final exam(q6)

175
You are the system administrator of StarMoon Technologies. The network of your organization includes 200 computers on a Windows 2003 based network. In your organization, 20 employees are deployed offshore for a project at London. These employees logon to the organization's network using dial-up connection. Recently, the CEO of your organization, Nancy Jones informs you that she has to attend a three-day conference in London. During her stay in London, she wants to access the organization's network remotely using her laptop. You need to assign her special privileges that are not available to other remote users deployed in London. How can you accomplish this task with least administrative effort and without disturbing the current network communication mechanism? You can configure a RADIUS server and grant special privileges to Nancy when she logs on remotely. You can assign static IP address to the laptop of the CEO and assign special privileges to that IP address. You can configure an IAS server and grant special privileges to Nancy when she logs on remotely. You can use Audit and Oakley logging to grant special privileges to the laptop of the CEO. You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Virginia and Texas. The Virginia branch has 1100 hosts. However, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch is 1000 per second. The Texas branch has 2100 hosts. The expected number of client queries for the branch is 1900 per second. You need to plan the number of zones and DNS servers for each branch. Which of the following options would you recommend for your organization? A zone at each branch and a separate DNS server for each zone.

Upload: tnt-nguyen

Post on 04-Mar-2015

494 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Final Exam(Q6)

You are the system administrator of StarMoon Technologies. The network of your organization includes 200 computers on a Windows 2003 based network. In your organization, 20 employees are deployed offshore for a project at London. These employees logon to the organization's network using dial-up connection. Recently, the CEO of your organization, Nancy Jones informs you that she has to attend a three-day conference in London. During her stay in London, she wants to access the organization's network remotely using her laptop. You need to assign her special privileges that are not available to other remote users deployed in London. How can you accomplish this task with least administrative effort and without disturbing the current network communication mechanism?

You can configure a RADIUS server and grant special privileges to Nancy when she logs on remotely.

You can assign static IP address to the laptop of the CEO and assign special privileges to that IP address.

You can configure an IAS server and grant special privileges to Nancy when she logs on remotely.

You can use Audit and Oakley logging to grant special privileges to the laptop of the CEO.

You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Virginia and Texas. The Virginia branch has 1100 hosts. However, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch is 1000 per second. The Texas branch has 2100 hosts. The expected number of client queries for the branch is 1900 per second. You need to plan the number of zones and DNS servers for each branch. Which of the following options would you recommend for your organization?

A zone at each branch and a separate DNS server for each zone. Four zones at each branch and a DNS server for each branch. Two zones at the Virginia branch office and a separate DNS server for each zone.

A single zone at the Texas branch office with one DNS server. Two zones at the Texas branch office and a separate DNS server for each zone. A

single zone at the Virginia branch office with one DNS server.

You are the system administrator at BlueMoon Computers. The internal network of the organization contains a DNS server to process the queries of the client computers over the network. The employees using the DNS server complain about the slow processing speed of the DNS server. The DNS server of the network stores the entire project related data, the queries submitted to the server, and the results of the queries. The employees have to wait for a considerably long period to get the results of the queries they submit to the DNS server. This is delaying the projects they are working on and degrading their overall performance. What should you do to solve the problem?

Page 2: Final Exam(Q6)

Configure DNS server as Authoritative Server so that it stores only the results of the queries.

Configure DNS server as Primary Server so that it stores only the results of the queries.

Configure DNS server as Caching-only server so that it stores only the results of the queries.

Configure DNS server as Secondary Server so that it stores only the results of the queries.

Which database file is used by the DHCP database as a swap file during database maintenance?

Dhcp.mdb Resl.log J50.chk Tmp.edb

You are the system administrator at Blue Moon Inc. The company network consists of 500 computers. All the computers are running on Windows Server 2003. James is using a client computer on the network. He wants to access the files available on the server. The server has an IP address 192.168.0.45. James complains that he is not able to access the server computer. You decide to examine the ARP cache on James' computer. You notice that the MAC entry corresponding to 1 92.1 68.0.45 address in ARP cache does not match with the MAC address of the server computer. How will you fix the problem?

Identify the MAC address of the server using arp -a command, and then, modify the ARP cache by adding correct MAC address into the ARP cache as a static entry.

Modify the ARP cache, adding a different MAC address corresponding to the IP address 1 92.1 68.0.45.

Identify the MAC address of the server using arp -a command. Modify the ARP cache, deleting the entry corresponding to the IP address 192.1

68.0.45.

John is the system administrator at Global Software, Inc. The company is having remote network access between the computers of the branch office and the head office. John needs to monitor the network access servers through various objects. These objects contain information about the remote network access requests, errors, protocols, and performance data. Which object should John use to monitor the performance of all remote access ports?

RA Total IAS Authentication Client RAS Port

Page 3: Final Exam(Q6)

IAS Authentication Server

Blueperl, Inc has its head office at Texas City and two branch offices at Denver and New York. All the offices of the organization have implemented NLB clusters. All the NLB clusters are accessible across the organization's network. You, as a system administrator have been assigned the task to add a node in a cluster at the Denver branch and check the performance of the cluster. Which of the following options will enable you to accomplish this task?

Network Load Balancing Cluster Network Load Balancing Manager Network Load Balancing Command Network Load Balancing Tool

The WAN interfaces in______________router can be configured

depending on the number of locations to be connected.

2400 modular router 2500 series router 3600 series modular router 1900 series router

Which RRAS feature in Windows Server 2003 supports routing, where one computer sends packets addressed for the entire network?

Unicast routing Network address translation Multicast routing Demand-dial routing

You are the system administrator at BlueMoon Computers. All the computers in the company are connected using an internal network. The employees working on a single project need to communicate with each other by exchanging messages and required information. The employees complain that the information they send is not routed to the correct computers. Which layer of the OSI model should be checked to resolve the problem?

Transport Network Data Link Physical

An organization has its head office at Denver and two branch offices at Virginia and New York. Each branch including the head offices has implemented NLB clusters. You, as a

Page 4: Final Exam(Q6)

system administrator, need to monitor the NLB cluster of the New York branch from the head office. Which of the following commands will enable you to perform this task?

Nlb.exe Nlb.clr Nlb.txt Nlb.dat

You are the system administrator at BlueMoon Computers. The internal network connecting all the computers of the company contains a DHCP server. You implement synchronous backup method to take the backup of the data automatically. All the data related to the projects going on in the company are maintained by the DHCP server and stored in the company database. The hard drive on which the DHCP server was configured crashes due to a hardware failure. All the data on the hard drive is lost. The data is very important for the progress of the projects. What should you do to minimize the data loss?

Check the J50.chk file to restore the data. Check theJ50.log file to find out the various transactions in the DHCP database

transactions. Check the dhcp.mdb file to find out the various transactions in the DHCP database

transactions. Check the Tmp.edb file to find out the various transactions in the DHCP database

transactions.

You are the system administrator in Texas Computers, Inc., with its head office at Texas. The total number of hosts at the head office is 50. The organization now plans to open a branch office at New York that will have 100 hosts. The branch office at New York will be a separate subnet but will be connected to the organization's network at Texas, through VPN. You need to plan the TCP/IP addressing structure for the new branch office according to the current infrastructure of the organization. Identify the most appropriate addressing structure for the new branch office.

Class-based, class C addressing structure Classless-based, class C addressing structure Class-based, class B addressing structure Classless-based, class B addressing structure

You are the system administrator at Red Sky Inc. The organization has a network of Windows Server 2003 computers. You are asked to implement a routing protocol that allows a router to keep track of all the devices on the network. The router should acknowledge any changes occurring in the network configuration when a device goes off the network. Which routing protocol will you suggest to accomplish this?

Routing Information Protocol (RIP) v2 Routing Information Protocol (RIP) vl

Page 5: Final Exam(Q6)

Static routing would be most appropriate, so no routing protocol is needed. Open Shortest Path First (OSPF)

Under which condition can a DNS Zone allow only secure dynamic updates?

Zone is configured as a primary zone. Zone is configured as a forward lookup zone. Zone is configured as an Active Directory-integrated zone. Zone is configured as a stub zone.

Consider the following statements:

Statement A: DNS host records registration problem may occur when the primary DNS suffix and the zone name is not the same.

Statement B: DNS dynamic update problem occurs when a DNS client is using a third party DNS product that does not support dynamic updates.

Which of the following is correct about the above statements?

Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B are True. Both, Statement A and Statement B are False.

You are the system administrator at BlueMoon Computers. Red Sky is another company working in partnership with BlueMoon Computers. Both companies are working on a joint project. Companies need to access the data from each other's database during project development. To secure the data access procedure, both companies use secret shared key for each data access session. The secret key is used to encrypt and decrypt the data over the network. Database administrator in your company informs you that an unauthorized access is made to the database. How will you verify the unauthorized access?

Examine the Audit log and verify all IPSec Policy change events in the log to identify an unauthorized access.

Examine the Audit log and verify all the IPSec driver per- packet drop events in the log to identify an unauthorized access.

Exam i ne the Audit I og and verify al I the I PSec Pol i cy Agent events in the log to identify an unauthorized access.

Examine the Audit log and verify all the Internet Key Exchange events in the log to identify an unauthorized access.

Which predefined IPSec policy ensures secure communication with only IPSec enabled devices?

Page 6: Final Exam(Q6)

Secure Server Client Client and Server Server

The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices?

Centralized Fixed Distributed Mixed

Consider the following statements:

Statement A: A forwarder resolves the names that the DNS servers forward to it.

Statement B: A forwarder redirects the queries to the root server of the external network to resolve the queries.

Which of the following is true with respect to the above statements?

Statement A is True and Statement B is False. Both Statement A and Statement B are False. Both Statement A and Statement B are True. Statement A is False and Statement B is True.

Consider the following statements:

Statement A: The host name of a computer is displayed using Hostname utility.

Statement B: The NetBIOS name of a computer need not be unique.

Which of the following is true with respect to the above statements?

Both Statement A and Statement B are True. Statement A is False and Statement B is True. Statement A is True and Statement B is False. Both Statement A and Statement B are False.

You are the system administrator of Skyline, Inc., a leading telecom organization with its head office located at New York. There is a setup of 200 computers In the network. All

Page 7: Final Exam(Q6)

computers are running on Windows Server 2003 operating system. You want to apply circuit-level filtering to protect the network from outside attack. In addition, you want to ensure fast and secure access to the Internet. Which of the following options will enable you to accomplish this task?

IFSec in tunnel mode NAT VPN

ISA

StarMoon Technologies has its head office at Boston. The network of the head office consists of 200 computers running Windows Server 2003. The branch office of the organization is located at Texas City. The network ofthe branch office consists of 100 computers running Windows NT computers. The head office and the branch office are connected through slow WAN links. Select the best-suited name resolution strategy for resolving host names for the organization.

Plan for one DNS server and one WINS server, both located at the head office. Plan for one WINS server at the head office and one DNS server at the branch

office. Plan for two DNS servers at the head office and one WINS server at the branch

office. Plan for one DNS server at the head office and one WINS server at the branch

office.

You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. You want to configure a computer to work both as a Web server named www.admin.bmcompltd.com and a FTP server named ftp.accounts.bmcompltd.com. The current host name of the computer Is compl .admln.bmcompltd.com. You need to configure this computer using CNAME resource records. What are the various CNAME entries you need to make In the admin.bmcompltd.com zone to accomplish this task?

compl IN AIO.0.0,31 ftp IN CNAME compl compl IN A 10.0.0.31 WWW IN CNAME compl ftp IN CNAME compl compl IN A 10.0.0.31 www IN CNAME compl www IN CNAME compl ftp IN CNAME compl

James Is the system administrator at Safest Software Co. James Is monitoring the network, which includes tracking and troubleshooting network problems. Which utility should he use to test the network connectivity and configuration of TCP/IP settings of a remote computer?

Page 8: Final Exam(Q6)

Network Connections Repair Link Netsh command Network Diagnostics utility Ping utility

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The Internal network of the company Is divided Into various zones. The database administrator of the company complains about not being able to send mails and communicate with other computers over the network. To resolve the problem, you need to know the host names of the computers and the ports assigned to provide a particular service. Which resource record should you view to get the desired Information?

Host (A) Start Of Authority (SOA) Service Record (SRV) Pointer (PTR)

You are the system administrator at BlueMoon Computers, You are reviewing the network traffic and notice that there are a large number of DNS queries for resolving the host name of the File server In the network. You also find that the network services are becoming slow because of the DNS queries and irrelevant network traffic for the File server. You decide to configure the entry of the File server In the Hosts file on each computer. The Hosts file will be preloaded In the client resolver cache. You also plan to add name-to-IP address mapping to the Lmhosts file so that the NetBIOS names In the organization can be resolved. What Is the correct sequence of steps you should take to accomplish this task?

View and flush client resolver cache.

View and release NetBIOS name cache.

Preload the client resolver cache.

View and flush client resolver cache.

Preload the client resolver cache.

View and release NetBIOS name cache.

Preload the client resolver cache.

View and flush client resolver cache.

View and release NetBIOS name cache.

Page 9: Final Exam(Q6)

View and release NetBIOS name cache.

Preload the client resolver cache.

View and flush client resolver cache.

You are the system administrator at Supersoft2000. You configure the DHCP scopes. Which DHCP scope property you should configure to set the range of valid IP addresses?

Subnet mask Network ID Lease duration Network IP address range

You are the system administrator of Infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command Is unsuccessful. Which of the following could be a cause of this problem?

The server's cache is populated. The DNS server service is not started. The server has an incorrect IP address. The server is not authoritative for the requested name.

You are a system administrator at Blue Sky Inc. You decide to use IAS to centrally manage remote access to company's network. You maintain a centralized database of all user profiles that can be accessed by other remote access servers on the network. The company decides to expand Its network to various cities, adding 5000 workstations to the network. How will you Justify that IAS Is suitable for the new network configuration?

IAS enables an organization to outsource remote access services. IAS provides simple network admini strati on. IAS enables centralized administration of network access servers. IAS allows scalability of the network.

You are the system administrator at BlueMdon Computers, A WINS server Is Installed at the main branch of the company. You need to maintain the WINS database. You need to ensure that the WINS clients get the correct Information and that the database Is not overcrowded with unnecessary data. What Is the correct sequence of steps that you should perform to accomplish this task?

Compact a WINS database.

Backup and restore a WINS database.

Page 10: Final Exam(Q6)

Scavenge a WINS database.

Check the WINS database for consistency.Backup and restore a WINS database.

Compact a WINS database.

Scavenge a WINS database.

Check the WINS database for consistency.

Backup and restore a WINS database.

Scavenge a WINS database.

Compact a WINS database.

Check the WINS database for consistency.

Scavenge a WINS database.

Compact a WINS database.

Backup and restore aWINS database.

Check the WINS database for consistency.

You are a system administrator at WorldAd, Inc. The company has recently started its offshore branch offices In different countries. All the branch offices need to have a direct secure link with the server running on Windows Server 2003 located at head office In Denver. To keep networking costs minimal, the company decides to use public network Instead of leased lines to connect different offices. All the offices need to use the Virtual Private Network (VPN) connection with the head office. The VPN will ensure user authentication and data security using encryption during transmission. You are asked to enable Routing and Remotes Access service on the server so that the VPN connection can be configured. What prerequisite Information will you require before configuring a VPN server for VPN connection?

Identify the DHCP server or N AS that Is used to assign IP addresses to the remote clients.

Identify RADIUS server or NAS that needs to be configured for authenticating the connection request.

Verify that user accounts are configured with access properties to permit dial-up access.

Page 11: Final Exam(Q6)

Identify the interfaces that connect to the Internet and the private network of the company.

Identify whether the remote client Is assigned IP addresses by a DHCP server or by a VPN server.

Identify the DHCP server or NASthat Is used to assign IP addresses to the remote clients.

Identify RADIUS server or NAS that needs to be configured for authenticating the connection request.

Identify the interfaces that connect to the Internet and the private network of the company.

Identify whether the remote client is assigned IP addresses by a DHCP server or by a VPN server.

Identify whether the VPN connection Is authenticated by a RADIUS server or by a VPN server.

You are the system administrator at Red Sky Inc. The company has a medium-sized network, which has systems running Windows Server 2003. The network has various subnetworks and data transmission between the client computers on the subnetworks takes place through routers. Users using the client computers complain about the long transmission delay for data packets. You analyze the network settings and find that sometimes the data packets enter a loop and are not able to reach the destination computer. Which methodology will you Implement to solve the problem?

Configure the network router and implementing Open Shortest Path First (OSPF). Configure the network router and implementing Classless Interdomain Routing

(CIDR). Configure the network router and implementing Routing Information Protocol

(RIP). Configure the network router and implementing Border Gateway Protocol (BCP).

You are the system administrator in Denver Prime, Inc. The organization has a Windows Server 2003 based network of 400 computers. In addition, there Is a Windows Server 2003 computer, which serves as a DNS as well as an internet server. Recently, you have noticed that the DNS server takes a long time In resolving host names. As a result, you plan to move the DNS server service to a computer with higher configuration. However, you find that this will make the DNS server unavailable for at least two days. This will result In loss of time and effort. So, you plan to optimize the performance of the DNS server. As a first step towards optimizing the performance of the DNS server, you plan to restrict the internet clients from using the DNS server for resolving other domain names on the Internet. Which of the following options will enable you to accomplish this task?

Page 12: Final Exam(Q6)

Disable EDNSO Disable recursion on the DNS server Disable local subnet prioritization Disable round-robin rotation

Consider the following statements:

Statement A: Filter specifies the type of action that needs to be performed on a particular type of network traffic. Statement B: Filter action specifies the type of network traffic to which a particular action is applied.

Which of the following Is true with respect to the above statements?

Statement A is False and Statement B is True. Both Statement A and Statement B are True, Statement A Is True and Statement Bis False. Both Statement A and Statement B are False.

You are the system administrator at Global Software, Inc. The company has one DHCP server and 300 clients. You are responsible for assigning IP addresses to all the client computers. You use DHCP service to assign IP addresses dynamically. You now want to display the date when the server was assigned a dynamic IP address using DHCP. Which field containing the DHCP settings should you use to Implement the required task?

Lease Obtained Lease Expire DHCP Server Default Gateway

You are the system administrator of StarMoon Technologies. The head office of your organization Is located at Boston. The organization has opened two branches In Paris and London. You have been assigned the task of planning the network Infrastructure for the new branches. After analysing the network requirements, you have Implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You need to transfer data between the branches using IP, IPX/SPX, RIP, orOSPF protocol. Depending on the requirements, which intermediate device would you recommend for the network?

Hub Layer 1 switch Layer 2 switch Router

You are the system administrator in Red Sky IT Systems. The head office of your organization is located at Denver. The network of the organization consists of 100 computers on the redsky.com domain. In the head office, IPSec Is deployed for secure

Page 13: Final Exam(Q6)

data transmission/Your Junior system administrator. James Informs you that while connecting to one of the computers, ComputerOl, an error message, ""Invalid authentication protocol" is displayed. You check the IPSec policies configured on James computer, and find that the IPSec policies are correctly configured. When you try to connect to ComputerOl, you also receive the same error message. Which of the following tools will enable you to resolve this problem?

CPO Editor IP Security Monitor RSoP troubleshooting tool Security Configuration and Analysis MMC snap-in

You are the system administrator at Red Sky Inc. The company has a dedicated network of 2000 computers running Windows Server 2003 to control product sales and distribution at various sales offices. The network is not connected to the internet. A DHCP server on the network dynamically assigns IP address to all the computers. Power failure shuts down the DHCP server and it Is not available on the network. New client computers are not able to connect to the network because DHCP server has failed. You are asked to device some solution so the network does not fail in future even after DHCP server goes down. What solution will you suggest for the problem?

Reconfigure the DHCP server to change the client IP addresses.

Run the ipconfig command with /release and /renew options sequentially for each client computer.

Implement alternate IP addressing scheme on the network configuring User configured Alternate Configuration on each computer.

Implement alternate IP addressing scheme on the network configuring Automatic Private IP Addressing on each computer.

The head office of your organization Is located at New York. The organization now plans to open a new branch office at Las Vegas, which will be connected to the head office through WAN links. The new branch office is located In a building with three floors and will accommodate approximately 1000 hosts. Out of these 1000 hosts, 400 hosts belong to the operational department and the remaining 600 hosts belong to the administration department. The network of this branch office will consist of computers running Windows Server 2003 and Windows 2000 operating systems. As the system administrator, you need to create a TCP/IP plan for the new branch office. Identify the most appropriate plan for the new branch office.

You can use classless-based, class C addressing structure. In addition, you can have two subnets for the new branch office.

You can use classless-based, class B addressing structure. In addition, you can have two subnets for the new branch office.

You can use class-based, class C addressing structure. In addition, you can have one subnet for the new branch office.

Page 14: Final Exam(Q6)

You can use class-based, class B addressing structure. In addition, you can have one subnet for the new branch office.

You have joined as a system administrator in PQR Corp. The head office of your organization is located at Chicago and three branch offices are located at Denver, Texas, and California. The network of the head office consists of 100 computers, which are logically divided in three subnets. There is one computer running Windows Server 2003 that is configured as a domain controller. The head office network is connected to the branch office networks by slow WAN links. Computers in the head office and branch offices have been assigned IP addresses manually. You plan to reduce the administrative burden of managing IP addresses manually. Which of the following options will enable you to accomplish this task?

Modify Extension Mechanisms for DNS. Implement mixed DHCP infrastructure in the organization. Configure the domain controller of the organization as a caching-only server. Implement distributed DHCP infrastructure in the organization.

Alpha Communications, Inc. is a leading advertising and media organization located at Boston. The head office of the organization has a setup of 75 computers. The network setup is in a mixed mode that consists of Windows 2000, Windows 98, and Windows Server 2003 operating systems. The organization has opened a new branch office at New York. The branch office has a setup of 50 computers and has a routed environment. The branch office network is a VLAN for the main organization's network. You have just joined as a system administrator in this branch and you have been assigned the task to plan for a host name resolution method, which of the following name resolution methods would be most appropriate for the branch?

