exam 70-299 preparation questions

27
Exam 70-299 study material Made available by Testkingprep.com Free 70-299 Exam Preparation Questions Exam 70-299 : Implementing and Administering Security in a Microsoft Windows Server 2003 Network For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html

Upload: stuart-broad

Post on 28-Mar-2016

225 views

Category:

Documents


0 download

DESCRIPTION

Testkingprep is the leader in providing certification solution to the seekers and testking certification study guide is more authentic than others. Testking 70-299 practice exam and tests have constantly strived for excellence to make sure that our clients receive up-to-date study materials and support for all kind of certification exams.

TRANSCRIPT

Page 1: Exam 70-299 preparation questions

Exam 70-299 study material

Made available by Testkingprep.com

Free 70-299 Exam Preparation Questions

Exam 70-299: Implementing and Administering Security in a Microsoft Windows Server 2003 Network

For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html

Page 2: Exam 70-299 preparation questions

For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html

Page 3: Exam 70-299 preparation questions

Question:1 Which of the following are valid reasons to enable LM authentication? (Choose all that apply.)

A. Users will access network resources using computers running Windows 95. B. Users will access network resources using computers running Windows 98. C. Users will access network resources using computers running Windows NT. D. Users will access network resources using computers running Windows Me.

Answer: A, B

Question:2 You work as a security administrator for Microsoft. The basic network and some configurations are as the following: Today, you discover that unauthorized users intercepted data in sales documents while the documents were transmitted over the WLAN. You need to protect sales documents from being intercepted by unauthorized users. What should you do?

For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html

Page 4: Exam 70-299 preparation questions

For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html

Page 5: Exam 70-299 preparation questions

A. Use the CMAK wizard to create an executable file that a user can use to automatically create a remote access connection with customized security settings.

B. A new VPN server will be available. And then, configure a Connection Manager Administration Kit (CMAK) profile that connects sales users to the VPN server.

C. choose to automatically use the current credentials. D. provide credentials each time a connection is made.

For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html

Page 6: Exam 70-299 preparation questions

Answer: B

Question:3 Enabling account lockout accomplishes which of the following goals?

A. Makes it impossible to steal a user??s password. B. Reduces the likelihood that a malicious attacker will use brute force techniques to discover a

user??s password. C. Eliminates the need for strong passwords. D. Reduces Help desk costs.

Answer: B

Question:4

You work as a security administrator for Microsoft. The basic network and some configurations are as

the following: You are willing to configure the network in order to encrypt the traffic of Telnet, SNMP, and Kerberos by IPSec. However, you do not plan to encrypt other network protocols. How would you do that? Choose two that apply.

Page 7: Exam 70-299 preparation questions

A. Used to store keys that are configured for private key archival. B. create your own templates to meet the needs of your organization. C. define the permissions for each certificate template to ensure that only authorized users, computers,

or group members can obtain certificates based on a certificate template. D. Add a new rule to the Server Traffic policy to encrypt Kerberos traffic. E. Allows a security principal to find the certificate template in Active Directory when enrolling for

certificates. F. Configure the rules in the Server Traffic policy to use an authentication method other than

Kerberos.

Page 8: Exam 70-299 preparation questions

Answer: D, F

Question:5 Which of the following authentication methods should be chosen for a Web site on a public Internet with minimal security requirements, where administrators have no control over which browser a client uses?

A. Basic Authentication B. Digest Authentication For Windows Domain Servers C. Integrated Windows Authentication D. NET Passport Authentication

Answer: A

Question:6 You work as a security administrator for Microsoft. The basic network and some configurations are as the following:

You decide to implement IPSec to encrypt the payroll application data during transmission. You configure a custom IPSec policy named Payroll App on Server_One using the rules shown in the exhibit. You configure an IPSec default Client policy on the client computers in both Active Directory domains. During testing, you notice that client computers in the theOne.com Active Directory domain use IPSec when communicating with Server_One. However, client computers in the theTwo.com Active Directory domain cannot communicate with Server_One. You need to enable all client computers to use IPSec when communicating with Server_One. How would you do that?

