mcse sample questions

24
MCSE Sample Questions : Microsoft Windows Server 2003 Environment Microsoft Windows Server 2003 Environment 1. You are the desktop support specialist for your company. Your company has 20 users and four computers. The network is shown in the exhibit (See the exhibit below). On Monday, the operating system on a computer named COMP2 was upgraded from Windows NT 4.0 to Windows 2000 Professional. On Tuesday morning, a user on COMP2 complains that while he is able to log on to the domain, he is not able to access files on a server named SERV2 or connect to the Internet. You find that the user on COMP1 is able to connect to SERV2 and the Internet. What would be the most likely cause of the problem? A. Incorrect IP address on COMP2. B. Incorrect default gateway on COMP2. C. COMP2 does not have a domain computer account. D. The network does not have a WINS server. Answer: B 2. You are the workgroup administrator for a small office. The office contains 12 Windows 2000 professional computers. Each computer is assigned a private IP address in the 172.10.X.X range. One computer has a dial-up connection to the Internet. To enable all users to access the Internet, you enable ICS (Internet Connection Sharing) on the computer with the dial up connection. You configure ICS and reboot the computer. You notice that none of the other users can connect to the ICS computer, and the ICS computer cannot see the other computers in the network. What could be the problem? A. Configure the other computers to use the ICS computer as a proxy. B. Configure the other computers to receive their IP address automatically. C. Configure the other computers to use the ICS computer as their default gateway. D. Enable Internet Connection Sharing on all of the computers.

Upload: suchitk

Post on 10-Apr-2015

245 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: MCSE Sample Questions

MCSE Sample Questions : Microsoft Windows Server 2003 EnvironmentMicrosoft Windows Server 2003 Environment

1. You are the desktop support specialist for your company. Your company has 20 users and four computers. The network is shown in the exhibit (See the exhibit below). On Monday, the operating system on a computer named COMP2 was upgraded from Windows NT 4.0 to Windows 2000 Professional. On Tuesday morning, a user on COMP2 complains that while he is able to log on to the domain, he is not able to access files on a server named SERV2 or connect to the Internet. You find that the user on COMP1 is able to connect to SERV2 and the Internet. What would be the most likely cause of the problem?

A. Incorrect IP address on COMP2. B. Incorrect default gateway on COMP2. C. COMP2 does not have a domain computer account. D. The network does not have a WINS server.

Answer: B

2. You are the workgroup administrator for a small office. The office contains 12 Windows 2000 professional computers. Each computer is assigned a private IP address in the 172.10.X.X range. One computer has a dial-up connection to the Internet. To enable all users to access the Internet, you enable ICS (Internet Connection Sharing) on the computer with the dial up connection. You configure ICS and reboot the computer. You notice that none of the other users can connect to the ICS computer, and the ICS computer cannot see the other computers in the network. What could be the problem?

A. Configure the other computers to use the ICS computer as a proxy. B. Configure the other computers to receive their IP address automatically. C. Configure the other computers to use the ICS computer as their default gateway. D. Enable Internet Connection Sharing on all of the computers.

Answer: B

3. You provide technical support for a company with several locations. In a remote sales office, there are 5 Windows 2000 Professional computers. All computers are connected in a workgroup, as shown in the exhibit. (See the exhibit below). The manager's computer has a 56K dial up connection to the Internet. The manager calls and explains that she had enabled ICS (Internet Connection

Page 2: MCSE Sample Questions

Sharing) on her computer. Once ICS had been enabled, none of the other users were able to access a shared folder on the manager's computer. What should you instruct her to do?

A. Configure the dial-up connection to disable shared access. B. Configure the dial-up connection to disable on-demand dialing. C. Disable data encryption in the new dial-up connection. D. Use the ipconfig command to release and renew your network TCP/IP address.

Answer: A

4. You are installing a computer named COMP2 on a Windows 2000 network as shown in the exhibit (See the exhibit below). Your network uses TCP/IP as the only network protocol. You configure COMP2 with an IP address of 192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway of 192.168.2.1 Though you are able to log onto the domain, you are not able to connect to any resources on SERV2. Users need to be able to access this server to access documents and shared printers. What should you do to ensure that USER2 can connect to network resources?

A. Configure Client2 to use a Default Gateway of 192.168.10.1 B. Configure Client2 to use a TCP/IP address of 192.168.2.16

Page 3: MCSE Sample Questions

C. Configure Client2 to use a TCP/IP address of 192.168.5.16 D. Create a computer account on the domain for USER2

Answer: A

5. You are configuring the dial-up connection for the portable computer shown in the exhibit (See the exhibit below). What address should you use as the default gateway for the portable computer's dial-up connection?

A. 192.168.111.42 B. 192.168.100.21 C. 192.168.100.1 D. 209.29.9.20

Answer: C

6. You are setting up a computer for students to use to practice exercises for their certification exams. You want to configure the computer so that users can boot into both Windows 98 and Windows 2000 Professional. You want to ensure that students can access all drive resources from either operating system. What should you do?

