Programs, add the Terminal Server component.

b) From Add or Remove Programs, add the Connection Point Services component.

c) From the Terminal Services Configuration console, modify the Maximum connections setting.

d) From the Terminal Services Configuration console, modify the Restrict each user to one session
setting.
Question21 of 50

Your network includes a TS Gateway server named TSG1. TSG1 has installed a self-signed server
certificate that it uses for SSL communications. You want to use a computer running ISA Server as an SSL
endpoint for TS Gateway connections. Which of the following steps must you take to ensure that ISA
Server can communicate with TS Gateway?

a) Export the SSL certificate of ISA Server to TS Gateway.

b) Export the SSL certificate of TS Gateway to ISA Server

c) Open TCP port 443 on the computer running ISA Server.

d) Enable HTTPS-HTTP bridging between ISA Server and TS Gateway.

Question22 of 50

Your network consists of one Active Directory domain. All servers run Windows Server 2008. You plan to
publish a Web site on two Web servers. You need to recommend a solution for the deployment of the
two Web servers. The solution must provide the following requirements: Session-state information for
all users Access to the Web site if a single server fails Scalability to as many as seven Web servers
Support for multiple dedicated IP addresses for each Web server What should you recommend?

a) Install failover clustering on each Web server

b) Install Network Load Balancing on each Web server

c) Assign multiple bindings in Internet Information Services (IIS) 7.0

d) Create managed handler mappings in Internet Information Services (IIS) 7.0

Question23 of 50

You are a help desk technician for your company. An employee named Marc is attempting to open a
Microsoft Word document Phonelist.doc by using Internet Explorer. However, when he types
http://Server1/Files/Phonelist.doc into the address bar in Internet Explorer, he receives the following
error message: 404: Page not found?! You verify that Phonelist.doc exists in a shared folder named Files
on Server1. You need to ensure that Marc can access Phonelist.doc by using Internet Explorer. What
should you do?

a) Instruct Marc to run the IPconfig/flushdns command on his computer.

b) Grant Marcs domain user account Allow-Read permission on the File shared folder.
c) Grant Marcs domain user account Allow-Read permission on Phonelist.do

d) Instruct Marc to type file:\\server1\File\Phonelist.doc into the address bar in Internet Explorer

Question24 of 50

Your network contains a Windows Server Update Services (WSUS) server named Server1. You need to
configure all WSUS client computers to download approved updates directly from the Microsoft Update
servers. The solution must ensure that all WSUS client computers report successful installation of
updates to Server1. What should you do?

a) From Active Directory, deploy a Group Policy object (GPO)

b) From Server1, modify the Update Source and Proxy options

c) From the WSUS client computers, modify the local computer policy

d) From Server1, modify the Update Files and Languages options

Question25 of 50

Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is
deployed on the network. Server1 will be used to collect events from the Security event logs of the
other servers on the network. You need to define the Custom Event Delivery Optimization settings on
Server1. Which tool should you use?

a) Event Viewer

b) Task Scheduler

c) Wecutil

d) Wevtutil

Question26 of 50

How many attributes NTFS can Support?

a) 7

b) 4

c) 8
d) 13

Question27 of 50

Windows 2003 web edition can support maximum RAM?

a) 256 MB

b) 2 GB

c) 512 MB

d) 1 GB

Question28 of 50

A server application creates report files. The application saves the report files in a folder named Report.
A service account is listed as the owner of all report files. You need to assign ownership of the report
files to a user in a department named Audit. You must achieve this goal by using the minimum amount
of administrative effort. What should you do?

a) Rewrite the application.

b) Create a scheduled task to run Attrib.exe.

c) Create a scheduled task to run Icacls.exe.

d) Use the Advanced Security settings to change the owner of each file.

Question29 of 50

How can you administer Windows Server 2008 R2 from a Windows 7 workstation?

a) Download and install the RSAT

b) Download and install the RSA

c) Download and install the WDS

d) Download and install the latest service pack

Question30 of 50
You have multiple client computers on which you need to deploy the same image by using multicast.
Some of these computers are slower than others. Will slow clients bring down the speed of multicast
transmission?

a) No, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed

b) Yes, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed

c) Yes, WDS in Windows Server 2008 has the ability to divide multicast transmissions into multiple
streams based on the client speed

d) No, WDS in Windows Server 2008 Standard edition has the ability to divide multicast transmissions
into multiple streams based on the client speed

Question31 of 50

To Backup the Windows 2008 Systemstate configuration in to tape

a) Install and configure the SCSI card driver, Tape drive driver and fire the Systemstate backup through
Backup console.

b) Installa and configure the SCSI card driver,Tape drive driver and fire the systemstate backup through
Wbadmin command.

c) Tape drive cannot be configured to backup directly using native tools in Windows 2008. Backup can
be taken only on disks.

d) Systemstate backup can only be taken to CD/DVD but not to Tape Drive in Windows 2008.

Question32 of 50

You have a file server that runs Windows Server 2008 R2. You configure quotas on the server. You need
to view each users quota usage on a per folder basis. What should you do?

a) From the command prompt, run dirquota.exe quota list

b) From File Server Resource Manager, create a File Screen

c) From File Server Resource Manager, create a Storage Management report

d) From the properties of each volume, review the Quota Entries list
Question33 of 50

Assume that you are the administrator of your companys network. You receive a request from Stephens
manager to disable Stephens access to a network share named Financial. Stephens user account is the
only member in a group named Reports. The Reports group has Full Control permission to the Financial
share. You delete the Reports group. You later find out that the manager was in error and that Stephen
should have his access to Financial share restore What should you do?

a) Re-create Reports and re-create Stephens user account. Use existing NTFS permissions.

b) Re-Create Reports and grant Reports NTFS Full Control permission to Financial. Stephens user
account will still be a member of Reports.

c) Re-create Reports and grant Reports Full Control permission to Financial. Add Stephens user account
to Reports.

d) Re-Create Reports and add Stephens existing user account to Reports. Use existing NTFS permissions.