Broadcast NetAuto Automatic name resolution LM HOSTS

You are the system administrator at BlueMoon Computers. The computers of the company are interconnected using an internal network. The employees of various departments of the company communicate with each other using the network. The

Page 15: Final Exam(Q6)

employees also access the server to get the required information related to their respective projects. The employees complain that during their sessions they get disconnected from the server, which results in loss of data. They also complain that sometimes they are not able to connect to other applications over the network. Which layer of the OSI model should be checked to resolve the problem?

physical Data Link Transport Session

You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. The data zone located on the primary zone changes. The change in the data zone should be updated in the secondary DNS servers also. You need to make the necessary updates to the secondary DNS servers. Which server should you look for the list of servers to be notified?

Primary Server Authoritative Server Caching-only Server Secondary Server

Reprotek, inc. has its head office at Denver. The organization has opened a new branch office at Boston. The head office supports the Ethernet LAN network where as the branch office supports token ring network. You have created two broadcast domains. One broadcast domain consists of the head office whereas the other broadcast domain consists of the new branch office. You have been assigned the task to select an appropriate intermediate device so that the data is transmitted using a specific protocol. Which of the following devices is best suited in this situation?

Router Hub Layer 3 switch Layer 2 switch

Your organization has acquired a new business contract and has assigned a team of five employees to work on this contract. As this team works on confidential data, you do not want Internet-name resolution for this team. You have installed a new DNS server for this team, in addition, you do not want any client queries to be forwarded to this new DNS server. You also do not want other employees of the organization to use this DNS server internal name resolution. Which of the following options enables you to accomplish this task?

Disable recursion on DNS server. Disable round-robin rotation on DNS server.

Page 16: Final Exam(Q6)

Delete root hints file on DNS server. Disable local subnet prioritization on DNS server.

You are the system administrator at BlueMoon Computers. The internal network of the company connects all the computers in the company. A remote client broadcasts the NetBIOS name query packet to internal network interface to connect to a computer over the network. The broadcast is unable to resolve the name of the computer. You need to preload the NetBIOS name cache using the Lmhosts file to allow it to resolve NetBIOS names. To preload the NetBIOS name cache using Lmhosts file, you need to perform the following steps:

1. Open the Run dialog box and type notepad

%systemroot%system32\drivers\etc\lmhosts.sam in the Open combo box.

2. insert the required information in discrete lines of Lmhosts file for preloading the content in the NetBIOS name cache.

3. Click the OK button to open the Lmhosts file for editing in Notepad.

4. Select the All Files option from the Save as type list box and type "lmhosts" to save the file without an extension.

5. Select the Save As option from the File menu to open the Save As dialog box.

6. Click the Save button to complete the preloading process and close the Notepad.

What is the correct sequence of steps you need to follow to accomplish this task?

1,3,2,5,4,6 1,2,3,5,4,6 1,3,2,4,5,6 1,2,3,4.5.6

An organization has its head office at Denver and two branch offices at Virginia and New York- Each branch including the head offices has implemented NLB clusters. You, as a system administrator, need to monitor the NLB cluster of the New York branch from the head office. Which of the following commands will enable you to perform this task?

Nib.txt Nlb.exe Nlb.dat Nlb.clr

You are the system administrator at Red Sky Corp. The company has a large network consisting of many subnetworks containing systems running Windows Server 2003. The

Page 17: Final Exam(Q6)

subnetworks are used by the branch offices, which send latest production information to the head office. The company has decided to start a new branch office in New Jersey. You are asked to connect the subnetwork in the branch office with the main network so that the latest production information can be delivered to the head office. How will you configure the connection?

Configure network routing by adding a routing protocol and a routing interface. Configure network routing by configuring RRAS, and adding a routing protocol. Configure network routing by configuring RRAS only. Configure network routing by configuring RRAS, adding a routing protocol, and

adding a routing interface.

Consider the following statements:

Statement A: Filter specifies the type of action that needs to be performed on a particular type of network traffic. Statement B: Filter action specifies the type of network traffic to which a particular action is applied.

Which of the following is true with respect to the above statements?

Statement A is False and Statement B is True. Statement A is True and Statement B is False. Both Statement A and Statement B are True. Both Statement A and Statement B are False.

You are the system administrator at BlueMoon Computers. The company has various branches at different places. The various branches are interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition?

Extinction timeout Renewal interval Verification interval Extinction interval

James is the system administrator at Smart Software Development. The company is having remote network access between the computers of branch office and head office. James needs to monitor the network access servers through various objects. These objects contain information about the remote network access requests, errors, protocols, and performance data. Which object should James use to monitor the performance of individual remote access ports?

Page 18: Final Exam(Q6)

RAS Port IAS Authentication Client IAS Authentication Server RA Total

You are the system administrator at Red Sky IT Systems. You configure the DHCP reservation. Which element of DHCP reservation should you configure for the value that identifies a particular reservation?

MAC address Reservation name Description IP address

You are the system administrator of Best Sportswear, inc. The head office of the organization is in Washington DC. The organization now plans to set up a new customer care outlet in the same city. This outlet will have 1 5 computers running Windows Server 2003 and Windows 2000 operating systems. The network of the customer care outlet will not be an independent network and it will be connected to the network of the head office using slow WAN links. One computer will be the FTP server that will be used by the employees of the customer care outlet to communicate with the head office. The FTP server will have a static IP address. As a system administrator, you need to create the best suited TCP.'IP plan for the customer care outlet as per the existing infrastructure and the requirements of the organization, identify the most azpropriate plan.

You can use class-based, class C addressing structure, in addition, you can use manual addressing for allocating the IP addresses to the hosts of the customer care outlet.

You can use classless-based, class C addressing structure, in addition, you can use manual addressing for allocating the IP addresses to the hosts of the customer care outlet.

You can use class-based, class C addressing structure. In addition, you can use DHCP dynamic addressing for allocating the IP addresses to the hosts of the customer care outlet.

You can use classless-based, class C addressing structure. In addition, you can use DHCP dynamic addressing for allocating the IP addresses to the hosts of the customer care outlet.addition, you can use DHCP dynamic addressing for allocating the IP addresses to the hosts of the customer care outlet.

You are the system administrator of Dreamz, inc, an organization that creates multimedia graphics. The head office of your organization is located at Denver. The management of your organization plans to open a branch office at Melbourne. You have been assigned the task of planning the network infrastructure for the new branch office at Melbourne considering that heavy multimedia files would be transferred on the network. The

Page 19: Final Exam(Q6)

organization's network has high configuration computers. Identify the network access connection method that is most appropriate for the branch office.

LAN Wireless LAN VPN Dial up

Consider the following statements:

Statement A: The NS resource record appears in the forward lookup zones.

Statement B: The NS resource record appears in the reverse lookup zones.

Which of the following is true with respect to above statements?

Statement A is False and Statement B is True. Both Statement A and Statement B are False. Both Statement A and Statement B are True. Statement A is True and Statement B is False.

You are the system administrator of BtueMoon Computers. The network in your organization is based on Windows Server 2003. There is one DNS server service installed on a Windows Server 2003 computer. The client computers in your domain are Windows NT 3.5x, Windows 2000, and Windows 2003. The users of Windows 2003 complain about being unable to access the shared resources on Windows NT server over the network. They need to access the Windows NT server to get some important information related to their project. Why are the employees unable to get their data from the Windows NT server?

The clients working on Windows NT have not been manually updated with the DNS server.

The DHCP server does not have the Enable Updates for DNS Clients That Do Not Support Dynamic Update check box selected.

You have not run the ipconfig /all command on all the Windows 2003 computers. The DNS server has the Enable Updates for DNS Clients That Do Not Support

Dynamic Update check box selected.

You are the system administrator at BlueMoon Computers. The internal network of the company has a DHCP server to manage all the DHCP clients. You go for an important meeting. While you attend the meeting, the assistant system administrator looks after the network activities. When you come back, the assistant system administrator informs you that many employees are unable to access the network. He also informs that some employees complained about the IP conflict problem they are facing when they want to communicate with other computers. What should you do to find out what went wrong while you were not present?

Page 20: Final Exam(Q6)

Check the J50.log file to find out the various transactions in the DHCP database transactions.

Check the Resl .log file to find out the various transactions in the DHCP database transactions.

Check the dhcp.mdb file to find out the various transactions in the DHCP database transactions.

Check the Tmp.edb file to find out the various transactions in the DHCP database transactions.

You are the system administrator of StarMoon Technologies. The head office of the organization is located at Boston. Your organization has opened two branches in Paris and London. You have been assigned the task of planning the network infrastructure for the new branches. After analysing the network requirements, you have implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You need to transfer data between the branches using the IPX protocol only. Depending on the requirements, which intermediate device would you recommend for the network considering that the management wants you to implement the most inexpensive device?

Layer 3 switch Router Layer 2 switch Hub

You are the system administrator at Red Sky inc. The company has a dedicated network of 2000 computers running Windows Server 2003 to control product sales and distribution at various sales offices. The network is not connected to the Internet. A DHCP server on the network dynamically assigns IP address to all the computers. Power failure shuts down the DHCP server and it is not available on the network. New client computers are not able to connect to the network because DHCP server has failed. You are asked to device some solution so the network does not fail in future even after DHCP server goes down. What solution will you suggest for the problem?

Run the ipconfig command with .'release and /renew options sequentially for each client computer.

Reconfigure the DHCP server to change the client IP addresses. Implement alternate IP addressing scheme on the network configuring User

configured Alternate Configuration on each computer. Implement alternate IP addressing scheme on the network configuring Automatic

Private IP Addressing on each computer.

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The database administrator of the company wants to send and receive mails from the clients of the

Page 21: Final Exam(Q6)

company. You want to find out whether a SMTP e-mail server is present on the network. Which resource record should you view to get the desired information?

Service Record (SRV) Mail Exchange (MX) start Of Authority (SOA Host (A)

The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices?

Distributed Fixed Centralized Mixed

Consider the following statements:

Statement A: A NetBIOS computer with name Computer! [OOh] provides workstation services.

Statement B: A NetBIOS computer with name Computer2 [03h] provides messenger services.

Which of the following is true with respect to the above statements?

Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both Statement A and Statement B are True. Both Statement A and Statement B are False.

You are the system administrator in Red Sky IT Systems. The head office of your organization is located at Denver. The network of the organization consists of 100 computers on the redsky.com domain. In the head office, IPSec is deployed for secure data transmission. Your junior system administrator, James informs you that while connecting to one of the computers, ComputerOl, an error message, "Invalid authentication protocol" is displayed. You check the IPSec policies configured on James computer, and find that the IPSec policies are correctly configured. When you try to connect to ComputerOl, you also receive the same error message. Which of the following tools will enable you to resolve this problem?

Page 22: Final Exam(Q6)

CPO Editor Security Configuration and Analysis MMC snap-in IP Security Monitor RSoP troubleshooting tool

Which route stored in a routing table is the route to a specific host on the network or contains a broadcast address?

Default route Host route Network route Network mask

Janes Technologies has a setup of 80 computers. This organization uses an SQL database that is hosted on two computers in the network. The SQL server database is required round-the-clock because most of the data updates occur after office hours. The organization has recently recruited 40 employees who will be using the SQL server database. As a system administrator, you need to plan the availability of this database for all the 120 employees considering the fact that you also need to ensure consistency of the data stored in the database. Which of the following types of clusters is best suited for meeting these requirements?

Create an NLB quorum cluster Create a server cluster Create a server quorum cluster Create an NLB cluster

Which of the following is an invalid character according to the DNS naming standards ?

Alphabet Hyphen Number Underscore

You are the system administrator at Safest Software Co. You are monitoring the network, which includes tracking and troubleshooting network problems, which utility should you use to troubleshoot TCP/IP problems?

Address resolution utilities Network Diagnostics utility Netsh command Network Connections Repair Link

Page 23: Final Exam(Q6)

You are the system administrator at Modern Research inc. The company is a research organization that manages a community of research scientists from various universities across the globe. The company has its head office in Atlanta and all the scientists working on a project submit their thesis at the head office for publishing. The scientist at the remote location needs to establish a connection with the Windows Server 2003 server in head office using dial-up. The connection should be physical, non-permanent, and secure so that a malicious user cannot trap the transmitted data. You are asked to configure the Routing and Remote Access on the server so that the scientists can communicate with the server in a secure manner using dial-up. What configuration information will you take into consideration while configuring the Remote Access Server for dial-up?

identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients identify the type of link used by the client to setup a connection with remote access server.

Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Which of the following options is a storage method for networks that use SCSI parallel bus to connect multiple storage devices in a network?

Zoning LUN masking Server cluster NLB cluster’

Which predefined ipsec policy ensure communication with only ipsec enable devices?

Client and server Secure server Client Server

Page 24: Final Exam(Q6)

You are the system administrator of infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command is unsuccessful. Which of the following could be a cause of this problem?

The server has an incorrect IP address. The server's cache is populated. The DNS server service is not started. The server is not authoritative for the requested name.

You are a system administrator at WOrldAd, Inc. The company has 150 employees. All the employees are authorized to access sensitive data files available on company servers. You want to ensure that only authenticated users can access the data files using PAP, CHAP, and MS-CHAP protocols. Users authenticated with the authentication protocols should be allowed to establish remote connection, which parameter of the policy profile should be configured to meet the requirements?

Authentication Encryption Dial-in-constraints IP properties

John is the system administrator at Technology Systems. The company has one DHCP server and 300 clients. John is responsible for assigning IP addresses to all the client computers. He uses DHCP service to assign IP addresses dynamically. He now wants to display the IP address of the DHCP server that responds to the DHCP request. Which field containing the DHCP settings should John use to implement the required task?

DNS Server Subnet Mask DHCP Server Default Gateway

Consider the following statements:

Statement A: You should disable the local subnet prioritization method when the servers having multiple IP addresses are not on the same subnet.

Statement B: You should disable the round-robin rotation method when the servers having multiple IP addresses are on the same network.

Which of the following is correct about the above statements?

Page 25: Final Exam(Q6)

Both, Statement A and Statement B are True. Statement A is False and Statement B is True. Both, Statement A and Statement B are False. Statement A is True and Statement B is False.

You are the system administrator at Red Sky inc. The company has a network of Windows Server 2003 systems. A server, running Windows Server 2003, in the company's head office has a collection of class files. Classes need to be used by the software developers to develop software. Users connected to the network want to access the server as Web server. You are also required to implement authentication and authorization so that an unauthorized user cannot access the resources available on the server, in addition you should monitor the routing activities taking place during data transfer. How will you meet the requirements?

Configure the network server to allow packet filtering. Configure the network router and implement Open Shortest Path First (OSPF). Configure the network server to allow Routing and Remote Access Service. Configure the network router and implement Routing Information Protocol (RIP).

You are the system administrator at Blue Moon Inc. The company network consists of 500 computers. All the computers are running on Windows Server 2003. James is using a client computer on the network. He wants to access the files available on the server. The server has an IP address 192.168.0.45. James complains that he is not able to access the server computer. You decide to examine the ARP cache on James' computer. You notice that the MAC entry corresponding to 192.168.0.45 address in ARP cache does not match with the MAC address of the server computer. How will you fix the problem?

Identify the MAC address of the server using arp -a command. Modify the ARP cache, deleting the entry corresponding to the IP address

192.168.0.45. Identify the MAC address of the server using arp -a command, and then, modify

the ARP cache by adding correct MAC address into the ARP cache as a static entry. Modify the ARP cache, adding a different MAC address corresponding to the IP

address 192.168.0.45.

You are the system administrator in Texas Computers, Inc., with its head office at Texas. The total number of hosts at the head office is 50. The organization now plans to open a branch office at New York that will have 100 hosts. The branch office at New York will be a separate subnet but will be connected to the organization's network at Texas, through VPN. You need to plan the TCP/IP addressing structure for the new branch office according to the current infrastructure of the organization, identify the most appropriate addressing structure for the new branch office.

Classless-based, class C addressing structure Class-based, class B addressing structure Classless-based, class B addressing structure

Page 26: Final Exam(Q6)

Class-based, class C addressing structure

You are the system administrator of Red Sky Corp. The domain in the company network has two Windows Server 2003 member server computers named Server 1 and Server 2. Routing and Remote Access Service is enabled for remote access on Server 2. IAS is installed on Server 1. Server 2 uses Server 1 to authenticate remote access credentials. The remote access policies on Server 1 specify that domain members are allowed remote access to the network. However, users report that they are not allowed to dial in to Server 2. You need to identify the cause of the problem and suggest a solution to resolve the problem. How will you accomplish the task?

Server 1 is configured to support only local user accounts. Configure Routing and Remote Access on Server 1 to use RADIUS Authentication to resolve the problem.

Server 1 is configured to support only local user accounts. Add Server 1 to the RAS and IAS Servers group in Active Directory to resolve the problem.

Server 1 is configured to support only local user accounts. Add arealm replacement rule for the Windows Server 2003 domain on Server 1 to resolve the problem.

Server 1 is configured to support only local user accounts. Add a remote access policy that uses MS-CHAP on Server 1 to resolve the problem.

Which event ID in the DHCP server audit log specifies an event when a client renews a lease ?

11 12 02 10

Consider the following statements:

Statement A: The NS resource record appears In the forward lookup zones.

Statement B: The NS. resource record appears in the reverse lookup zones.

Which of the following Is true with respect to above statements?

Both Statement A and Statement B are False. Both Statement A and Statement B areTrue: Statement A Is True and Statement B Is False. Statement A is False and Statement B is True.

Page 27: Final Exam(Q6)

Which RRAS feature in Windows Server 2003 supports routing, where one computer sends packets addressed for the entire network?

Demand-dial routing Network address translation Multicast routing Unicast routing

Which of the following functions Is performed by IPSec?

Authenticates client computers Involved in communication Establishes a communication path between peer entities Provides password protection for data Provides insecure communication between clients

You have joined Texas Computers, Inc. as a system administrator. You have been asked to plan the network Infrastructure for the two new branch offices of the organization. You have to collect and record the Information about the various teams that will be implementing the network infrastructure. You also need to determine the tools and strategies that will be used for implementing the network Infrastructure for the new branch offices. In addition, you need to Identify contingencies and unforeseen problems during the Implementation of the network Infrastructure and determine ways to deal with such problems. Identify the plans In which you will record this Information.

Team plan, support plan, and communication plan Communication plan, capacity plan, and test plan Communication plan, deployment plan, and support plan Team plan, capacity plan, and test plan

You are the system administrator at Blue Moon Computers. The Internal network of the company consists of a DHCP server and various DHCP clients. The company has undertaken many new projects. The team members of the new projects are located at different places and need to communicate with each other over the internal network of the company. The employees of the company complain that they are unable to get the services from the server. The employees also complain that they have to wait far a considerably long time to download the files from the network to their computers. Sometimes, the request for a file or network resource Is timed out and is rejected by the server. The employees need to transfer files to each other to perform their project work. What should you do to let the employees complete their projects In time?

Use the DHCP statistic, Offers, to find out how many DHCPOFFER packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests.

Use the DHCP statistic, Declines, to find out how many DHCPDECLINE packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests.

Page 28: Final Exam(Q6)

Use the DHCP statistic, Discovers, to find out how many DHCPDISCOVER packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests.

Use the DHCP statistic, Requests, to find out how many DHCPREQUEST packets are received from each client. This will help you to know who Is trying to overload the network with unnecessary service requests.

You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Vi rgl ni a and Texas. The Vi rgi ni a branch has 1100 hosts. H owever, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch Is 1000 per second. The Texas branch has 21OG hosts. The expected number of client queries for the branch is 1900 per second. You need to plan the number of zones and DNS servers for each branch. Which of the following options would you recommend for your organization?

Four zones at each branch and a DNS server for each branch. A zone at each branch and a separate DNS server for each zone. Two zones at the Texas branch office and a separate DNS server for each zone. A

single zone at the Virginia branch office with one DNS server. Two zones at the Virginia branch office and a separate DNS server for each zone.

A single zone at the Texas branch office with one DNS server

The head office of Matrix, Inc. Is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers In these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP Infrastructure strategy you will plan for the new branch offices?

Distributed Fixed Mixed Centralized

Which event ID In the DHCP audit log file specifies an event when an IP address Is Issued to a client?

10 13 12 11

You are the system administrator at Global Software, Inc. The company has one DHCP server and 300 clients. You are responsible for assigning IP addresses to all the client computers. You use DHCP service to assign IP addresses dynamically. You now want to

Page 29: Final Exam(Q6)

display the date when the server was assigned a dynamic IP address using DHCP. Which field containing the DHCP settings should you use to Implement the required task?

Lease Expire DHCP Server Default Gateway Lease Obtained

Origin Communications, Inc. Is a leading ISP provider that has Its head office located at London. This organization has 10 branches In different parts of USA. At the head office, a 3600 modular router Is placed and at each branch office 2500 series routers are placed for transmitting the data packets. The organization has opened 16 new branches in different parts of the world. You as a system administrator have been assigned the task to select an appropriate routing protocol for the new branch offices. Which of the following routing protocols will be best suited for the new branch offices?

Static ospf rip vpn

You are the system administrator of Infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command Is unsuccessful. Which of the following could be a cause of this problem?

The DNS server service is not started. The server has an Incorrect IP address. The server is not authoritative for the requested name. The server's cache is populated.

StarMoon Technologies has its head office at Boston. The network of the head office consists of 200 computers running Windows Server 2003. The branch office of the organization is located at Texas City. The network ofthe branch office consists of 100 computers running Windows NT computers. The head office and the branch office are connected through slow WAN links. Select the best-suited name resolution strategy for resolving host names for the organization.

Plan for two DNS servers at the head office and one WINS server at the branch office.

Plan for one DNS server at the head office and one WINS server at the branch office.

p|an for one DNS server and one WINS server, both located at the head office.

Page 30: Final Exam(Q6)

Plan for one WINS server at the head office and one DNS server at the branch office.

You are a System administrator at Red Sky Corp. You are asked to Implement a security policy on the company network. You Implement the security policy configuring MS-CHAP authentication on RRAS. John Is an employee In the company and has remote access rights as specified In the access policies for the network. You need to modify the parameters In the policy profile so that a user cannot change the account password later. How will you meet the requirements by configuring a parameter In policy profile?

Configure Multilink parameter. Configure IP properties. Configure Encryption parameter. Configure Authentication parameter.