A. Create a single FAT32 partition. B. Create a single NTFS volume. C. Configure one NTFS volume, and one extended FAT32 partition. D. Configure a dynamic volume.

Answer: A

7. Your Windows 2000 professional computer has a shared laser printer that is used by several other users in the office. Users are complaining that they are not able to submit print jobs to the shared printer. Your computer has two hard disks. Drive C is almost out of free space, while drive D has

Page 4: MCSE Sample Questions

ample free space. You suspect that the lack of free space on drive C is preventing users from submitting print jobs. What can you do to allow print jobs to spool on Drive D?

A. From the Print Server Properties dialog box, change the spool folder to a folder on drive D. B. From the Printer Properties dialog box, change the spool folder to a folder on drive D. C. Use the Microsoft Redirector to send the print jobs to Drive D. D. Make drive D a dynamic volume and extend drive C onto drive D.

Answer: A

8. You are the network administrator for a small company. A Windows 2000 server serves as a domain controller, DNS server and serves file and print functions. Users home folders are located on this computer so that all user files will be backed up every night with the server backup. Because of drive space limitations, you have defined disk quotas for the user's home folders. The office manager, Sandra, informs you that when she tries to save documents to her home folder, she receives the error: 'Insufficient disk space'. She informs you that she must be able to save her important files into this folder as soon as possible. Other users are not encountering this problem. What should you do?

A. Set the compression attribute for Sandra's folder. B. Grant Sandra Full Control permission to her home folder. C. Have Sandra save the files to her local hard disk. D. Increase the Server's disk quota entry.

Answer: D

9. You have a Windows NT 4.0 Workstation computer with an NTFS file system that you use for software development. As your company upgrades their systems to Windows 2000, you will need to be able to test applications in both the Windows NT Workstation environment and the Windows 2000 environment. You decide that the easiest course of action would be to install Windows 2000 Professional in a dual boot environment with Windows NT 4.0 Workstation on your computer. What should you do before installing Windows 2000 Professional?

A. Edit the BOOT.INI file to reflect the new installation of Windows 2000 Professional. B. Install Service Pack 3 or later for Windows NT Workstation 4.0. C. Install Service Pack 4 or later for Windows NT Workstation 4.0. D. Convert the NTFS file system to FAT.

Answer: C

10. Your office is part of a larger Windows 2000 network. Two computers named PUB1 and PUB2 have identical laser printers shared as LASER1 and LASER2 During a particularly busy day, LASER1 has run out of toner. You do not have another toner cartridge to service it. Several users have print jobs waiting to print on PUB1. You need to send all print jobs waiting on PUB1 to the printer on PUB2. You also want any print jobs that may be sent to PUB1 later in the day to be sent to the printer on PUB2. What is the best course of action?

A. Change the spool settings for PUB1 to point to the spooler directory on PUB2. B. Change the share name of LASER1 to LASER2. C. Configure LASER1 to add a port and set the port to \\PUB2\LASER2. D. Configure LASER2 to add an input path and set the path to \\PUB1\LASER1.

Answer: C

11. You install an updated device driver for a SCSI adapter on your Windows 2000 Professional computer. After installation you are prompted to restart your computer. During startup, your computer appears to lock up. You try to boot in safe mode, but again, your computer appears to lock up. How can you fix the problem?

A. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the remove command to remove the device driver.

B. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

Page 5: MCSE Sample Questions

C. Insert the Emergency Repair Disk. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

D. Press F8 during startup to access the Windows 2000 boot menu Select debug mode from the boot menu Use the remove command to remove the device driver.

Answer: B

12. The president of your company collects manager's weekly reports in a shared folder on her Windows 2000 Professional computer called reports. Because the reports contain sensitive information, she asks you to prevent users from enabling offline access for the network share that contains the financial report. What should you do?

A. Use Windows Explorer to disable Offline Files. B. Use Windows Explorer to disable Caching for the reports on the network share. C. Set the Manager's access level to read-only. D. Implement a domain policy to block the synchronization of offline files.

Answer: B

13. You install an updated device driver for a SCSI adapter on your Windows 2000 Professional computer. After installation you are prompted to restart your computer. During startup, your computer appears to lock up. You try to boot in safe mode, but again, your computer appears to lock up. How can you fix the problem?

A. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the remove command to remove the device driver.

B. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

C. Insert the Emergency Repair Disk. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

D. Press F8 during startup to access the Windows 2000 boot menu Select debug mode from the boot menu Use the remove command to remove the device driver.

Answer: B

14. You are the desktop Administrator for a Windows 2000 network. Client computers on your network receive their TCP/IP configuration from a DHCP server. You have purchased 25 new computers with PXE compliant network cards. You decide to use RIS to deploy a Windows 2000 image to the 25 new computers. For the first 17 computers, the installation works fine. For the remaining 8 computers, the installation fails. What is the likely cause of the problem?