Question34 of 50

Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?

a) Run the dfscmd.exe \\FS1\dfs /restore command on FS1

b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group

c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group

d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner

Question35 of 50

Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\
dfs. \\contoso.com\\dfs is configured to use Windows 2000 Server mode. The domain contains two
servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 is configured as a
namespace server for \\contoso.com\dfs. You need to migrate \\contoso.com\dfs to Windows Server
2008 mode. You install the Distributed File System role service on Server2. What should you do next?

a) At the command prompt, run dfsutil root export \\contoso.com\dfs c:\dfs.xml

b) Configure Server2 as a namespace server for \\contoso.com\dfs

c) At the command prompt, run dfsutil root adddom \\contoso.com\dfs v2

d) Create a new shared folder named DFS on Server2

Question36 of 50

Your network contains a server that runs Windows Server 2008 R2. You need to enable access based
enumeration (ABE) on a shared folder. Which console should you use?

a) Share and Storage Management

b) Disk Management

c) File Server Resource Manager

d) Storage Explorer

Question37 of 50

Compressed Files can be encrypted on a disk quota enabled volume?

a) TRUE

b) false

c) NA

d) Not sure

Question38 of 50

The main benefits of a domain are


a) provide decentralized administration

b) provides mobility for computers

c) provides scalability to create larger networks

d) provide a single logon process for the user to gain access to computer resources

Question39 of 50

How would you back up a Certificate Authority installation?

a) Use the certutil -backup command

b) Perform a Copy backup

c) Create a new AD DS snapshot

d) Use the certmgmt -backup command

Question40 of 50

You are a network administrator for TestKing. The network consists of a single Active Directory domain
testking.com. All servers run Windows Server 2003. TestKing has a main office and a branch office. Both
offices are connected to the Internet by Network Address Translation (NAT) firewalls and T1 connections
to the companys ISP. Each firewall is configured with a perimeter network. TestKing uses a public key
infrastructure (PKI) for both internal and external authentication. TestKing needs to connect to the main
office to the branch office by using the existing Internet connections. TestKings written security policy
included the following requirements:

1. All Internet communications must use the PKI for all authentication and data encryption.

2. All servers that are required to communicate to or by means of the Internet must be located in a
firewall perimeter network.

You need to connect to the main office to the branch office. You need to comply with the written
security policy. You install Routing and Remote Access servers in the perimeter network at each office.
What else should you do?

a) Configure persistent, two-way initiated PPTP connections with EAP-TLS authentication

b) Configure persistent, two-way initiated PPTP connections with MS-CHAP v2 user authentication

c) Configure persistent, two-way initiated L2TP/IPSec connections with MS-CHAP v2 user authentication
d) Configure persistent, two-way initiated L2TP/IPsec connections with EAP-TLS user and computer
authentication

Question41 of 50

Which RAID level is also called mirroring?

a) 0

b) 1

c) 3

d) 5

Question42 of 50

Your network contains a server that has the HyperV server role installed. The server hosts a virtual
machine (VM) named VM1. VM1 runs Windows Server 2008 R2 and has the file server role installed. You
need to add more disk space to VM1. The solution must minimize the amount of downtime for VM1.
What should you do first on VM1?

a) Add a virtual disk to IDE controller 0

b) Add a virtual disk to the SCSI controller

c) Add a virtual disk to IDE controller 1

d) Add a passthrough disk to IDE controller 0

Question43 of 50

Your network contains a two node Hyper-V cluster that hosts 10 virtual machines (VMs). You discover
that when a failover occurs, all of the VMs fail over simultaneously. You need to modify the cluster so
that you can fail over each VM individually. What should you do first?

a) Create a Clustered Shared Volume

b) Add a third node to the cluster

c) Add a new disk to the failover cluster

d) Modify the properties of the cluster failover


Question44 of 50

Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?

a) From HyperV Manager, reset VM1

b) Run the ExportVM PowerShell cmdlet

c) Run the UnmountVHD PowerShell cmdlet

d) From HyperV Manager, pause VM1

Question45 of 50

Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V.VS1 hosts
10 virtual machines. You need to configure VS1 to shut down each virtual machine before the server
shuts down. What should you do?

a) Create a shutdown script on each virtual machine.

b) Install Integration Services on each virtual machine.

c) Enable the Turn off the virtual machine option in the Automatic stop action properties on each virtual
machine.

d) Enable the Turn off the virtual machine option in the Automatic stop action properties on each VM

Question46 of 50

Do all problem solutions need to be mandatorily implemented?

a) Yes, all of them need to be implemented.

b) No, none of them need to be implemented.

c) On a case on case basis, post discussion with the customer.

d) All of the above

Question47 of 50
Incident and Service requests are the same

a) Yes

b) Yes, both are reported to the Service desk

c) No, although both may be reported to the service desk

d) None of the above

Question48 of 50

Root cause analysis (RCA) techniques are useful in _________ process.

a) A) Incident management

b) B) Problem management

c) C) Release management

d) D)All ITIL processes

Question49 of 50

Which of the following are the two types of problem management?

a) Reactive and Informative

b) Preventive and Retrospective

c) Reactive and Proactive

d) Retrospective and Proactive

Question50 of 50

Which process or function ensures that change proposals are submitted with the aim of removing errors
within the IT infrastructure?

a) Configuration Management

b) Problem Management

c) Change Management
d) Service Desk

Set 13:

Jan 31 2013 | Logged in as : 219731Time remaining: 01:34:22Block 2 of 3

Question1 of 50

You suspect that a stale record is incorrectly returned by your internal DNS server, and you wish to
empty the server cache. Which ONE of the following action will achieve this?

a) The ipconfig /flushdns command on the server

b) The ipconfig /flushdns command on the client

c) Restart the DNS service on the server

d) All of them

Question2 of 50

Which ITIL process handles the implementation of the policy for access management and access to
information systems?

a) Availability Management

b) Incident Management

c) Release Management

d) Security Management

Question3 of 50

Your network contains an Active Directory domain named contoso.com. The network has Direct Access
deployed. You deploy a new server named Server1 that hosts a management application. You need to
ensure that Server1 can initiate connections to Direct Access client computers. Which settings should
you modify from the Direct Access Setup console?

a) Application Servers

b) DirectAccess Server
c) Infrastructure Servers

d) Remote Clients

Question4 of 50

You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
Occasionally, users report that they cannot connect to the terminal server. You need identify user
accounts that have multiple Terminal Services connections to Server1. Which tool should you use?

a) Remote Desktop

b) Terminal Server Licensing

c) Terminal Services Configuration

d) Terminal Services Manager

Question5 of 50

You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?

a) From Terminal Services Manager, create a new group.

b) From Terminal Services Manager, delete the inactive sessions.

c) From Terminal Services Configuration, modify the RDP-Tcp settings.

d) From Terminal Services Configuration, modify the User logon mode setting

Question6 of 50

Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?

a) Configure a secondary zone on the DNS server in the branch office

b) Configure a stub zone on the DNS server in the branch office

c) Configure a stub zone on the DNS server in the main office


d) Configure a primary zone on the DNS server in the branch office

Question7 of 50

Which tools can you use to manage printers on Windows 2000/2003 computers?

a) The Printers Folder

b) Internet Explorer

c) Internet Services Manager

d) 1 and 2

Question8 of 50

You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). You need to track the
amount of disk space used by each user on the server. What should you do?

a) From Performance console, create a counter log.

b) From the properties of each volume, enable quotas.

c) From the Event Viewer console, create a new log view.

d) From the Local Security Policy, enable auditing for object access.