Page 9: Exam 70-299 preparation questions

A. Manually importing the templates into Local Group Policy on individual computers. B. The custom Payroll App policy could be modified by adding the certificate authentication type to the

existing rules on Server_One. C. Importing the templates into Group Policy objects linked to Active Directory directory service. D. Deploy security templates in environments that do not use Active Directory.

Page 10: Exam 70-299 preparation questions

Answer: B

Question:7 Which of the following authentication methods should be chosen for a high-security, internal Web site in an Active Directory environment where single sign-on is a requirement?

A. Basic Authentication B. Digest Authentication For Windows Domain Servers C. Integrated Windows Authentication D. NET Passport Authentication

Answer: C

Question:8 You work as a security administrator for Microsoft. The basic network and some configurations are as the following: The employees of Microsoft must have access only to files that they are assigned access to based on their membership in a group. SSL on Server_One is to protect confidential data while it is in transit. You make sure that each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory. You need to ensure that Server_One authenticates users based on possession of their certificate. How can you do that?

A. Configure a Web server to serve content to the public Internet while minimizing the risk that the system will provide attackers with an entry point to the internal network.

B. Configure the mapping client certificate. C. configure fireware to allow all outbound connections from the internal network but to block all

incoming traffic. D. Using reversible encryption is not recommended.

Page 11: Exam 70-299 preparation questions

Answer: B

Question:9 Which of the following scenarios requires delegated authentication?

A. A public Web site from which all content should be anonymously accessed. B. An internal Web site from which all content should be anonymously accessed. C. An internal Web site containing simple Hypertext Markup Language (HTML) documents that only

managers should be able to access. D. An internal Web site that accesses a back-end server containing data that only specific users

should be able to access.

Answer: D

Question:10 You work as a security administrator for Microsoft. The basic network and some configurations are as the following:

The network is depicted in the exhibit. Currently, you need to plan an authorization model to control user access to the application. You will place theOne.com user accounts in a group named theOne-Users. You will place theTwo.com user accounts in a group named theTwo-Users. You will use a group named theResources to assign permissions that allow access to the application. You need to choose the appropriate types of groups to implement your plan. Which three types of groups should you choose? Please choose three that apply.

Page 12: Exam 70-299 preparation questions

A. Use a domain local group named theOne-Users in the theOne.com domain. B. Use a global group named theOne-Users in the theOne.com domain. C. Use a domain local group named theTwo-Users in the theTwo.com domain. D. Use a global group named theTwo-Users in the theTwo.com domain. E. Use a global group named theResources that contains the theOne-Users and the theTwo-Users

groups in the theOne.com domain. F. Use a domain local group named theResources that contains the theOwo-Users and the theTwo-

Users groups in the theOne.com domain. G. Use a domain local group named theResources that contains the theOne-Users and the theTwo-

Users groups in the theTwo.com domain. H. Use a domain local group named theResources that contains the theOwo-Users and the theTwo-

Users groups in the theOne.com domain.

Answer: B, D, H Question:11 In which of the following situations should you use trusts? (Choose all that apply.)

A. To enable access to an external Web site by customers from dozens of different companies. B. To enable access to shared folders by employees of a recently acquired company who have

accounts in a different domain. C. To enable all employees within an enterprise that uses multiple domains to print to a printer.

Page 13: Exam 70-299 preparation questions

D. To enable employees of a consulting firm to send e-mail messages to internal employees with whom they are working closely.

Page 14: Exam 70-299 preparation questions

Answer: C

Question:12 You work as a security administrator for Microsoft. The basic network and some configurations are as the following:

Now, you want to reduce the number of help desk calls related to account when it is lockout. What should you do?

A. Understand how Group Policy can be used to deploy security templates to computers in a domain.

B. Click the GPO you want to import the security template into. If you need to create a new GPO, click New and then type a name for the GPO.