You are the system administrator at BlueMOon Computers, The internal network of the company contains a DNS server. Whenever the DNS database Is changed or updated, you need to manually update the changes. The size of the DNS database Is large. Therefore, you want to automate the system of updating the DNS database. The DNS database contains confidential data related to the projects going on In the company, and therefore, data must be secure. What should you do to reduce your burden of updating the database and keep the security of the DNS database?

Create a new zone with Do not allow dynamic updates option selected. Create a new zone with Allow both secure and nonsecure dynamic updates option

selected. Configure zone to allow transfer from specified IP addresses. CCreate a new zone with Allow only secure dynamic updates option selected.

Consider the following statements:

Statement A: Filter specifies the type of action that needs to be performed on a particular type of network traffic.

Statement B: Filter action specifies the type of network traffic to which a particular action is applied.

Which of the following Is true with respect to the above statements?

Both Statement A and Statement B are False. Statement A is True and Statement B is False. Both Statement A and Statement B are True. Statement A is False and Statement B is True.

Consider the following statements:

Page 31: Final Exam(Q6)

Statement A: A host name of a computer contains a maximum of 255 characters.

Statement B: ANetBIOS name consists of amaximum ofl5 characters. Which of the following Is true with respect to the above statements?

Both Statement A and Statement B are True. Statement A is False and Statement B is True, Statement A Is True and Statement Bis False. Both Statement A and Statement B are False.

You are working as the system administrator at WorkWithTerminals. The organization provides network solutions to the client organizations. A client organization want to connect its subnetworks. It wants to Install a router for each link, which will route the network traffic from source to destination. The router should dynamically collect the routing Information and the routing table should also be updated from time to time. What kind of routing solution would you suggest to the organization?

Connect the subnetworks using a router that implements Open Shortest Path First (OSPF).

Connect the subnetworks using a router that implements Routing Information Protocol (RIP).

Connect the subnetworks using a router that Implements static routing. Connect the subnetworks using a router and do not implement a routing protocol.

You are the system administrator of Janes Technologies. The organization has 1200 hosts that use a customized application. This application Is required to be available 24X7 for all the employees of the organization. The downtime of this application can result in loss of business and effort. As a result, you need to plan for providing 24X7 availability of this application with minimal downtime. Which of the following options Is the best possible strategy to accomplish this task?

Create a server cluster that is based on local quorum cluster model. Create a server cluster that is based on minority node set quorum device cluster

model. Create a server cluster that is based on single quorum device cluster model. Create a server cluster that is based on majority node set quorum cluster model.

You are the system administrator at BlueMOon Computers, The internal network of the company contains a primary DNS server and various secondary DNS servers. The Internal network of the company is divided Into various zones. The managing director of the company wants you to give him a list of all the zones of the network and the e-mail address of the administrator of that zone. Which resource record should you view to get the required Information?

Start Of Authority (SOA) Host (A).

Page 32: Final Exam(Q6)

Pointer (PTR) Service Record (SRV)

You are the system administrator at Red Sky Inc. the company's network consists of 500 systems with Windows Server 2003 servers. An authorized remote user can access the shared files available on servers. You are asked to keep track of network access activities using routing and remote access logging characteristics provided by RRAS. In addition, you are asked to perform the following activities:

Maintain a detailed record of all remote access requests. Log names of remote access policies for all the connection attempts.

You want to use the Information available In the above logs for Judicial enforcement of remote access policies. How will you meet the requirements?

Configure the server to allow Audit logging. Configure the server to allow Local Authentication and Account logging. Configure the server to allow Event logging. Configure the server to allow Polnt-to-PoInt logging.

You are the system administrator at WorldAd, Inc. The network has 50 computers, which are Installed in an office. All the computers are running Windows Sever 2003 and configured to use NetBIOS naming function. The computers are configured as B-type nodes of NetBT protocol and use WINS IP addresses. The company decides to scale up the network to contain 5000 computers. After expansion of the network size all the employees complain about degraded network bandwidth. How will you fix the problem?

Configure network computers as M-node types, so that the computers use broadcast as a default for name resolution.

Configure networks computers as P-node types and use a NetBIOS Name Server (NBNS) for naming function.

Deny the use of NetBIOS naming functions for logical naming of host computers. Change the ip address type.

You are the system administrator at Red Sky Inc. All the computers on the network are running Windows Server 2003. The network has a DNS server to resolve host names with IP addresses. The DNS server provides DHCP services and assigns IP addresses dynamically to the client computers. Client computers on the network access the Internet through a proxy server with an IP address 192.168.0.254. The configuration of DHCP server is changed according to the requirements of a new project. Employees complain to you that they are unable to access the Internet. Employees need to access the Internet to complete their project in scheduled time. What will you do to resolve the problem?

Permanently lease an IP address to the proxy server and specify this setting in DHCP server.

Assign a static IP address to the proxy server.

Page 33: Final Exam(Q6)

Allow the DHCP server to assign an IP address for the proxy server. Assign a new IP address to proxy server every time the proxy server connects to

the Internet.

You are the system administrator at BlueMOon Computers, The computers of the company are interconnected using an internal network. The employees of various departments of the company communicate with each other using the network. The employees also access the server to get the required Information related to their respective projects. The employees complain that during their sessions they get disconnected from the server, which results In loss of data. They also complain that sometimes they are not able to connect to other applications over the network. Which layer of the OSI model should be checked to resolve the problem?

Data Link Session Transport Physical

You are the system administrator at WorldAd, Inc. The company has a large network of Windows Server 2003 computers. The employees of the company use the internal network to communicate and transfer the data related to their projects. The internal network of the company Is divided Into various subnetworks. Multiple routers are used to connect the various subnetworks with each other. The routers are configured such that they discard the data packets If the network traffic or hop counts for a data packet increase more than the threshold value. The employees from the various subnetworks complain to you that the time taken In transferring the data from one subnetwork to the other is more than expected during the office working hours. The employees also complain that sometimes the data is not all transferred from one sub network to another. What should you do to solve the problem?

Use Routing Information Protocol (RIP) for routing the data packets. Use Classless Interdomain Routing (CIDR) for routing the data packets. Use Border Gateway Protocol (BGP) for routing the data packets. Use Open Shortest Path First (OSPF) for routing the data packets

You are the system administrator in Red Sky IT Systems. The head office of your organization is located at Denver. The network of the organization consists of 100 computers on the redsky.com domain. In the head office, IFSec Is deployed for secure data transmission. Your Junior system administrator. James Informs you that while connecting to one of the computers, ComputerOl, an error message, ""Invalid authentication protocol" is displayed. You check the IFSec policies configured on James computer, and find that the IFSec policies are correctly configured. When you try to connect to ComputerOl, you also receive the same error message. Which of the following tools will enable you to resolve this problem?

Page 34: Final Exam(Q6)

RSoP troubleshooting tool Security Configuration and Analysis MMCsnap-in IPSecurity Monitor GPO Editor

How many generic domains are present in the domain name space ?

Two Four Seven Three

You are the system administrator at BlueMOon Computers, The company has various branches at different places. The various branches are Interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition?

Extinction interval Extinction timeout Renewal interval Verification interval

You are the system adm i ni strator at Sm artsoft2000. Al I the com puters In the company are running Windows Server 2003 as their operating system. You have Installed and configured network access services on the computers of accounts department. Same of the users of accounts department start complaining about connection failure and slow connection speed. Which utility should you use to resolve these problems?

Recovery Console Event Viewer System Monitor and Performance Logs and Alerts Task Manager

Consider the following statements:

Statement A: The caching-only servers are non-authoritative servers that contain Information regarding frequently requested domain names and IP addresses associated with each domain name. Statement B: The information contained in the caching-only server is used only to quickly answer queries from other DNS servers.

Page 35: Final Exam(Q6)

Which of the following Is correct about the above statements?

Both, Statement A and Statement B are True. Statement A is True and Statement B is False. Both, Statement A and Statement B are False. Statement A is False and Statement B is True.

James Is the system administrator at Safest Software Co. James Is monitoring the network, which includes tracking and troubleshooting network problems. Which utility should he use to test the network connectivity and configuration of TCP/IP settings of a remote computer?

Ping utility Network Connections Repair Link Network Diagnostics utility Netsh command

You are the system administrator in Denver Prime, Inc. The organization has a Windows Server 2003 based network of 400 computers. In addition, there Is a Windows Server 2003 computer, which serves as a DNS as well as an internet server. Recently, you have noticed that the DNS server takes a long time In resolving host names. As a result, you plan to move the DNS server service to a computer with higher configuration. However, you find that this will make the DNS server unavailable for at least two days. This will result In loss of time and effort. So, you plan to optimize the performance of the DNS server. As a first step towards optimizing the performance of the DNS server, you plan to restrict the internet clients from using the DNS server for resolving other domain names on the Internet. Which of the following options will enable you to accomplish this task?

Disable round-robin rotation Disable recursion on the DNS server Disable local subnet prioritization Disable EDNSO

You are the system administrator at BlueMOon Computers, You have established the internal network of the company, which connects all the computers. You assign host names and NetBIOS names to the computers on the network. Different applications run on different computers. An application running on a computer needs to communicate with another computer on the network to request for some information. The application sends a host name to the DNS client sen/Ice. The following steps are performed:

1. DNS server sends the request to the NetBIOS name resolution process.

Page 36: Final Exam(Q6)

2. DNS client service seeks the required host name in the client resolver cache.

3. DNS client sen/ice seeks the host name query to the DNS server.

4. The corresponding IP address Is returned to the application on success.

What Is the correct sequence of steps that is followed when the DNS client service resolves the host name to the corresponding IP address?

2,3,1,4 2,1,3,4 1,2,3,4 3,2,1,4

BlueMoon Computers has implemented the Windows Server 2003 domain-based network at their head office at California. You are the system administrator of the company. The CEO of the company asks you to provide a remote connection to two employees of the company, who need to connect to the company's private network from New York. For this you configure a VPN support for remote connectivity on the remote access server and configure the client computers for VPN connectivity. Now, you have to maintain the security of the private network to avoid any unauthorized access.

Which Is the most appropriate option to implement the security at the head office?

Configure NAS for authenticating the connection request. Configure Smart Card authentication on the remote access server. Configure Dial-up connection for remote clients instead of VPN connection. Configure Smart Card authentication on NAS.

You have been assigned the task of providing an Internet connectivity solution to.an organization. The network of the organization Includes 50 computers on a non-routed environment. The organization requires private addressing on the computers within the network. In addition, the organization does not want to restrict the Internet access on a user-by-user basis. Based on these requirements, which Internet connectivity solution would you recommend for the organization?

NAT Kerberos V5 Isa Public key certificate

Page 37: Final Exam(Q6)

You are the system administrator of Best Sportswear, Inc. The head office of the organization is In Washington DC. The organization now plans to set up a new customer care outlet In the same city. This outlet will have 15 computers running Windows Server 2003 and Windows 2000 operating systems. The network of the customer care outlet will not be an Independent network and It will be connected to the network of the head office using slow WAN links. One computer will be the FTP server that will be used by the employees of the customer care outlet to communicate with the head office. The FTP server will have.a static IP address. As a system administrator, you need to create the best suited TCP/IP plan far the customer care outlet as per the existing Infrastructure and the requirements of the organization. Identify the most appropriate plan.

You can use classless-based, class C addressing structure. In addition, you can use manual addressing for allocating the IP addresses to the hosts of the customer care outlet.

You can use classless-based, class C addressing structure. In addition, you can use DHCP dynamic addressing for allocating the IP addresses to the hosts of the customer care outlet.

You can use class-based, class C addressing structure. In addition, you can use DHCP dynamic addressing for allocating the IP addresses to the hosts of the customer care outlet.

You can use class-based, class C addressing structure. In addition, you can use manual addressing for allocating the IP addresses to the hosts of the customer care outlet.

In which type of failover policy, the server cluster consists of high capacity nodes that can host multiple applications?

Standby server N+l configuration Failover pairs Random

Identify the network In which a layer 2 switch Is best suited.

A network of 1500 computers with heavy traffic on the network. A network of 40 computers that has high level of data loss. A network of 40 computers that has high broadcast traffic. A network of 40 computers, which is divided into two subnets and data needs to

be transferred using any protocol.

John is the system administrator at Technology System, John configures the DHCP scopes. Which DHCP scope property should be configure to spetify the time period for which DHCP server will assign IP address ?

Exclusion range Scope Name Lease duration

Page 38: Final Exam(Q6)

Router

You have joined BlueMoon Computers as a system administrator. The Internal network of the company Is divided Into various zones. The Internal network has a primary DNS server and various secondary NS servers to manage different zones of the network. The company has undertaken a new project. The team members of the project need to communicate with each other using the names corresponding to the role they are assigned In the project. So, you need to change the host names of computers used by these employees. Which record source do you use to rename the computers?

Alias (CNAME) Mail Exchange (MX) Start Of Authority (SOA) Nameserver (NS)

You are the system administrator of StarMoon Technologies. The network of your organization includes 200 computers on a Windows 2003 based network. In your organization, 20 employees are deployed offshore for a project at London. These employees logon to the organization's network using dial-up connection. Recently, the CEO of your organization, Nancy Jones Informs you that she has to attend a three-day conference In London. During her stay In London, she wants to.access the organization's network remotely using her laptop. You need to assign her special privileges that are not available to other remote users deployed In London. How can you accomplish this task with least administrative effort and without disturbing the current network communication mechanism?

You can configure an IAS server and grant special pnvileges to Nancy when she logs on remotely.

You can configure a RADIUS server and grant special privileges to Nancy when she logs on remotely.

You can assign static IP address to the laptop of the CEO and assign special privileges to that IP address.

You can use Audit and Oakley logging to grant special privileges to the laptop of the CEO.

You are the system administrator at Red Sky IT Systems. You configure the DHCP reservation. Which element of DHCP reservation should you configure for the value that identifies a particular reservation?

MAC address Reservation name Description IP address

Page 39: Final Exam(Q6)

You are the system administrator in StarMoon Technologies. The organization has its head office at Florida and branch office at Los Angeles. Everyday, important information, such as daily sales report and customer records are sent from the branch office to the head office using a dial-up connection. You want to ensure that the data that is being transmitted using the dial-up connection is secure from unauthorized access. Which of the following options will enable you to accomplish this with least administrative effort?

Configure the RADIUS server. Implement IPSec policies. implement a private network between the head office and the branch office. Configure internet Authentication Server (IAS).

You are the system administrator at Blue Moon Computers. The internal network of the company consists of a DHCP server and various DHCP clients. The company has undertaken many new projects. The team members of the new projects are located at different places and need to communicate with each other over the internal network of the company. The employees of the company complain that they are unable to get the services from the server. The employees also complain that they have to wait for a considerably long time to download the files from the network to their computers. Sometimes, the request for a file or network resource is timed out and is rejected by the server. The employees need to transfer files to each other to perform their project work. What should you do to let the employees complete their projects in time?

Use the DHCP statistic, Discovers, to find out how many DHCPDISCOVER packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests.

Use the DHCP statistic, Requests, to find out how many DHCPREQUEST packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests.

Use the DHCP statistic, Declines, to find out how many DHCPDECLINE packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests.

Use the DHCP statistic, Offers, to find out how many DHCPOFFER packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests.

The head office of Janes Technologies is located at New York. This office has a setup of 1000 computers running Windows Server 2003. One computer is running as a DNS server to resolve the names for the domain, janestechnologies.com. The branch office of this organization is located at London. The head office is connected with the branch office using slow WAN links. The users from the branch office send name resolution queries to the head office. You as a system administrator need to select an appropriate

Page 40: Final Exam(Q6)

strategy to reduce the load on the DNS server at the head office. Which of the following options will be the most appropriate strategy for this situation?

Disable recursion on the DNS server at the head office and place one DNS server at the branch office.

Place one DNS server at the branch office and configure forwarders. Place two DNS server at the head office. Place one DNS server at the head office and one DNS server at the branch office.

You are the system administrator in Best Computers, Inc., with its head office at New York. The organization has 15 branches across USA, with total number of employees being 8000. The organization now plans to open up 4 new branch offices in Europe with each branch office having 1000-1200 hosts, in addition, each new branch office will be a separate network that will be connected to the main organization's network through VPN and leased lines. As a system administrator, you need to plan the TCP IP addressing structure for the new branch offices according to the current infrastructure of the organization, identify the most appropriate addressing structure for the new branch offices.

Classless-based, class A addressing structure Class-based, class A addressing structure Class-based, class B addressing structure Classless-based, class B addressing structure

You are the system administrator at BlueMoon Computers. The internal network of the company connects all the computers. Most of the computers in the network are Windows 95 and Windows 98 computers. An application running on a computer needs to get some data from another computer over the network. The application sends a request to resolve the NetBIOS name of the corresponding computer. Where does the application send the request at first during the NetBIOS name resolution?

Lmhosts file Broadcasts on the network NetBIOS cache WINS server

Consider the following statements:

Statement A: A host name of a computer contains a maximum of 255 characters.

Statement B: A NetBIOS name consists of a maximum of 15 characters. Which of the following is true with respect to the above statements?

Both Statement A and Statement B are False.

Page 41: Final Exam(Q6)

Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both Statement A and Statement B are True.

You are the system administrator at BlueMoon Computers. The company has various branches at different places. The various branches are interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition?

Extinction timeout Renewal interval Extinction interval Verification interval

The WAN Interfaces In______________router can be configured

depending on the number of locations to be connected.

2500 series router 1900 series router 2400 modular router 3600 series modular router

You are the system administrator at Modern Research inc. The company is a research organization that manages a community of research scientists from various universities across the globe. The company has its head office in Atlanta and all the scientists working on a project submit their thesis at the head office for publishing. The scientist at the remote location needs to establish a connection with the Windows Server 2003 server in head office using dial-up. The connection should be physical, non-permanent, and secure so that a malicious user cannot trap the transmitted data. You are asked to configure the Routing and Remote Access on the server so that the scientists can communicate with the server in a secure manner using dial-up. What configuration information will you take into consideration while configuring the Remote Access Server for dial-up?

Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients.identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Page 42: Final Exam(Q6)

Identify the DHCP server or NAS that is used to assign IP addresses to the remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients.

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Identify the type of link used by the client to setup a connection with remote access server.

You are the system administrator at BlueMoon Computers. The organization is divided into various departments. All the departments are interconnected to each other using an internal network. The employees of the company need to use the internal network to send e-mails and access the Internet using Web browsers. The employees complain that they are unable to use the internal network to send e-mails and access the Internet through Web browsers. They also complain that they are unable to use other applications that use the internal network to transfer files from one computer to the other. Which layer of the OSl model should be checked to resolve the problem?

Session Application Transport Presentation

Which RPvAS feature in Windows Server 2003 supports routing where one computer sends packets directly to one destination address?

Network address translation Unicast routing Multicast routing Demand-dial routing

You are the system administrator in Denver Prime, Inc. The organization has a Windows Server 200B based network of 400 computers. In addition, there is a Windows Server 2003 computer, which serves as a DNS as well as an Internet server. Recently, you have noticed that the DNS server takes a long time in resolving host names. As a result, you plan to move the DNS server service to a computer with higher configuration. However, you find that this will make the DNS server unavailable for at least two days. This will result in loss of time and effort. So, you plan to optimize the performance of the DNS server. As a first step towards optimizing the performance of the DNS server, you plan to restrict the Internet clients from using the DNS server for resolving other domain names on the Internet. Which of the following options will enable you to accomplish this task?

Disable EDNS0 Disable round-robin rotation Disable recursion on the DNS server Disable local subnet prioritization

Page 43: Final Exam(Q6)

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The database administrator of the company complains about not being able to send mails and communicate with other computers over the network. To resolve the problem, you need to know the host names of the computers and the ports assigned to provide a particular service, which resource record should you view to get the desired information?

Pointer (PTR) Service Record (SRV) Host (A) Start Of Authority (SOA)

You are the system administrator at BlueMoon Computers. The internal network of the organization contains a DNS server to provide service to all other client computers. The company has undertaken many new projects. The employees working on the project complain that the network processing speed has become slow. The employees need to query the DNS database frequently to communicate with each other and to get the information they need related to their projects. Due to this increase in the time that the DNS server takes to give the results of the queries to the client computers, the projects are delayed. What should you do to let the projects be delivered in time?

Reduce the increased DNS network traffic by: Updating root hints on DNS server Clearing DNS server cache using DNS console

Reduce the increased DNS network traffic by: Updating root hints on DNS server Configuring DNS server to use forwarder

Reduce the increased DNS network traffic by: Configuring DNS server to use forwarder Clearing DNS server cache using DNS console

Reduce the increased DNS network traffic by: Updating root hints on DNS server Configuring DNS server to use forwarder Clearing DNS server cache using DNS console

You are the system administrator at Smartsoft2000. All the computers in the company are running Windows Server 2003 as their operating system. You have installed and configured network access services on the computers of accounts department. Some of the users of accounts department start complaining about connection failure and slow connection speed. Which utility should you use to resolve these problems?

Task Manager Event Viewer System Monitor and Performance Logs and Alerts Recovery Console

Page 44: Final Exam(Q6)

Consider the following statements:

Statement A: Nslookup command line utility enables you to troubleshoot DNS problems.

Statement B: DNSLint is a third-party tool that enables you to troubleshoot DNS problems.

Which of the following is correct about the above statements?

Both, Statement A and Statement B are False. Statement A is False and Statement B is True. Statement A is True and Statement B is False. Both, Statement A and Statement B are True.

identify the network in which a layer 2 switch is best suited.

A network of 40 computers that has high broadcast traffic. A network of 40 computers, which is divided into two subnets and data needs to be

transferred using any protocol. A network of 40 computers that has high level of data loss. A network of 1500 computers with heavy traffic on the network.

You are the system administrator at Red Sky inc. The company has a network of Windows Server 2003 systems. A server, running Windows Server 2003, in the company's head office has a collection of class files. Classes need to be used by the software developers to develop software. Users connected to the network want to access the server as Web server. You are also required to implement authentication and authorization so that an unauthorized user cannot access the resources available on the server, in addition you should monitor the routing activities taking place during data transfer. How will you meet the requirements?

Configure the network router and implement Open Shortest Path First (OSPF). Configure the network server to allow Routing and Remote Access Service. Configure the network router and implement Routing information Protocol (RIP). Configure the network server to allow packet filtering.