Question9 of 50

Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode
enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are
displayed. What should you do?

a) Disable referrals

b) Modify the system access control list

c) Enable access-based enumeration (ABE)

d) Modify the discretionary access control list


Question10 of 50

What is a MAC address in an Ethernet network?

a) The address assigned by DHCP

b) A TCP/IP address

c) The physical address assigned by the NIC manufacturer

d) A logical address created by the network administrator

Question11 of 50

Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB
of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to
prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS
replication traffic is minimized. Which tool should you use to prestage the Folder1 data?

a) Dfscmd

b) Dfsrmig

c) Dfsutil

d) Wbadmin

Question12 of 50

Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?

a) Start the computer in Safe Mode, and reformat the hard disk

b) Start the computer in debug mode, and reformat the hard disk

c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor

d) Start the computer by using the Windows Server 2003 CD-ROM

Question13 of 50
You want to see if any broken links are there in your Web site. Which tool do you use?

a) NT Explorer

b) Site Server Express

c) User Manager

d) Performance Monitor

Question14 of 50

Which command launches the file signature verification tool that is used to identify unsigned drivers
installed on a windows 2003 Server?

a) Winmsexe

b) Fsutil.exe

c) Sigverif.exe

d) Regedit.exe

Question15 of 50

Your network contains two servers named Server1 and Server2 that run Windows Server 2008.
Microsoft System Center Operations Manager (SCOM) 2007 is installed on Server2. The Hyper-V role is
installed on Server1. Server1 hosts five child virtual machines that run Windows Server 2003. You need
to recommend a solution that enables administrators to monitor the child virtual machines. The solution
must gather the following data from the virtual machines: Performance statistics Event data from the
application log What should you recommend?

a) On Server1, install a SCOM agent

b) On each child virtual machine, install a SCOM agent

c) On Server2, install the Microsoft Virtual Server 2005 R2 Management Pack

d) On Server2, install Microsoft System Center Virtual Machine Manager (SCVMM) 2007

Question16 of 50

Which of the following is a transport-layer protocol?


a) NetBEUI

b) NetBIOS

c) NDOS

d) PPP

Question17 of 50

The rights required to share a folder on a domain controller for a user jack is

a) Jack should be member of power users

b) Jack should be member of server operators

c) Jack should be member of domain controller

d) Jack should be member of Print operators

Question18 of 50

You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?

a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.

b) Restore the Documents and Settings folder that contains the WorkProduct folder.

c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.

d) Restore Peters WorkProduct folder, and choose the original location for the restoration.

Question19 of 50

When connecting IIS to an external data source through ODBC (Open Data Base Connector), which type
of ODBC DSN must be specified?

a) System
b) File

c) Server

d) User

Question20 of 50

How would you back up a Certificate Authority installation?

a) Use the certutil -backup command

b) Perform a Copy backup

c) Create a new AD DS snapshot

d) Use the certmgmt -backup command

Question21 of 50

Your network contains a server that has the SNMP Service installed. You need to configure the SNMP
security settings on the server. Which tool should you use?

a) Local Security Policy

b) Scw

c) Secedit

d) Services Console

Question22 of 50

Which of the following categories for UTP has the least expensive cable?

a) 1

b) 2

c) 3

d) 4

Question23 of 50
Which of the following will complete the Four Ps of Service Design? 1. Perspectives 2. Positioning 3. Plan
4. ???

a) People

b) Product

c) Patterns

d) Partners

Question24 of 50

The primary goal of which process is to provide the rights for users to be able to access a service or
group of services, while preventing access to non-authorized users.

a) Configuration Management

b) Availability Management

c) Access Management

d) Change Management

Question25 of 50

What is the default share permissions when creating a new share in Microsoft Windows Server?

a) Everyone Group will get no access.

b) Everyone Group will get read access.

c) Everyone Group will get full control.

d) Everyone Group will get special permissions.

Question26 of 50

Which of the following is the most appropriate approach to carrying out Service Operations?

a) The internal IT view is most important as Service Operations has to monitor and manage the
infrastructure
b) Service Operations should maintain a balance between an internal IT view and an external business
view

c) The external business view is most important as Service Operations is the place where value is
realized and the customer obtains the benefit of the services

d) IT Operations does not take an internal or external view as they execute processes defined by Service
Design

Question27 of 50

You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?

a) Configure the Online Responder Role Service on a member server

b) Configure the Online Responder Role Service on a domain controller

c) Configure the Certification Authority Web Enrollment Role Service on a member server

d) Configure the Certification Authority Web Enrollment Role Service on a domain controller

Question28 of 50

Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core? If yes, how can you use it for remote management?

a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core

b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core

c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core enable by using the SConfig tool.

d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core and enable by using the SConfig tool.

Question29 of 50
ITIL V3 talks about "aligning IT with business".

a) TRUE

b) false

Question30 of 50

Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?

a) From HyperV Manager, reset VM1

b) Run the ExportVM PowerShell cmdlet

c) Run the UnmountVHD PowerShell cmdlet

d) From HyperV Manager, pause VM1

Question31 of 50

Which network service must be present to use RIS?

a) Telnet

b) DHCP

c) BOOTP

d) RAS

Question32 of 50

What type of disk partition must be used to boot an operating system?

a) Level0

b) Extended

c) Level1

d) Primary
Question33 of 50

You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?

a) Windows Explorer

b) Efsinfo

c) Syskey

d) Cipher

Question34 of 50

Your network contains a computer named Computer1. Computer1 is assigned an IP address of


192.168.1.112/26. Your companys corporate policy states that the first usable address in each subnet is
allocated to the default gateway. You need to configure the default gateway for Computer1. Which
address should you choose?

a) 192.168.1.1

b) 192.168.1.63

c) 192.168.1.65

d) 192.168.1.93

Question35 of 50

You have been given a task to set per user 10 GB of Hard disk space on a file server. How you will do
this?

a) Ensure the File system on the File server is FAT

b) Ensure File System on the File server is NTFS

c) Enable Disk quota and set 10 GB for each user

d) All the Above


Question36 of 50

How can you ensure that an application installed on a computer running Terminal Services can support
multiple users?

a) Use the Qappsrv command.

b) Use the Change logon command.

c) Use the Chguser command.

d) Use the Mstsc command.