A. Your DHCP server does not have enough available IP addresses for the new computers. B. There are not enough licenses configured in RIS for the new computers. C. You have not created enough computer accounts for the new computers. D. You have reached the maximum number of clients for a Windows 2000 network.

Answer: A

15. You are the desktop administrator for your company. Your network has 130 Windows 2000 client computers. You need to apply the latest service pack to all 130 computers. To save time, you decide to use a Windows Installer package to install the service pack on all 130 computers. You create an installer package, and assign it to the domain. The next day, you check the status of the installation and find that the service pack has only been installed on the computers in some departments in the domain, but not others. What can you do to ensure that the service pack is applied to all computers in the domain?

A. Ensure that all client computers have the latest version of the Windows Installer. B. Log into each of the client computers using an administrative account to install the service pack. C. Create a Windows Installer assignment file. Specify each computer in the domain by name. D. Ensure that all users in the domain have permission to access the share and folder that contains

the service pack installation files.

Answer: D

Page 6: MCSE Sample Questions

16. You have 45 computers in your network that you must upgrade from Windows NT 4.0 Workstation to Windows 2000 Professional. You want to use Setup Manager to create an unattended installation file to reduce the need for user interaction during the upgrade process. Since you will be installing Windows 2000 from a CD ROM, how can you use an unattended installation?

A. Install Setup Manager on each Windows NT 4.0 Workstation computers. Start the installation from within Setup Manager by specifying the unattended text file to use.

B. Rename Unattend.txt to Winnt.sif. Copy this file to the C:\WINNT\SYSTEM32\INSTALL directory. C. Rename Unattend.txt to Winnt.sif. Keep this file on a floppy disk in the drive during installation. D. Use setup manager to specify the names of the 45 computers that will be upgraded.

Answer: C

17. You are upgrading several computers in your office from Windows NT 4.0 to Windows 2000. While running Windows 2000 setup on one computer, you encounter a read error with the CD-ROM, and are forced to terminate setup. You replace the CD ROM, but find that you are not able to boot the computer into Windows 2000 or Windows NT. You attempt to boot from the CD ROM, and find that the computer does not support booting from the CD ROM. What can you do to recover the installation?

A. Boot the computer from a Windows NT boot disk. Delete the WINNT directory. Rename the $WINNT.OLD directory to WINNT.

B. Create a Windows NT Boot disk. Copy the real-mode CD-ROM drivers to this disk. Boot with the floppy disk and run setup again from the CD ROM.

C. On another computer, create a set of Windows 2000 installation disks. Use these disks to restart the installation on the failed computer.

D. Press F8 while booting the computer. Select 'Rollback to previous version of Windows' from the recovery options menu.

Answer: C

18. Your network has 25 computers that have been purchased over the course of time. These computers need to be upgraded from Windows NT 4.0 Workstation or Windows 9x to Windows 2000. These computers come from a variety of vendors and feature a variety of hardware. You decide that you want to use Sysprep and a third party disk imaging software to simplify installations. You want to ensure that Windows 2000 detects the new variety of hardware without generating errors. What should you do?

A. Remove all devices in Device Manager before running Sysprep. B. Include the -pnp perameter when you run sysprep. C. Include the -redetect perameter when you run sysprep. D. Check the 'Force hardware redetection' checkbox when you run sysprep.

Answer: B

19. You are planning to deploy Windows 2000 Professional on 25 identical new computers in your company. You decide to use Sysprep and a third party disk imaging software to simplify installations. You install Windows 2000 on one computer. You then log in using the local administrator account and install the applications that the users will use and configure the initial desktop settings. You want to ensure that the users will receive the desktop settings, shortcuts and start menu that you have configured. What should you do?

A. Run Sysprep. Sysprep will always use the active profile as the default. B. Specify the administrator profile in the [profiles] section of the sysprep.inf. C. Log into the computer as Default User. Set up the desktop settings, shortcuts and start menu

settings. D. Copy the Administrator profile to the Default User profile. Grant permissions to the Everyone group

to use the profile.

Answer: D

20. You are the desktop administrator for your company's network. The network is configured as shown in the Exhibit (See the exhibit below). You have just received 25 new PXE compliant computers that

Page 7: MCSE Sample Questions

need to be installed on the network. You decide to use Remote Installation Service (RIS) to deploy Windows 2000 on the new computers. Assuming that you have already created a RIS image, and placed the image on the RIS server, what must you do to ensure that the new computers can receive a RIS image?

A. Add a WINS to the network. B. Add a DHCP to the network. C. Create a set of RIS boot disks. D. Create computer accounts in the domain for the new computers.

Answer: B

21. You are the desktop administrator for the finance department. A user named Tom transfers from the sales department to the finance department. You add Tom's user account to the finance group, which has Full Control access to the FinanceFiles folder. When Tom tries to access the FinanceFiles folder, he is denied access. What could be the cause of the problem?