The head office of Machill, Inc has Implemented WINS for NetBIOS name resolution. As a system administrator of this organization, you have noticed a tremendous increase in the WINS traffic. The performance logs Indicate that the client renewal traffic is very high. Which of the following options will help you to counter this problem

Increase the client renew interval Decrease response time Decrease the client renew interval

Page 45: Final Exam(Q6)

Increase response time

You are a system administrator at Blue Sky inc. You decide to use IAS to centrally manage remote access to company's network. You maintain a centralized database of all user profiles that can be accessed by other remote access servers on the network. The company decides to expand its network to various cities, adding 5000 workstations to the network. How will you justify that IAS is suitable for the new network configuration?

IAS allows scalability of the network. IAS provides simple network administration. IAS enables an organization to outsource remote access services. IAS enables centralized administration of network access servers.

You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Virginia and Texas. The Virginia branch has 1100 hosts. However, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch is 1000 per second. The Texas branch has 2100 hosts. The expected number of client queries for the branch is 1900 per second. You need to plan the number of zones and DNS servers for each branch. Which of the following options would you recommend for your organization?

A zone at each branch and a separate DNS server for each zone. Two zones at the Texas branch office and a separate DNS server for each zone. A

single zone at the Virginia branch office with one DNS server. Four zones at each branch and a DNS server for each branch. Two zones at the Virginia branch office and a separate DNS server for each zone.

A single zone at the Texas branch office with one DNS server.

You are the system administrator at Red Sky inc. the company's network consists of 500 systems with Windows Server 2003 servers. An authorized remote user can access the shared files available on servers. You are asked to keep track of network access activities using routing and remote access logging characteristics provided by RRAS. In addition, you are asked to perform the following activities:

Maintain a detailed record of all remote access requests. Log names of remote access policies for all the connection attempts.

You want to use the information available in the above logs for judicial enforcement of remote access policies. How will you meet the requirements?

Configure the server to allow Event logging. Configure the server to allow Audit logging. Configure the server to allow Local Authentication and Account logging. Configure the server to allow Point-to-Point logging.

Page 46: Final Exam(Q6)

The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices?

Centralized Distributed Fixed Mixed

Consider the following statements:

Statement A; Predefined iPSec polices are directly used or assigned as a security template for defining custom IPSec policies. Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies.

Which of the following is true with respect to the above statements?

Statement A is False and Statement B is True. Both Statement A and Statement B are False. Both Statement A and Statement B are True. Statement A is True and Statement B is False.

You are the system administrator at Blue Moon Inc. The company has a network of 250 computers, which are used by programmers to develop software. The programmers share sensitive data among themselves during software development. This data can be accessed by any unauthorized user outside the company network. You are asked by the management to reconfigure the DHCP server so that new IP addresses are assigned to the computers. After configuring DHCP server, you find that some computers do not get the new DHCP settings. How will you fix the problem?

Use Ipconfig/renew command to renew the IP address, and then use Ipconfig/ail to display complete listing of TCP/IP settings.

Use Ipconfig/renew command to renew the IP address of the omputer, and then use ipconfig/release to release this IP address.

Use Ipconfig command to display TCP.' IP settings of the computer, and then use ipconfig/renew to renew the IP address.

Use Ipconfig/release command to release the IP address, and then use Ipconfig /renew to renew the IP address.

You are the system administrator of StarMoon Technologies. The head office of your organization is located at Boston. The organization has opened two branches in Paris and London. You have been assigned the task of planning the network infrastructure for the new branches. After analysing the network requirements, you have implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You

Page 47: Final Exam(Q6)

need to transfer data between the branches using IP, IPX/SPX, RIP, or OSPF protocol. Depending on the requirements, which intermediate device would you recommend for the network?

Layer 1 switch Hub Router Layer 2 switch

You are the system administrator at WorldAd, inc. The network has 50 computers, which are installed in an office. All the computers are running Windows Sever 2003 and configured to use NetBIOS naming function. The computers are configured as B-type nodes of NetBT protocol and use WINS IP addresses. The company decides to scale up the network to contain 5000 computers. After expansion of the network size all the employees complain about degraded network bandwidth. How will you fix the problem?

Configure network computers as M-node types, so that the computers use broadcast as a default for name resolution.

Configure networks computers as P-node types and use a NetBIOS Name Server (NBNS) for naming function.

Deny the use of NetBIOS naming functions for logical naming of host computers. Change the IP address type.

You are the system administrator at Safest Software Co. You are monitoring the network, which includes tracking and troubleshooting network problems, which utility should you use to troubleshoot TCP/IP problems?

Network Connections Repair Link Network Diagnostics utility Address resolution utilities Netsh command

You are the system administrator in Janes Technologies. Your organization has 400 computers in a mixed mode environment. The computers are running Windows 2000 and Windows Server 2003 on a local area network. The currently used connection method between the head office and branch office of the organization has been creating problems, such as slow network speed, terminated network connections, and low bandwidth, in addition, the organization has been incurring high cost for maintaining the currently used connection method. The management has asked you to change the connection method so that these problems can be resolved and the maintenance cost can be reduced. Which of the following connection methods should you use to fulfil the requirements of the organization?

Page 48: Final Exam(Q6)

LAN VPN Wireless LAN Dial-up

You are the system administrator of Janes Technologies. The organization has 1200 hosts that use a customized application. This application is required to be available 24X7 for all the employees of the organization. The downtime of this application can result in loss of business and effort. As a result, you need to plan for providing 24X7 availability of this application with minimal downtime. Which of the following options is the best possible strategy to accomplish this task?

Create a server cluster that is based on local quorum cluster model. Create a server cluster that is based on single quorum device cluster model. Create a server cluster that is based on minority node set quorum device cluster

model. Create a server cluster that is based on majority node set quorum cluster model.

The head office of your organization is located at New York. The organization now plans to open a new branch office at Las Vegas, which will be connected to the head office through WAN links. The new branch office is located in a building with three floors and will accommodate approximately 1000 hosts. Out of these 1000 hosts, 400 hosts belong to the operational department and the remaining 600 hosts belong to the administration department. The network of this branch office will consist of computers running Windows Server 200B and Windows 2000 operating systems. As the system administrator, you need to create a TCP/IP plan for the new branch office, identify the most appropriate plan for the new branch office.

You can use classless-based, class B addressing structure. In addition, you can have two subnets for the new branch office.

You can use class-based, class B addressing structure. In addition, you can have one subnet for the new branch office.

You can use class-based, class C addressing structure. In addition, you can have one subnet for the new branch office.

You can use classless-based, class C addressing structure. In addition, you can have two subnets for the new branch office.

You are the system administrator of Skyline, Inc., a leading telecom organization with its head office located at New York. There is a setup of 200 computers in the network. All computers are running on Windows Server 2003 operating system. You want to apply circuit-level filtering to protect the network from outside attack. In addition, you want to ensure fast and secure access to the internet. Which of the following options will enable you to accomplish this task?

Page 49: Final Exam(Q6)

ISA

VPN

ipsec in tunnel mode NAT

Consider the following statements:

Statement A: Forward lookup is used to resolve IP addresses to names.

Statement B: Reverse lookup is used to resolve names to IP addresses.

Which of the following is true with respect to the above statements?

Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both Statement A and Statement B are False. Both Statement A and Statement B are True.

John is the system administrator at Technology Systems. The company has one DHCP server and 300 clients. John is responsible for assigning IP addresses to all the client computers. He uses DHCP service to assign IP addresses dynamically. He now wants to display the IP address of the DHCP server that responds to the DHCP request. Which field containing the DHCP settings should John use to implement the required task?

Subnet Mask DNS Server DHCP Server Default Gateway

You are the system administrator at Red Sky Corp. The company has a large network consisting of many subnetworks containing systems running Windows Server 2003. The subnetworks are used by the branch offices, which send latest production information to the head office. The company has decided to start a new branch office in New Jersey. You are asked to connect the subnetwork in the branch office with the main network so that the latest production information can be delivered to the head office. How will you configure the connection?

Configure network routing by configuring RRAS, adding a routing protocol, and adding a routing interface.

Configure network routing by configuring RRAS, and adding a routing protocol. Configure network routing by adding a routing protocol and a routing interface. Configure network routing by configuring RRAS only.

Page 50: Final Exam(Q6)

You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. The data zone located on the primary zone changes. The change in the data zone should be updated in the secondary DNS servers also. You need to make the necessary updates to the secondary DNS servers. Which server should you look for the list of servers to be notified?

Primary Server Authoritative Server Caching-only Server Secondary Server

How many generic domains are present in the domain name space ?

Seven Four Three Two

Which of the following functions is performed by IPSec?

Provides insecure communication between clients Establishes a communication path between peer entities Provides password protection for data Authenticates client computers involved in communication

Consider the following statements:

Statement A: Predefined IPSec polices are directly used or assigned as a security template for defining custom IPSec policies. Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies.

Which of the following is true with respect to the above statements?

Statement A is False and Statement B is True. Both Statement A and Statement B are False. Statement A is True and Statement B is False. Both Statement A and Statement B are True.

Page 51: Final Exam(Q6)

Under which condition can a DNS Zone allow only secure dynamic updates?

Zone is configured as a forward lookup zone. Zone is configured as a stub zone. Zone is configured as an Active Directory-integrated zone. Zone is configured as a primary zone.

You are the system administrator of Janes Technologies. The head office of the organization is located at New York. The organization now plans to open a new branch office at Sydney and has assigned the task of planning the network setup of the new branch office to you. The management wants that the average utilization for the new branch office should be between 8096 to 9096. In addition, the peak throughput should be 9 Mbps. As a system administrator, you need to determine the best network connection type, assuming that the wire speed is 10 Mbps. Identify the most appropriate connection type for the network.

Shared Fast Ethernet Fast Ethernet Switched Fast Ethernet Swtiched Ethernet

You are the system administrator at BlueMoon Computers. The organization is divided into various departments. Ail the departments are interconnected to each other using an internal network. The employees of the company need to use the internal network to send e-mails and access the Internet using Web browsers. The employees complain that they are unable to use the internal network to send e-mails and access the Internet through Web browsers. They also complain that they are unable to use other applications that use the internal network to transfer files from one computer to the other. Which layer of the OSI model should be checked to resolve the problem?

Application Transport Presentation Session

You are the system administrator at Red Sky Inc. The company has a network of Windows Server 2003 systems. A server, running Windows Server 2003, in the company's head office has a collection of class files. Classes need to be used by the software developers to develop software. Users connected to the network want to access the server as Web server. You are also required to implement authentication and authorization so that an unauthorized user cannot access the resources available on the server. In addition you should monitor the routing activities taking place during data transfer. How will you meet the requirements?

Configure the network server to allow Routing and Remote Access Service. Configure the network router and implement Open Shortest Path First (OSPF).

Page 52: Final Exam(Q6)

Configure the network router and implement Routing Information Protocol (RIP). Configure the network server to allow packet filtering.

You are the system administrator of Janes Technologies. The organization has 1200 hosts that use a customized application. This application is required to be available 24X7 for all the employees of the organization. The downtime of this application can result in loss of business and effort. As a result, you need to plan for providing 24X7 availability of this application with minimal downtime. Which of the following options is the best possible strategy to accomplish this task?

Create a server cluster that is based on minority node set quorum device cluster model.

Create a server cluster that is based on majority node set quorum cluster model. Create a server cluster that is based on local quorum cluster model. Create a server cluster that is based on single quorum device cluster model.

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The database administrator of the company wants to send and receive mails from the clients of the company. You want to find out whether a SMTP e-mail server is present on the network. Which resource record should you view to get the desired information?

start Of Authority (SOA) Host (A) Mail Exchange (MX) Service Record (SRV)

You are a system administrator at Blue Sky Inc. You decide to use IAS to centrally manage remote access to company's network. You maintain a centralized database of all user profiles that can be accessed by other remote access servers on the network. The company decides to expand its network to various cities, adding 5000 workstations to the network. How will you justify that IAS is suitable for the new network configuration?

IAS enables centralized administration of network access servers. IAS allows scalability of the network. IAS provides simple network administration. IAS enables an organization to outsource remote access services.

You are the system administrator at Red Sky Inc. The company has a network of 3000 computers running Windows Server 2003 and using WINS type IP address. You decide to use NetBIOS name resolution on the network. To provide connectivity with TCP/IP networks, you configure the NetBT protocol on all the Windows Server 2003 computers. You set all the nodes as B-node type of NetBT protocol. After performing all these

Page 53: Final Exam(Q6)

configuration changes, you notice that the network performance has suffered substantially. What can be the cause of the problem?

Host computers configured as B-node on the network are creating an excessive broadcast traffic.

Host computers on the network are using peer-to-peer name queries for name resolution and registration.

Host computers are not able to resolve names by NBNS. Host computers on the network are using NetBIOS Name Server (NBNS) for

name registration and name resolution.

You are the system administrator at Blue Moon Inc. The company has a network of 250 computers, which are used by programmers to develop software. The programmers share sensitive data among themselves during software development. This data can be accessed by any unauthorized user outside the company network. You are asked by the management to reconfigure the DHCP server so that new IP addresses are assigned to the computers. After configuring DHCP server, you find that some computers do not get the new DHCP settings. How will you fix the problem?

Use Ipconfig/release command to release the IP address, and then use Ipconfig /renew to renew the IP address.

Use Ipconfig/renew command to renew the IP address of the computer, and then use ipconfig/release to release this IP address.

Use Ipconfig/renew command to renew the IP address, and then use Ipconfig/all to display complete listing of TCP/IP settings.

Use Ipconfig command to display TCP/IP settings of the computer, and then use Ipconfig/renew to renew the IP address.

You are the system administrator at BlueMoon Computers. There are 200 computers in the company. You need to configure four computers as DNS servers. The employees working on various projects in the company need to query the DNS server to get the data and information related to their project. The DNS server either provides the service to the client computers or redirects the queries to the Internet. Some employees complain about various viruses from Internet attacking their systems and diminishing their processing speed. What should you do to let the employees get rid of these viruses?

Configure one of the four servers as a forwarder, to prevent the DNS servers from redirecting the queries to the Internet.

Configure the server to listen to oniy recursive queries, to prevent the DNS servers from redirecting the queries to the Internet.

Configure root hints to point to the local/internal servers, to prevent the DNS servers from redirecting the queries to the Internet.

Configure the server to listen to only iterative queries, to prevent the DNS servers from redirecting the queries to the Internet.

Page 54: Final Exam(Q6)

Janes Technologies has its own DNS server to resolve the names within a domain, janestechnologies.com. The organization has opened anew branch office at Paris. You have joined as a system administrator in the Paris branch. You have been assigned the task of setting up the network of the branch office. To accomplish this, you have configured a computer running on Windows Server 2003 as a domain controller. However, you are not able to register the domain controller with the DNS server. Which of the following commands will enable you to troubleshoot this problem?

Use the Nbtstat command to check the status of current NetBIOS over TCP/IP connections.

Use the Nslookup command to check whether the new domain controller is resolving the parent domain controller.

Use the Netstat command to check if there is a connectivity problem. Use the NetDiag command to check if there is a problem with the domain

janestechnologies.com.

Consider the following statements:

Statement A: You should disable the local subnet prioritization method when the servers having multiple IP addresses are not on the same subnet.

Statement B: You should disable the round-robin rotation method when the servers having multiple IP addresses are on the same network.

Which of the following is correct about the above statements?

Both, Statement A and Statement B are True. Statement A is False and Statement B is True. Both, Statement A and Statement B are False. Statement A is True and Statement B is False.

Which of the following options is a storage method for networks that use SCSI parallel bus to connect multiple storage devices in a network?

LUN masking NLB cluster Zoning Server cluster

John is the system administrator at Technology Systems. John configures the DHCP scopes. Which DHCP scope property should he configure to specify the time period for which DHCP server will assign IP addresses?

Lease duration Scope name Router

Page 55: Final Exam(Q6)

Exclusion range

You are the system administrator at BlueMoon Computers. You have established the internal network of the company, which connects all the computers. You assign host names and NetBIOS names to the computers on the network. Different applications run on different computers. An application running on a computer needs to communicate with another computer on the network to request for some information. The application sends a host name to the DNS client service. The following steps are performed:

1. DNS server sends the request to the NetBIOS name resolution process.

2. DNS client service seeks the required host name in the client resolver cache.

3. DNS client service seeks the host name query to the DNS server.

4. The corresponding IP address is returned to the application on success.

What is the correct sequence of steps that is followed when the DNS client service resolves the host name to the corresponding IP address?

2,3,1,4 3,2,1,4 1,2,3,4 2,1,3,4

You are the system administrator at BlueMoon Computers. The DHCP server of the internal network controls hundreds of computers connected to each other and with the server. The DHCP server contains a lot of data. The server is has very less memory space left. The Managing Director asks you to attend a meeting with the board of directors about configuring the internal network of some new offices that have opened recently. When you come back after the meeting, you find that the server has run out of memory space. You want to check the transactions that were done on the DHCP database after you left for the meeting. How can you get the desired information?

Check the J50.log file to find out the various transactions in the DHCP database transactions.

Check the Resl .log file to find out the various transactions in the DHCP database transactions.

Check the Tmp.edb file to find out the various transactions in the DHCP database transactions.

Check the dhcp.mdb file to find out the various transactions in the DHCP database transactions.

How does smart card log on work?

By verifying the software publisher identity

Page 56: Final Exam(Q6)

By verifying the users identity during log on By encrypting the transmitting message By signing the data with digital signatures

You are the system administrator at Safest Software Co. You are monitoring the network, which includes tracking and troubleshooting network problems. Which utility should you use to troubleshoot TCP/IP problems?

Network Diagnostics utility Network Connections Repair Link Netsh command Address resolution utilities

You have joined BlueMoon Computers as a system administrator. The internal network of the company is divided into various zones. The internal network has a primary DNS server and various secondary NS servers to manage different zones of the network. The company has undertaken a new project. The team members of the project need to communicate with each other using the names corresponding to the role they are assigned in the project. So, you need to change the host names of computers used by these employees. Which record source do you use to rename the computers?

Alias (CIS)AME) Nameserver (NS) Mail Exchange (MX) start Of Authority (SOA)

Which RRAS feature in Windows Server 2003 supports routing to bring up temporary connections?

Demand-dial routing Unicast routing Multicast routing Network address translation

Consider the following statements:

Statement A: A forwarder resolves the names that the DNS servers forward to it.

Statement B; A forwarder redirects the queries to the root server of the external network to resolve the queries.

Page 57: Final Exam(Q6)

Which of the following is true with respect to the above statements?

Statement A is False and Statement B is True. Both Statement A and Statement B are False. Both Statement A and Statement B are True. Statement A is True and Statement B is False.

Redzone, Inc. has a namespace, redzone.com. One of the DNS servers, DNS01 has some confidential data and the organization does not want any external users or computers to access the DNS namespace of the DNS server, DNS01. As a result, you, as the system administrator, want to segregate the DNS namespace of the DNS server, DNS01 from other DNS servers of the organization. Which of the following type of internal namespace is required that has minimal impact on the existing namespace?

Perfect Unique Delegated Existing

You are the system administrator of Skyline, Inc., a leading telecom organization with its head office located at New York. There is a setup of 200 computers in the network. All computers are running on Windows Server 2003 operating system. You want to apply circuit-level filtering to protect the network from outside attack. In addition, you want to ensure fast and secure access to the Internet. Which of the following options will enable you to accomplish this task?

NAT VPN IPSec in tunnel mode ISA

You are the system administrator of StarMoon Technologies. The head office of the organization is located at Boston. The organization has opened two branches at Paris and London and implemented Ethernet network at both the branch offices. You have planned

Page 58: Final Exam(Q6)

for network connectivity between the head office and the branch offices through the Internet. You need to plan for an intermediate device that connects the Internet with your organization's network. Which of the following devices will enable you to accomplish this task?

Router Layer 2 switch Hub and Layer 2 switch Layer 3 switch

You are the system administrator at Modern Research Inc. The company is a research organization that manages a community of res scientists from various universities across the globe. The cc has its head office in Atlanta and all the scientists working < project submit their thesis at the head office for publishing, scientist at the remote location needs to establish a conned the Windows Server 2003 server in head office using dial-up connection should be physical, non-permanent, and secure malicious user cannot trap the transmitted data. You are ask configure the Routing and Remote Access on the server so t scientists can communicate with the server in a secure mani dial-up. What configuration information will you take into consideration while configuring the Remote Access Server for dial-up?

identify the DHCP server or NAS that is used to assign IP addresses to the remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients.

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Identify the type of link used by the client to setup a connection with remote access server.

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Page 59: Final Exam(Q6)

You are the system administrator of Denver Prime, Inc. The organization has a DNS namespace, www.denverprime.com. Some employees of the organization have been sent to London on a project for six months. These employees need to access the organization's domain using the www.denverprime.com namespace. As these employees access this domain namespace through the Internet, you need to ensure security of the organization's domain. What should you do to ensure that the organization's domain is secure?

Apply low-level security on the DNS server. Apply medium to high-level security on the DNS server. Apply high-level security on the DNS server. Apply medium-level security on the DNS server.

James is the system administrator at Red Sky IT Systems. James is responsible for maintaining a record of IP addresses of all the computers of the research department. The junior system administrator has assigned IP addresses manually to the computers of research department, james now wants to verify the assigned IP addresses to maintain his record. Which utility should James use to implement the given task?

Ipconfig Netstat Ping Nslookup

James is the system administrator at Smart Software Development. The company is having remote network access between the computers of branch office and head office. James needs to monitor the network access servers through various objects. These objects contain information about the remote network access requests, errors, protocols, and performance data. Which object should James use to monitor the performance of individual remote access ports?

IAS Authentication Client IAS Authentication Server

Page 60: Final Exam(Q6)

RAS Port RA Total

Techno, Inc. has its head office at Chicago. This organization has two branch offices located at London and Los Angeles. Each location has a network setup in mixed mode with 10 computers running on Windows Server 2003 and 200 computers running on Windows XP. The head office and each branch office have a Windows Server 2003 computer that is configured as a WINS server. You are the system administrator of the organization and you want the WINS data in the network to be consistent throughout the network. In addition, you want that all computers in the network should be able to access each other by name. Which of the following options will enable you to accomplish these objectives?

Configure pull replication on all WINS servers.

Configure push replication on the WINS servers at the branch offices.

Configure push replication on the WINS server at the head office and pull replication on the WINS servers at the branch offices.