Question37 of 50

Windows clustering provides which of the following benefits?

a) High-availability

b) Network load balancing

c) Component load balancing

d) All of the above

Question38 of 50

To resolve host name to IP address DNS server will use

a) Forward zone

b) Reverse zone

c) Forward lookup zone

d) Reverse lookup zone

Question39 of 50

What is the Kerberos version used in windows 2008?

a) 5

b) 6
c) 7

d) 4

Question40 of 50

A 10BaseT network must be terminated with (?)-ohm terminators.

a) 50

b) 58

c) 75

d) None of the above

Question41 of 50

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:

- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.

- The number of virtual network connections must be minimized.

What should you do?

a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network

b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network

c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network

d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network

Question42 of 50
Which of the following media has the highest EMI?

a) UTP

b) STP

c) Coaxial cable (thin)

d) Radio

Question43 of 50

In windows 2003 which of the following version supports 64bit?

a) Web Edition

b) Standard Edition

c) Enterprise Edition

d) Both Web and Standard Edition

Question44 of 50

You have a DHCP server that runs Windows Server 2008 R2. You need to reduce the size of the DHCP
database. What should you do?

a) From the DHCP snap-in, reconcile the database

b) From the folder that contains the DHCP database, run jetpack.exe dhcp.mdb temp.mdb

c) From the properties of the dhcp.mdb file, enable the File is ready for archiving attribute

d) From the properties of the dhcp.mdb file, enable the Compress contents to save disk space attribute

Question45 of 50

You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual
machine. You configure the virtual machine to use the physical network card of the host server. You
notice that you are unable to access network resources from the virtual machine. You need to ensure
that the virtual host can connect to the physical network. What should you do?
a) On the host server, install the Microsoft Loopback adapter

b) On the host server, enable the Multipath I/O feature

c) On the virtual machine, install the Microsoft Loopback adapter

d) On the virtual machine, install Microsoft Hyper-V Integration Components

Question46 of 50

You are the network administrator for TestKing. TestKing is deploying a public Web server farm on
Windows Server 2008 computers. This Web server farm will allow the public to view company
information. The Web servers in the Web server farm will be placed in TestKings perimeter network,
which uses a public Internet address space. TestKing wants to reduce the probability of external
unauthorized users breaking into the public Web servers. You need to make the Web servers less
vulnerable to attack. You also want to ensure that the public will be able to view information that is
placed in TestKings perimeter network. What should you do?

a) Configure each Web servers IP address to a private reserved Internet address

b) Configure the Web servers to allow only IPSec communications

c) Disable any unneeded services on the Web servers

d) Disable TCP/IP filtering on all adapters in the Web servers

Question47 of 50

To configure Network printer which port we have to select

a) LPT port

b) Network Port

c) TCP/IP port

d) Standard TCP/IP port

Question48 of 50

Your network consists of one Active Directory forest that contains one root domain and 10 child
domains. Administrators of the child domains frequently modify the records for authoritative DNS
servers for the child domain DNS zones. You need to recommend a solution to minimize the amount of
manual configuration steps required to maintain name resolution on the network. What should you
recommend?

a) On the child domain DNS servers, create stub zones for the root domain zone

b) On the child domain DNS servers, configure conditional forwarders for the parent domain

c) On the root domain DNS servers, configure delegation subdomain records for the child domains

d) On the root domain DNS servers, create stub zones for the child domain zones

Question49 of 50

You manage a server that runs Windows Server 2008 R2. The D:\Payroll folder is corrupted. The most
recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:\Payroll folder back
to the most recent backup version without affecting other folders on the server. What should you do on
the server?

a) Run the Recover d:\payroll command

b) Run the Wbadmin restore catalog -backuptarget:D: -version:10/29/2007-09:00 -quiet command

c) Run the Wbadmin start recovery -backuptarget:D: -version:10/29/2007-09:00 -overwrite -quiet


command

d) Run the Wbadmin start recovery -version:10/29/2007-09:00 -itemType:File -items:d:\Payroll -


overwrite -recursive -quiet command

Question50 of 50

All domain controllers run Windows Server 2008. You need to prepare the environment to provide a
high-availability solution for a back-end Microsoft SQL Server 2005 data store. What should you do?

a) Install a Windows Server 2003 Network Load Balancing cluster.

b) Install a Windows Server 2008 Network Load Balancing cluster.

c) Install a Windows Server 2008 failover cluster that has shared storage.

d) Install a Windows Server 2008 failover cluster that has direct attached storage.

Set 14:

Jan 31 2013 | Logged in as : 220154Time remaining: 01:34:56Block 2 of 3


Question1 of 50

Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?

a) Start the computer in Safe Mode, and reformat the hard disk

b) Start the computer in debug mode, and reformat the hard disk

c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor

d) Start the computer by using the Windows Server 2003 CD-ROM

Question2 of 50

A user complains that whenever he tries to open acrobat file from Internet explorer it does not get
opened. What would be the problem?

a) IE Cipher Strength

b) ActiveX controls

c) Internet explorer

d) Adobe acrobat software

Question3 of 50

Which of the following would NOT be stored in the Definitive Media Library (DML)?

a) Master copies of software

b) Backups of application data

c) Software licenses

d) Master copies of controlled documentation

Question4 of 50
Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?

a) From HyperV Manager, reset VM1

b) Run the ExportVM PowerShell cmdlet

c) Run the UnmountVHD PowerShell cmdlet

d) From HyperV Manager, pause VM1

Question5 of 50

To communicate between DNS client and a WINS Client, what parameter you will configure?

a) Not possible to communicate

b) DNS parameter in WINS

c) WINS parameter in DNS

d) all the options

Question6 of 50

Write the name of layer of the OSI model that maintains a connection between nodes?

a) Transport Layer

b) Session Layer

c) Physical Layer

d) Network Layer

Question7 of 50

Which of the following IRQs are used for the CMOS/real-time clock?

a) 0

b) 2
c) 4

d) 8

Question8 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the File
Services role installed. You configure a file classification rule. You discover that scanned documents
stored as JPG files are not being classified. You need to ensure that all file classification rules apply to
scanned documents. What should you do?

a) Modify the properties of the file classification rule

b) Modify the properties of the Windows Search Service

c) Enable the Windows TIFF IFilter feature

d) Install the Office 2007 System Converter: Microsoft Filter Pack

Question9 of 50

Which of the following is a transport-layer protocol?

a) NetBEUI

b) NetBIOS

c) NDOS

d) PPP

Question10 of 50

What type of DNS domain microsoft.Com is?