A. Tom's account must be given permissions on the share as well. B. Tom may have a policy restriction which does not allow him to access the FinanceFiles folder. C. Tom may still be a member of a group that has been explicitly denied access the FinanceFiles

folder. D. You must add Tom's account directly to the FinanceFiles folder.

Answer: C

22. Your Windows 2000 Professional computer has several shared folders. You are conducting a security audit and wish to view the permissions on each of the shared folders. How can you quickly view all shared folders on your computer? on of ShareA. What should you do?

A. User Windows Explorer to search for shared folders. B. Use System information in Computer Management to view shared folders. C. Use disk management to view the shared folders on each drive. D. Use Shared Folders in Computer Management to view shared folders.

Answer: D

23. A manager in your office received a new Windows 2000 Professional laptop computer. You have been asked to configure offline files for the manager to work on documents at home. You enable offline files, and have the manager log off of the network. During the logoff process, the expected

Page 8: MCSE Sample Questions

synchronization of offline files does not occur. You have the manager log back on to the network. What can you do to correct the problem?

A. Enable file and print sharing. When the manager logs off, the files will synchronize. B. Manually synchronize all offline files. C. On the server, make all files available offline. When the manager logs off, the files will synchronize. D. Do nothing. Windows 2000 Professional does not tell you when Synchronization happens.

Answer: C

24. You use a Windows 2000 Professional computer to run a third party application to log network activity in your office. These log files are kept in a folder that has limited access. You schedule a task to run a clean-up program to purge old log files from the log file folder. When the scheduled task runs, it terminates without deleting any files. To test the application, you log into the computer, and run the application. It runs correctly. What can you do to ensure that the application will work as a scheduled task?

A. Configure the scheduled task to run under your account. B. Configure the Task Scheduler service account to use a local Administrator account. C. Give the task scheduler service full control permission for the directory. D. Configure the Task Scheduler service to start automatically.

Answer: A

25. You are setting up a Windows 2000 professional laptop computer to use offline files. You set up a shortcut to a folder that is shared on a Windows 2000 Server computer. When you attempt to configure the shortcut to be available, you do not see the option to make the folder available offline. What should you do?

A. Establish an offline files link to the folder in Computer Management. B. Configure the folder on the network share for offline access in Windows Explorer. C. Connect to the network before trying to make the shortcut available offline. D. Copy the folder from the network share, and select 'Make Available Offline' in the local folder

properties.

Answer: B

26. You have a Windows 2000 Professional computer that runs several monitoring applications that occasionally make changes to registry entries. You use Windows Backup to make a nightly backup of the computer. You want to ensure that the current registry objects are included in the backup. What should you do?

A. Configure Windows Backup to back up the entire hard drive. B. Configure Windows Backup to back up the System State data. C. Select 'Registry Files' under 'Additional Files to back up' in Windows Backup. D. Configure Windows Backup to backup open files.

Answer: B

27. You have a Windows 2000 Professional computer that is used by several users. You occasionally set up special accounts for visiting vendors to log into the computer. These accounts have limited access to the network, and are named guest1, guest2, guest3, etc... You create a script to delete these accounts periodically from the computer. You want to use Windows scheduler to run this script on a regular basis. You want to ensure that the script will run regardless of which account is currently logged on to the computer. What should you do?

A. Schedule the task to run under an Administrative account. B. Log on as administrator and schedule the task to run as guest1. C. Give the guest accounts local administrative rights. D. Grant the guest accounts 'execute' permissions to the script.

Answer: A

Page 9: MCSE Sample Questions

28. You are the desktop support specialist for a magazine publishing company. One computer in the office is used to download images from digital cameras and from the Internet. Many users log in to this computer each day. A user complains that this computer has stopped responding. You find that someone has installed drivers for a digital camera. These drivers were not approved for use with Windows 2000. You want to ensure that only drivers that are approved for use with Windows 2000 are used on this computer. Which settings should you enable in the Deliver Signing Options dialog box?(Choose all that apply)

A. Ignore B. Warn C. Block D. Apply setting as system default.

Answer: C, D

29. You connect a USB printer to your Windows 2000 Professional computer. You install the device driver for the printer. During the install process, the computer displays a fatal error. You restart the computer, and the computer locks up while loading Windows 2000 Professional. You start the computer in safe mode. What should you do next?

A. Enabling driver signing. Set driver signing to Block installation of unsigned drivers. B. Remove the printer from the printers applet in control panel. C. Disable the printer device driver using the disable command. D. Disable the printer device driver in Computer Management.

Answer: D

30. The president of your company collects manager's weekly reports in a shared folder on her Windows 2000 Professional computer called reports. Because the reports contain sensitive information, she asks you to prevent users from enabling offline access for the network share that contains the financial report. What should you do?

A. Use Windows Explorer to disable Offline Files. B. Use Windows Explorer to disable Caching for the reports on the network share. C. Set the Manager's access level to read-only. D. Implement a domain policy to block the synchronization of offline files.

Answer: B

31. The manager of the finance department has two spreadsheets that contain sensitive information. She has used Windows 2000 encryption to ensure the security of the files on her local computer. She would like to make a backup of the files. What should you advise her to do?

A. Copy the files to a network share on an NTFS volume B. Copy the files to a floppy disk and use the CIPHER command to encrypt them. C. Place the files in an encrypted folder and copy the folder to a floppy disk. D. Use her computer to format a floppy disk and copy the files to the disk.

Answer: A

32. You are asked to establish a dial-up connection on a Windows 2000 Professional computer in the Accounts Payable department to connect a custom application to the vendor's network. You have limited information about the type of connection. Because of the sensitive nature of the connection you want to make sure that authentication information is not sent in plain text. Click the exhibit button to view the Advanced Security Settings dialog box. In the Advanced Security Settings dialog box, which options should be checked? (Choose all that apply)

Page 10: MCSE Sample Questions

A. Unencrypted password (PAP) B. Shiva Password Authentication Protocol (SPAP) C. Challenge Handshake Authentication Protocol (CHAP) D. Microsoft CHAP (MS-CHAP) E. Microsoft CHAP Version 2 (MS-CHAP v2) F. For MS-CHAP based protocols, automatically use my Windows logon name and password

Answer: C, D, E

33. You are the desktop administrator for your network. Sam, the manager of the sales department, complains that someone has been deleting files from his hard disk. He asks you if you can track any users that delete files from his computer in the future. What should you do? (Choose all that apply)

A. Enable a Group Policy for auditing successful object access events. B. Enable a Group Policy for auditing unsuccessful object access events. C. Enable the local Group Policy for auditing successful system events. D. Enable the local Group Policy for auditing unsuccessful system events. E. Use Windows 2000 Explorer to enable auditing for Sam's files. F. Enable auditing in the properties of any share that exists on Sam's computer.

Answer: A, E

34. Your company has an outside sales team. Recently each of the outside sales staff was given a new Windows 2000 portable computer. The sales team now wants to be able to dial into the network from client sites. For security purposes, you have been asked to set up connections that use smart cards for two-factor authentication. The connection is already configured on the server. You need to configure each laptop to use this connection. What should you do?

A. Set the dial-up connection to use EAP. B. Set the dial-up connection to use SPAP. C. Use the software that came with the smart card to create the connection.

Page 11: MCSE Sample Questions

D. Issue a client side certificate for each of the portable computers. Configure each connection as a VPN connection.

Answer: A

35. You have a need to provide a vendor with a Windows 2000 based portable computer with an external Zip drive. You find an external Zip drive in the supply closet. You attach the drive to the parallel port of the portable computer, and configure the parallel port as an ECP port. Your port settings are shown in the exhibit (See the exhibit below). Windows 2000 Professional has detected the change to the port, but does not detect the attached drive. You need to resolve the problem quickly. What should you do?(Choose all that apply)

A. Configure the ECP port to use any interrupt assigned to the port. B. Configure the ECP port to not use the automatic resource setting. C. Change the LPT Port Number to Unassigned. D. Configure the ECP port to enable legacy Plug and Play detection.

Answer: D

36. You get a great deal on a refurbished laser printer. The printer is plug and play compliant and connects to your USB port. The printer is on the current Windows 2000 Hardware Compatibility List (HCL). You install the printer and run the manufacturers setup program. During the installation, you receive the error shown in the exhibit (See the exhibit below). What should you do?

Page 12: MCSE Sample Questions

A. Change the USB port setting to enable legacy Plug and Play detection. B. Configure the USB port to Disable Error Detection. C. Connect the printer as a shared device on a non-Windows 2000 computer. D. Install the WDM-compliant device drivers using the Add New Hardware wizard.

Answer: D

37. You are the network consultant for a small company. Part of the office network is shown in the exhibit (See the exhibit below). The network has built up as the company grew. Originally a Windows NT 4.0 peer-to-peer network running NWLINK protocol, the network has grown into a Windows 2000 domain. Not all computers in the network can access all other computers in the network. Though the network works now, the general manager has asked you fix the connectivity problem and prepare the network for Internet connectivity. What should you do?

A. Change all NWLINK computers to the 802.2 frame type. B. Install TCP/IP on the Windows NT 4.0 Workstations. C. Change the default network protocol to NWLink IPX/SPX D. Add the NetBEUI protocol to the binding order on all client computers.

Answer: B

38. You are the desktop administrator for your company. Pat, a manager in the accounting department asks for your help. Pat needs to copy a spreadsheet to a floppy disk so she can use it at home. On her hard drive, compressed, the file is less than 1 MB in size. However, when Pat attempts to copy the file to an empty floppy disk, she receives the error: 'Insufficient Disk Space' What should you suggest to Pat to do?