C. Modify the Default Domain Policy Group Policy object (GPO). Configure an account lockout threshold of 10.

D. Browse for the security template you want to import. If you want to remove security settings that already exist in the GPO, select the Clear This Database before importing check box.

Answer: C

Question:13 In which of the following scenarios should you raise the domain functional level to Windows Server 2003? (Choose all that apply.) A. An environment with domain controllers running Windows NT, Windows 2000, and Windows

Server 2003 that has only client computers that run Windows XP. B. An environment with domain controllers running Windows 2000 and Windows Server 2003 that has

only client computers that run Windows NT and Windows 98. C. An environment with only domain controllers that run Windows Server 2003 and with only

client computers that run Windows 98 and Windows XP. D. An environment with only domain controllers that run Windows Server 2003 and with only

client computers that run Windows XP and Windows Server 2003.

Page 15: Exam 70-299 preparation questions

Answer: C, D

Question:14 You work as a security administrator for Microsoft. The basic network and some configurations are as the following:

You need to ensure that employees can access only their company's Web application. You must accomplish this task without requiring customers to disclose passwords. What should you do?\

A. Configure a Web server to serve content to the public Internet while minimizing the risk that the system will provide attackers with an entry point to the internal network.

B. configure an IP filter to match a packet??s source or destination port number, or even a packet??s IP protocol number.

C. configure the specific algorithms you want to use for integrity and encryption, including the option to use MD5 for integrity instead of the default SHA1, and standard Data Encryption Standard (DES) for encryption instead of the default 3DES.

D. The user can configure a certification authority (CA). Issue certificates to each employee of each customer that requires access to the Web site. Configure many-to-one certificate mapping.

Answer: D

Question:15 Which type of trust should you create to enable users from a UNIX-based Kerberos realm to access resources in a Windows Server 2003 domain?

A. Parent/child trust B. Tree/root trust C. External D. Realm

Page 16: Exam 70-299 preparation questions

Answer: D

Question:16 You work as a security administrator for Microsoft. The basic network and some configurations are as the following: Now, you want to require the partner company employees to use certificate-based authentication to access the extranet Web site. You have a public key infrastructure (PKI), which consists of a stand-alone root certification authority (CA) and an enterprise subordinate CA. The partner company does not have a PKI. You decide to issue certificates from your CA hierarchy to the partner company employees. The partner company certificates will require a different certificate policy than the policy currently used for issuing certificates to internal employees. Certificate revocation checking will be used during certificate-based authentication. You need to implement the necessary PKI changes to comply with these requirements. You want to achieve this goal by using the minimum amount of administrative effort. Which three actions should you perform? Please choose three that apply.

A. Use firewalls and perimeter networks to provide an additional layer of security for computers running Windows Server 2003.

B. Use a new subordinate CA in your CA hierarchy to issue certificates to partner company employees and to the extranet Web server.

C. Add the certificate of the root CA to the Trusted Root Certification Authorities store on the partner company's computers.

D. Add DNS records directly into the database. Dynamic DNS (DDNS) servers can receive malicious or unauthorized updates from an attacker using a client that supports the DDNS protocol if the server is configured to accept unsecured updates. E. create multiple domains to apply different security policies to users or resources.

F. Create new HTTP Authority Information Access (AIA) paths and certificate revocation list (CRL) distribution points that specify locations on the extranet Web site.

Answer: B, C, F

Question:17 You work as a security administrator for Microsoft. The basic network and some configurations are as the following:

Currently, you need to reduce the time that it takes for client computers to find out about certificate revocations and to process certificate revocation information. You also need to limit the negative impacts that this change will have on network performance. What should you do?

Page 17: Exam 70-299 preparation questions

A. The CA protects the privacy of its certificates and keys, you can trust that a certificate holder is who he or she claims to be.

B. Accepts a certificate request, verifies the requester's information according to the policies of the CA and the type of certificate being requested, generates a certificate, and then uses its private key to digitally sign the certificate.

C. In the Certification Authority console, open the Revoked Certificates properties. Set the Delta Certificate Revocation List (CRL) publication interval to one hour.

D. Provides identity information to the CA, and the information the user provides becomes part of the issued certificate.

Answer: C

Question:18 Creating a two-way trust between DomainA and DomainB will have which of the following effects? (Choose all that apply.)

A. Enable all users in DomainA to access all shared folders in DomainB. B. Enable members of the Domain Admins group in DomainA to access all shared folders in

DomainB. C. Enable administrators of DomainA to grant access to shared folders to users in DomainB. D. Enable administrators of DomainA to view a list of users and groups in DomainB.

Answer: C, D

Question:19 You work as a security administrator for Microsoft. The basic network and some configurations are as the following:

Now, you need to create a single group named myEditors that contains all editorial department employee user accounts and that has access to the resources on file server computers. What should you do?

Page 18: Exam 70-299 preparation questions

A. Use distribution groups with Active Directory-aware applications and e-mail applications and name it myEditors.

B. Create a universal security group in the forest root domain and name it myEditors. C. Created a distribution group for the human resources department and name it myEditors. D. Nest global groups inside of other global groups.

Page 19: Exam 70-299 preparation questions

Answer: B

Question:20 What should you do to improve the security of Computer3 while retaining backward compatibility? (Choose all that apply.)

A. Evaluate which shares require anonymous access, and configure those shares as hidden by appending a $ to the share name.

B. Disable the Network Access: Let Everyone Permissions Apply To Anonymous Users setting. C. Enable the Network Access: Shares That Can Be Accessed Anonymously setting for those

shares required by the legacy application. D. Enable the Network Access: Let Everyone Permissions Apply To Anonymous Users setting for all

computers in the domain.

Answer: A, B, C

Question:21 -You work as a security administrator for Microsoft. The basic network and- -some configurations are as the following:

-You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. You need to ensure that branch office -administrators can verify which scripts are approved scripts. What should you do?

A. Create groups for each location, such as GG Austin, GG Boston, and GG San Diego. B. Delegate the task of creating and maintaining groups to other users in the organization. C. Digitally sign all approved scripts. Instruct branch office administrators to verify the signature before

using a script. D. Place the user accounts into a global group. Instead of adding the user accounts to the ACL, you add

the global group to the ACL. You then assign the group a set of access permissions.

Page 20: Exam 70-299 preparation questions

Answer: C

Question:22 The presence of one of the following security principals in the ACL of a shared folder indicates that anonymous users have access to the shared folder. Which security principal would indicate this?

A. Everyone B. Anonymous C. Anonymous Logon D. Unauthenticated Users

Answer: C

Question:23 You work as a security administrator for Microsoft. The basic network and some configurations are as the following:

Today, you examine several client computers and discover that VBS files are downloaded by using Microsoft Outlook, instant messaging, or peer-to-peer file sharing programs. You need to prevent running VBS files regardless of how they arrive on client computers. What should you do?

A. Spend all day issuing certificates-and you would probably make a large number of mistakes. B. Use the ADSIEdit snap-in to view and modify the Active Directory objects directly. C. Use a software restriction policy to disable all unauthorized scripts. D. Define the permissions for each certificate template to ensure that only authorized users,

computers, or group members can obtain certificates based on a certificate template.

Page 21: Exam 70-299 preparation questions

Answer: C

Question:24 What are Sam's effective privileges to the file?

A. Full Control B. Modify C. Read & Execute D. Read

Page 22: Exam 70-299 preparation questions

Answer: A

For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html

Page 23: Exam 70-299 preparation questions

For complete Exam 70-299 Training kits and Self-Paced Study Material

Visit:http://www.testkingprep.com/70-299.html

http://www.testkingprep.com/

For Latest 70-299 Exam Questions and study guides- visit- http://www.testkingprep.com/70-299.html