a) Second-level domain

b) Root domain

c) Top-level domain

d) Third-level domain

Question11 of 50
You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to
implement a backup schedule on Server1 to meet the following requirements: Everyday, back up all files
and folders to disk. Every Friday, back up all files and folders to tape Every Sunday, Tuesday, and
Thursday, back up only the files and folders that have changed since the previous Fridays backup to
tape. Which backup jobs should you create?

a) a normal backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday, and Thursday

b) a normal backup to disk everyday a normal backup to tape on Friday an incremental backup to tape
on Sunday, Tuesday, and Thursday

c) a copy backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday and, Thursday

d) a copy backup to disk everyday a normal backup to tape on Friday an incremental backup to tape on
Sunday, Tuesday and, Thursday

Question12 of 50

The primay DNS zone is a read only copy

a) TRUE

b) false

c) NA

d) Not sure

Question13 of 50

Your network consists of an Active Directory forest that contains one domain. All domain controllers run
Windows Server 2008 and are configured as DNS servers. You have an Active Directory-integrated zone.
You have two Active Directory sites. Each site contains five domain controllers. You add a new NS record
to the zone. You need to ensure that all domain controllers immediately receive the new NS record.
What should you do?

a) From the DNS Manager console, reload the zone

b) From the Services snap-in, restart the DNS Server service

c) From the DNS Manager console, increase the version number of the SOA record
d) From the command prompt, run repadmin /syncall

Question14 of 50

Your company runs Terminal Services on a server named Server2. You need to prevent new sessions on
the Terminal Server without affecting current user sessions. Which command should you run?

a) Change logon /disable

b) Change user /execute disable

c) Tskill /server:Server2 /A

d) Taskkill /S Server2 /fi "MODULES eq TermSrv"

Question15 of 50

You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You need to merge a differencing disk and a parent disk. What should you do?

a) Edit the parent disk

b) Inspect the parent disk

c) Edit the differencing disk

d) Inspect the differencing disk

Question16 of 50

Which of the following categories for UTP has the least expensive cable?

a) 1

b) 2

c) 3

d) 4

Question17 of 50
The main benefits of a domain are

a) provide decentralized administration

b) provides mobility for computers

c) provides scalability to create larger networks

d) provide a single logon process for the user to gain access to computer resources

Question18 of 50

You want to install windows 7 on 30 PXE-compliant computers and 35 non-PXE-compliant computers. All
65 computers are included on the current hardware compatibility list (HCL). You create a RIS image. You
load the Image on the RIS server. You then start the 65 computers. You find that the 30 PXE-Compliant
computers can connect to the RIS server. However, the 35 non-PXE-compliant computers are not able to
connect to the RIS server. You want the 35 non-PXE compliant computers to connect to the RIS server.
What should you do?

a) Run Rbfg.exe to create a Non-PXE-compliant startup disk

b) Run Riprep.exe to create a non-PXE complaint startup disk

c) Grant the everyone group NTFS Read permission for the RIS image

d) Grant the Administrators group NTFS Read permission for the RIS image

Question19 of 50

Microsoft IIS7.0 doesnt support which of the following service.

a) News

b) Mail

c) Gopher

d) WWW

Question20 of 50
Your company has one main office and four branch offices. An Active Directory site exists for each office.
The network consists of one Active Directory domain. All servers run Windows Server 2008. The branch
offices are connected to the main office by slow and unreliable wide area network (WAN) links. Users
complain that WAN link failures prevent them from accessing files on remote servers. You need to
recommend a solution to maintain availability of files on the remote servers. The solution must meet the
following requirements: Support scheduling of WAN link traffic. Enable the connection to resume
immediately after a WAN link interruption. What should you recommend?

a) Use DFS Replication and replicate data to each branch office

b) Use the File Server Resource Manager (FSRM) and create file screens

c) Use the File Replication Service (FRS) and replicate data to each branch office

d) Configure separate DFS Namespaces on each branch office server

Question21 of 50

Windows 2008 R2 Datacenter Edition can support Maximum RAM?

a) Upto 2TB

b) Upto 4TB

c) upto 6TB

d) Upto 16TB

Question22 of 50

You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). You need to create a report
of all the printers that are on the server and the drivers that they use. What should you do?

a) Open The Printers and Faxes control panel applet and select the details view. Take a screen capture
of the Printers and Faxes window.

b) Run the command %systemroot%\system32\net.exe share; printers.txt.

c) Run the command - cscript %systemroot%\system32\prnmngr.vbs; printers.txt.

d) Run the command cscript %systemroot%\system32\prnport.vbs; printers.txt.

Question23 of 50
CSMA/CD stands for?

a) Complete System for Media Attenuation and Collision Detection

b) Collision Signaling - Message Access / Collision Detection

c) Collision Sense Multiple Access / Common Deferment

d) Carrier Sense Multiple Access/Collision Detection

Question24 of 50

During a RIS installation, after the client system boots, it initiates a-

a) TFTP download

b) DHCP request

c) Telnet Session

d) ROSI protocol

Question25 of 50

Which of the following is NOT an objective of Service Operation?

a) Through testing,to ensure that services are designed to meet business needs

b) To deliver and support IT services

c) To manage the technology used to deliver services

d) To monitor the performance of technology and processes

Question26 of 50

You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?

a) From Terminal Services Manager, create a new group.

b) From Terminal Services Manager, delete the inactive sessions.

c) From Terminal Services Configuration, modify the RDP-Tcp settings.


d) From Terminal Services Configuration, modify the User logon mode setting

Question27 of 50

One of the advantage of terminal service is

a) Remote administration

b) Deployment of application

c) Remote administration and Deployment of application and Multiple desktop environment

d) Multiple desktop environment

Question28 of 50

You have a file server that runs Windows Server 2008 R2. You configure quotas on the server. You need
to view each users quota usage on a per folder basis. What should you do?

a) From the command prompt, run dirquota.exe quota list

b) From File Server Resource Manager, create a File Screen

c) From File Server Resource Manager, create a Storage Management report

d) From the properties of each volume, review the Quota Entries list

Question29 of 50

Which of the following is the CORRECT description of the Four P's of Service Design?

a) A four step process for the design of effective Service Management

b) A definition of the people and products required for successful design

c) A set of questions that should be asked when reviewing design specifications

d) The four major areas that need to be considered in the design of effective Service Management

Question30 of 50
You’ve added the AD CS role to your server and configured group policy to enroll users automatically.
What else must you do in order to start issuing certificates?

a) No further action is required

b) Configure OCSP responders

c) Configure certificate templates

d) Configure NDES services

Question31 of 50

You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster.
All nodes have access to a SAN, and adequate storage is available. Which of the following options should
you choose for your quorum configuration?

a) Node And File Share Majority

b) Node And Disk Majority

c) No Majority: Disk Only

d) Node Majority

Question32 of 50

Which of the following best describes the goal of Information Security Management Process?

a) To align IT security with business security and ensure that information security is effectively managed
in all service and Service Management activities

b) To ensure that that the information security risks are appropriately managed and enterprise
information resources are used responsibly

c) To provide a focus for all aspects of IT security and manage all IT security activities

d) To provide the strategic direction for security activities and ensures objectives are achieved

Question33 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:

- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.