A. Use Drivespace.exe to compress the entire floppy disk. B. Format the Floppy disk on the Windows 2000 computer. Set the compression attribute on the

floppy disk to on. C. Use another program to compress the bitmap file before copying it to the floppy disk. D. Copy an empty compressed folder to the floppy disk. Copy the compressed bitmap file to the folder

on the floppy disk.

Answer: C

39. You are the desktop administrator for a graphic arts studio. To support a processor intensive rendering program, you have purchased a computer with Dual Pentium 4 processors. You install

Page 13: MCSE Sample Questions

Windows 2000 Professional on the computer. In Device Manager you notice that the drivers for the second processor are not installed. How can you enable support for the second processor?

A. Re-install Windows 2000 Professional. Specify the additional driver for the second processor. B. Remove the current processor from device manager, System devices. Reboot to allow Windows

2000 to detect the second processor. C. Use Device Manager to add the appropriate hardware abstraction layer (HAL) to the computer to

support the second processor. D. Boot Windows 2000 Professional into a command prompt only. Use HALBUILD.EXE to rebuild the

hardware abstraction layer (HAL).

Answer: C

40. You are preparing a RIS installation of Windows 2000 Professional on 45 PXE compliant computers. You install Windows 2000 on a reference computer along with all application and desktop settings. You use sysprep to shut down the computer, and you create an image of the test computer for distribution. When you apply the image to the next computer, you notice that a key application has not been installed. You want to correct the problem with the least amount of effort. What should you do?

A. Use Setup manager to specify a network installation directory for the application. B. Install the application and create the RIS image again. C. Use Sysdiff to take a snapshot of the application installation. Use Windiff to apply the change to the

rest of the computers. D. Add the application install path to the [apps] section of the unattended.txt file

Answer: B

Microsoft Windows Server 2003 Network Infrastructure (70-291)

MCSE Sample Questions : Microsoft Windows Server 2003 Network InfrastructureMicrosoft Windows Server 2003 Network Infrastructure

1. As a newly recruited network administrator of a company your boss has told you that the network ID of this network is 192.168.1.1 and subnet mask is 255.255.255.240 and has two subnets, but he wanted to create a new subnet for IT and Marketing departments. What is the total number of subnets that can be created from the existing subnet mask?

A. 5 B. 4 C. 14 D. 41

Answer: C

2. What is the maximum number of PPTP and L2TP connections that can be supported on a Windows 2003 Enterprise edition?

A. 1000 and 5000 B. 1000 and 1500 C. 1000 and 1000 D. 5000 and 1000

Answer: C

3. As part of trouble shooting errors in a VPN connection, what logs must be checked? A. IPSec logging B. Event viewer

Page 14: MCSE Sample Questions

C. VPNSec Log D. All of above

Answer: a

4. A network has an unauthorized DHCP server. What is the utility to detect this? A. DHCPUnatho B. DetectDHCP C. DHCPLOC D. There is no way to detect an authorised DHCP server

Answer: C

5. What is the recommended way for making DNS servers aware of other namespaces? A. STUB Zone B. Conditional Forwarding C. Forward lookup D. Reverse lookup

Answer: B

6. What is the broadcast address of the subnet 192.18.12.128 / 255.255.255.224 and address range 192.18.12.129 through 192.18.12.158?

A. 192.18.12.159 B. 192.18.12.128 C. 192.18.12.158 D. 192.18.12.129

Answer: D

7. Which is the best option for troubleshooting name resolution problems? A. NSlookup B. Systems Monitor C. DNS log in Event Viewer D. Network Monitor

Answer: A

8. You have installed a Windows Server 2003 DNS server, but because of security reasons, you have to install this behind a firewall. What port on the firewall must be opened so that users can access the server?

A. IP and UDP port 42 B. UDP and TCP port 53 C. TCP 53 but not UDP D. PPTP and UDP 21

Answer: B

9. In an IPSec tunnel what types of traffic can be secured? A. Multicast B. Unicast C. Kerberos D. Resourse Reservation Protocol(RSVP)

Answer: B

Page 15: MCSE Sample Questions

10. An administrator has to choose between compatibility at the same time security is the top most priority for implementing a Virtual Private Network?

A. PPPoE B. LT2P C. PPTP D. PPP

Answer: B

MCSE Sample Questions : Windows Server 2003 Active Directory InfrastructureWindows Server 2003 Active Directory Infrastructure

1. As the network administrator you have been requested to create a site link to join two sites together for replication. First you click Start, point to Programs, point to Administrative Tools, and then click to open Active Directory Sites and Services. What is the next step in creating this site link?

A. Click two or more sites to connect and click OK B. Right-click on Licensing Site Setting and then click on properties. C. Open Inter-Site Transport folder and then right-click IP or SMTP folder D. Enter a name for the site link bridge. E. In the New Object Link dialog box click New Site Link Bridge.

Answer: C

2. In any Active Directory forest there are five Operations Masters roles that must be assigned to one or more domain controllers. Which of the following answers correctly depicts these roles?

A. Infrastructure Master, PDC Emulator, Relative ID master, SYSVOL, Root Domain B. Schema Master, Domain Naming Master, Infrastructure Master, PDC Emulator, Relative ID master. C. Root Master, Domain Name Master, Infrastructure Master, PDC Emulator, Relative ID master. D. Trust Master, Root Master, Infrastructure Master, PDC Emulator, Relative ID master.

Answer: B

3. A hierarchical structure made up of multiple domains that trust each other is called a(n) _______? A. Forest B. Schema C. Site D. Organizational Unit E. Tree

Answer: E

4. You have been told that you need to track down the source of a breach in network security. As a network technician for your company's Windows 2000 network you quickly pull up Event Viewer and examine the security logs on the Domain Controllers. However upon viewing the security log you notice there are key and lock icon symbols you do not understand. What could these mean?

A. The key icon represents that this event is locked with a normal password while the lock icon represents that this event is locked with an encryption.

B. The key icon represents that the event is a key alert record while the lock icon indicates that this event can only be unlocked by its owner.

C. The key icon represents that the event occurred successfully while the lock icon represents event occurred unsuccessfully.

D. The key icon represents that this event contains errors, warnings, or vital information while the lock icon represents that this event is normal and within guidelines.

Answer: C

5. As a network administrator you have been requested to move a printer from your company's Marketing OU to your company's Research OU. After the move you test the printer and find that the

Page 16: MCSE Sample Questions

local administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can you do to change this?

A. Remove the permissions for the local administrator from the printer. B. Remove printer permissions from the local administrator. C. Remove the Everyone group from the printer. D. Delete the printer object.

Answer: A

6. You recently been promoted to Network Administrator for DLM Shipping. When you took over this position the first thing you notice is this Windows 2000 environment using DNS naming convention, root domain is DIM.COM, with numerous child domains. User accounts are stored in the child domains. However your supervisor informs you that root domain is misspelled and should be DLM.COM. He explains this is causing tremendous problems with the users and customers. He wants you to rename the domain. What will happen if you rename this root domain server?

A. When you rename the root domain server you will only have to rebuild the user accounts since the root domain holds the authentication (SAM) database.

B. When you rename the root domain server you will simply rename the child domain also. C. When you rename the root domain server you will lose the entire network orphaning the child

domains. D. When you rename the root domain server you will not need to do anything else since domain

names are inherited the child domains will acquire the new domain name.

Answer: C

7. Windows 2000 Active Directory contains both logical and physical components. Which of the following are physical components of Active Directory?

A. Trees B. Organizational Units C. Sites D. Domains E. Domain Controllers

Answer: C, E

8. You are the network administrator for a company that has a Windows 2000 single domain with three sites containing two domain controllers in each. The company only has two IP site links: Atlanta_Detroit and Dallas_Detroit. You are contemplating on adding another domain controller within each site to handle all replication for each site. How should you configure this domain Controller?

A. Configure the new domain controller to be an IP preferred bridgehead server. B. Configure the new domain controller to be a site link. C. Configure the new domain controller to be a subnet. D. Configure the new domain controller to be a replication master.

Answer: A

9. You are requested to perform a transfer of the role of relative ID master for a domain within your company. Where would you begin this transfer?

A. Open the Active Directory Schema snap-in B. Open the Active Directory Sites and Services console C. Open the Active Directory Domains and Trusts console D. Open the Active Directory Users and Computers console

Answer: D

10. You have just assisted your company in migrating to Windows 2000 Active Directory. In addition you have installed an intranet server with Web hosting services for each department within your company. One department, the legal department, actually hosts both a web services and ftp services

Page 17: MCSE Sample Questions

on its intranet server. You need to identify the legal department's intranet server as the host for both ftp and web server within the DNS server's resource records. Which type of resource record should you create to identify this server?

A. Alias (CNAME) B. Mail Exchange (MX) C. Pointer (PTR) D. Service (SVR) E. Name Server (NS) F. Start of Authority (SOA)

Answer: D

11. As the network administrator you have just been informed that one of your authorized Power Users has deleted several local user accounts. You explain to this mortified employee that he needs to perform an authoritatively restore on the select portion of Active Directory data deleted. What must be done before he can use NTDSUTIL utility to authoritatively restore the data?

A. Republish the SYSVOL B. Bring down all domain controllers at the site and reboot C. Perform a Primary restore D. Synchronize Active Directory Services E. Nonauthoritatively restore the System State data F. Revoke and reissue orphaned certificates

Answer: E

12. Your company uses Windows 2000 IIS server and log files you have enabled a reverse lookup zone. This will assist in running troubleshooting tools. Because your company is experiencing trouble with a DNS server you decide to use NSLOOKUP to confirm that zone delegation was successful. At the command prompt on your DNS server, you type NSLOOKUP 10.0.0.25 command. What do you expect to see next?