Configure push/pull replication partnerships among all WINS servers.

You are the system administrator of Red Sky Corp. The domain in the company network has two Windows Server 2003 member server computers named Server 1 and Server 2. Routing and Remote Access Service is enabled for remote access on Server 2. IAS is installed on Server 1. Server 2 uses Server 1 to authenticate remote access credentials. The remote access policies on Server 1 specify that domain members are allowed remote access to the network. However, users report that they are not allowed to dial in to Server 2. You need to identify the cause of the problem and suggest a solution to resolve the problem. How will you accomplish the task?

Page 61: Final Exam(Q6)

Server 1 is configured to support only local user accounts. Add a realm replacement rule for the Windows Server 2003 domain on Server 1 to resolve the problem.

Server 1 is configured to support only local user accounts. Add Server 1 to the RAS and IAS Servers group in Active Directory to resolve the problem.

Server 1 is configured to support only local user accounts. Add a remote access policy that uses MS-CHAP on Server 1 to resolve the problem.

Server 1 is configured to support only local user accounts. Configure Routing and Remote Access on Server 1 to use RADIUS Authentication to resolve the problem.

Which database file is used by the DHCP database as a swap file during database maintenance?

Tmp.edb JSO.chk Res! Jog Dhcp.mdb

Consider the following statements:

Statement A: Domain names represent user-friendly alphanumeric names that refer to computers on the Internet.

Statement B: The multihomed NetBIOS name registers a unique NetBIOS name that has more than one IP address in the WINS database.

Which of the following is true with respect to the above statements?

Both Statement A and Statement B are False. Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both Statement A and Statement B are True.

Page 62: Final Exam(Q6)

You are the system administrator at Blue Moon Computers. The internal network of Blue Moon Computers maintains multiple WINS. The WINS database contains many WINS client names that are no longer in use. It has become difficult for you to manage the WINS client names and retrieve information from the WINS database. When the WINS database is replicated from one WINS server to the other, all the unused names are also replicated. You want to specify the time required by WINS server to verify the active names that are replicated from other WINS servers. Which parameter should you use to accomplish this task?

Renewal interval Extinction interval Verification interval Extinction timeout

Your organization has acquired a new business contract and has assigned a team of five employees to work on this contract. As this team works on confidential data, you do not want Internet-name resolution for this team. You have installed anew DNS server for this team. In addition, you do not want any client queries to be forwarded to this new DNS server. You also do not want other employees of the organization to use this DNS server internal name resolution. Which of the following options enables you to accomplish this task?

Disable recursion on DNS server. Delete root hints file on DNS server. Disable local subnet prioritization on DNS server. Disable round-robin rotation on DNS server.

You are the system administrator in Best Computers, Inc., with its head office at New York. The organization has 15 branches across USA, with total number of employees being 8000. The organization now plans to open up 4 new branch offices in Europe with each branch office having 1000-1200 hosts. In addition, each new branch office will be a separate network that will be connected to the main organization's network through VPN and leased lines. As a system administrator, you need to plan the TCP/IP addressing structure for the new branch offices according to the current infrastructure of the organization. Identify the most appropriate addressing structure for the new branch offices.

Page 63: Final Exam(Q6)

Class-based, class B addressing structure Class-based, class A addressing structure Classless-based, class A addressing structure Classless-based, class B addressing structure

As the system administrator of Red Sky IT Systems, you have implemented VPN for secure and cost effective data transfer across the branch offices. You want to ensure that the incoming and outgoing data communication through VPN should be secure. Which of the following options will enable you to accomplish this task?

Select the public key certificate authentication method to secure both the incoming and the outgoing network traffic.

Set the tunnel endpoints for the VPN tunnel in the Edit Rule Properties dialog box to secure both the incoming and the outgoing network traffic.

Select the IPX/SPX authentication method to secure both the incoming and the outgoing network traffic.

Select the Remote Access option in the Edit Rule Properties dialog box to secure both the incoming and the outgoing network traffic.

An organization has its head office at Denver and two branch offices at Virginia and New York. Each branch including the head offices has implemented NLB clusters. You, as a system administrator, need to monitor the NLB cluster of the New York branch from the head office. Which of the following commands will enable you to perform this task?

Nlb.dat Nlb.exe Nlb.txt Nlb.clr

Page 64: Final Exam(Q6)

You are the system administrator at Red Sky Corp. The company has a large network consisting of many subnetworks containing systems running Windows Server 2003. The subnetworks are used by the branch offices, which send latest production information to the head office. The company has decided to start a new branch office in New Jersey. You are asked to connect the subnetwork in the branch office with the main network so that the latest production information can be delivered to the head office. How will you configure the connection?

Configure network routing by configuring RRAS, and adding a routing protocol.

Configure network routing by adding a routing protocol and a routing interface.

Configure network routing by configuring RRAS, adding a routing protocol, and adding a routing interface.

Configure network routing by configuring RRAS only.

You are the system administrator of Prix, Inc. The top management of your organization has decided that all employees are required to daily log in their time sheet in the time tracking database. For this employees would be using the domain name www.prix.com. The employees working remotely at the client site also need to log in their time sheet in the database daily. To do this, the employees operating remotely need access to the www.phx.com domain of the organization. You anticipate that this process would take maximum 20 minutes. How you can accomplish this task considering the feasibility of the solution?

You should implement Dial-up to enable remote employees to log on to the network. This is because the employees located remotely require network access for just 20 minutes.

Page 65: Final Exam(Q6)

You should implement Wireless LAN to enable remote employees to log on to the network. This is because employees located remotely can easily access the network using Wireless LAN for a short duration.

You should implement VPN to enable remote employees to log on to the network. This is because VPN would provide secure and cost effective remote access.

You should implement LAN to enable remote employees to log on to the network. This is because LAN would provide high-speed network connection.

Consider the following statements

Statement A; Filter specifies the type of action thai needs to be

performed on a particular type of network Traffic.

Statement B: Filter action specifies die type of network traffic to

which a particular action is applied.

Which of the following is true with respect to the above statements^ Statement A is False and Statement 8 is True. Both Statement A and Statement 8 are False. Statement A is True and Statement B is False. Both Statement A and Statement B are True..

Consider the following statements.

Statement A; Forward lookup is. used to resolve IP addresses to names.

Statement £: Bjeverse lookup js used to resolve nafnes to IF addresses.

Whid owing is true with respect to the above statements-

Both Statement A and Statement B are False. Both Statement A and Statement 6 are True. Statement A is False and Statement B Is True. Statement A is True and Statement 8 is False.

Page 66: Final Exam(Q6)

The WAN interfaces In router ran he configured depending on the nutrrber of locations to be connected.

3600 series modular router 2400 modular router' 1900 series router 2500 series router

BlueMoon Computers has Implemented the Windows Server 2003 domain-based networl' at their head office -at California..You are the system administrator ofthe company. The CED ofthe company asks you to provide a remote connection to two employees of the company, who need to connect to the company's private network from New York, for remote access server and configure the client computers for VPN connectivity. Now, you have to maintain die security ofthe private networl: to avoid any .unauthorized access.

Which is the most appropriate option to implement the security ai the head office?

Configure Smart Card authentication on the remote access server, Configure Smart Card authentication on NAs. Configure NAS for authenticating the connection request. Configure Dial-up connection for remote clients Instead of VPN connection.

Consider the following statements.

Statement A: The disabling recursion method lncre_as.es the workload on the DPJS server.

Statement JJ: The disabling recursion method reduces the probability of a Dfjs server being misused or attacked.

Which ofthe following is correct about the above statements?

Statement A is False and Statement B is True. Statement A is True and Statement B is False. Both, Statement A and Statement B are True. Both, Statement A and Statement B are False.

The head office of janes Technologies Is located ai rjew York. This office has a setup of 1 GOO. computers running Windows Server 2003. One computer is running as a DNS

Page 67: Final Exam(Q6)

server to resolve the names for the domain, ianestechnologii2s.com.The branch office ofrhis otQanization

office using slow WAN links. The users from the branch office send name resolution queries to die head office. You as a system admin)strator need to select an appropriate strategy to reduce the load on the DNS server ai the head office. Which ofthe following options will be the most appropriate strategy for this situation?

Place two DNS server at the head Office. Disable recursion on the DNS server at the head office and place one DNS server

at the branch office. place one DNS server at the branch office and configure orwarders. Place one DNS server at the head office and one DNS server at the at the branch

office.

Which RRAS feature in Windows Server 2G03supports routlngto bring up temporary connections?

Demand-dial routing NetWork address translation Multicast routing " Unicast routing\

You are The system administrator at Blue Moon Computers. The internal networl- of BlUe Moon Computers malntalns rnultlpie WINS.The'WINS database contains m,any WINS client names that are no longer In use. It has become difficult for you to manage the WINS client names and retrieve Information from rhe WINS database. When die WINS database is replicated from one WINS server to die other, all the unused names are _a|$o replicated- You want TO specify rhe time required by WINS server to verify the active names that are replicated from other WINS servers. Which parameter should you use to accomplish this task?

Extinction timeout Verification interval Extinction Interval Renewal interval

You are The system administrate' at the bluemoon comiputers. The internal networl: ofthe company contain a primary DNS sesrver and various secondary DfyS servers. The

Page 68: Final Exam(Q6)

Intenal network of the company Is divided Into various zones. The database of administrator of the comim parry. You wanr to find out whether SMTP E-mail server is present on the network

Which resource record should view to get the desired information?

Mail Exchange (MX) Host:(A) Service Record (SRV) Start Of Authority (SOA)

office of the organization is located at Denver. The network of the organization consists of 1GO. computers*on the red&ky.corn domain. In the head office. IFSec is. already deployed for secure data transmission. You have applied hashing algorithm for additional security of the date transfer and network access processes. As a result, you need to reconfigure the currently applied IFSec policies. Which of the following component of the IFSec policy do you need to change"

Filter action" Connection method Filter list Authentication method

Which database file In DHCp records the existing transactions if the system run? out of disk space?

50.log Dhcp.mdb Resl.log Tmp.edb

You are rhe system administrator at Red-Sky Inc. The organization has a network of Windows Server 2003 computers. You are asked to Implement a routing protocol Chat allows a router to He.ep track of all the devices on the network. The router should acknowledge any changes occurring In the network configuration when a device goes off the network. Which routing protocol Will you suggest to accomplish this?

Static routing would be most appropriate, so no routing protocol Is needed. Routing Information Protocol (RIP) vl Routing Information protocol (RIP^).v2 Open Shortest Path First (OSPF)

Page 69: Final Exam(Q6)

You are a system administrator a; Red Sky Corp. You are asked to Implement a security policy on the company network. You implement the security policy configuring MS-CHAP authentication on PRAS. John is an employee In the company and has remote access rights as specified In the access policies for the network- You need to modify rhe parameters in the policy profile so that a user cannot change the configurinp a parameter In policy profile?

Configure IP properties. Configure Authentication parameter. Configure Encryption parameter. < Configure Multlllnk parameter.

You are the system administrator at Blue Moon Inc. The company has a network of 250 computers, which are used by programmers to develop software. The programmer? share sensitive dataamong-therriselves during software development. This data can be accessed by any unauthorized user outside the company network. You are asked by the management to reconfigure the DHCP server so thai new IP addresses are assigned to the computers. After configuring pHCP server, you find that some computers do not get the new DHCP settings. How will you fix the problem?

Use Ipconfig/renew command to renew the IP address, and then use Ipcanfig/all to display complete listing of TCP/IP settings.

Use Ipcorifig/release command to release the IP address, and then use Ipconfig /renew to renew the IP address.

Use Ipconfig command to display TCP/IP settings ofthe computer, and then use Ipconfig/renew to renew the IP address.

use ipconfig/renew eommandto renew the IP address of the computer, and then use Ipconfig/release to release this IP address.

You are rhe system administrator at Blue Moon Inc. The company network consists of 5GO computers. All the computers are running bh Windows Server 2003. James is using a client computer on rhe network. He wants to access tlie files available on the server. The server has* an IP address 1 $2.168.0.45; James complains that he is not able to access the server computer. You decide to examine the ARP cache on James' computer. You notice thai the MAG entry corresponding to 192.168.0.45 address in ARP cache does not match with the MAG address ofthe server computer. How will you fix the problem*1

Identify the MAG address Of the server using arp -a command.

Page 70: Final Exam(Q6)

Identify the MAG address ofthe server using arp -a command. and: then, modi fy the ARP cache by adding correct MAC address Into the ARP cache as a static entry.

Modify the ARP cache, deleting the entry corresponding to the IP address 1 &2.16S.0.45.

Modify the ARP cache, adding a different MAC address corresponding-

You have joined as a system administrator In PQRCorp, Ttie head office of your organization is located at Chicago and three branch offices are located at. Denver, Texas, and California- The network of the head office consists of ICO computers, which are logically divided in three subnets. There is one computer running Windows berver 2003 that Is configuied -as a dornain controller.The head office network is connected to the branch office networks by slow WAN links.Computers-In the head office and branch offices have been assigned IP addresses manually. You plan to reduce the administrative burden of managing IP -addresses manually. Which of the following options will enable you to accomplish this task?

Modify Extension Mechanisms for DNS. Implement mixed DHCP Infrastructure in the organization. Configure the domain controller of the organization as a caching-only server.- Implement distributed DHCP infrastructure in the organization.

network consists of 500 computers. All the computers are running on Windows Server 2003.James is using id lent computer an she network. He wants to access the files available an the server. The server has an IP address 192.168.0.45. James complains that he Is not able to access the server computer. You decide to examine the ARP cache on lames' computer. You notice that the MAC entry corresponding to l92.163-0.45 address in ARP cache does not match with the MAC address •of the server computer. How will you fix the problem?

Identify the MAC address of the server using arp -aeommand.

Identify the MAC address of rhe server using arp -a command, and

then, modify the ARP cache by adding correct MAC address Into the ARP cache as a static entry.

Modify the ARP cache, deleting the entry corresponding to the IP address 192.16S.C.45.

Modify the ARP cache, adding a different MAL^ address corresponding to the IP address 1 92.V6S.0-45.

Consider the following statements.

Page 71: Final Exam(Q6)

Statement A: The 16th character of 16-byte NetBIOS name of a computer represents the service associated with It.

Statement B; A host name enables you to resolve multiple IP addresses associated with a computer name.

Which of rhe following is true with respect to the above statements^1

Statement A is True and Statement B is False, Both Statement A and Statement B are True- Statement A is False and Statement B Is True. Both Statement A and Statement B are False

BlUesky. I nc has two branch offices located a),Ca!lforri|a andBoston. The DNS server of the Organizition is intalled at the head office located -at Los Angeles. A limited amount of bandwidth \> available between the head office and Che branch offices. Which of the foil owing types of DNS servers \> best suited for the head office In this scenario?

Caching-only ~ Non-recursive Conditional forwarders Forward-only

You are The system administrator ofStarMoon Technologies. The network ofyour organization Includes 200 computers on a Windows 2003: based network. In your organization, 20 employees are deployed offshore for a project at London, These employees logon to the organization's network using dial-up connection. Recently, the CEy of your organization, Nancy Jones Inform. & you that she has to attend a three-day conference In ■London. During her stay In London, she. wants, to access the orQanizstion s network remotely using her laptop. You

remote users deployed In ■London. How can you accomplish rhis task With least administrative effort and without disturbing the current network communication mechanism?

You can configure a RADIUS server and grant special privileges to Nancy when she logs on remotely.

You can assign static IP address to the laptop of the CEO and assign special privileges to that IP address.

You can use Audit and Oakley logging to grant special privileges to the laptop ofthe CEO.

Page 72: Final Exam(Q6)

You can configure an IAS server and grant special pnvileges to Nancy when she logs on remotely.

The head office of Prime Computers js at Atlanta. The organization plans to open three new branch offices at Geneva, Paris, and Virginia. Each branch office Will have approximately 1000 hosts. All the servers at the branch offices will connect to the corporate office using WAN links and VPN- As a system administrator, you need to create rne Ti_P/IP plan tor trie new orancn offices, identify tne appropriate TCP/lp addressing structure and the number of subnets for the new branch offices.

You can use clasps-based, class B addressing structure arid one subnet for each new branch office.

You can use classless-based, class A addressing structure and one subnet for each new branch office.

You can use classless-based, class 6 addressing structure and one subnet for each new branch office.

You can use classless-based, class C addressing structure and one subnet for each new branch office.

You are The system administrator of Red Sky Corp.The domain In the company network has two Windows Server 2003 member server computers named Server 1 and Server 2. Routing and Remote Access Service is enabled for remote access on Server 2. IAS is installed on Server 1. Server 2 uses Server 1 to authenticate remote access credentials. The remote access policies on Senear 1 specify that domain members are allowed remote access to the network. However, users tepon that they are nor, allowed to dial In to Server 2. You need to identify the cause ofthe problem and suggest a solution to resolve the problem. How Will you accomplish the task?

Server 1 is configured to support only local user accounts. Add a

realm replacement rule for the Windows Server 2003 domain on Server 1 to resolve the problem.

Server 1 is configured to support only local user accounts.

Configure Routing and Remote Access on Server l to use RADIUS Authentication to resolve the problem.

server 1 is configured to support only local user accounts. Add Server 1 to the PAS and IAS Servers group in Active Directory to resolve the problem.

Server 1 is configured to support only local user accounts. Add a remote access policy that uses MS-CHAF on Server 1 to resolve the problem.

Page 73: Final Exam(Q6)

The network has various subnetworks and data transmission between the client computers on the subnetworks takes place through routers. Users using the client computers complain about the long transmission delay for data packets. You analyze the network settings and find that sometimes rhe data packets enter a loop and are not able to reach The destination computer. Which methodology will you implement to solve rhe problem?

Configure the network router and implementing Classless interdomain Routing (CIDRJ.

Configure the network router and implementing Open Shortest Path First (OSPF). Configure the network router and implementing Routing information Protocol

(RIP). Configure the network router and Implementing Border Gateway Protocol (BGP).

You are The system administrator at BlueMoon Computers. The internal networl: connecting a|l the computers ofthe company contains e DHCp server. You implement synchronous backup method to take the backup of the data automatically. All the data related to the projects going on In the company are maintained by the DHCP server and stored in the company database. The hard drive on which the DHCPserver was configured crashes due to a hardware failure. All Cite data on the hard drive Is lost. The data is very important for the progress of the projects. What should you do to minimize the data loss-?

Check the Tmp.edb file to find out the vanous transactions In the DHCP database transactions.

Check theJ50.chk file torestore the data. Check the J50.log file to find out the various transactions In the DHCP database

transactions. Check the dhcp.mdb file to find out the vanous transactions In the DHCP database

transactions.

You are rhe system administrator of an organization that has Its head office at Boston and branch office at Los Angeles. To secure data during transmission, you want to define the source and destination; points for the transmission. Which of the following router connectivity options is suitable for data transmission in this, situation?

VPN in exit mode VPN in transport, mode IPSec In transport mode IPSec in tunnel mode

Page 74: Final Exam(Q6)

You are work I no as the system administrator for your oroanization. The network 15 running in the native rriode. All the client machlnes use the DPJS server for name resolution. Recently, the users of the client computers have complained that they are not able to access Che resources on Che internet, identify the probable cause of the problem.

The name server Is configured as a root server. The server does not support dynamic updates. The sender's root hints file is not updated. The name server has only one network card.

You are rhe system administrator at BiueMoon Computers. You are reviewing the network traffic and notice thai: there are a large number of DNS queries for resolving the host name of the File server In the network. You a|$o find that the network services are becoming slow because of the DNS queries and irrelevant network Traffic for the File server. You decide to configure the entry of the file server In the Hosts file on each computer. The Hosts file will be preloaded In the client resolver cache. You also plan to add name-to-IP address mapping to the Lmhosts file so that the NetBIOS names in the orqanization can be resolved. What is the correct sequence of steps

mapping to tne Lmnosts rue so inst tne i organization can be resolved. What, is the you should take to accomplish this task"

Preload the client resb|ver cache

. View arid flush client resalver cache.

View arid release NetBIOS name cache.

view and flush client resalver cache.

Preload the client resalver cache.

View and release NetBIOS name cache.

View and release NetBIOS name cache.

Preload the client resolver cache-

View and flush client resolver cache.

View and flush client resolver cache

Page 75: Final Exam(Q6)

. View and release tyetBIOS name cache.

Preload the client resolver cache.

You are rhe system administrator at BiueMoon Computers. There are 200 computers in the company. You need to configure four computers as DNS servers. The employees wording on various projects in rhe company need to query the i_'NS server to oeT the data and information related to their project. The DNS server either provides the service to die client computers or redirects the queries to tlie Internet. Some: em pi oyees complain about various viruses* from Internet attacking their systems and diminishing Their processing speed. What should you do to let the employees-get rid of these viruses?

Configure root hints to point to the local/Internal servers, to prevent the DNS servers from redirecting the quenes to the Internet.

Configure the server to listen to only iterative queries, to

prevent the DNS servers from redirecting the queries to the Internet.

Configure the server to listen to only recursive queries, to

prevent the DNS servers from redirecting the quenes to the Internet.

Configure one ofthe four servers as a forwarder, to prevent the DNS servers from redirecting the queries to the Internet.

-------------------\

Blueperl, |nc has Its head office at Texas City and two branch offices at penver and New York. All the offices ofthe organization have implemented MLB dusters. All the NLB clusters are accessible across Che organization's network. You, as a system administrator have been assigned the task to add a node In a duster at the Denver branch and check the performance ofthe cluster. Which of the foil owing options will enable you to accomplish tin s task?

Network Load Balancing Cluster Network Load Balancing Tool Network Load Balancing Command Network Load Balancing Manager

Which rrrechod is used to cheek the integrity of a software product and identity of its publisher?

Page 76: Final Exam(Q6)

Encrypting file system Software code signing Internet authentication Digital signatures\

Blueperl, |nc has Its head office at Texas City and two branch offices at penver and New York. All the offices of the organization have implemented MLB duster?. All the NLB clusters are accessible across die organization's network. You, as a system administrator have been assigned the task to add -a node In a duster -at the Denver branch and check rhe performance of the cluster. Which of the following options will enable you to accomplish tins task?

Network Load Balancing Cluster Network Load Balancing Command Network. Load Balancing Manager Network Load Balancing Tool

Which event; ID in the DHCP server audit; log specifies an event when a client renews a lease?