- The number of virtual network connections must be minimized.

What should you do?

a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network

b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network

c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network

d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network

Question34 of 50

You are the network administrator for TestKing. TestKing is deploying a public Web server farm on
Windows Server 2008 computers. This Web server farm will allow the public to view company
information. The Web servers in the Web server farm will be placed in TestKings perimeter network,
which uses a public Internet address space. TestKing wants to reduce the probability of external
unauthorized users breaking into the public Web servers. You need to make the Web servers less
vulnerable to attack. You also want to ensure that the public will be able to view information that is
placed in TestKings perimeter network. What should you do?

a) Configure each Web servers IP address to a private reserved Internet address

b) Configure the Web servers to allow only IPSec communications

c) Disable any unneeded services on the Web servers

d) Disable TCP/IP filtering on all adapters in the Web servers

Question35 of 50
Application Management is NOT responsible for?

a) Documenting and maintaining the technical skills required to manage and support Applications

b) Managing applications through their lifecycle

c) Assisting in the decision to build or buy new software

d) Developing operational functionality required by the business

Question36 of 50

You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to
use Windows Backup to meet the following requirements: Minimize the number of scheduled backup
jobs. Perform a scheduled normal backup to disk every Friday. Perform a scheduled normal backup to
tape every Friday. Perform scheduled differential backups to tape every Monday, Tuesday, Wednesday,
and Thursday. How many scheduled jobs should you create from Windows Backup?

a) one

b) two

c) three

d) six

Question37 of 50

You are the administrator of a Windows Server 2003 network. Your network includes 75 Windows XP
Professional computers. You are adding 50 new PXE-compliant computers to the network. The hardware
on each computer is configured identically. You are using a RIS image to deploy Windows XP
Professional to the 50 computers. You successfully install Windows XP Professional on the first 10
computers. However, you cannot install Windows XP Professional on remaining 40 computers. What
should you do?

a) Configure the DHCP scope to add additional IP addresses.

b) Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.

c) Modify the startup sequence in the CMOS of the remaining computers.

d) Create computer accounts on the remaining computers in the Active Directory.


Question38 of 50

You plan to use only iSCSI for shared storage thats runs Windows 2008. You plan to deploy servers that
run Microsoft SQL Server 2005 on the network. You need to recommend a high-availability solution for
the SQL Server 2005 servers to withstand the failure of any single hardware component. What should
you recommend?

a) Install a two node failover cluster that has multiple network cards.

b) Install a two node failover cluster that has a dual port teamed network card.

c) Install a Network Load Balancing cluster that has multiple network cards.

d) Install a Network Load Balancing cluster that has multiple teamed network cards.

Question39 of 50

What type of disk partition must be used to boot an operating system?

a) Level0

b) Extended

c) Level1

d) Primary

Question40 of 50

Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?

a) 64-bit guest support.

b) On multiprocessor hosts, the ability to assign a host processor to a virtual machine

c) Network load balancing support

d) 64-bit host support

Question41 of 50
The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?

a) Certification Authority snap-in

b) Certificates snap-in

c) Certificate Templates snap-in

d) Windows Backup

Question42 of 50

Your company has a server that runs Windows Server 2008 R2. You have a new application that locates
remote resources by name. The new application requires IPv6. You need to ensure that the application
can locate remote resources by using IPv6. What should you do?

a) Create a new Pointer (PTR) DNS record

b) Create a new Signature (SIG) DNS record

c) Create a new Quad-A (AAA DNS record

d) Create a new Route Through (RT) DNS record

Question43 of 50

You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are
configured as DNS servers. The domain contains one Active Directory-integrated DNS zone. You need to
ensure that outdated DNS records are automatically removed from the DNS zone.What should you do?

a) From the properties of the zone, disable dynamic updates

b) From the properties of the zone, enable scavenging

c) From the properties of the zone, modify the TTL of the SOA record

d) From the command prompt, run ipconfig /flushdns

Question44 of 50
You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?

a) Modify the quota template

b) Delete and recreate the quota template

c) Create a new quota template. Modify the quota for each folder

d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders

Question45 of 50

Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You
install a new network adapter on Server1. You need to view the media access control (MAC) address for
the new network adapter. What should you do

a) At the command prompt, run Ipconfig /all.

b) At the command prompt, run Net view \\server1.

c) From the Device Manager snap-in, view the properties of the network adapter.

d) From the Services snap-in, view the properties on the Network Connections service.

Question46 of 50

Your network contains an Active Directory domain. You have a print server named Server1 that runs
Windows Server 2008 R2. You deploy a new print device and create a shared printer. You need to
ensure that only members of a group named Marketing can print color documents on the new print
device. All other users must only be able to print black and white documents on the new print device.
What should you do?

a) Create a printer port

b) Modify the Active Directory printer object

c) Create a second shared printer

d) Modify the properties of the shared printer


Question47 of 50

When would you use the WINS Service?

a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.

b) When you need to resolve host an IP address

c) When you need to give each host an IP address

d) When you need to resolve NetBIOS names to IP address dynamically.

Question48 of 50

You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?

a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.

b) Restore the Documents and Settings folder that contains the WorkProduct folder.

c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.

d) Restore Peters WorkProduct folder, and choose the original location for the restoration.