A. Hostname B. Server zone C. DNS log file D. DNS queries

Answer: A

13. You have been requested to create a group Policy (GPO) linked to a domain. The GPO will be applied to all users in the domain. What is the first step in creating a GPO?

A. Open the DispatchPolicy GPO console B. Open Active Directory Users and Computers C. Add the Group Policy snap-in to the MMC console D. Open Active Directory Sites and Services

Answer: B

14. You have been asked to troubleshoot a problem with your DNS servers that appears to not be making zone transfers between primary and secondary DNS servers. You begin to solve this problem by opening the DNS console tree, right click the name server, then click Properties. On the Logging tab, select the debug options and click OK. Which of the following are solutions for transfer problems between primary and secondary zones?

(Choose all that apply).

A. Make sure the serial numbers for the zones involved in the transfer are not the same on each server.

B. Make sure a site-link server is properly configures between each zone. C. Delete the secondary DNS server from the primary and reboot.

Page 18: MCSE Sample Questions

D. Eliminate the possibility of network connectivity between the two hosts. Use the PING command to ping each DNS host by its IP address from its remote counterpart.

E. Verify that the primary and secondary DNS servers involved in the transfer are both started and that the zone is not paused.

Answer: A, E

15. As the network administrator you have been asked to move a domain controller from one site to another existing site using Windows 2000 Active Directory. To accomplish this you begin by getting into the Active Directory Sites and Services console. Then you select the domain controller that you want to move. What do you do next?

A. Right-click the domain controller, select Cut, navigate to the new site and Paste it there. B. Click Move on the Action menu, select the site to which you want to move the domain controller in

the Move Server dialog box and click OK. C. Drag the domain controller to the new site and drop it there. D. Right-click the domain controller, select Advanced, select the site to which you want to move the

domain controller in the Move Server dialog box, and click OK.

Answer: B

16. As a network technician you have been requested to restore a mistakenly deleted organizational Unit from the Active Directory. You first perform a nonauthoritative restore of the System State data. After which you next chose to use the NTDSUTIL utility to authoritatively restore the organizational unit (OU) that has been mistakenly deleted. The deleted OU is named "prepexams1" and was located in the knowledgeoasis.com domain. At the command prompt you type the utility command 'ntdsutil' and enter, then the type of restore command 'authoritative restore' and enter. Which of the following commands should you enter next to restore this OU?

A. Ntdsutil OU=prepexams1,DC=knowledgeoasis,DC=com B. Restore subtree OU=prepexams1,DC=knowledgeoasis,DC=com C. Restore database OU=prepexams1,DC=knowledgeoasis,DC=com D. Authoritative restore OU=prepexams1,DC=knowledgeoasis,DC=com

Answer: B

17. You need to create a reverse lookup zone to enable reverse lookup queries. To create a reverse lookup zone you will need to open DNS console and expand the DNS server. What should you do next?

A. Right-click the DNS server and click Properties. B. Right-click the Reverse Lookup Zone folder and click Advanced. C. Right-click the DNS server and select New Domain. D. Right-click the Reverse Lookup Zone folder and click New Zone.

Answer: D

18. As network administrator you have been asked to create an Active Directory structure to allow local administrators at your company's branch offices to control users and local resources. The local administrators should control only resources in branch offices. What should you do to accomplish this request?

A. Create a child OU for each branch office, place users and resources in it, and delegate control of each OU to local administrators at each office.

B. Create a schema that contains formal definition of administrative duties and structure over users and resources in each branch.

C. Create an implicit trust object thast grants specific authority to the local administrator over their branch domain.

D. Create an explicit one-way nontransitive trust between domains that allow the branch administrators to controller their users and resources.

Answer: A

Page 19: MCSE Sample Questions

19. You are the backup operator of a Windows 2000 domain. The domain has 2 domain controllers and one certificate server at the central office and 1 domain controller at a branch office. You have been requested to add the domain controller in the remote branch office to your regular once a week backup at the central office. You schedule the backup job to include the system state data from both locations. What will be backed up from the branch office?

A. SYSVOL B. Registry C. Certificate database D. COM+ Class Registration database E. System boot files F. None of the above

Answer: F

20. You are an Account Operator responsible for maintaining Windows 2000 Active Directory and the network directory infrastructure. You have been using Windows 2000 Group Policy objects to assign .msi packages to a group of Windows 2000 Professional workstations based on their membership in an organizational unit. Recently you added several new users to the OUs receiving the .msi packages. All seems to performing properly until you are contacted by one of the new users. This user states that an error message: The feature you are trying to install cannot be found in the source directory. What is the solution(s) to this problem?

(Choose all that apply)

A. You must ensure that the user has sufficient permissions for the SDP and the application. B. Make sure the network is operating correctly. C. You must ensure that the user has Apply Group Policy permission for the GPO. D. You must ensure that the user has READ permission for the GPO.

Answer: A, B, C, D