11 02 12 10

You are The system administrator at BiueMoon Computers. The internal network ofthe company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones ofthe network.The data zone located on the primary zone changes. The change in the data zone should be updated In the secondary DNS servers also. You need to make the necessary updates to the secondary DNS servers. Which server should you look for the list of servers to be notified^

Pri mary Server Caching-only Server Secondary Server Authoritative Server

Consider the following statements.

Page 77: Final Exam(Q6)

Statement A: The disabling recursion method Increases the workload on the DPJS server.

Statement B: Trie disabling recursion method reduces the probability of a DfJS server being misused or attacked.

Which of the following is, correct about the above statements?

Statement A is True and Statement B is False. Both, Statement A and Statement B are True. Statement A is False and Statement B Is True. Both, Statement A and Statement B are False.

You are rhe system administrator at Red Sky IT Systems. You configure the DHCP reservation. Which element of pHCP reservation should you configure for the value that, identifies a particular reservation?

C Reservation name C IP address C MAC address C Description

You are the system administrator at BlueMoon Computers-. The internal network of the company contains a DNS server. Whenever the PNS database is changed or updated, you need to manually update the changes. The size of the DNS database is 1 arge. Therefore, you want to automate the system of updating the DNS database. The DNS database contains confidential data related to the projects going on In rhe company, and therefore, data must be secure. What should you do to reduce your hurden of updati rig rhe database and Keep the security of the DNS database7

Create a new zone with Do not allow dynamic updates option selected. Configure zone to allow transfer from specified IP addresses* Create a new zone with Allow both secure and nonsecure dynamic updates option

selected. Create anew zone with Allow only secure dynamic updates option selected.

Consider the following statements.

Statement A: Forward lookup is. used to resolve IP addresses to names.

Statement R* Bjeverse lookup js used to resolve narnes to IP addresses.

Page 78: Final Exam(Q6)

Which ofthe following is true with respect to the above statements?

Both Statement A and Statement B are False. Statement A is True and Statement B Is False. Both Statement A and Statement B. are True. Statement A is False and Statement B is True.

You are rhe system administrator at WorldAd, Inc. The. company has a large network of Windows Server 2003 computers. The network has 20 subnetworks, which are used by different;departments In the organization. To provide communication parh between the subnetworks., you Implement static routing. The router will determine the route for tne data trartii. oepenaing upon rne routing protocol, how w'" you configure the rout I no protocol for the type of routing used in die network?

Implement Routing Information Protocol (RIP) v2. | m pi errtent Routi ng 1 nformatlon protocol \ (Rl P) yi. Implement Open Shortest Path First (OSPF) protocol. Routes are configured manually In static protocol, so no need to implement a

routing protocol.

How many generic domains are present In the domain name space?

two Four Three Seven

You are rhe system administrator at Red iky Inc. The company has a network of 3.000 computers running Windows Server 2003 and using WINS type IF address. You decide to use Net-Bios narrie resolution on the network. To provide connectivity with 'TCP/IP networks, you configure the NetBT protocol on all the Windows Server 2003 computers. You set all rhe nodes asE—node type of NetET protocol. After performing all these configuration changes, you notice that the network performance has suffered substantlally. What can be the cause of the problem?

Host computers on the network are using NetBIOS Name Server (NEWS) for name registration and name resolution.

Host computers on the network are using peer-to-peer name queries for name resolution and registration.

Page 79: Final Exam(Q6)

Host computers configured as B-node on the network are creating an excessive broadcast traffic.

Host computers are not able to resolve names by NBNS.

Consider the following statements.

Statement A; Dom,aln names represent user-friendly alphanumeric names that refer to computers on the Internet.

Statement B: The mulcihomed NetBIOS name registers a unique (SIetBIOS rrarne that has more than one IP address In the WINS database.

Which of the following is true with respect to the above statementj«

Statement Ale False and Statement B is True. Statement A is True and Statement B is False. Both Statement a and Statement B are True, Both Statement A and Statement B are False.

You are The system administrator at WorldAd Inc. The company has five branch offices in different cities. All information about company's business details, products, and services is stared In a database -at the head office in New York. Users from branch offices access this Information through the company network. You want to monitor the network access for authorized access. In addition you want to meet the following requirements.

Make a record of errors and warning messages occurring within remote access server.

Keep track of start and stop time of remote access services;. Maintain a record of failed access events with rhe respective user Inform, ation.

How Will you meet, the requirements?

C Configure RABIUS-Based authentication and Account logging. C Configure Local Authentication and Accounting logging. C Configure Event logging and maintain an Event log.

You are rhe system administrator at Global Software, Inc. The company has one DHCP server and 300 clients. You are responsible for assigning IP addresses to all the client computers. You use pHCP service to assign IP addresses dynamically. You now want to

Page 80: Final Exam(Q6)

display the date when the server was assigned a dynamic IP address using DHCP. Which field containing the DHCP settings should you use to Implement the required task?

DHCPSeruei1 Lease Expire Default Gateway Lease Obtained

You are The system administrator at Red iky Inc. The company has a dedicated network of SOOu computers running Windows Server 2o*j.3 to control product sales arid distribution at various sales offices. The network is not connected to the internet. A DHGp server on the network dynamically assigns IP address to all the computers. Power failure shuts down the DHCP server and it Is not available on the network. New client computers-are not able to connect to the network because DHCP server has failed. You are asked to device some solution so the network does not tall in future even atter DHCP server ooss down. What solution will you suooest for the problem?

f Reconfigure the DHCP server to change the client IP addresses.

Run the i peon fig command with /release and /renew options sequentially for each client computer.

Implement alternate IP addressing scheme on the network

configuring User configured Alternate Configuration on each computer.

Implement alternate IP addressing scheme on the network

Configuring automatic IP addressing on each computer

You are the system administrator at Red bky Inc. The company's corporate office is spread across various buildings In a locality. There are administrative, managerial, and finance departments that are located in different buildings. All the departments need to communicate with each other. The communication has to tak_e place through a network connection between subnetworks. All systems on the subnetwork are running Windows Server 2003. You need to ensure that the communication within department's subnetwork has no effect on the data transfer to another subnetwork In a dlfferenT department*. You a|so need to optimize the data transfer rate between the subnetworks. Hew Will you ensure rhe connectiviry?

Ensure a network connection between the subnetworks using a direct cable connection.

Ensure a network connection between the subnetworks using a router.

Page 81: Final Exam(Q6)

Ensure a network connection between the subnetworks using a hub.

Consider the following statements.

Statement A: Transport mode ensures that routers at both ends of a WAN connection implement IP Sec protocols irrespective of the computers taking part In communication.

Statement JJ: Tunnel mode ensures chat two computers communicating over a network support IFSec irrespective of the Intermediate computers.

Which of rhe following is true with respect to the above statements^

Statement A is False and Statement B is True. Both Statement A and Statement 6 are False. Statement A is True and Statement B is False. BothStatement A and Statement B are True.

You are a system administrator at Blue Moon Inc. Employees In the company use desktops, laptops, and mobile PDAs In the network. You are asked to secure the network from unauthorized users. The sensitive data available on the network should be accessible on|y to authorized users. To control user access, you decide to set a constraint in the dial—in property page of the client computer. This constraint should grant access only to those users who have their calling numbers in the list. Which constraint will you set in the Dial—m permission dialog box to meet the requirements?

Callback Options Verify caller ID Apply Static Flutes Assi gn a Static IP Address

In which type of fall-over policy, the server cluster consists of high capacity nodes that can host multiple applications?

Standby server N+1 configuration Fa'lower pairs Random

You are The system administrator orPlasrna, Inc. This organization has its head office at Los Angeles. The branch office of this organization Is located at Texas City. The

Page 82: Final Exam(Q6)

employees of the purchase-.department based at Los Angeles complain to you thai: there is slew network connectivity and at times they are not able to connect to the purchase department ofthe Texas City branch. Which ofthe followlncj options will enable you to determine the cause of problem?

Run the Ping command and then run the Tracert command. Run the Ping command then run the NetDiag command. Run the ipconfig command and then run the Ping command. Run the Nbtstat command and then run the Ping command.

--------------\

The head office of your orqanition is located at new york organization now plans to open a new branch office at Las Vegas, which will be a separate network and will he connected to the head office through WAW links. The new branch office will accommodate approximately 1200 hosts. The network ofthis branch office will consjst of computers running Windows Server 2GQ3. and Windows 2000 operating systems. The management ofthe organization wants that the IP addresses should be automatically assigned to the hosts in the network. As a system administrator, you need to create a TCP/IP plan for the new branch office, identify the most appropriate plan for the new branch office.

You can use classless-based, class B addressing structure. In

addition, you can Implement DHCP reserved addressing for allocating the IP addresses to the hosts of the new branch office.

You can use class-based, class B addressing structure. In

addition, you can Implement DHCP reserved addressing for allocating the IP addresses to the hosts of the new branch office.

You can use classless-based, class B addressing structure. In

addition, you can Implement DHCP DYNAMIC addressing for allocating the IP addresses to the hosts of the new branch office.

You can use class-based, class B addressing structure. In

addition, you can Implement DHCP DYNAMIC addressing for allocating the IP addresses to the hosts of the new branch office.

Page 83: Final Exam(Q6)

You are rhe system administrator at BlueMoon Computers. The internal network ofthe company connects all die computers. Most ofthe computers in the network are Windows.-95 and Windows 98 computers. An application running on a computer needs to get some data from another computer over the network. The application sends-a request to resolve the NetBIOS name ofthe corresponding computer, where does the application send the request at first during the NetBIOS name resolution?

Broadcasts on the network NetBIOS cache WINS server Lmhosts file

You are The system administrator at BlueMoon Computers. The company has various branches at different places. The internal network maintained by the company connects the branches of the company with

server. The WINS clients complain about the inconsistent records and names in the WINS server. What steps-should you follow to ensure that the WINS server remains consistent'1

Mark the anginal record for deletion after adding It to the local .database only if the record in the local database has a lower version ID than the record retrieved from the original database.

Update the time stamp of a record, if the record in the local WINS database is identical to the record of the owner database.

Update the time stamp of a record, if the record in the local WINS .database Is identical to the record of the owner database. Mark the ohginal record for deletion after adding It to the local database only if the record in the local database has a lower version ID than the record retneved from the original database.

You are the system administrator of Denver Prime, Inc. The organization has a DNS namespace, www.denverprime.com. Some employees of the organization have been sent to London on a project for six months. These employees need to access the organization's domain using the www.denverprime.com namespace. As these employees access this domain namespace through the Internet, you need to ensure security of the organization's domain. What should you do to ensure that the organization's domain is secure?

Apply medium-level security on the DNS server. Apply medium to high-level security on the DNS server. Apply high-level security on the DNS server. Apply low-level security on the DNS server.

Prime, Inc. has a setup of 50 computers. The network of the organization is divided into three subnets using layer 2 switches. The network setup is in a mixed mode that consists

Page 84: Final Exam(Q6)

of Windows 2000, Windows 98, and Windows Server 2003 operating systems. The management is willing to incur a maintenance cost but is not willing to incur expenditure for new infrastructure. The bandwidth available is also less. With these considerations, you need to plan a host name resolution method for the organization. Identify an appropriate name resolution method.

Automatic name resolution LMHOSTS Broadcast Net Auto

You are the system administrator in Janes Technologies. Your organization has 400 computers in a mixed mode environment. The computers are running Windows 2000 and Windows Server 2003 on a local area network. The currently used connection method between the head office and branch office of the organization has been creating problems, such as slow network speed, terminated network connections, and low bandwidth. In addition, the organization has been incurring high cost for maintaining the currently used connection method. The management has asked you to change the connection method so that these problems can be resolved and the maintenance cost can be reduced. Which of the following connection methods should you use to fulfil the requirements of the organization?

Dial-up vpn lan Wireless LAN

Consider the following statements:

Statement A: NLB clusters are planned for servers that are continuously accessed and updated by users in a network.

Statement B: Server clusters are planned for servers that need to be seal able.

Which of the following is correct about the above statements?

Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B are True. Both, Statement A and Statement B are False.

Page 85: Final Exam(Q6)

You are The system administrator at BlueMoon Computers. The company opens up a new branch at Houston. 50 computers need to be configured on a network at the new branch office, 'h addition, the Managing Director has said thai; some computers from rhe Internal network of the head office have to be transferred to the new network. The senior administrator informs you that he had faced many difficulties regarding the conflicts In the IP-addresses he assigned when the current office was configured. What is rhe most efficient way rhat you should follow so that you do not face such a problem?

Release all IPaddresses of rhe network from which the computers are transferred to rhe new office, and then, assign IF address to all the computers manually.

Assign IP addresses to all the computers manually. Assign II2 addresses to all the computers of the office using DHCP. Exclude the computers from the other network and assign IP

You are the system administrator at BlueMoon Computers. The CEO of the company asked you to enable access for its mobile employees to the resources of the corporate network over the Internet. Which method will you use to access the network keeping the cost factor in mind?

VPN server RAS server Network router Dial-up Connection

Which RRAS feature in Windows Server 2003 supports routing to bring up temporary connections?

Unicast routing Multicast routing Demand-dial routing Network address translation

You are the system administrator in StarMoon Technologies. The organization has its head office at Florida and branch office at Los Angeles. Everyday, important information, such as daily sales report and customer records are sent from the branch office to the head office using a dial-up connection. You want to ensure that the data that is being transmitted using the dial-up connection is secure from unauthorized access. Which of the following options will enable you to accomplish this with least administrative effort?

Page 86: Final Exam(Q6)

implement a private network between the head office and the branch office. Implement IPSec policies. Configure the RADIUS server. Configure Internet Authentication Server (IAS).

You have joined Texas Computers, Inc. as a system administrator. You have been asked to plan the network infrastructure for the two new branch offices of the organization. You have to collect and record the information about the various teams that will be implementing the network infrastructure. You also need to determine the tools and strategies that will be used for implementing the network infrastructure for the new branch offices. In addition, you need to identify contingencies and unforeseen problems during the implementation of the network infrastructure and determine ways to deal with such problems. Identify the plans in which you will record this information.

Team plan, capacity plan, and test plan Communication plan, deployment plan, and support plan Communication plan, capacity plan, and test plan Team plan, support plan, and communication plan

Redzone, Inc. has a namespace, redzone.com. One of the DNS servers, DNS01 has some confidential data and the organization does not want any external users or computers to access the DNS namespace of the DNS server, DNS01. As a result, you, as the system administrator, want to segregate the DNS namespace of the DNS server, DNS01 from other DNS servers of the organization. Which of the following type of internal namespace is required that has minimal impact on the existing namespace?

Perfect Existing Delegated Unique

Janes Technologies has its own DNS server to resolve the names within a domain, janestechnologies.com. The organization has opened anew branch office at Paris. You have joined as a system administrator in the Paris branch. You have been assigned the task of setting up the network of the branch office. To accomplish this, you have configured a computer running on Windows Server 2003 as a domain controller. However, you are not able to register the domain controller with the DNS server. Which of the following commands will enable you to troubleshoot this problem?

Use the Netstat command to check if there is a connectivity problem. Use the Nslookup command to check whether the new domain controller is

resolving the parent domain controller. Use the Nbtstat command to check the status of current NetBIOS over TCP/IP

connections.

Page 87: Final Exam(Q6)

Use the NetDiag command to check if there is a problem with the

You are the system administrator of Red Sky, Inc. Your organization has a network of 100 Windows 2000 and Windows Server 2003 based computers, which are on a single subnet. In your organization, two DNS servers have been assigned five IP addresses each. You notice that both the DNS servers take quite a long time to resolve host names ofredsky.com domain. To resolve this problem, you plan to create another subnet and move one of these DNS servers to the newly created subnet. However, this task will require two days to be completed and would require the entire network of the organization to be shut down for at least one day. The management does not agree to this proposal, as it will result in loss of business. So, you plan to optimize the response of these two DNS servers. Which of the following options will enable you to accomplish this task with least administrative effort?

Disable local subnet prioritization on both the DNS servers. Disable EDNSO on both the DNS servers. Disable recursion on both the DNS servers.

You are the system administrator at Smartsoft2000. All the computers in the company are running Windows Server 2003 as their operating system. You have installed and configured network access services on the computers of accounts department. Some of the users of accounts department start complaining about connection failure and slow connection speed. Which utility should you use to resolve these problems?

Recovery Console Task Manager Event Viewer System Monitor and Performance Logs and Alerts

You are the system administrator at Red Sky Inc. the company has a dedicated network of2GCo computers running Windows Server 2'*"*'.3 to control product sales and distribution at various sales orrices. The network is nor connected to the internet. A DHCP server on the network dynamically assigns IP address to all the computers.. Power failure shuts down the DHCP server and it Is not available on the network. Mew client computers-are nor, able to connect to the network because DHCP server has failed. You are asked to device some solution so the network does not fall in future even after DHCP server goes down. What solution will you suggest, for the problem?

Implement alternate IP addressing scheme on the network configuring User configured Alternate Configuration on each computer. Run the ipcorifig command with /release and /reneW options sequentially for

each client computer.

Page 88: Final Exam(Q6)

Implement alternate IP addressing scheme on the network configuring Automatic private IP Addressing on each computer.

Which aveni; ID in the DHCP server audit; log specifies an event when a client renews a lease?

12 11 02 10

You are rhe system administrator at Smartsoft2C'00. All the computers in the company are running window server 2003 as their operating system. You have installed and configured network access services on the computers of accounts department. Some of the users of accounts .department start complaining about connection failure and slow connection speed. Which utility should you use to resolve these problems?

Event Viewer Task Manager Recovery Console System Monitor and Performance Logs and Alerts

You are The system administrator of Dreamz, Inc. an organization that creates multimedia graphics. The head office of your organization |s located at Denver. The management of your organization plans to open a branch office at Melbourne. You have been assigned the task of planning the network infrastructure for the new branch office at ■Melbourne considering that heavy multimedia files would be transferred on die network.The organization's, network has high

configuration computers* Identify the network access connection

method that is rriost appropriate for the branch office.

VPN

Wireless LAN

Dial up LAN

You are rhe system administrator at BiueMoon Computers. The internal network of the company has a DHCP server to manage all die DHCP clients. You go for an Important

Page 89: Final Exam(Q6)

meeting. While you attend Cite meeting, rhe assistant system administrator looks after the network

Inform^ you that many employees are unable to access the network. He

problem they are facing: when they want to communicate with other computers. What should you do to find out what went wrong vyhile you were not present?

Check the Res! .log file to find out the various transactions In the DHCP database transactions.

Check theJ50.log file to find out the various transactions in the DHCP database transactions.

Check the dhcp.rndb file to find out the vanous transactions in the DHCPdatabase transactions.

Which of the foil owing options enables load balancing of the requests that are being serviced by the clusters?

Masking NLB masking Zoning LUN masking

The head office of your organization is located at new york. The organization now plans to open a new branch office at Las Vegas, which will be connected to the head office through WAN links.- The new branch office is located In a building with three floors and will accommodate approximately 1000 hosts. Out of these 1000 hosts, ApO hosts belong to the operational department and the remaining $00 hosts belorrgto the administration department. The network of this branch office will consist of computers running Windows Server 2003 and Windows 2000 operating systems. As the system administrator, you need to create a TCP/IP p|an for rhe new branch office. Identify the rriost appropria e plan for the new branch office.

You can use classless-based, class C addressing structure. In addition, you can have two subnets for the new branch office.

You can use class-based, class B addressing structure, in addition, you can have one subnet for the neto branch office.

You can use class-based, class C addressing structure. In addition, you can have one subnet for the new branch office.

You can use classless-based, class B addressing structure, in addition, you can have one subnet for the neto branch office

Page 90: Final Exam(Q6)

You are The system administrator in Janes Technologies. The head office of the organization is located in Florida and branch office \h located in California..The current security mechanisms applied in the organization's network have been hacked by unauthorized users and have caused loss of confidential Information. As a result, the management has asked you to implement stronger security mechanism.5 so

accessino the organization's ■network are autlienti cared. VVhich of the foil owing options will enable you to accomplish this with least administrative effort?

Use RADIUS server. Implement a private network berweenthe head office and the branch office- Use Internet Authentication Server (|AS). implementJPSec policies.

Redzone, inc. has a namespace, redzone.com. one of the Dns01 has some confidential data and the organization does not want, any extaernal users or computer to access, the DNS namespace of the DNS server,DNSo1, as a result, you as the system administrator, want to segregate the DNS namespaceof the DNS server, DNS01 from other DNS server of the organization, Which of the following type of internal namespace is required that has minimal impact on the existing namespace?

Perfect Existing Unique Delegated

Which method is used to check the integrity of a software product and identity of its publisher?

Encrypting file system Software code signing Internet authentication Digital signatures

You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Virginia and Texas. The Virginia branch has 1100 hosts. However, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch is 1000 per second. The Texas branch has 2100 hosts. The expected number of client queries for the branch is 1900 per second.

Page 91: Final Exam(Q6)

You need to plan the number of zones and DNS servers for each branch. Which of the following options would you recommend for your organization?

A zone at each branch and a separate DNS server for each zone.

Two zones at the Texas branch office and a separate DNS server for each zone. A single zone at the Virginia branch office with one DNS server.

Four zones at each branch and a DNS server for each branch.

Two zones at the Virginia branch office and a separate DNS server for each zone. A single zone at the Texas branch office with one DNS server.

Consider the following statements:

Statement A: You can implement multiple sites by registering multiple second level domains.

Statement B: You can implement multiple sites by registering single second level domain and then subdividing it.

Which of the following is true with respect to the above statements?

Statement A is True and Statement B is False. Both Statement A and Statement B are False. Both Statement A and Statement B are True.

Statement A is False and Statement B is True.

Page 92: Final Exam(Q6)

You have been assigned the task of providing an Internet connectivity solution to.an organization. The network of the organization Includes 50 computers on a non-routed environment. The organization requires private addressing on the computers within the network. In addition, the organization does not want to restrict the Internet access on a user-by-user basis. Based on these requirements, which Internet connectivity solution would you recommend for the organization?

NAT Kerberos V5 Isa Public key certificate

You are a System administrator at Red Sky Corp. You are asked to Implement a security policy on the company network. You Implement the security policy configuring MS-CHAP authentication on RRAS. John Is an employee In the company and has remote access rights as specified In the access policies for the network. You need to modify the parameters In the policy profile so that a user cannot change the account password later. How will you meet the requirements by configuring a parameter In policy profile?

C Configure Multilink parameter.

C Configure IP properties.

C Configure Encryption parameter.

C Configure Authentication parameter.

StarMoon Technologies has its head office at Boston. The network of the head office consists of 200 computers running Windows Server 2003. The branch office of the organization is located at Texas City. The network ofthe branch office consists of 100 computers running Windows NT computers. The head office and the branch office are connected through slow WAN links. Select the best-suited name resolution strategy for resolving host names for the organization.

C Plan for one DNS server and one WINS server, both located at the head office.

C Plan for one WINS server at the head office and one DNS server at the branch office.

C Plan for two DNS servers at the head office and one WINS server at the branch office.

C Plan for one DNS server at the head office and one WINS server at the branch office.

Page 93: Final Exam(Q6)

You are the system administrator in Best Computers, Inc., with its head office at New York. The organization has 15 branches across USA, with total number of employees being 8000. The organization now plans to open up 4 new branch offices in Europe with each branch office having 1000-1200 hosts, in addition, each new branch office will be a separate network that will be connected to the main organization's network through VPN and leased lines. As a system administrator, you need to plan the TCP IP addressing structure for the new branch offices according to the current infrastructure of the organization, identify the most appropriate addressing structure for the new branch offices.

Classless-based, class A addressing structure

Class-based, class A addressing structure

Class-based, class B addressing structure

Classless-based, class B addressing structure

Consider the following statements:

Statement A; Predefined iPSec polices are directly used or assigned as a security template for defining custom IPSec policies.

Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies.

Which of the following is true with respect to the above statements?

Statement A is False and Statement B is True.

Both Statement A and Statement B are False.

Both Statement A and Statement B are True.

Statement A is True and Statement B is False.

Page 94: Final Exam(Q6)

You are The system administrator at Blue Moon Computers. The internal networl- of BlUe Moon Computers malntalns rnultlpie WINS.The'WINS database contains m,any WINS client names that are no longer In use. It has become difficult for you to manage the WINS client names and retrieve Information from rhe WINS database. When die WINS database is replicated from one WINS server to die other, all the unused names are _a|$o replicated- You want TO specify rhe time required by WINS server to verify the active names that are replicated from other WINS servers. Which parameter should you use to accomplish this task?

Extinction timeout. Verification interval. Extinction Interval. Renewal interval.

You are the system administrator at BlueMoon Computers. The organization is divided into various departments. All the departments are interconnected to each other using an internal network. The employees of the company need to use the internal network to send e-mails and access the Internet using Web browsers. The employees complain that they are unable to use the internal network to send e-mails and access the Internet through Web browsers. They also complain that they are unable to use other applications that use the internal network to transfer files from one computer to the other. Which layer of the OSl model should be checked to resolve the problem?

Session

Application

Transport

Presentation

You are rhe system administrator at Global Software, Inc. The company has one DHCP server and 300 clients. You are responsible for assigning IP addresses to all the client computers. You use pHCP service to assign IP addresses dynamically. You now want to display the date when the server was assigned a dynamic IP address using DHCP. Which field containing the DHCP settings should you use to Implement the required task?

DHCPSeruei1 Lease Expire Default Gateway

Page 95: Final Exam(Q6)

Lease Obtained

Statement A: The caching-only servers are non-authoritative servers that contain Information regarding frequently requested domain names and IP addresses associated with each domain name. Statement B: The information contained in the caching-only server is used only to quickly answer queries from other DNS servers.

Which of the following Is correct about the above statements?

C Both, Statement A and Statement B are True.

C Statement A is True and Statement B is False.

C Both, Statement A and Statement B are False.

C Statement A is False and Statement B is True.

The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices?

Distributed

Fixed

Centralized

Mixed

Consider the following statements:

Statement A: A NetBIOS computer with name Computer! [OOh] provides workstation services.

Statement B: A NetBIOS computer with name Computer2 [03h] provides messenger services.

Which of the following is true with respect to the above statements?

Statement A is True and Statement B is False.

Page 96: Final Exam(Q6)

Statement A is False and Statement B is True.

Both Statement A and Statement B are True.

Both Statement A and Statement B are False.

Which RRAS feature in Windows Server 2G03supports routlngto bring up temporary connections?

Demand-dial routing NetWork address translation Multicast routing " Unicast routing\

You are the system administrator at BlueMoon Computers. The internal network of the company connects all the computers in the company. A remote client broadcasts the NetBIOS name query packet to internal network interface to connect to a computer over the network. The broadcast is unable to resolve the name of the computer. You need to preload the NetBIOS name cache using the Lmhosts file to allow it to resolve NetBIOS names. To preload the NetBIOS name cache using Lmhosts file, you need to perform the following steps:

1. Open the Run dialog box and type notepad

%systemroot96system32\drivers\etc\lmhosts.sam in the Open combo box.

2. Insert the required information in discrete lines of Lmhosts file for preloading the content in the NetBIOS name cache.

3. Click the OK button to open the Lmhosts file for editing in Notepad.

4. Select the All Files option from the Save as type list box and type "lmhosts" to save the file without an extension.

5. Select the Save As option from the File menu to open the Save As dialog box.

6. Click the Save button to complete the preloading process and

What is the correct sequence of steps you need to follow to accomplish this task?

1,2,3,4,5,6 1,2,3,5,4,6

Page 97: Final Exam(Q6)

1,3,2,5,4,6 1,3,2,4,5,6

You are the system administrator at WorldAd, Inc. The company has a large network of Windows Server 2003 computers. The network has 20 subnetworks, which are used by different departments in the organization. To provide communication path between the subnetworks, you implement static routing. The router will determine the route for the data traffic depending upon the routing protocol. How will you configure the routing protocol for the type of routing used in the network?

Implement Routing Information Protocol (RIP) v1. Implement Open Shortest Path First (OSPF) protocol. Implement Routing information Protocol (RIP) v2. Routes are configured manually in static protocol, so no need to implement a

routing protocol.

You are the system administrator at Red Sky Inc. The company has a network of Windows Server 2003 systems. A server, running Windows Server 2003, in the company's head office has a collection of class files. Classes need to be used by the software developers to develop software. Users connected to the network want to access the server as Web server. You are also required to implement authentication and authorization so that an unauthorized user cannot access the resources available on the server. In addition you should monitor the routing activities taking place during data transfer. How will you meet the requirements?

Configure the network router and implement Routing Information Protocol (RIP). Configure the network server to allow packet filtering.

Configure the network router and implement Open Shortest Path First (OSPF).

Configure the network server to allow Routing and Remote Access Service.

You are the system administrator at Modern Research Inc. The company is a research organization that manages a community of research scientists from various universities across the globe. The company has its head office in Atlanta and all the scientists working on a project submit their thesis at the head office for publishing. The scientist at the remote location needs to establish a connection with the Windows Server 2003 server in head office using dial-up. The connection should be physical, non-permanent, and secure so that a malicious user cannot trap the transmitted data. You are asked to configure the Routing and Remote Access on the server so that the scientists can

Page 98: Final Exam(Q6)

communicate with the server in a secure manner using dial-up. What configuration information will you take into consideration while configuring the Remote Access Server for dial-up?

Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Identify the type of link used by the client to setup a connection with remote access server.

Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access.

Identify the DHCP server or NAS that is used to assign IP addresses to the remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients.

You are the system administrator at Red Sky IT Systems. You use command line utilities other than Network Monitor to test network connectivity. Which utility should you use with TCP/IP protocol to verify the address resolution of DNS name to IP address?

Domain Controller Diagnostic Tool Hostname Netstat Nslookup

Steve is the system administrator at Smart Software Developers. Steve configures DHCP scopes. Which DHCP scope property should he configure for the range of the IP addresses in the scope that are not to be leased?

Scope name Exclusion range

Network ID

Page 99: Final Exam(Q6)

Network IP address range

You have joined BiueMoon Computers as a system administrator. The internal network of the company is divided into various zones. The internal network has a primary DNS server and various secondary NS servers to manage different zones of the network. The users of the internal network complain that the same host names are resolved to different computers using different DNS servers. You want to get information about the various DNS servers and the zones controlled by them. Which record source should you look to get the desired information?

Start Of Authority (SOA) Mail Exchange (MX) Service Record (SRV) Nameserver (NS)

You are the system administrator of StarMoon Technologies. The head office of your organization is located at Boston. The organization has opened two branches in Paris and London. You have been assigned the task of planning the network infrastructure for the new branches. After analysing the network requirements, you have implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You need to transfer data between the branches using IP, IPX/SPX, RIP, orOSPF protocol. Depending on the requirements, which intermediate device would you recommend for the network?

Hub Layer 1 switch Layer 2 switch Router

Consider the following statements:

Statement A: You can implement multiple sites by registering multiple second level domains.

Statement B: You can implement multiple sites by registering single second level domain and then subdividing it.

Which of the following is true with respect to the above statements?

Statement A is True and Statement B is False. Both Statement A and Statement B are False. Both Statement A and Statement B are True. Statement A is False and Statement B is True.

Page 100: Final Exam(Q6)

You are the system administrator of Infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command is unsuccessful. Which of the following could be a cause of this problem?

The server is not authoritative for the r The DNS server service is not started. The server's cache is populated. The server has an incorrect IP address.

allowed remote access to the network. However, users report that they are not allowed to dial in to Server 2. You need to identify the cause of the problem and suggest a solution to resolve the problem. How will you accomplish the task?

Server 1 is configured to support only local user accounts. Add a realm replacement rule for the Windows Server 2003 domain on Server 1 to resolve the problem.

Server 1 is configured to support only local user accounts. Configure Routing and Remote Access on Server 1 to use RADIUS Authentication to resolve the problem.

Server 1 is configured to support only local user accounts. Add Server 1 to the RAS and IAS Servers group in Active Directory to resolve the problem.

Server 1 is configured to support only local user accounts. Add a remote access policy that uses MS-CHAP on Server 1 to resolve the problem.

You are the system administrator in Denver Prime, Inc. The organization has a Windows 2000 and Windows Server 2003 based network of 400 computers. In addition, there are five Windows Server 2003 computers, out of which three servers, A, B, and C, are configured as DNS servers. The other two Windows Server 2003 computers are configured as a DHCP server and a domain controller, respectively. Recently, your junior system administrator, Chris informs you about the possible security threat due to communication of all the internal DNS servers with the DNS servers on the Internet. Therefore, to optimize security, you plan to specify a particular path to the Internet by restricting the internal DNS servers, A and B to communicate directly with the DNS servers on the Internet. Which of the following options is best suited to accomplish this task?

Delete root hints file on DNS servers, A and B. Disable round-robin rotation on DNS servers, A and B. Disable local subnet prioritization on DNS servers, A and B. Disable recursion on DNS servers, A and B.

You are the system administrator of StarMoon Technologies. The network of your organization includes 200 computers on a Windows 2003 based network. In your organization, 20 employees are deployed offshore for a project at London. These employees logon to the organization's network using dial-up connection. Recently, the

Page 101: Final Exam(Q6)

CEO of your organization, Nancy Jones informs you that she has to attend a three-day conference in London. During her stay in London, she wants to access the organization's network remotely using her laptop. You need to assign her special privileges that are not available to other remote users deployed in London. How can you accomplish this task with least administrative effort and without disturbing the current network communication mechanism?

You can assign static IP address to the laptop of the CEO and assign special privileges to that IP address.

You can configure a RADIUS server and grant special privileges to Nancy when she logs on remotely.

You can configure an IAS server and grant special privileges to Nancy when she logs on remotely.

You can use Audit and Oakley logging to grant special privileges to the laptop of the CEO.

Which RRAS feature in Windows Server 2003 supports routing, where one

Compui ddressed for the entire network?

Demand-dial routing Network address translation Unicast routing Multicast routing

Consider the following statements:

Statement A: Predefined IPSec polices are directly used or assigned as a security template for defining custom IPSec policies. Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies.

Which of the following is true with respect to the above statements?

C" Statement A is True and Statement B is False.

C Both Statement A and Statement B are False.

C Both Statement A and Statement B are True.

C Statement A is False and Statement B is True.

How many generic domains are present in the domain name space?

Three Seven Four

Page 102: Final Exam(Q6)

Two

You are the system administrator at Red Sky Inc. The company has engine, transmission, workshop, and power units that produce different parts for car manufacturing. All production units send production information to the main office, where it is stored in a database. You are working at the company's main office and systems at the main office are running Windows Server 2003. Transmission unit is sending too much of data and you want to filter out the unnecessary information. How will you meet the requirements?

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the inbound data packets from a particular source IP address to a destination IP address. Select appropriate protocol, and source and destination Ports.

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the inbound data packets selecting an appropriate protocol.

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the inbound data packets to a destination IP address with the appropriate protocol.

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the inbound data packets from a source IP address.

You are the system administrator of BlueMoon Computers. The network in your organization is based on Windows Server 2003. There is one DNS server service installed on a Windows Server 2003 computer. The client computers in your domain are Windows NT 3.5x, Windows 2000, and Windows 2003. The users of Windows 2003 complain about being unable to access the shared resources on Windows NT server over the network. They need to access the Windows NT server to get some important information related to their project. Why are the employees unable to get their data from the Windows NT server?

You have not run the ipconfig /all command on all the Windows 2003 computers. The DHCP server does not have the Enable Updates for DNS Clients That Do Not

Support Dynamic Update check box selected. The clients working on Windows NT have not been manually updated with the

DNS server. The DNS server has the Enable Updates for DNS Clients That Do Not Support Dynamic Update check box selected.

You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. You want to configure a computer to work both as a Web server named www.admin.bmcompltd.com and a FTP server named ftp.accounts.bmcompltd.com. The current host name of the computer is compl .admin.bmcompltd.com. You need to configure this computer using CNAME

Page 103: Final Exam(Q6)

resource records. What are the various CNAME entries you need to make in the admin.bmcompltd.com zone to accomplish this task?

www IN CNAME compl ftp IN CNAME compl compl IN A 10.0.0.31 ftp IN CNAME compl compl IN A 10.0.0.31 www IN CNAME compl ftp IN CNAME compl compl IN A 10.0.0.31 www IN CNAME compl

Pharma, Inc. is a leading pharmaceutical organization with its head office located at New York. This organization has opened its new branch office at Chicago. The head office needs to send confidential information to the branch office using the public network. The routers connecting these offices are authenticated with computer-based certificates. You as a system administrator need to develop a secure router connectivity option between the head office and the new branch office. Which of the following options will be best suited for the network?

Isa IPSec in tunnel mode NAT Vpn

You are the system administrator at BlueMoon Computers. The computers of the company are interconnected using an internal network. The employees of various departments of the company communicate with each other using the network. The employees also access the server to get the required information related to their respective projects. The employees complain that during their sessions they get disconnected from the server, which results in loss of data. They also complain that sometimes they are not able to connect to other applications over the network. Which layer of the OSI model should be checked to resolve the problem?

Data Link Session Transport Physical

StarMoon Technologies is a small software development organization. The network setup of this organization consists of 20 computers. The employees of this organization use VB.Net and SQLServer database. There are two active nodes supporting each of these applications. You, as a system administrator, have been assigned the task of planning a fail over strategy to ensure minimal downtime if any one of the nodes fails. Which of the following failover policies will be best suited for the organization?

Standby server configuration Failover pairs configuration N+l configuration Radom failover policies

Page 104: Final Exam(Q6)

The head office of your organization is located at New York. The organization now plans to open a new branch office at Las Vegas, which will be a separate network and will be connected to the head office through WAN links. The new branch office will accommodate approximately 1200 hosts. The network of this branch office will consist of computers running Windows Server 2003 and Windows 2000 operating systems. The management of the organization wants that the IP addresses should be automatically assigned to the hosts in the network. As a system administrator, you need to create a TCP/IP plan for the new branch office. Identify the most appropriate plan for the new branch office.

You can use class-based, class B addressing structure. In addition, you can implement DHCP reserved addressing for allocating the IP addresses to the hosts of the new branch office.

You can use classless-based, class B addressing structure. In addition, you can implement DHCP reserved addressing for allocating the IP addresses to the hosts of the new branch office.

You can use classless-based, class B addressing structure. In addition, you can implement DHCP dynamic addressing for allocating the IP addresses to the hosts of the new branch office.

You can use class-based, class B addressing structure. In addition, you can implement DHCP dynamic addressing for allocating the IP addresses to the hosts of the new branch office.

You are the system administrator at BlueMoon Computers. The company has various branches at different places. The various branches are interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition?

Verification interval Renewal interval Extinction interval Extinction timeout

The head office of Janes Technologies is located at New York. This office has a setup of 1000 computers running Windows Server 2003. One computer is running as a DNS server to resolve the names for the domain, janestechnologies.com. The branch office of

Page 105: Final Exam(Q6)

this organization is located at London. The head office is connected with the branch office using slow WAN links. The users from the branch office send name resolution queries to the head office. You as a system administrator need to select an appropriate strategy to reduce the load on the DNS server at the head office. Which of the following options will be the most appropriate strategy for this situation?

Disable recursion on the DNS server at the head office and place one DNS server at the branch office.

Place two DNS server at the head office. Place one DNS server at the head office and one DNS server at the branch office. Place one DNS server at the branch office and configure forwarders

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The database administrator of the company complains about not being able to send mails and communicate with other computers over the network. To resolve the problem, you need to know the host names of the computers and the ports assigned to provide a particular service. Which resource record should you view to get the desired information?

Pointer (PTR) Service Record (SRV) Start Of Authority (SOA) Host (A)

ames is the system administrator at Smart Software Development. The company is having remote network access between the computers of branch office and head office. James needs to monitor the network access servers through various objects. These objects contain information about the remote network access requests, errors, protocols, and performance data. Which object should James use to monitor the performance of individual remote access ports?

RAS Port IAS Authentication Client IAS Authentication Server RA Total

Consider the following statements:

Statement A: A host name of a computer contains a maximum of 255 characters.

Page 106: Final Exam(Q6)

Statement B: A NetBIOS name consists of a maximum of 15 characters. Which of the following is true with respect to the above statements?

Both Statement A and Statement B are True. Statement A is True and Statement B is False. Both Statement A and Statement B are False. Statement A is False and Statement B is True.

You are the system administrator of Denver Prime, Inc. The organization has a DNS namespace, www.denverprime.com. Some employees of the organization have been sent to London on a project for six months. These employees need to access the organization's domain using the www.denverprime.com namespace. As these employees access this domain namespace through the Internet, you need to ensure security of the organization's domain. What should you do to ensure that the organization's domain is secure?

Apply medium to high-level security on the DNS server. Apply medium-level security on the DNS server. Apply high-level security on the DNS server, Apply low-level security on the DNS server.

You are the system administrator at WorldAd, Inc. The company network has 250 computers, and five servers running Windows Server 2003. An employee can make remote network access to the server by configuring properties of Dial-in properties dialog box. You configure the Callback Option in the dialog box and enable the Set by Caller option. What can be the consequence of making this configuration change in the client's Dial-in properties?

The configuration denies a user to use a callback option. The configuration will require the user to set the callback options. The configuration specifies a telephone number at which the server can call back

to the user. The configuration disconnects the user after authentication.

Bluesky, Inc has two branch offices located at California and Boston. The DNS server of the organization is installed at the head office located at Los Angeles. A limited amount of bandwidth is available between the head office and the branch offices. Which of the following types of DNS servers is best suited for the head office in this scenario?

Forward-only Non-recursive Conditional forwarders Caching-only

Page 107: Final Exam(Q6)

You are the system administrator at Red Sky Inc. James is using a network system running Windows Server 2003. The company network has 200 computers and James' computer is connected to the network. A DHCP server dynamically assigns IP addresses to the client computers on the network. The network is confined to the company premises and it is not connected to the Web. Some of the programs on James' computer are corrupt and he restarts the computer after fixing the bugs in the programs. In the mean time, connection with the DHCP server is snapped because of network failure. After restart, James' computer is unable to locate the DHCP server and default gateway. James is not able connect to the network because of DHCP failure. How can this problem be avoided?

Configure James' computer to allow user configured Alternate Configuration. Configure Automatic Private IP Addressing service for James' computer. Change the existing leased IP address of James' computer with a renewed IP

address. Manually assign an IP address to James' computer after it restarts.

You are the system administrator at BlueMoon Computers. The DHCP server of the internal network controls hundreds of computers connected to each other and with the server. The DHCP server contains a lot of data. The server is has very less memory space left. The Managing Director asks you to attend a meeting with the board of directors about configuring the internal network of some new offices that have opened recently. When you come back after the meeting, you find that the server has run out of memory space. You want to check the transactions that were done on the DHCP database after you left for the meeting. How can you get the desired information?

Check the dhcp.mdb file to find out the various transactions in the DHCP database transactions.

Check the J50.log file to find out the various transactions in the DHCP database transactions.

Check the Resl .log file to find out the various transactions in the DHCP database transactions.

Check the Tmp.edb file to find out the various transactions in the DHCP database transactions.

You want to protect data from unauthorized attack during data transmission. Which of the following router connectivity strategies is suitable for this?

On-demand Tunneling Leased lines Demand-dial persistent

You are the system administrator at Red Sky Inc. The company has a network of 3000 computers running Windows Server 2003 and using WINS type IP address. You decide

Page 108: Final Exam(Q6)

to use NetBIOS name resolution on the network. To provide connectivity with TCP/IP networks, you configure the NetBT protocol on all the Windows Server 2003 computers. You set all the nodes as B-node type of NetBT protocol. After performing all these configuration changes, you notice that the network performance has suffered substantially. What can be the cause of the problem?

Host computers on the network are using peer-to-peer name queries for name resolution and registration.

Host computers are not able to resolve names by NBNS. Host computers on the network are using NetBIOS Name Server (NBNS) for

name registration and name resolution. Host computers configured as B-node on the network are creating an excessive

broadcast traffic.

John is the system administrator at Technology Systems. John configures the DHCP scopes. Which DHCP scope property should he configure to specify the time period for which DHCP server will assign IP addresses?

Exclusion range Scope name Router Lease duration

You are the system administrator at Red Sky Inc. The company has a medium-sized network, which has systems running Windows Server 2003. The network has various subnetworks and data transmission between the client computers on the subnetworks takes place through routers. Users using the client computers complain about the long transmission delay for data packets. You analyze the network settings and find that sometimes the data packets enter a loop and are not able to reach the destination computer. Which methodology will you implement to solve the problem?

Configure the network router and implementing Open Shortest Path First (OSPF). Configure the network router and implementing Classless Interdomain Routing

(CIDR). Configure the network router and implementing Border Gateway Protocol (BGP). Configure the network router and implementing Routing Information Protocol

(RIP).

You are the system administrator in StarMoon Technologies. The organization has its head office at Florida and branch office at Los Angeles. Everyday, important information, such as daily sales report and customer records are sent from the branch office to the head office using a dial-up connection. You want to ensure that the data that is being transmitted using the dial-up connection is secure from unauthorized access.

Page 109: Final Exam(Q6)

Which of the following options will enable you to accomplish this with least administrative effort?

Configure Internet Authentication Server (IAS). Implement a private network between the head office and the branch office. Implement IPSec policies. Configure the RADIUS server.

You have joined Texas Computers, Inc. as a system administrator. You have been asked to plan the network infrastructure for the two new branch offices of the organization. You have to collect and record the information about the various teams that will be implementing the network infrastructure. You also need to determine the tools and strategies that will be used for implementing the network infrastructure for the new branch offices. In addition, you need to identify contingencies and unforeseen problems during the implementation of the network infrastructure and determine ways to deal with such problems. Identify the plans in which you will record this information.

Team plan, capacity plan, and test plan Communication plan, deployment plan, and support plan Communication plan, capacity plan, and test plan Team plan, support plan, and communication plan

You are the system administrator at Global Software, Inc. The company has one DHCP server and 300 clients. You are responsible for assigning IP addresses to all the client computers. You use DHCP service to assign IP addresses dynamically. You now want to display the date when the server was assigned a dynamic IP address using DHCP. Which field containing the DHCP settings should you use to implement the required task?

Lease Expire DHCP Server Lease Obtained Default Gateway

Consider the following statements:

Statement A: You should disable the local subnet prioritization method when the servers having multiple IP addresses are not on the same subnet.

Statement B: You should disable the round-robin rotation method when the servers having multiple IP addresses are on the same network.

Which of the following is correct about the above statements?

Statement A is False and Statement B is True.

Page 110: Final Exam(Q6)

Both, Statement A and Statement B are True. Statement A is True and Statement B is False, Both, Statement A and Statement B are False.

You are the system administrator at BlueMoon Computers. You are reviewing the network traffic and notice that there are a large number of DNS queries for resolving the host name of the File server in the network. You also find that the network services are becoming slow because of the DNS queries and irrelevant network traffic for the File server. You decide to configure the entry of the File server in the Hosts file on each computer. The Hosts file will be preloaded in the client resolver cache. You also plan to add name-to-IP address mapping to the Lmhosts file so that the NetBIOS names in the organization can be resolved. What is the correct sequence of steps you should take to accomplish this task?

View and flush client resolver cache. Preload the client resolver cache. View and release NetBIOS name cache.

Preload the client resolver cache. View and flush client resolver cache. View and release NetBIOS name cache.

View and release NetBIOS name cache. Preload the client resolver cache. View and flush client resolver cache.

View and flush client resolver cache. View and release NetBIOS name cache. Preload the client resolver cache.

BlueMoon Computers has implemented the Windows Server 2003 domain-based network at their head office at California. You are the system administrator of the company. The CEO of the company asks you to provide a remote connection to two employees of the company, who need to connect to the company's private network from New York. For this you configure a VPN support for remote connectivity on the remote access server and configure the client computers for VPN connectivity. Now, you have to maintain the security of the private network to avoid any unauthorized access.

Which is the most appropriate option to implement the security at the head office?

Configure Smart Card authentication on the remote access server. Configure Smart Card authentication on NAS. Configure NAS for authenticating the connection request. Configure Dial-up connection for remote clients instead of VPN connection.

Which even ID in the DHCP Server Audit log specifies an event when a client renews a lease?

02 12 10

Page 111: Final Exam(Q6)

11

How many IPsec policies can be applied at a time?

Two One Four Three

You are the system administrator at Safest Software Co. You are monitoring the network, which includes tracking and troubleshooting network problems. Which utility should you use to troubleshoot TCP/IP problems?

Address resolution utilities Network Connections Repair Link Network Diagnostics utility Netsh command

The WAN interfaces in______________router can be configured

depending on the number of locations to be connected.

2500 series router 900 series router 3600 series modular router 2400 modular router

Which of the following options enables load balancing of the requests that are being serviced by the clusters?

NLB masking Zoning LUN masking Masking

You are the system administrator at network has 250 computers, and five servers running Windows Server 2003. An employee can make remote network access to the server by configuring properties of Dial-in properties dialog box. You configure the Callback Option in the dialog box and enable the Set by Caller option. What can be the consequence of making this configuration change in the client's Dial-in properties?

Page 112: Final Exam(Q6)

The configuration specifies a telephone number at which the server can call back to the user.

The configuration denies a user to use a callback option. The configuration disconnects the user after authentication. The configuration will require the user to set the callback options.

You are the system administrator at BlueMoon Computers. The company opens up a new branch at Houston. 50 computers need to be configured on a network at the new branch office. In addition, the Managing Director has said that some computers from the internal network of the head office have to be transferred to the new network. The senior administrator informs you that he had faced many difficulties regarding the conflicts in the IP addresses he assigned when the current office was confioured. What is the most efficient wavthat you should follow so that you do not face such a problem?

Exclude the computers from the other network and assign IP addresses to the new computers in the network manually.

Assign IP addresses to all the computers of the office using DHCP. Release all IP addresses of the network from which the computers are transferred

to the new office, and then, assign IP address to all the computers manually.

You are the system administrator at BlueMoon Computers. The company has various branches at different places. The various branches are interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition?

Verification interval Renewal interval Extinction timeout Extinction interval

The head office of Prime Computers is at Atlanta. The organization plans to open three new branch offices at Geneva, Paris, and Virginia. Each branch office will have approximately 1000 hosts. All the servers at the branch offices will connect to the corporate office using WAN links and VPN. As a system administrator, you need to create the TCP/IP plan for the new branch offices. Identify the appropriate TCP/IP addressing structure and the number of subnets for the new branch offices.

Page 113: Final Exam(Q6)

You can use classless-based, class C addressing structure and one subnet for each new branch office.

You can use classless-based, class A addressing structure and one subnet for each new branch office.

You can use class-based, class B addressing structure and one subnet for each new branch office.

You can use classless-based, class B addressing structure and one subnet for each new branch office.

The head office of Janes Technologies is located at New York. This office has a setup of 1000 computers running Windows Server 2003. One computer is running as a DNS server to resolve the names for the domain, janestechnologies.com. The branch office of this organization is located at London. The head office is connected with the branch office using slow WAN links. The users from the branch office send name resolution queries to the head office. You as a system administrator need to select an appropriate strategy to reduce the load on the DNS server at the head office. Which of the following options will be the most appropriate strategy for this situation?

Disable recursion on the DNS server at the head office and place one DNS server at the branch office.

Place two DNS server at the head office. Place one DNS server at the head office and one DNS server at the branch office. Place one DNS server at the branch office and configure forwarders.

You are the system administrator at Red Sky Inc. James is using a network system running Windows Server 2003. The company network has 200 computers and James' computer is connected to the network. A DHCP server dynamically assigns IP addresses to the client computers on the network. The network is confined to the company premises and it is not connected to the Web. Some of the programs on James' computer are corrupt and he restarts the computer after fixing the bugs in the programs. In the mean time, connection with the DHCP server is snapped because of network failure. After restart, James' computer is unable to locate the DHCP server and default gateway. James is not able connect to the network because of DHCP failure. How can this problem be avoided?

Manually assign an IP address to James' computer after it restarts. Configure James' computer to allow user configured Alternate Configuration. Configure Automatic Private IP Addressing service for James' computer. Change the existing leased IP address of James' computer with a renewed IP

address.

You are the system administrator at BlueMoon Computers. The internal network of the company contains a DNS server. Whenever the DNS database is changed or updated, you need to manually update the changes. The size of the DNS database is large. Therefore, you want to automate the system of updating the DNS database. The DNS database contains confidential data related to the projects going on in the company, and therefore,

Page 114: Final Exam(Q6)

data must be secure. What should you do to reduce your burden of updating the database and keep the security of the DNS database?

Create a new zone with Do not allow dynamic updates option selected. Configure zone to allow transfer from specified IP addresses. Create a new zone with Allow both secure and nonsecure dynamic updates option

selected. Create a new zone with Allow only secure dynamic updates option selected

You are the system administrator in Red Sky IT Systems. The head office of your organization is located at Denver. The network of the organization consists of 100 computers on the redsky.com domain. In the head office, IFSec is deployed for secure data transmission. Your junior system administrator, James informs you that while connecting to one of the computers, ComputerOl, an error message, "Invalid authentication protocol" is displayed. You check the IFSec policies configured on James computer, and find that the IFSec policies are correctly configured. When you try to connect to ComputerOl, you also receive the same error message. Which of the following tools will enable you to resolve this problem?

Security Configuration and Analysis MMC snap-in RSoP troubleshooting tool GFO Editor IP Security Monitor

Consider the following statements:

Statement A: You can implement multiple sites by registering multiple second level domains.

Statement B: You can implement multiple sites by registering single second level domain and then subdividing it.

Which of the following is true with respect to the above statements?

Statement A is False and Statement B is True. Both Statement A and Statement B are False. Both Statement A and Statement B are True. Statement A is True and Statement B is False.

John is the system administrator at Global Software, Inc. The company is having remote network access between the computers of the branch office and the head office. John needs to monitor the networks access servers through various objects. These objects contain information about the remote network access request, errors, protocols, and performance data. Which object should John use to monitor the performance of all remote access ports?

Page 115: Final Exam(Q6)

RAS port RA total IAS Athentication Client IAS Authentication Server

Which of the following characters is used to present the root domain?

Question Mark (?) Period (.) At the rate of (@) Hyphen (-)

You are the system administrator at BlueMoon Computers. You have established the internal network of the company, which connects all the computers. You assign host names and NetBIOS names to the computers on the network. Different applications run on different computers. An application running on a computer needs to communicate with another computer on the network to request for some information. The application sends a host name to the DNS client service. The following steps are performed:

1. DNS server sends the request to the NetBIOS name resolution process.

2. DNS client service seeks the required host name in the client resolver cache.

3. DNS client service seeks the host name query to the DNS server.

4. The corresponding IP address is returned to the application on success.

What is the correct sequence of steps that is followed when the DNS client service resolves the host name to the corresponding IP address?

1,2,3,4 2,1,3,4 2,3,1,4 3,2,1,4

John is the system administrator at Technology Systems. John uses command line utilities other than Network Monitor to test network connectivity. Which utility should he use to display the statistics regarding the current network connections of the client configured on the TCP/IP protocol?

Host name Netstat ipconfig Nslookup

Page 116: Final Exam(Q6)

You are the system administrator at BlueMoon Computers. All the computers in the company are connected using an internal network. The employees working on a single project need to communicate with each other by exchanging messages and required information. The project managers of the projects complain that the messages they send to their team members or other project managers are either partially received or received with the words jumbled. Which layer of the OSI model should be checked to resolve the problem?

Physical Transport Network Data Link

You are the system administrator at WorldAd, Inc. The company has a large network of Windows Server 2003 computers. The employees of the company use the internal network to communicate and transfer the data related to their projects. The internal network of the company is divided into various subnetworks. Multiple routers are used to connect the various subnetworks with each other. The routers are configured such that they discard the data packets if the network traffic or hop counts for a data packet increase more than the threshold value. The employees from the various subnetworks complain to you that the time taken in transferring the data from one subnetwork to the other is more than expected during the office working hours. The employees also complain that sometimes the data is not all transferred from one sub network to another. What should you do to solve the problem?

Use Routing Information Protocol (RIP) for routing the data packets. Use Open Shortest Path First (OSPF) for routing the data packets. Use Classless Interdomain Routing (CIDR) for routing the data packets. Use Border Gateway Protocol (BGP) for routing the data packets.

You are the system administrator of Janes Technologies. The organization has 1200 hosts that use a customized application. This application is required to be available 24X7 for all the employees of the organization. The downtime of this application can result in loss of business and effort. As a result, you need to plan for providing 24X7 availability of this application with minimal downtime. Which of the following options is the best possible strategy to accomplish this task?

Create a server cluster that is based on minority node set quorum device cluster model.

Create a server cluster that is based on majority node set quorum cluster model. Create a server cluster that is based on local quorum cluster model. Create a server cluster that is based on single quorum device cluster model.

How does smart card log on work?

By encrypting the transmitting message

Page 117: Final Exam(Q6)

By verifying the users identity during log on By verifying the software publisher identity By signing the data with digital signatures

Consider the following statements:

Statement A: Nslookup command line utility enables you to troubleshoot DNS problems.

Statement B: DNSLint is a third-party tool that enables you to troubleshoot DNS problems.

Which of the following is correct about the above statements?

Both, Statement A and Statement B are True. Both, Statement A and Statement B are False. Statement A is True and Statement B is False. Statement A is False and Statement B is True.

Petersons, Inc. has a setup of 40 computers. All computers are running on Windows Server 2003 and are assigned fixed IP addresses. As a system administrator of the organization, which of the following methods would you recommend for updating the DNS automatically?

DNS client dynamic updates Dynamic updates from Active Directory Secure dynamic updates in Active Directory Dynamic updates from DHCP

You are the system administrator of StarMoon Technologies. The network of your organization includes 200 computers on a Windows 2003 based network. In your organization, 20 employees are deployed offshore for a project at London. These employees logon to the organization's network using dial-up connection. Recently, the CEO of your organization, Nancy Jones informs you that she has to attend a three-day conference in London. During her stay in London, she wants to access the organization's network remotely using her laptop. You need to assign her special privileges that are not available to other remote users deployed in London. How can you accomplish this task with least administrative effort and without disturbing the current network communication mechanism?

You can use Audit and Oakley logging to grant special privileges to the laptop of the CEO.

You can configure a RADIUS server and grant special privileges to Nancy when she logs on remotely.

Page 118: Final Exam(Q6)

You can configure an IAS server and grant special privileges to Nancy when she logs on remotely.

You can assign static IP address to the laptop of the CEO and assign special privileges to that IP address.

You are the system administrator of Infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command is unsuccessful. Which of the following could be a cause of this problem?

The server has an incorrect IP address. The DNS server service is not started. The server is not authoritative for the requested name. The server's cache is populated.

You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Virginia and Texas. The Virginia branch has 1100 hosts. However, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch is 1000 per second. The Texas branch has 2100 hosts. The expected number of client queries for the branch is 1900 per second. You need to plan the number of zones and DNS servers for each branch. Which of the followinq options would vou recommend forvour organization?

Two zones at the Virginia branch office and a separate DNS server for each zone. A single zone at the Texas branch office with one DNS server.

A zone at each branch and a separate DNS server for each zone. Two zones at the Texas branch office and a separate DNS server for each zone. A

single zone at the Virginia branch office with one DNS server. Four zones at each branch and a DNS server for each branch.

You are the system administrator of Red Sky, Inc. Your organization has a network of 100 Windows 2000 and Windows Server 2003 based computers, which are on a single subnet. In your organization, two DNS servers have been assigned five IP addresses each. You notice that both the DNS servers take quite a long time to resolve host names of redsky.com domain. To resolve this problem, you plan to create another subnet and move one of these DNS servers to the newly created subnet. However, this task will require two days to be completed and would require the entire network of the organization to be shut down for at least one day. The management does not agree to this proposal, as it will result in loss of business. So, you plan to optimize the response of these two DNS servers. Which of the following options will enable you to accomplish this task with least administrative effort?

Disable EDNSO on both the DNS servers. Disable round-robin rotation on both the DNS servers. Disable recursion on both the DNS servers.

Page 119: Final Exam(Q6)

Disable local subnet prioritization on both the DNS servers.

You are the system administrator of StarMoon Technologies. The head office of your organization is located at Boston. The organization has opened two branches in Paris and London. You have been assigned the task of planning the network infrastructure for the new branches. After analysing the network requirements, you have implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You need to transfer data between the branches using IP, IPX/SPX, RIP, orOSPF protocol. Depending on the requirements, which intermediate device would you recommend for the network?

Layer 2 switch Hub Router Layer 1 switch

An organization has its head office at Denver and two branch offices at Virginia and New York. Each branch including the head offices has implemented NLB clusters. You, as a system administrator, need to monitor the NLB cluster of the New York branch from the head office. Which of the following commands will enable you to perform this task?

Nlb.txt Nlb.clr Nlb.exe Nlb.dat

Consider the following statements:

Statement A: Predefined IPSec polices are directly used or assigned as a security template for defining custom IPSec policies. Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies.

Which of the following is true with respect to the above statements?

Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both Statement A and Statement B are False. Both Statement A and Statement B are True.

James is the system administrator at BlueMoon Computers. James configures DHCP scopes. Which DHCP scope property should he configure for the IP address used for accessing remote networks?

Page 120: Final Exam(Q6)

Lease duration Exclusion range Router Scope name

You are the system administrator in Texas Computers, Inc., with its head office at Texas. The total number of hosts at the head office is 50. The organization now plans to open a branch office at New York that will have 100 hosts. The branch office at New York will be a separate subnet but will be connected to the organization's network at Texas, through VPN. You need to plan the TCP/IP addressing structure for the new branch office according to the current infrastructure of the organization. Identify the most appropriate addressing structure for the new branch office.

Class-based, class C addressing structure Classless-based, class C addressing structure Class-based, class B addressing structure Classless-based, class B addressing structure

Consider the following statements:

Statement A: Domain names represent user-friendly alphanumeric names that refer to computers on the Internet.

Statement B: The multihomed NetBIOS name registers a unique NetBIOS name that has more than one IP address in the WINS database.

Which of the following is true with respect to the above statements?

Statement A is False and Statement B is True. Both Statement A and Statement B are False. Both Statement A and Statement B are True. Statement A is True and Statement B is False.

You are the system administrator at Red Sky Inc. the company s network consists of 500 systems with Windows Server 2003 servers. An authorized remote user can access the shared files available on servers. You are asked to keep track of network access activities using routing and remote access logging characteristics provided by RRAS. In addition, you are asked to perform the following activities:

Maintain a detailed record of all remote access requests. Log names of remote access policies for all the connection attempts.

You want to use the information available in the above logs for judicial enforcement of remote access policies. How will you meet the requirements?

Configure the server to allow Local Authentication and Account logging.

Page 121: Final Exam(Q6)

Configure the server to allow Event logging. Configure the server to allow Audit logging. Configure the server to allow Point-to-Point logging.

You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. The data zone located on the primary zone changes. The change in the data zone should be updated in the secondary DNS servers also. You need to make the necessary updates to the secondary DNS servers. Which server should you look for the list of servers to be notified?

Primary Server Authoritative Server Caching-only Server Secondary Server

You are the system administrator at Red Sky Inc. The company has engine, transmission, workshop, and power units that produce different parts for car manufacturing. All production units send production information to the main office, where it is stored in a database. You are working at the company's main office and systems at the main office are running Windows Server 2003. Transmission unit is sending too much of data and you want to filter out the unnecessary information. How will you meet the requirements?

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the inbound data packets from a source IP address.

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the inbound data packets to a destination IP address with the appropriate protocol.

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the inbound data packets from a particular source IP address to a destination IP address. Select appropriate protocol, and source and destination ports.

Configure the Routing and Remote Access settings from the system's Control Panel. Enable the IP router manager and filter the Inbound data packets selecting an appropriate protocol.

Which database file in DHCP maintains a log of all database

J50.log Dhcp.mdb Res1.log

Page 122: Final Exam(Q6)

Tmp.edb

Origin Communications, Inc. is a leading ISP provider that has its head office located at London. This organization has 10 branches in different parts of USA. At the head office, a 3600 modular router is placed and at each branch office 2500 series routers are placed for transmitting the data packets. The organization has opened 16 new branches in different parts of the world. You as a system administrator have been assigned the task to select an appropriate routing protocol for the new branch offices. Which of the following routing protocols will be best suited for the new branch offices?

Static ospf vpn rip

You are the system administrator at WorldAd, Inc. The network has 50 computers, which are installed in an office. All the computers are running Windows Sever 2003 and configured to use NetBIOS naming function. The computers are configured as B-type nodes of NetBT protocol and use WINS IP addresses. The company decides to scale up the network to contain 5000 computers. After expansion of the network size all the employees complain about degraded network bandwidth. How will you fix the problem?

Change the IP address type. Configure network computers as M-node types, so that the computers use

broadcast as a default for name resolution. Deny the use of NetBIOS naming functions for logical naming of host computers. Configure networks computers as P-node types and use a NetBIOS Name Server

(NBNS) for naming function.

You are the system administrator at Safest Software Co. The company has one DHCP server and 300 clients. You are responsible to assign IP addresses to ail the client computers. You use DHCP service to assign IP addresses dynamically. You now want to maintain all the information used in domain name service. Which field containing the DHCP settings should you use to implement the required task?

Default Gateway DHCP Server Subnet Mask DNS Server

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The managing director of the company wants you to give him a list of all the zones of the network and the e-mail

Page 123: Final Exam(Q6)

address of the administrator of that zone. Which resource record should you view to get the required information?

Start Of Authority (SOA) Pointer (PTR) Host (A) Service Record (SRV)

Which RRAS feature in Windows Server 2003 supports routing to bring up temporary connections?

Demand-dial routing Multicast routing Unicast routing Network address translation

BlueMoon Computers has implemented the Windows Server 2003 domain-based network at their head office at California. You are the system administrator of the company. The CEO of the company asks you to provide a remote connection to two employees of the company, who need to connect to the company's private network from New York. For this you configure a VPN support for remote connectivity on the remote access server and configure the client computers for VPN connectivity. Now, you have to maintain the security of the private network to avoid any unauthorized access.

Which is the most appropriate option to implement the security at the head office?

Configure NAS for authenticating the connection request. Configure Smart Card authentication on the remote access server. Configure Smart Card authentication on NAS. Configure Diai-up connection for remote clients instead of VPN connection.