Question49 of 50

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?

a) Configure all access points as RADIUS clients to the Remediation Servers

b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)

c) Create a Network Policy that defines Remote Access Server as a network connection method

d) Create a Network Policy that specifies EAP-TLS as the only available authentication method
Question50 of 50

Files in an EFS partition are-

a) Compressed

b) Archived

c) Encapsulated

d) Encrypted

Set 15:

Question1 of 50

A message is associated with which layer of the OSI reference model?

a) Application

b) Transport

c) Network

d) Data Link

Question2 of 50

Why will you use netdiag

a) This command-line diagnostic tool helps to isolate networking and connectivity problems by
performing a series of tests to determine the state of your network client. These tests and the key
network status information they expose give network administrators and support personnel a more
direct means of identifying and isolating network problems

b) This GUI diagnostic tool helps to isolate networking and connectivity problems by performing a series
of tests to determine the state of your network client. These tests and the key network status
information they expose give network administrators and support personnel a more direct means of
identifying and isolating network problems

c) its third part tool and Microsoft suggested not to use this tool in medium and large setup.

d) None of the above


Question3 of 50

What is the advantage of enabling volume shadow copy?

a) any deleted files can be recovered

b) deleted shared files and folders can be recovered

c) deleted objects can be recovered

d) none of the above

Question4 of 50

Which of the following IRQs are used for LPT1?

a) 1

b) 3

c) 5

d) 7

Question5 of 50

What is another name for 10Base5 ?

a) Baseband

b) Broadband

c) Thicknet

d) Thinnet

Question6 of 50

Which of the following modules manages bindings in NDIS?

a) Protocol manager
b) Binding manager

c) Redirector

d) The registry

Question7 of 50

Which standard divides the data link layer into the LLC and the MAC sublayers?

a) 802.1

b) 802.2

c) 802.3

d) 802.4

Question8 of 50

What network evolved from the Defense Departments ARPANET?

a) MILNET

b) ARP/RARP

c) TCP/IP

d) Internet

Question9 of 50

Your company has one office in Montreal and one office in New York. Each office has 2,000 client
computers configured as DHCP clients. DHCP relay is not supported on the network routers. The
network consists of one Active Directory domain. You need to recommend a DHCP addressing solution
for both offices. The solution must meet the following requirements: Minimize traffic between offices.
Be available if a single server fails. What should you recommend?

a) In each office, install a DHCP server that has two scopes

b) In each office, install a DHCP instance on a two node failover cluster

c) In the Montreal office, install a DHCP server. In the New York office, install a DHCP Relay Agent
d) In the Montreal office, install a DHCP instance on a two node failover cluster. In the New York office,
install a DHCP Relay Agent

Question10 of 50

Reserved address always will have least priority

a) TRUE

b) false

c) NA

d) Not sure

Question11 of 50

What is the main purpose of a DNS server?

a) To resolve IPX addresses into NetBIOS names

b) To resolve IP addresses into NetBIOS names

c) To resolve IP addresses into FQDN names

d) To resolve FQDN names into NetBIOS names

Question12 of 50

You want to ensure that DNS zone content is secured and that no user can write to DNS zones. How
should you configure your zones?

a) Secondary

b) Caching

c) Stub

d) AD-integrated

Question13 of 50
You configured a DNS zone on the primary server and now would like to set up a transfer to a secondary
server. However, during secondary zone initiation on another server attempts to load the zone
consistently fail. What should you do to correct the problem?

a) Allow zone transfers to any server (Zone Transfer tab in zone properties)

b) Allow zone transfers to servers listed in the Name Servers tab (Zone Transfer tab in zone properties)
and add the secondary server to the NS of the zone

c) Allow zone transfers to selected servers (Zone Transfer tab in server properties)

d) Uncheck the Secure cache against pollution

Question14 of 50

Your company has a domain controller named Server1 that runs Windows Server 2008 R2. Server1 has
the DNS Server server role installed. You need to configure the DNS server to resolve IP addresses to
host names. Which record should you create?

a) Pointer (PTR)

b) Host Info (HINFO)

c) Service Location (SRV)

d) Canonical Name (CNAME)

Question15 of 50

The different records held by primay DNS server are?

a) PTR

b) All of the options

c) NS

d) MX

Question16 of 50

To communicate between DNS client and a WINS Client, what parameter you will configure?
a) Not possible to communicate

b) DNS parameter in WINS

c) WINS parameter in DNS

d) all the options

Question17 of 50

When would you use the WINS Service?

a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.

b) When you need to resolve host an IP address

c) When you need to give each host an IP address

d) When you need to resolve NetBIOS names to IP address dynamically.

Question18 of 50

You want to install Windows XP Professional on 10 non-PXE-compliant computers on the marketing


segment of your network. The 10 computers do not have operating systems installed. You attempt to
load the computers by using an existing RIS image that is on the RIS server. You find that the 10
computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers, including the RIS server. You then check the network servers and find
that the Windows Server 2003 computer running WINS has stopped responding due to hard disk failure.
You want to enable the computers to connect to the RIS server. What should you do?

a) Repair and restart the WINS server.

b) Repair the WINS server and upgrade the server to Windows 2008 Server.

c) Configure the Active Directory server to run DHCP

d) Configure a static entry in WINS that points to the RIS server.

Question19 of 50

How will you administer Windows Server 2008 R2 from the workstation where you cannot install
Windows Server Remote Administration Tools?
a) You can not use Remote Desktop for remote administration

b) You can still use Remote Desktop for remote administration, if it is disabled on the target server, if
you have permissions and firewall is blocking the connection.

c) You can still use Remote Desktop for remote administration, if it is enabled on the target server, if
you have permissions and firewall is not blocking the connection.

d) None of the above

Question20 of 50

You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS
Gateway) role service installed. You need to provide a security group access to the TS Gateway server.
What should you do?

a) Add the security group to the Remote Desktop Users group.

b) Add the security group to the TS Web Access Computers group.

c) Add the security group to the TS Web Access Computers group.

d) Create and configure a Connection Authorization Policy.

Question21 of 50

You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?

a) From Terminal Services Manager, create a new group.

b) From Terminal Services Manager, delete the inactive sessions.

c) From Terminal Services Configuration, modify the RDP-Tcp settings.

d) From Terminal Services Configuration, modify the User logon mode setting

Question22 of 50
You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?

a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.

b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.

c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.

d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.

Question23 of 50

Which of the following operating systems is ideal for Web servers?

a) Windows 2003 Server

b) Windows 2000 Professional

c) Windows 2000 Print Server

d) Windows 2000 File Server

Question24 of 50

Where is the Print job stored

a) Printer properties

b) Spooler Printer

c) Print Spool

d) Print Spooler

Question25 of 50

Which of the following operations cannot be performed in My computer folder?

a) Format
b) Sharing

c) Delete

d) Copy

Question26 of 50

Which of the following server service is not provided by Windows 2000?

a) Print Server

b) File Server

c) Application Server

d) Web Server

Question27 of 50

Windows 2003 Enterprise Edition can support Maximum multiprocessor?

a) 8

b) 32

c) 16

d) 9

Question28 of 50

What is the advantage that the 64-bit environment has over the 32-bit environment?

a) Price

b) Performance

c) Application Support

d) Ease of Management and Maintenance


Question29 of 50

All servers run Windows Server 2003. A network server named Server1 functions as the main file server.
Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by
using the Backup utility. You discover that files that are open during the backup process are not being
backed up. You need to ensure that open files should be backed up successfully. What should you do?

a) Enable volume shadow copies on the partitions that are being backed up

b) Disable volume shadow copies on the partitions that are being backed up.

c) Select the Verify data after backup check box in the Advanced backup options of the backup job.

d) Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.

Question30 of 50

Your network consists of one Active Directory domain named ABC.COM. The domain contains three
Windows Server 2008 servers named Server1, Server2, and Server3. Server1 runs Active Directory
Certificate Services (AD CS) and is configured as an enterprise root certification authority. Server2 hosts
an internal Web site. Users currently connect to the Web site by using the URL https://server2.abc.com.
You plan to replicate the Web site from Server2 to Server3. You need to recommend a solution to
enable users to connect to the Web site through HTTPS on either Server2 or Server3 by using a single
URL. The solution must meet the following requirements: Users must be able to use the
https://www.abc.com URL to connect to the Web site. Incoming connections must be dynamically
balanced between Server2 and Server3. What should you recommend?

a) Add both servers to a Network Load Balancing cluster. Export the Web server certificate on Server2
to Server3

b) Add both servers to a failover cluster. Issue a Web server certificate for www.abc.com. Install the
certificate on Server2

c) Add both servers to a Network Load Balancing cluster. Issue a Web server certificate for
www.abc.com. Install the certificate on Server2 and Server3

d) Add both servers to a failover cluster. Issue a Web server certificate for server2.abc.com and install
the certificate on Server2. Issue a Web server certificate for server3.abc.com and install the certificate
on Server3

Question31 of 50

Maximum number of Nodes supported in Windows 2008 standard server Load Balancing and cluster
a) 16 Nodes in cluster and 32 Nodes in Load Balancing

b) Zero Nodes in cluster and 32 Nodes in Load Balancing

c) 16 Nodes in cluster and 16 Nodes in Load Balancing

d) 32 Nodes in cluster and 32 Nodes in Load Balancing

Question32 of 50

Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?

a) From the Services snap-in, disable the IP Helper

b) From the Services snap-in, disable the Netlogon service

c) From Windows Firewall, enable the Block all connections option on the Public Profile

d) From Windows Firewall, enable the Block all connections option on the Domain Profile

Question33 of 50

What is the primary purpose of an ACL?

a) It controls access to resources.

b) It explicitly allows or denies access to a particular resource.

c) It explicitly defines users and their respective access rights to a particular resource.

d) All of them

Question34 of 50

You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?

a) Attrib.exe
b) Cacls.exe

c) Dsacls.exe

d) Dsmod.exe

Question35 of 50

You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?

a) Configure the Disk Quota and file screening policy.

b) Recommen for thirdparty file server solution like filers and configure the policy.

c) Control the usage through disk quota and access control.

d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.

Question36 of 50

Stand alone DFS root will use Active Directory ?

a) TRUE

b) false

c) NA

d) NOT SURE

Question37 of 50

The features of NTFS file system are

a) Security

b) Compression

c) Disk quota

d) All the options


Question38 of 50

What Command is used to view all the share folders in a system?

a) net share c:

b) net share

c) net share test

d) All the Options

Question39 of 50

You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?

a) Configure the Online Responder Role Service on a member server

b) Configure the Online Responder Role Service on a domain controller

c) Configure the Certification Authority Web Enrollment Role Service on a member server

d) Configure the Certification Authority Web Enrollment Role Service on a domain controller

Question40 of 50

You’ve added the AD CS role to your server and configured group policy to enroll users automatically.
What else must you do in order to start issuing certificates?

a) No further action is required

b) Configure OCSP responders

c) Configure certificate templates

d) Configure NDES services

Question41 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You need to merge a differencing disk and a parent disk. What should you do?

a) Edit the parent disk

b) Inspect the parent disk

c) Edit the differencing disk

d) Inspect the differencing disk

Question42 of 50

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements: - All virtual
machines (VMs) on Server1 must be able to communicate with other computers on the network.

- The number of virtual network connections must be minimized.

What should you do?

a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network

b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network

c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network

d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network

Question43 of 50

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is
configured to use a 127GB dynamically expanding virtual hard disk (VH. You need to add 500 GB of disk
space to VM1. The solution must minimize the amount of downtime for VM1. What should you do?
a) Increase the size of the VHD drive

b) Convert the VHD to a fixedsize disk

c) Add a new VHD drive to a SCSI controller

d) Add a new VHD drive to an IDE controller

Question44 of 50

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
HyperV server role installed. Server1 hosts a virtual machine (VM) named VM1. You take a snapshot of
VM1 at 05:00 and at 19:00. You use HyperV Manager to delete the snapshot taken at 05:00. You need to
ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1. What
should you do?

a) At the command prompt, run the rmdir.exe command

b) From the HyperV Manager console, shut down VM1

c) From Windows PowerShell, run the RemoveItem cmdlet

d) From the HyperV Manager console, rightclick VM1 and click Revert

Question45 of 50

Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?

a) 64-bit guest support.

b) On multiprocessor hosts, the ability to assign a host processor to a virtual machine

c) Network load balancing support

d) 64-bit host support

Question46 of 50

"Warranty of a service" means which of the following?

a) The service is fit for purpose


b) There will be no failures in applications and infrastructure associated with the service

c) All service-related problems are fixed free of charge for a certain period of time

d) Customers are assured of certain levels of availability,capacity,continuity and security

Question47 of 50

Which of the following statements is true about the term Event?

a) A change of state which has significance for the management of a Configuration Item or IT service.

b) The term Event is also used to mean an Alert or notification created by any IT Service,configuration
Item or Monitoring tool.

c) Events typically require IT Operations personnel to take actions,and often lead to Incidents being
logged

d) All of above

Question48 of 50

Which of the following statements about Supplier and Contract Database (SC are correct?

1. A database or structured Document used to manage Supplier Contracts throughout their Lifecycle.

2. The SCD contains key Attributes of all Contracts with Suppliers

3. Its never part of the Service Knowledge Management System.

4. Maintaining it is responsibility of Supplier management process

a) 1 & 2 only

b) 1,2 & 3

c) 1,2 & 4

d) All of above

Question49 of 50
In which core publication can you find detailed descriptions of the following?

1. Service Portfolio Management

2. Demand Management

3. Financial Management

a) Service Operations

b) Service Strategy

c) Service Transition

d) Continual Service Improvement

Question50 of 50

Why is baseline established?

a) To standardize operation

b) For knowing the cost of services provided

c) For clear roles and responsibility

d) Comparing at a later point in time.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy