test quarter 5 -1

Upload: anhhuyniitdtu

Post on 06-Apr-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Test Quarter 5 -1

    1/47

    Which of the following organizations is a large working committee of operators, vendors, and researchers

    concerned with the evolution of the Internet architecture and the smooth operation of the Internet?

    a. Internet Engineering Task Force (IETF)

    b. Internet Research Task Force (IRTF)

    c. Internet Architecture Board (IAB)d. Internet Corporation for assigned Names and Numbers (ICANN)

    Correct Answer: -> a

    Which of the following protocols functions at the Internet Layer of the TCP/IP Architecture?

    a. TCP

    b. FTP

    c. ICMP

    d. SMTP

    Correct Answer: -> c

    Which of the following RFC Standards is achieved after the detailed assessment of at least two successful

    independent and interoperable implementation of a specification?

    a. Proposed Standard

    b. Draft Standard

    c. Historic Standard

    d. Internet standard

    Correct Answer: -> a

    What is the minimum length of an Ethernet data field?

    a. 1500 Bytes

    b. 512 Bytes

    c. 24 Bytes

    d. 46 BytesCorrect Answer: -> d

    Which of the following protocols lie above the Internet Protocol in the TCP/IP architecture?

    a. ICMP and IGMP

    b. ICMP and ARP

    c. IGMP and RARP

    d. Network Access Layer

    Correct Answer: -> d

    What is the minimum length of IP header?

    a. 40 Bytesb. 60 Bytes

    c. 46 Bytes

    d. 20 Bytes

    Correct Answer: -> d

    Which of the following field in the IP header indicates reliability, precedence delay and throughput

    parameters?

    a. Service

  • 8/2/2019 Test Quarter 5 -1

    2/47

    b. Fragment Offset

    c. Options

    d. Flags

    Correct Answer: -> a

    For which of the following field the length varies in the IP header?a. Flag

    b. Options

    c. Fragment Offset

    d. Protocol

    An IPv6 address consists of ___________ bytes.

    a. 12 Bytes

    b. 16 Bytes

    c. 24 Bytes

    d. 32 Bytes

    Correct Answer: -> b

    10/ To enable reverse lookups over the Internet, a special domain called the __________ domain has been

    built into the DNS structure over the Internet.

    a. in.addr.arpa

    b. in-addr.arpa

    c. arpa-in.addr

    d. arpa.in.addr

    11/ Which of the following domain specify the country/region or the type of organization?

    a. Root-level domain

    b. Second-level domain

    c. Sub domaind. Top-level domain

    Correct Answer: -> d

    12/ Which of the following DNS server is registered in the top-level domains?

    a. Primary server

    b. Root server

    c. Secondary server

    d. Forwarding server

    Correct Answer: -> b

    13/ Which of the following RFC defines BOOTP?a. RFC 980

    b. RFC 826

    c. RFC 951

    d. RFC 802

    Correct Answer: -> c

    14/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new

    subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address.

  • 8/2/2019 Test Quarter 5 -1

    3/47

    The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a

    DHCP address to the node?

    a. He has to create a new scope for the node

    b. A RFC 1542 compliant router to be added in the network

    c. Provide a new DHCP server in the network

    d. A bridge to be added in the networkCorrect Answer: -> a

    15/ Amazon.com is a company using a DNS system. The company has configured a server for resolving the

    IP address. The company wants to have a server that can work as a primary server in case of failure of the

    existing server. The server should also handle the fault tolerance and load balancing. Which of the following

    server is capable of doing that?

    a. Primary Server

    b. Secondary Server

    c. Caching Server

    d. Forwarding Server

    Correct Answer: -> b

    16/ You are analyzing data packets from node A having IP address 172.17.4.28 to node B having IP

    address 172.17.4.98 using a network Analyzer. From the given figure, identify the hardware address of

    node A?

    a. Hardware address of the node A is 00:00:21:DC:3E:7B

    b. Hardware address of the node A is 00:00:18:8E:C3:2A

    c. Hardware address of the node A is ff:ff:ff:ff:ff:ff

    d. Hardware address of the node A is 0x5332

    17/ Jim is configuring a router table. He wants to implement the default routing method. In the default

    routing method the routing table:

    A. Contains one entry, 255.255.255.255

    B. Contains one entry, 127.0.0.1

    C. Contains one entry, 0.0.0.0

    D. Contains one entry, 255.255.255.0

    a. A

    b. B

    c. C

    d. D

    Correct Answer: -> c

    18/ You are analysing TCP data packets through a network analyzer. Which of the following information canyou read from a IP header?

    A. The total lifetime of a datagram.

    B. The hardware address of the source node.

    C. The IP address of the destination node.

    D. The final destination protocol to which the data packet or datagram should be delivered

    a. A, B and D

    b. A, C and D

  • 8/2/2019 Test Quarter 5 -1

    4/47

    c. B, C, and D

    d. A, B, C and D

    19/ In an organization, there are 400 nodes spread across eight subnets with two DHCP servers. You are

    the network administrator of the organization. You want each node to receive an IP address automatically

    but?

    one of the DHCP servers is down. What should you do?a. Create four DHCP scopes on each DHCP server

    b. Create eight DHCP scopes on each DHCP server

    c. Create two global DHCP scopes on each DHCP server

    d. Create one global DHCP scope on each DHCP server

    20/ Your company wants to setup a LAN environment.?You are assigned to design the new network. You

    want to implement a device, which:

    A. Joins multiple computers or other network devices together to form a single network segment

    B. Amplify and regenerate the signal from one node to another in a network

    C. Provides a common connection point for computers, printers, and other network devices in a star

    topology network

    Which of the following network component will meet the preceding requirements?

    a. Repeaters

    b. Hubs

    c. Switch

    d. Bridge

    Correct Answer: -> b

    21/ You are a network administrator in an insurance company. The company is having 2 Windows 2000

    Server, 20 Windows 2000 Professional nodes and 15 Novell Netware nodes. You want to increase the

    speed of the network traffic within the same physical network and also want to have minimum overheadwhen a data packet is travelling on the same physical network. Which of the following protocols you need to

    implement in the network?

    A. TCP/IP

    B. IPX/SPX

    C. SNA

    D. NetBEUI

    E. DLC

    F. Apple talk

    a. A, B and D

    b. A, D and Fc. A, B and F

    d. A, C and F

    Correct Answer: -> a

    22/ Which of the following field in the ARP packet format helps to define the type of network on which ARP

    is running?

    a. PTYPE field

    b. HLEN field

  • 8/2/2019 Test Quarter 5 -1

    5/47

    c. HTYPE field

    d. PLEN field

    Correct Answer: -> c

    23/ Statement A: Internet Standard is achieved when a draft standard for which successful demonstration of

    its execution and significant operational and functional experience has been obtained.Statement B: A standard or specification is called an historic standard or specification when it has been

    outdated by a more recent specification.

    Which of the following options is correct about the above statement?

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, Statement A and Statement B are true.

    d. Both, Statement A and Statement B are false.

    Correct Answer: -> b

    24/ Statement A: IP generates control messages related to any error in connection or flow control over the

    network.

    Statement B: IP is responsible for addressing and forming the data packets to be transferred over the

    network.

    Which of the following options is correct about the above statement?

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, Statement A and Statement B are true.

    d. Both, Statement A and Statement B are false.

    25/ Node X request?s Node Y to set up a connection. Node X sends a SYN segment to node Y. Node Y

    sends an acknowledgement to Node X to start the data communication. Node Y sends the secondsegment; a combination of SYN and ACK segment to Node X. Node X sends a confirmation to Node Y.

    Which of the following flag will be set active by node X?

    a. SYN

    b. PSH

    c. RST

    d. ACK

    26/ Statement A: CSMA/CA is the access method used in Ethernet and wireless Ethernet networks.

    Statement B: CSMA/CD is a slower access method than CSMA/CA.

    Which of the following options is correct about the above statements?a. Statement A is true, and statement B is false

    b. Statement A is false, and statement B is true

    c. Both, Statement A and Statement B are false.

    d. Both, Statement A and Statement B are true.

    Correct Answer: -> c

    27/ Statement A: FCS contains an 8-byte CRC value used for error checking.

    Statement B: The sending node creates the CRC value in Network Access layer.

  • 8/2/2019 Test Quarter 5 -1

    6/47

    Which of the following options is correct about the above statements?

    a. Statement A is true, and statement B is false

    b. Statement A is false, and statement B is true

    c. Both, Statement A and Statement B are false.

    d. Both, Statement A and Statement B are true.

    28/ Statement A: A domain is a logical group of computers over a large network.

    Statement B: Resolver is a computer that maintains the database of host names and their corresponding IP

    addresses for name resolution.

    Which of the following options is correct about the above statements?

    a. Statement A is true, and statement B is false

    b. Statement A is false, and statement B is true

    c. Both, Statement A and Statement B are false.

    d. Both, Statement A and Statement B are true.

    Correct Answer: -> a

    29/ Assertion: BOOTP was evolved because of limitations of RARP.

    Reason: RARP does not provide IP address.

    a. Both, the assertion and reason are true, and the reason IS a correct explanation of the assertion.

    b. Both, the assertion and reason are true, and the reason IS NOT a correct explanation of the assertion.

    c. The assertion is true and the reason is false.

    d. The assertion is false and hence the reason does not apply.

    Correct Answer: -> c

    30/ You observe that each time you run the program, escape.exe, the computer slows down significantly.

    You decide to set the priority of the program to low. Which of the following options will enable you to

    perform this task?a. Task Manager

    b. System Monitor

    c. Performance Console

    d. Service Manager

    Correct Answer: -> a

    31/ When James runs the application, uinstall.exe, he observes that the computer slows down and the

    application hangs. James is unable to close the application by using the Close button. Which of the

    following options should James use to exit the application?

    a. System Monitor

    b. Performance Logs and Alertsc. Task Manager

    d. Performance Console

    Correct Answer: -> c

    32/ You want to track the performance of your Windows Server 2003 computer after you install and run

    Visual Basic .NET and ASP.NET. You open System Monitor and add the required counters to monitor the

    performance of each sub-system. Which of the following options will enable you to view the counters over a

    period of time so that you can view the effect of the applications on the system performance?

  • 8/2/2019 Test Quarter 5 -1

    7/47

    a. Histogram

    b. Pie-chart

    c. Report

    d. Graph

    33/ Consider the following statements:Statement A: By default, IIS is not installed with Windows Server 2003.

    Statement B: By default, support for Active Server Pages is enabled in IIS.

    Which of the following is correct about the above statements?

    a. Both, Statement A and Statement B are False.

    b. Both, Statement A and Statement B are True.

    c. Statement A is True and Statement B is False.

    d. Statement A is False and Statement B is True.

    34/ Consider the following statements:

    Statement A: Integrated Windows Authentication method provides high-level security because the

    credentials of a user are confirmed through a cryptographic exchange between the Web server and the

    Web browser of the user.

    Statement B: Integrated Windows Authentication method is recommended on the intranet of an

    organization.

    Which of the following is correct about the above statements?

    a. Both, Statement A and Statement B are False.

    b. Both, Statement A and Statement B are True.

    c. Statement A is True and Statement B is False.

    d. Statement A is False and Statement B is True.

    35/ You are installing Windows Server 2003 using a Windows 98 bootable floppy and an error messageindicating ?Not enough space to create swap files?is displayed. Which of the following options is a possible

    solution for this problem?

    a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which

    you want to install Windows Server 2003.

    b. Press F3 key to exit setup and from the command line and disable the Cache Shadow option in the

    BIOS.

    c. Disable the Shadow Copies option in the BIOS.

    d. Disable the Caching Shadow option in the BIOS.

    Correct Answer: -> a

    36/ You are installing Windows Server 2003 on a computer with the following configuration:

    Pentium 2.4 GHz

    256 MB RAM

    4.5 GB Hard Disk

    During installation, setup displays the error message, ?Dumping Physical Memory?.

    Which of the following options can be a possible solution to this problem?

  • 8/2/2019 Test Quarter 5 -1

    8/47

    a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want

    to install Windows Server 2003.

    b. Disable the Cache Shadow option in the BIOS.

    c. Replace the RAM.

    d. Replace the hard disk.

    Correct Answer: -> b

    37/ You are installing Windows Server 2003 on a computer with the following configuration:

    Pentium 350 MHz

    128 MB RAM

    4.5 GB Hard Disk

    During installation, setup displays the error message, ERROR_INVALID_PARAMETER.

    What does this error message indicate?

    a. The Windows Installer service has failed to start.

    b. The hard disk does not have the disk space required to install Windows Server 2003.

    c. One of the parameters entered is incorrect.

    d. The data entered is of incorrect type.

    Correct Answer: -> c

    39/ The domain controller needs to have a(n) __________ address.

    a. IP

    b. Dynamic IP

    c. Static IP

    d. Route IP

    Correct Answer: -> b

    40/ Windows Server 2003 ______ bit version runs on Pentium-based systems.

    a. 8 bit

    b. 16 bit

    c. 32 bit

    d. 64 bit

    41/ Which of the following servers assigns the Static IP address to the domain controller in an

    organization?s forest?

    a. DHCP Serverb. DNS Server

    c. FTP Server

    d. ADC Server

    42/ Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder

    of Windows Server 2003 computer from the client computer?

    a. Admin$

    b. Print$

  • 8/2/2019 Test Quarter 5 -1

    9/47

    c. C$

    d. D$

    Correct Answer: -> b

    43/ Which option will enable you to change the password of a user account?

    a. Right click the user name and select the Reset Password option.b. Open the user account properties dialog box to change the password.

    c. Double-click the user name to change the password.

    d. Create a new user account with the same user name and password.

    Correct Answer: -> a

    44/ A user account that has similar properties already configured is called ___________.

    a. Domain user account

    b. Local user account template

    c. Local account template

    d. User account template

    Correct Answer: -> d

    45/ Identify the correct method to create local user accounts?

    a. Select the Start ( Programs ( Administrative Tools ( Microsoft Management Console menu command.

    b. Select the Start ( Programs ( Administrative Tools ( Computer Management menu command .

    c. Select the Start ( Programs ( Administrative Tools menu command.

    d. Select the Start ( Programs ( Administrative Tools ( Active Directory Users and Computers menu

    command.

    Correct Answer: -> b

    46/ Which container lists the default users and group accounts created by Windows Server 2003?

    a. Users and Computers

    b. Builtin and Computersc. Builtin and Users

    d. Users and Domain Controllers

    47/ Which file system supports partitions only up to 2 TB in size?

    a. FAT

    b. FAT 32

    c. NTFS

    d. FAT 16

    48/ Which command-line tool enables you to create domain computer accounts in Active Directory?

    a. DSGETb. DSADD

    c. NETSH

    d. DSRM

    49/ Which group has the right to create computer accounts in an organizational unit?

    a. Enterprise Admins on a server

    b. Server Operators on a domain controller

    c. Server Operators on a server

  • 8/2/2019 Test Quarter 5 -1

    10/47

    d. Account Operators on a domain controller

    50/ Which of the following groups are primarily used for backward compatibility with the Windows NT 4.0

    operating system?

    a. Global groups

    b. Distribution groupsc. Local groups

    d. Security groups

    51/ Which of the following group is used to assign rights and permissions to members who perform similar

    operations and access similar resources in any domain in the forest?

    a. Universal group

    b. Domain local group

    c. Security group

    d. Distribution group

    Correct Answer: -> a

    52/ Which of the following options are used with the DSMOD and DSADD commands to create user-

    specific profile folders?

    a. $Username$

    b. CN=Username

    c. %Username%

    d. #Username#

    Correct Answer: -> c

    53/ Which command-line tool enables you to identify user and group accounts that have not been used for

    the past 3 months?

    a. DSMOD

    b. DSQUERYc. DSADD

    d. DSGET

    54/ You are the system administrator in an organization. A user accidentally deletes the shortcuts on his

    desktop and asks you to create the shortcuts again. What should you do to ensure that the shortcuts do not

    get deleted from his desktop again?

    a. Make his user profile mandatory.

    b. Ask the user to login again.

    c. Make the default user profile mandatory.

    d. Make all user profiles mandatory.

    Correct Answer: -> d

    55/ You are the system administrator of CellGo. You want to hide one of the file server drives from the

    domain end users. How will you achieve it with minimum administrative cost?

    a. Disable the view option from the registry of each machine.

    b. Open Active Directory and remove the Share from the snap-in.

    c. Share the drive with a name ending with $.

    d. Share the drive with the name Admin$.

  • 8/2/2019 Test Quarter 5 -1

    11/47

    56/ You are the system administrator of Aztec.com. Susan has resigned from Aztec and in her place Robert

    has joined. You plan to disable Susan?s user account and then rename the user account as Robert.

    However, you delete Susan?s user account by mistake. What should you do to give Robert the same rights

    and privileges as Susan?

    a. Create a new user account by the name of Susan. It will get the SID of Susan?s account that was

    deleted. Rename the account to Robert.b. Create a new user account for Robert and assign him the rights and privileges of Susan.

    c. Create a new user account for Robert and map the SID of Susan to it.

    d. In the command prompt, type undo delusr and press Enter to revert the deleted account.

    57/ In Blue Sky Computers, several employees login remotely. Chris, the system administrator wants to

    know the applications that are started when a Terminal Services user logs on. Which of the following tabs in

    the user account properties dialog box will enable him to accomplish this task?

    a. Environment

    b. Sessions

    c. Remote Control

    d. Terminal Services Profile

    58/ You are the system administrator of your organization. You want to create a customized console

    containing the following administrative tools:

    Active Directory Users and Computers

    Computer Management

    Event Viewer

    Which of the following options will enable you to perform this task with the least administrative effort?

    a. Create consoles for each tool on the desktop.

    b. Create a console containing the required tools using the DSMOD command-line utility.

    c. Create a console containing the required tools using MMC.d. Create a console containing the required tools using the Active Directory Users and Computers tool.

    59/ Consider the following two statements:

    Statement A: DFS is a service that centralizes the file system resources that are physically spread over the

    network.

    Statement B: DFS Microsoft Management Console enables configuration of replication services and

    topologies.

    Which of the following is correct about the above statements?

    a. Both, Statement A and Statement B are False.

    b. Both, Statement A and Statement B are True.c. Statement A is True and Statement B is False.

    d. Statement A is False and Statement B is True.

    60/ As a system administrator, you need to restrict access of the members of the Finance organizational

    unit to the Internet. Which is the best possible method for performing this task?

    a. Disable Internet Explorer for each user of the Finance organizational unit.

    b. Apply a security policy for each user of the Finance organizational unit.

  • 8/2/2019 Test Quarter 5 -1

    12/47

    c. Apply a group policy setting that restricts access of each user of the Finance organizational unit to the

    Internet.

    d. Configure a GPO that restricts access to the Internet and apply this GPO on the Finance

    organizational unit.

    61/ Which GPO is linked to the domain and affects all the users and computers included in the domain aswell as the domain controller?

    a. Default Domain Controllers policy

    b. Default Domain policy

    c. Default GPO based policy

    d. Default Domain GPO based policy

    Correct Answer: -> b

    62/ Which of the following parameters of the Gpupdate command enables you to specify any one of the

    user or computer Group Policy that needs to be refreshed?

    a. /Target

    b. /Boot

    c. /Logoff

    d. /Force

    63/ You are a system administrator in Blue Sky IT Systems. As a security measure, you want to ensure that

    users do not add new programs and applications from the network. Which Group Policy should you

    configure so that you can prevent users from installing new programs over the network?

    a. Configure the ?Hide programs from your network?option.

    b. Configure the ?Hide applications from your network?option.

    c. Configure the ?Hide programs/applications from your network?option.d. Configure the ?Hide programs from your network?page.

    64/ As a system administrator, you have delegated the task of configuring Group Policies to the juniorsystem administrator, James. While trying to configure Group Policies for the organizational unit, Finance,

    and two users of the organizational unit, Marketing, James finds that he is not able to open Group Policy

    Object Editor. What could be the possible cause for this problem?

    a. Group Policy Object Editor is not installed on the domain controller.

    b. James does not have the Modify permission for the GPO.

    c. James does not have the Full Control permission for the GPO.

    d. James does not have the Read and Write permissions for the GPO.

    65/ Which of the following administrative control design implies that the administration of Group Policy is

    delegated only to top-level organizational unit administrators of an organization?s domain?

    a. Centralized administrative control designb. Decentralized administrative control design

    c. Task-based administrative control design

    d. Multi-level administrative control design

    66/ Which component of the Administrative Template node includes User Profiles, Scripts, Logon,

    Ctrl+Alt+Del Options, Group Policy, and Power Management?

    a. Network

    b. System

  • 8/2/2019 Test Quarter 5 -1

    13/47

    c. Windows Components

    d. Computer

    68/ You are the system administrator of a Windows Server 2003 network. You have placed the domain

    controllers in the Domain Controllers organizational unit. You suspect that some unauthorized users aretrying to access the network. You need to determine which computer is being used for this purpose. What

    would you do to identify the computer?

    a. Configure a local security policy for each domain controller to audit the success and failure of

    account logon events.

    b. Configure a domain policy to audit the success and failure of logon events.

    c. Configure a local security policy for each domain controller to audit the success and failure of directory

    service access.

    d. Configure a domain policy to audit the success and failure of account logon events.

    69/ You are the system administrator of Blue Sky IT Systems. The organization?s domain structure has

    separate organizational units for each department. For example, Finance organizational unit for the Finance

    department and Sales organizational unit for the Sales department. The organizational units contain group

    and computer accounts for the employees of the domain. You have received complaints that some of the

    computer accounts have been deleted and some of the group accounts have been modified by

    unauthorized users. As a system administrator, you want to track and locate the users who are deleting the

    computer accounts and modifying the group accounts. Which of the following audit policies do you need to

    configure for this?

    a. Audit policies related to system events

    b. Audit policies related to object access

    c. Audit policies related to Active Directory object access

    d. Audit policies related to user, group, and computer accounts

    70/ As a system administrator, you have asked the technical consultant of your organization to createcustomized security templates according to the domain structure of the organization. As a precautionary

    measure, you have also created customized security templates for the organization. The technical

    consultant creates the security templates and sends it to you. You now need to compare the security

    templates provided by your technical consultant with the security templates that you have created. Which of

    the following options will enable you to perform this task?

    a. The Security Templates snap-in

    b. The Security Configuration and Analysis snap-in

    c. The Security Manager snap-in

    d. The Group Policy Management snap-in

    71/ You have recently joined Blue Moon Computers Inc. as a system administrator. You review the currentsecurity settings of the organization and find them suitable and according to the requirements of the

    organization. However, you notice that the default permissions for the root directory of most of the

    computers in the organization have been changed. You want to restore the default security settings and

    permissions of the root directory of the computers. Which security template will enable you to perform this

    task?

    a. Rootsec.inf template

    b. Rootdir.inf template

    c. Rootdir Security.inf template

  • 8/2/2019 Test Quarter 5 -1

    14/47

    d. Root Security.inf template

    72/ As a system administrator, you want to apply enhanced security settings on the computers of the Sales

    department of your organization in addition to the security settings already applied. You want that the new

    security settings should define security settings for auditing of events. However, you do not want that the

    new security settings should interfere with the applications running on the computers of the Salesdepartment. Which of the following security templates will enable you to perform these tasks?

    a. Rootsec.inf

    b. DC Secure.inf

    c. Secure*.inf

    d. hisec.inf

    73/ You need to configure a software controlled fault tolerant system by using two hard disks. What level of

    RAID should you use for this purpose?

    a. RAID 0

    b. RAID 1

    c. RAID 5

    d. RAID 6

    74/ Consider the following statements:

    Statement A: ASR creates a recovery disk that recovers the system and its data.

    Statement B: ASR creates a backup of system state data, which includes, disk signatures, volumes, and

    partitions that are required to start a system

    Statement C: ASR restores a simplified version of the Windows Server 2003 operating system.

    Which of the following options is correct about the above statements?

    a. Only Statement A is True.

    b. Only Statement B is True.

    c. Statements A, B, and C are True.d. Statements A, B, and C are False.

    75/ You are the system administrator in CellGo Corp. All the servers in the organization are running on

    Windows Server 2003 having one Active Directory Service, CellGo.com. You want to have a

    comprehensive backup plan to ensure that the system can be restored in case of system failure. You want

    to backup the system state, system services, and all disks associated with the operating system

    components. Which recovery type should you use for this purpose?

    a. Shadow copies

    b. RAID 1

    c. Automated system recovery

    d. Synchronization tool

    76/ Consider the following statements:

    Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of

    multiple I/O performance on different disks.

    Statement B: Striped volumes do not provide fault tolerance.

    Which of the following is correct about the above statements?

    a. Both, Statement A and Statement B are False.

    b. Both, Statement A and Statement B are True.

  • 8/2/2019 Test Quarter 5 -1

    15/47

    c. Statement A is True and Statement B is False.

    d. Statement A is False and Statement B is True.

    Correct Answer: -> b

    77/ You are the system administrator of Blue Sky IT Systems. The employees of the Sales department back

    up their important data on a Windows Server 2003 computer having the following configuration:

    Pentium 1V 2.26 GHz

    128 MB RAM

    40 GB hard disk

    While installing an application on the Windows Server 2003 computer, the message ?you are running out of

    disk space on this computer?is displayed. You notice that some employees have stored unnecessary files

    on the computer. Which of the following actions do you need to perform to solve this problem?

    a. Perform disk cleanup.

    b. Enable disk quota for the employees of the Sales department.

    c. Defragment the hard disk.

    d. Implement shadow copies.

    Correct Answer: -> b

    78/ As a system administrator, you need to perform regular backups. To save time and back up data in an

    economical manner, you decide to take full backup on Mondays and back up only those files that have not

    been marked as archived on other week days. In addition, you do not want to set the archive bit of the files

    that have been backed up. Which type of backup are you performing?

    a. Normal

    b. Differential

    c. Daily

    d. Incremental

    79/ You are the system administrator of an organization that has 200 employees. You have asked all users

    to back up their files everyday at 5.30 PM before leaving, but you find that most users do not back up their

    files. What should you do to enable the users to back up their daily files automatically?

    a. Schedule a backup job to be performed when the user logs off the computer.

    b. Schedule a daily backup at 5.30 PM.

    c. Use Task Manager to backup at 5.30 PM.

    d. Configure the Computer Management console to take the backup at 5:30 PM.

    80/ Consider the following statements:

    Statement A: A basic disk can have a maximum of four primary partitions.

    Statement B: An extended partition can be subdivided into a maximum of 24 sub-sections.

    Which of the following is correct about the above statements?

    a. Both, Statement A and Statement B are False.

    b. Both, Statement A and Statement B are True.

    c. Statement A is True and Statement B is False.

    d. Statement A is False and Statement B is True.

  • 8/2/2019 Test Quarter 5 -1

    16/47

    81/ You need to install Windows Server 2003 on a computer that contains two 36 GB hard disks. You

    format the first disk as FAT 32 and the second disk as NTFS. To conserve disk space, you compress the

    folders on an NTFS disk. However, when other users move files and folders from the NTFS disk to the FAT

    32 disk, the files loses the compression attribute. What can be done to ensure that the files remain

    compressed?

    a. Format the first disk as NTFS.b. Upgrade both disks to dynamic disks.

    c. Convert the first disk to a dynamic disk.

    d. Upgrade the first disk to NTFS.

    82/ Your organization has a Windows Server 2003 environment, which includes various client computers,

    such as Windows 2000 Professional, Windows XP, and UNIX. You have configured a Windows Server

    2003 member server as a print server. A UNIX client computer needs to submit print jobs to the printer

    attached to the print server. The computer has a printer driver installed to access the print device. Which of

    the following options must be configured on the print server to support printing from the UNIX client

    computer?

    a. Install File and Print Sharing for UNIX clients.

    b. Check the TCP/IP configuration.

    c. Install the DLC protocol.

    d. Install Print Services for UNIX.

    Quarter 5 ReviewTCP/IP Fundamentals and Concepts

    1/ Which of the following MAN components provide connectivity between MANs and LANs, between

    networks with different topologies, or between networks using different network standards?

    a. Bridges.

    b. Routers.

    c. Switches.

    d. Repeaters.

    2/ Statement A: With TCP, applications exchange messages over the network with a minimum of protocol

    overhead.

    Statement B: TCP enables hosts to maintain multiple simultaneous connections.

    Which of the following options is correct about the above statements?

    a. Statement A is true, and statement B is false.

    b. Statement A is false, and statement B is true.

    c. Both, statement A and statement B are false.

    d. Both, statement A and statement B are true.

    3/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given

    figure, find out the length of the data packet?

    a. 53

    b. 92

    c. 58

  • 8/2/2019 Test Quarter 5 -1

    17/47

    d. 1090

    4/ Sky Lark Inc. is an IT-based company. It has provided laptops with Windows 2000 Professional to their

    employees. The employee transfers are very frequent in this company so the laptops move from one subnet

    to another subnet. You want to automatically assign the TCP/IP configuration to the laptop connected.

    Which service should you use?a. BOOTP

    b. DNS

    c. DHCP

    d. DHCP relay agent

    You want to enable Windows ME, Linux and Macintosh computers to use Internet Explorer to access your

    Web servers by using a host name. Which of the following service should you use?

    a. DHCP

    b. Hosts

    c. BOOTP

    d. DNS

    Statement A: IP generates control messages related to any error in connection or flow control over the

    network.

    Statement B: IP is responsible for addressing and forming the data packets to be transferred over the

    network.

    Which of the following options is correct about the above statement?

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, statement A and statement B are true.

    d. Both, statement A and statement B are false.

    Which of the following field in the IP header indicates reliability, precedence delay and throughput

    parameters?

    a. Service.

    b. Fragment Offset.

    c. Options.

    d. Flags.

    Statement A: Infrared transmissions can provide line of sight communications over short distances.

    Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial

    links.

    Which of the following options is correct about the above statements?

    a. Statement A is true, and statement B is false.

    b. Statement A is false, and statement B is true.

    c. Both, statement A and statement B are false.

    d. Both, statement A and statement B are true.

    9/ You are analyzing IP data packets from node A to node B using a Network Analyzer. From the given

    figure, identify the error control value?

  • 8/2/2019 Test Quarter 5 -1

    18/47

    a. 0x86ee

    b. 0x01

    c. 0x00

    d. 0x5332

    Gregg is a network administrator in a large finance organization, which is having a Windows 2003 Server.

    For the last 2-3 weeks he found that the network traffic is getting very heavy to the Window 2003 Server. He

    wants to track all the traffic to the Windows 2003 Server. What action should he perform?

    A. He should use network analyzer on any node of the network.

    B. He should use network analyzer on the Windows 2003 Server of the network.

    C. He should enable the Promiscuous Mode in the network analyzer.

    D. He should disable the Promiscuous Mode in the network analyzer.

    a. A and C.

    b. B and D.

    c. B and C.d. A and D.

    A local area network is handling large number of client computers. The network administrator was

    previously using the BOOPTP protocol for handling the client computers. The administrator is having a

    problem in manually allocating and configuring the IP addresses over the network. The protocol is also not

    able to detect the unused IP addresses over the network for their future allocation to another client. Which

    of the following protocol does the administrator implement to overcome that problem?

    a. DHCP protocol.

    b. BOOTP protocol.

    c. Internet protocol.

    d. Stop-and-wait protocol.

    From the given figure, specify the type of delivery of data packets between Node X to Router 1 and

    between Router 1 and Router 2.

    a. Both will use direct delivery.

    b. It will be direct delivery between Node X to Router 1 and indirect delivery between Router 1?andRouter 2.

    c. It will be indirect delivery between Node X to Router 1 and direct delivery between Router 1 and Router 2,

    d. Both will use indirect delivery.

    Your company wants to setup a LAN environment. You are assigned to design the new network. You wantto implement a device, which:

    1. Joins multiple computers or other network devices together to form a single network segment.

    2. Amplify and regenerate the signal from one node to another in a network.

    3. Provides a common connection point for computers, printers, and other network devices in a star

    topology network.

  • 8/2/2019 Test Quarter 5 -1

    19/47

    Which of the following network component will meet the preceding requirements?

    a. Repeaters.

    b. Hubs.

    c. Switch.

    d. Bridge.

    In which of the following state, the DHCP client enters, after sending the DHCPDISCOVER message?

    a. Initializing state.

    b. Requesting state.

    c. Selecting state.

    d. Bound state.

    Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the

    servers are configured as static routers. The network is divided into various subnets depending on

    departments. He wants to identify the path that a data packet takes as it passes through the routers. Which

    of the following utility will he use?

    a. Ipconfig.exe

    b. Tracert.exe

    d. Ping.exe

    c. Route.exe

    Which of the following is a reliable protocol of the Transport layer?

    a. IP

    b. TCP

    d. ICMP

    c. UDP

    17/ You are analyzing UDP data packets from node A to node B using a network analyzer. From the given

    figure, find out the destination port number?

    c. 17

    a. 1090

    b. 58

    d. 53

    Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header,

    provides integrity and confidentiality to IPv6 datagrams.

    Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating

    Security Header, provides authentication and integrity to IPv6 datagrams.

    Which of the following options is correct about the above statement?

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, statement A and statement B are true.

    d. Both, statement A and statement B are false.

    Alder tries to connect a ftp server from a node having Windows 2000 Professional by issuing the command

  • 8/2/2019 Test Quarter 5 -1

    20/47

    ftp sales.books.com but it fails. But he is able to connect the server by using the Windows Explorer

    program. What is the likely problem?

    a. No DNS server configured on Alder?s workstation.

    b. No DNS client configured on Alder?s workstation.c. No default gateway defined on the server.

    d. No DNS server defined on the server.

    In which of the following modes, two nodes can send as well as receive data but not at the same time?

    a. Simplex mode.

    b. Half-duplex mode.

    c. Full-duplex mode.

    d. Promiscuous mode.

    Which of the following layer comes below Network Layer in the bottom-up approach of OSI Reference

    Model?

    a. Transport Layer.

    b. Session Layer.

    c. Presentation Layer.

    d. Data Link Layer.

    Which of the following is the correct definition for Ethernet Access Method?

    a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream,

    by checking for matches between the data transmitted and the data received.

    b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and

    which to block.

    c. Ethernet Access Method is a set of rules that defines how a computer transmits data on

    the network cable and retrieves data from the cable.

    d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large,

    heterogeneous networks.

    Your company decided to open small branch offices in various cities of US. Each branch office will have 10-

    12 nodes, 1 fax machine and 1 printer. You were asked to design the network of each branch office.?You

    decided to have peer-to-peer network in the branch offices. You were asked to analyze the advantages of

    the peer-to-peer network. Which of the following are the advantages of peer-to-peer network?

    A. Strong central security

    B. Easy setup

    C. Ability of users to control resources sharing

    D. No network administrator required

    E. Optimized dedicated serversa. A, B and D.

    b. B, D and E.

    c. A, B and E.

    d. B, C and D.

    A datagram received from one network may be too large to be transmitted in a single packet on a different

    network. Which of the following TCP/IP protocol helps the router to divide the datagram into smaller pieces?

    a. ICMP

  • 8/2/2019 Test Quarter 5 -1

    21/47

    b. IP

    c. IGMP

    d. TCP

    Which of the following is an 8-bit value field that defines the type of BOOTP packet?

    a. Operation Code.b. Hop count.

    c. Hardware Type.

    d. Options.

    Tom tries to connect a ftp server from a node having Windows 2000 Professional by issuing the command

    ftp sales.books.com. He received the following error message ?Bad IP Address?. He then successfully pings

    the server. What is the likely problem?

    a. No DNS client configured on Tom?s workstation.b. No DNS server configured on Tom?s workstation.

    c. No default gateway defined on the server.

    d. No DNS server defined on the server.

    Statement A: Name server is a computer that maintains the database of host names and their

    corresponding IP addresses for name resolution.

    Statement B: The function of the resolvers is to pass name request between applications and name

    servers.

    Which of the following options is correct about the above statement?

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, statement A and statement B are true.

    d. Both, statement A and statement B are false.

    You can connect through Windows Explorer to all nodes on the local network, but cannot connect to any

    nodes on the remote subnet. Which IP address should you ping first to diagnose the problem?

    a. Ping

    b. Ping

    c. Ping

    d. Ping

    You cannot connect to a Windows 2000 Server from a node running on Windows 2000 Professional using

    Windows Explorer. Both the server and the node are in the same physical network. By using a network

    analyzer, you found that each time the node attempts to connect to the server, it broadcasts an ARP

    request for the default gateway. What is the most likely cause of the problem?

    A. Invalid default gateway address on the Windows 2000 Professional node

    B. Invalid subnet mask on the Windows 2000 Professional node

    C. Invalid default gateway address on the Windows 2000 Server

    D. Invalid subnet mask on the Windows 2000 Server

    a. A

    b. B

    c. C

  • 8/2/2019 Test Quarter 5 -1

    22/47

    d. D

    It is developed to implement file transfer, printer sharing, and mail service among Apple systems. Macintosh

    machines have them installed by default.

    Identify the protocol.a. DLC.

    b. SNA.

    c. AppleTalk.

    d. IPX/SPX.

    Statement A: Transport Layer is responsible for process-to-process communication.

    Statement B: The Transport layer can delivery a data packet either reliably or unreliably.

    Which of the following options is correct about the above statement?

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, statement A and statement B are true.

    d. Both, statement A and statement B are false.

    An administrator is moving a node from subnet A to another subnet B. After moving the node in the new

    subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address.

    The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a

    DHCP address to the node?

    a. He has to create a new scope for the node.

    b. A RFC 1542 compliant router to be added in the network.

    c. Provide a new DHCP server in the network.

    d. A bridge to be added in the network.

    Which of the following WAN components converts the digital signals from the computer to analog signals?

    a. Routers.

    b. Brouters.

    c. CSU/DSU.

    d. Modem.

    Which of the following record helps the DNS in providing information about the host such as, operating

    system used?

    a. HINFO.

    b. Start of authority (SOA).

    c. Address (A).d. Canonical Name (CNAME).

    Statement A: IPv6 data packets are exchanged and processed on each host by using IPv6 at the Network

    Access layer.

    Statement B: In IPv6, the Internet layer creates IPv6 packets including the source and destination address

    information that is used to route the data through the network.

    Which of the following options is correct about the above statement?

  • 8/2/2019 Test Quarter 5 -1

    23/47

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, statement A and statement B are true.

    d. Both, statement A and statement B are false.

    You are analyzing TCP data packets from node A to node B using a Network Analyzer. From the givenfigure, find out the size of the header?

    a. 28 Bytes

    b. 8 Bytes

    c. 60 Bytes

    d. 40 Bytes

    Which of the following layer of the OSI Reference model is responsible for routing, switching, and controlling

    the flow of data between nodes?

    a. Transport Layer.

    b. Network Layer.

    c. Presentation Layer.

    d. Physical Layer.

    Tom is designing a network for his office. He is not able to decide on the type of transmission medium. His

    office is in an area that is prone to high levels of EMI or for long distance data transmissions, where

    electrical signals are significantly distorted and degraded. He wants minimum distortion of signals in the

    transmission medium.

    a. He can select fibre-optic cables.

    b. He can select twisted-pair cables.

    c. He can select both fibre-optic cables or twisted-pair cables.

    d. He can select both coaxial cables or twisted-pair cables.

    Which of the following DHCP message consists of the IP address and additional configuration information,such as lease duration and subnet mask?

    a. Discover message.

    b. Offer message.

    c. Request message.

    d. Bootreply message.

    You are a network administrator in a finance organization. You want to configure your Windows 2003

    Server on the Internet and download files. Which of the following service you should use in the Windows

    2003 Server?

    a. Telnet.

    b. SMTP.c. SNMP.

    d. FTP.

    Which of the following protocols function at the Transport Layer?

    a. ICMP and IGMP.

    b. TCP and UDP.

    c. TCP and FTP.

    d. Network Access Layer.

  • 8/2/2019 Test Quarter 5 -1

    24/47

    48/ Tim George is a network administrator in an organization. The organization has three subnets. One

    subnet has only laptop Windows 2000 Professional nodes. The other two subnets have Windows 2000

    nodes. Tim has installed a DHCP server to support all the clients. Tim wants to set the IP lease period for

    the laptops to 7 days and for the other two subnets to 20 days. How should Tim implement this?

    a. Create one DHCP scope for all subnets. For each node, create an exclusion range with a unique leaseperiod.

    b. Create one DHCP scope for all subnets. For each node other than laptops, create a reservation with a

    30-day lease period.

    c. Create one DHCP scope for each subnet. Specify the lease period as part of the

    scope?s configuration.d. Create one DHCP scope for each subnet. Create a global option that specifies a lease period that is

    based on the operating system the client computer is running.

    49/ Which of the following RFCs define the protocols of the Network Access Layer?

    a. RFC 926 and RFC 951

    b. RFC 826 and RFC 894

    c. RFC 826 and RFC 951

    d. RFC 894 and RFC 926

    Quarter 5 ReviewManaging and Maintaining Windows Server 2003

    Consider the following statements:

    Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of

    multiple I/O performance on different disks.

    Statement B: Striped volumes do not provide fault tolerance.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

    Which audit policy is intended for the domain controllers that authenticate users as they log on to other

    computers?

    a. Audit object access

    b. Audit logon events

    c. Audit Account logon eventsd. Audit Account management

    Consider the following two statements:

    Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT

    or FAT 32, the file loses its permissions.

  • 8/2/2019 Test Quarter 5 -1

    25/47

    Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or

    FAT32, the file loses its permissions.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

    When James tries to open a newly installed application, his computer hangs. He tries to restart his

    computer but fails to do so. Which of the following options will enable James to restart the computer?

    a. Boot the computer using the Safe Mode with Networking option.

    b. Boot the computer using the Last Known Good Configuration.

    c. Boot the computer using the Safe Mode option.

    d. Boot the computer using the Windows Startup Disk.

    As a system administrator, you have created a GPO that is applied to the organization?s domain. You want

    that this GPO should not be applied to three users in the Finance organizational unit. Which of the following

    options will enable you to perform this task with the least administrative effort?

    a. Move the three users to another organizational unit in the domain.

    b. Disable the accounts of these users.

    c. Create a group of the three users and deny the Apply Group Policy option.

    d. Delete the accounts of these users and create local user accounts for these users.

    Consider the following statements:

    Statement A: Audit policies enable you to track the success of certain events and failure of all the events.

    Statement B: Audit policies only track the activities performed by a user.

    Statement C: You can use the audit policies to track the location where the activity occurred.

    Which of the following is correct about the above statements?

    a. Only Statement A is true.

    b. Only Statement B is true.

    c. Statements A, B, and C are true.

    d. Only Statement C is true.

    You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all client

    computers updated with patches and critical system updates from Microsoft. You plan to install software

    update service on a server, which will download all the required software updates and distribute the updates

    to the clients. Identify the server on which you should install the software update service.

    a. Server with DNS installed.b. Server with RRAS installed.

    c. Server with IIS installed.

    d. Server with DHCP installed.

    Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that

    he has given a confidential document for printing, which is not printed by the printer. The accountant is also

    unable to delete the print job from the print queue. What should Robert do to ensure that the document is

    not printed later?

  • 8/2/2019 Test Quarter 5 -1

    26/47

    a. On the print server, stop and restart the print spooler service.

    b. On the client computer, select the pause option from the document menu of the Printer window.

    c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer

    window.

    d. Restart the client?s computer.

    You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog

    box. What can be the possible cause of this problem?

    a. The folder is located on a disk partition that is not NTFS.

    b. You are not a member of the group that has deny permission for the folder.

    c. You don?t have appropriate rights for the folder.

    d. Shadow copies are configured on the folder.

    Which of the following is a logical boundary of an organization?s network?

    a. Domain

    b. Tree

    c. Forest

    d. Organizational unit

    You are a system administrator of an organization that consists of 1000 users who use Windows Server

    2003 and Windows 2000 computers. To secure the organization?s network, you and the junior

    administrators have planned and implemented several GPOs on the domain and organizational units. In

    addition, you have implemented Group Policies on individual users also.

    As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and

    Group Policies. While conducting this review you need to view the configured GPOs in a report format,

    which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which

    the GPO is applied. Identify the tool that will enable you to view GPOs in the report format.

    a. Group Policy Modeling

    b. Group Policy HTML Reportc. Group Policy Reporting

    d. Group Policy HTML Reporting

    You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E

    drive of your computer. After a couple of days, you notice that it has been modified. What can be the most

    likely cause of this problem?

    a. The file has been moved from a FAT 32 partition to an NTFS partition.

    b. The file has been moved from an NTFS partition to a FAT partition.

    c. The file has been moved from a FAT partition to an NTFS partition.

    d. The file has been moved from an NTFS partition to a different NTFS partition.

    Consider the following statements:

    Statement A: A Group Policy is applied to a site, domain, and the forest.

    Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.

    Which of the following options is correct about the above statements?

    a. Statement A is true and Statement B is false.

    b. Both, statement A and statement B are true.

    c. Both, statement A and statement B are false.

  • 8/2/2019 Test Quarter 5 -1

    27/47

    d. Statement A is false and Statement B is true.

    As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced

    security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid

    a similar situation, you plan to apply security settings for the fresh installation. Which security template will

    you use to perform this task?a. Setup security.inf

    b. DC security.inf

    c. Secure*.inf

    d. Security Set up.inf

    Consider the following statements:

    Statement A: The backup utility of Windows Server 2003 enables you to backup files and folders, schedule

    a backup, and restore data on the Windows Server 2003 computer.

    Statement B: ASR is a feature of the backup utility that enables you to recover a Windows Server 2003

    computer that does not boot.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

    17/ Which container lists the default users and group accounts created by Windows Server 2003?

    a. Users and Computers

    b. Builtin and Computers

    c. Builtin and Users

    d. Users and Domain Controllers

    Which of the following actions should you take if folder redirection is successful but the files and sub-folders

    are not available?

    a. Check if the redirected folder exists.

    b. Check if Remote Desktop for Administration is enabled.

    c. Check your permissions on the redirected folder.

    d. Check for the extensions of the files contained in the redirected folder.

    You are the system administrator for CellGo. The network of CellGo consists of a single Active Directory

    domain named CellGo.com. All network servers run Windows Server 2003. Some of the client computersrun Windows XP Professional and some work on Windows NT Workstation. You install terminal server on

    three member servers named Cell1, Cell2, and Cell3. You place all three terminal servers in an

    organizational unit named Terminal Server. You link a GPO to the Terminal Server OU. Five days later, end

    users notify that the performance of Cell2 is very slow. You discover that Cell2 has 70 disconnected

    Terminal Server sessions. You need to configure all the three terminal servers to end the disconnected

    session after 15 minutes of inactivity. You must achieve this goal by using the minimum amount of

    administrative effort. What should you do?

  • 8/2/2019 Test Quarter 5 -1

    28/47

    a. Log on to the console of each terminal server. In the RDP-Tcp connection properties dialog box, set the

    ?End a disconnected session?option to 15 minutes.

    b. Edit the GPO to set the time limit for disconnected sessions to 15 minutes.

    c. On Cell2, run the tsdiscon command to disconnect all 70 users from Cell2.

    d. In Active Directory Users and Computers, set the ?End a disconnected session?option for all domain user

    accounts to 15 minutes.

    Jenny is the system administrator of a domain named Aztec.com. In this domain, the accounting group and

    the marketing group share the same printer. Jenny receives a complaint from the marketing group that their

    small print jobs take a lot of time to print. Jenny finds that the accounting group gives large print jobs to the

    printer, which causes the delay. She learns that the accounting jobs are not needed on the same day on

    which the request has been sent to the printer. What should Jenny do to improve the situation?

    a. Create a separate printer; configure the printer to print directly to the printer port and then direct the

    accounting group to print through this printer.

    b. Create a separate printer; configure the printer to start printing immediately, and then direct the marketing

    group to print through this printer.

    c. Create a separate printer; configure the printer to be available only after certain hours, and then

    direct the accounting group to print large documents through this printer.

    d. Create a separate printer; configure the printer to be available only after certain hours, and then direct the

    marketing group to print documents through this printer.

    Which of the following options enables you to install the device drivers that are not digitally signed?

    a. Warn.

    b. Install.

    c. Ignore.

    d. Update.

    Consider the following statements:

    Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access

    permissions, callback options, and static IP address.Statement B: The Environment tab of the User Properties dialog box displays the name of the applications

    that are started when a Terminal Services user logs on.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true .

    c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

    As a system administrator, you want to provide high degree of security to domain controllers. For

    implementing this level of security, you want that the domain controllers should use digitally signedcommunication channels. Which of the following security templates will enable you to do this?

    a. Compatws.inf

    b. Securedc.inf

    c. Hisecdc.inf

    d. Setup Security.inf

    Consider the following statements:

    Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003.

  • 8/2/2019 Test Quarter 5 -1

    29/47

    Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003.

    Which of the following is correct about the above statements?

    d. Statement A is false and Statement B is true.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.a. Both, statement A and statement B are false.

    Harry is assigned the computer account PC02. The management of the organization decides to transfer

    Harry from the sales department to the administration department. You plan to move Harry?s computer to

    the administration department instead of allocating a new computer to Harry. Which of the following options

    will enable you to accomplish this task?

    c. Disable the computer account, PC02, in the sales organizational unit.

    a. Move the computer account, PC02, from the sales organizational unit to the administration

    organizational unit.

    b. Enable the computer account, PC02, in the administration organizational unit.

    d. Create a new computer account, PC02, in the administration organizational unit.

    Catherine is a user in your domain. Her username is Cath13 and she has a roaming profile stored in the

    domain controller. At what location will her desktop be stored?

    a. \\domain controller\ documents and settings\Cath13\desktop

    b. C:\documents and settings\Cath13\desktop

    c. C:\winnt\Profiles\Catherine\desktop

    d. C:\Profiles\desktop\Catherine

    You are the system administrator of your organization. You need to take backup of the data stored in the

    Sales_Data folder on the first Monday of every month. Which of the following options enables you to

    accomplish this task with least administrative effort?

    a. Take incremental backup of Sales_Data folder on the first Monday of every month.b. Schedule backup job of Sales_Data folder for the first Monday of every month.

    c. Take normal backup of Sales_Data folder on the first Monday of every month.

    d. Take differential backup of Sales_Data folder on the first Monday of every month.

    Which of the following protocols uses Transmission Control Protocol to ensure that data transfer is

    complete and accurate?

    a. FTP.

    b. HTTP.

    c. NNTP.

    d. SMTP.

    Consider the following statements:

    Statement A: Security policies cannot be implemented using GPOs.

    Statement B: Audit policies can be implemented using GPOs.

    Which of the following is correct about the above statements?

    a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, Statement A and B are true.

  • 8/2/2019 Test Quarter 5 -1

    30/47

    d. Both, Statement A and B are false.

    Identify the NTFS folder permission that enables users to only view the names of files and subfolders

    contained within a folder?

    a. List folder contents.

    b. Full Control.c. Modify.

    d. Read and Execute.

    Identify the group that has the rights and permissions to create and delete shared resources, stop and start

    services, and backup and restore files.

    a. Backup Operators.

    b. Administrators.

    c. Print Operators.

    d. Server Operators.

    You are the system administrator of Red Star Corp. John requests you to install a printer on his computer.

    To install the printer for John, you required the printer driver files. Identify the folder that you need to access

    to get the files.

    a. Print$ folder.

    b. Admin$ folder.

    c. Printer$ folder.

    d. Prn$ folder.

    You are working as a system administrator in an organization, which has its head office in Chicago. The

    organization has two branch offices, one in New York and the other in Texas. All the three offices have an

    interconnected WAN network. As a system administrator, you have been assigned the task of viewing the

    Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not

    know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for eachcomputer using the computer name, you decide to use the IP address of each computer with the Gpresult

    command. Which parameter of the Gpresult command will help you define the name or IP address of the

    remote computers?

    a. /u Domain/User

    b. /p Password

    c. /user TargerUserName

    d. /s Computer

    You are installing Windows Server 2003 on a computer with the following configuration:

    Pentium 2.4 GHz256 MB RAM

    4.5 GB Hard Disk

    During installation, setup displays an error message, ERROR_CREATE_FAILED.

    What does this error message indicate?

    a. The Windows Installer service has failed to start.

    b. The hard disk does not have the disk space required to install Windows Server 2003.

    c. One of the parameters entered is invalid.

  • 8/2/2019 Test Quarter 5 -1

    31/47

    d. The data entered is of incorrect type.

    Consider the following statements:

    Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services

    (DNS) namespace.

    Statement B: Trees are implemented in the domain structure of an organization when the organizationrequires multiple domains.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

  • 8/2/2019 Test Quarter 5 -1

    32/47

    Christina is the system administrator of StarMoon Technologies. She wants to restore the default

    permissions for a system drive that has been modified. Which of the following security templates will enable

    her to do this?

    a. Hisecws.inf

    b. Rootsec.infc. Rootws.inf

    d. Rootdc.inf

    You want to generate RsoP queries for the users in your organization to view the Group Policy settings

    applied to them. Which of the following tools will enable you to perform this task?

    a. Gpupdate.exe

    b. Gpresult.exe

    c. Group Policy Management Console.

    d. Group Policy Object Editor.

    As a system administrator, you have created a GPO that is applied to the organization?s domain. You want

    that this GPO should not be applied to three users in the Finance organizational unit. Which of the following

    options will enable you to perform this task with the least administrative effort?

    a. Move the three users to another organizational unit in the domain.

    b. Disable the accounts of these users.

    c. Create a group of the three users and deny the Apply Group Policy option.

    d. Delete the accounts of these users and create local user accounts for these users.

    Consider the following statements:

    Statement A: You need at least 100 MB free space on a volume for creating shadow copies.

    Statement B: You cannot edit shadow copies because they are read-only.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

    You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you

    want to save disk space and back up only those files that have been created or modified. Which of the

    following options will enable you to accomplish this task?

    a. Schedule incremental backup of the Accounts folder on the first Monday of every month.

    b. Schedule normal backup of the Accounts folder on the first Monday of every month.c. Schedule copy backup of the Accounts folder on the first Monday of every month.

    d. Schedule daily backup of the Accounts folder on the first Monday of every month.

    Which of the following options provides a secure path between the client and the Web server so that the

    data is not diverted to another computer?

    a. HTTP.

    b. SSL.

    c. NNTP.

  • 8/2/2019 Test Quarter 5 -1

    33/47

    d. FTP.

    Which policy enables you to specify password restrictions, account lockout policies, and Kerberos policies?

    a. Local Policies.

    b. Event Log Policies.

    c. Password Policies.d. Account Policies.

    Identify the correct method to create local user accounts?

    a. Select the Start > Programs > Administrative Tools > Microsoft Management Console menu command.

    b. Select the Start > Programs > Administrative Tools > Computer Management menu command.

    c. Select the Start > Programs > Administrative Tools menu command.

    d. Select the Start > Programs > Administrative Tools > Active Directory Users and Computers menu

    command.

    Which of the following options enables you to prevent the installation of any unsigned device driver?

    a. Warn.

    b. Stop.

    c. Prevent.

    d. Block.

    You are working as a system administrator in an organization, which has its head office in Chicago. The

    organization has two branch offices, one in New York and the other in Texas. All the three offices have an

    interconnected WAN network. As a system administrator, you have been assigned the task of viewing the

    Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not

    know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for each

    computer using the computer name, you decide to use the IP address of each computer with the Gpresult

    command. Which parameter of the Gpresult command will help you define the name or IP address of the

    remote computers?a. /u Domain/User

    b. /p Password

    c. /user TargerUserName

    d. /s Computer

    Consider the following statements:

    Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders

    stored in the folder.

    Statement B: You cannot access the encrypted files and folders like ordinary files and folders.

    Which of the following is correct about the above statements?a. Statement A is true and Statement B is false.

    b. Statement A is false and Statement B is true.

    c. Both, Statement A and B are true.

    d. Both, Statement A and B are false.

    Consider the following statements:

    Statement A: A spanned volume offers fault tolerance.

  • 8/2/2019 Test Quarter 5 -1

    34/47

    Statement B: A striped volume increases the speed at which data is read and written, but it does not offer

    fault tolerance.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

    As a system administrator, you need to secure the organization?s domain from any incidental attacks. From

    your past experience, you have noticed that most of the security breaches occur due to known passwords

    and user names. To prevent this, you want that the users of the network change their password periodically

    and the new password should be different from the old password. In case the new password is similar to

    any of the old passwords, the new password should not be accepted. To implement this, which security

    policy do you need to configure?

    a. Configure the ?Enforce old password history?policy.

    b. Configure the ?Enforce password history?policy.

    c. Configure the ?Enforce password history list?policy.

    d. Configure the Enforce old password history list?policy.

    The network of your organization consists of 300 end users who use the Windows application server. This

    application server is used for storing and processing data. The users complain it takes a long time to access

    the application server. In addition, it takes a long time to process data at certain times of the day. To solve

    this problem, you need to perform the following tasks:

    Task 1: Determine if processor is the bottleneck.

    Task 2: Determine if memory is the bottleneck.

    Task 3: Determine if network is the bottleneck.

    To perform these tasks, you propose to run the system monitor at different times throughout the day for a

    number of days, and view the data generated by the counters of Processor Time, Processor Queue Length,

    Pages per Second, and Average Disk Queue Length objects. Identify the tasks that will be completed by

    you if you use the proposed solution.

    a. Tasks 1 and 3.

    b. Task 1.

    c. Tasks 2 and 3.

    d. Task 3.

    You are the system administrator for CellGo. The organizational hierarchy consists of a head office and

    three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All theservers run Windows Server 2003. You work from the head office. Each branch office has a system

    administrator assigned to it. You want to review the auditing information of each branch office server. What

    should you do to view the auditing information with minimum administrative cost?

    a. View the security template from the Security Configuration and Analysis snap-in.

    b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view

    Event Viewer.

    c. Run the Seregcedit.exe utility and specify the appropriate parameters.

    d. Establish a Remote Desktop client session with each branch office server.

  • 8/2/2019 Test Quarter 5 -1

    35/47

    Which of the following enables you to monitor the performance of printers?

    a. Device Manager.

    b. Event Viewer.

    c. Performance Console.

    d. Task Manager.

    You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of

    your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the

    Device Manager window and notice that Windows Server 2003 has generated error code 29. What should

    you do to troubleshoot this problem?

    a. Verify that the device is using the current Windows Server 2003 driver.

    b. Verify that the device driver is not corrupt.

    c. Verify that the device driver has been properly configured.

    d. Check if the BIOS for the hardware device is enabled.

    Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its

    sales department. Steve has been assigned the task of creating user accounts for the new employees.

    Which of the following options will enable him to accomplish this task with the least administrative effort?

    a. Create user accounts using user account template.

    b. Create 30 user accounts one by one.

    c. Create user accounts using user profiles.

    d. Create user accounts using command line tools.

    Which of the following options is a collection of multiple domains that share a common schema and global

    catalog server?

    a. Active Directory.

    b. Tree.

    c. Forest.d. Organizational unit.

    Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of

    Windows Server 2003 computer from the client computer?

    a. Admin$

    b. Print$

    c. C$

    d. D$

    Identify the physically separated part of a domain network, which is connected with a slow wide area

    network (WAN) link to the domain network.a. Domain controller.

    b. Site.

    c. Forest.

    d. Organizational unit.

    You are installing Windows Server 2003 on a computer with the following configuration:

    Pentium 350 MHz

    128 MB RAM

  • 8/2/2019 Test Quarter 5 -1

    36/47

    4.5 GB Hard Disk

    During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH.

    What does this error message indicate?

    a. The Windows Installer service has failed to start.

    b. The data entered is invalid.c. One of the parameters entered is invalid.

    d. The data entered is of incorrect type.

    Consider the following two statements:

    Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT

    or FAT 32, the file loses its permissions.

    Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or

    FAT32, the file loses its permissions.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.

    d. Statement A is false and Statement B is true.

    Consider the following statements:

    Statement A: Group Policy is a feature of the Computer Management utility.

    Statement B: Group Policies can only be applied to multiple users.

    Which of the following options is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.d. Statement A is false and Statement B is true.

    You are the system administrator of your organization. You plan to enhance the availability of data stored in

    your Windows Server 2003 computer by implementing RAID-5 volumes on two hard disks.?However, on

    the Select the Volume Type page, the RAID-5 volume option is not highlighted. What can be the possible

    cause of this problem?

    a. There are bad sectors in any of the hard disks.

    b. The hard disks are not of the same manufacturer.

    c. A minimum of three hard disks is required for creating RAID-5 volumes.

    d. The hard disks have not been activated.

    Consider the following statements:

    Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003.

    Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003.

    Which of the following is correct about the above statements?

    a. Both, statement A and statement B are false.

    b. Both, statement A and statement B are true.

    c. Statement A is true and Statement B is false.

  • 8/2/2019 Test Quarter 5 -1

    37/47

    d. Statement A is false and Statement B is true.

    Identify the group that has full control over all domains that exist in an Active Directory forest.

    a. Security.

    b. Domain Admins.

    c. Backup Operator.d. Enterprise Admins.

    Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that

    he has given a confidential document for printing, which is not printed by the printer. The accountant is also

    unable to delete the print job from the print queue. What should Robert do to ensure that the document is

    not printed later?

    a. On the print server, stop and restart the print spooler service.

    b. On the client computer, select the pause option from the document menu of the Printer window.

    c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer

    window.

    d. Restart the client?s computer.

    Kate, the system administrator in ServeYourMoney Inc. wants to ensure that the call center executives of

    the company are able to view the daily calls data file in the calls folder. Kate also wants to ensure that the

    executives do not delete data from the folder. Which option will enable Kate to accomplish this task?

    a. Apply Full Control folder permission on the calls folder.

    b. Apply Write folder permission on the calls folder.

    c. Apply Read folder permission on the calls folder.

    d. Apply Modify folder permission on the calls folder.

    You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E

    drive of your computer. After a couple of days, you notice that it has been modified. What can be the most

    likely cause of this problem?a. The file has been moved from a FAT 32 partition to an NTFS partition.

    b. The file has been moved from an NTFS partition to a FAT partition.

    c. The file has been moved from a FAT partition to an NTFS partition.

    d. The file has been moved from an NTFS partition to a different NTFS partition.

    As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced

    security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid

    a similar situation, you plan to apply security settings for the fresh installation. Which security template will

    you use to perform this task?

    a. Setup security.inf

    b. DC security.infc. Secure*.inf

    d. Security Set up.inf

    As a system administrator, you need to deploy different types of GPOs on the domain, organizational units,

    and individual users working on server computers. To avoid problems related to Group Policy inheritance,

    you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on

    server computers. Which of the following tools will enable you to do this task?

    a. Group Policy Modeling

  • 8/2/2019 Test Quarter 5 -1

    38/47

    b. Group Policy Object Reporting

    c. Group Policy Object Modeling

    d. Group Policy Object Simulating

    You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog

    box. What can be the possible cause of this problem?a. The folder is located on a disk partition that is not NTFS.

    b. You are not a member of the group that has deny permission for the folder.

    c. You don?t have appropriate rights for the folder.

    d. Shadow copies are configured on the folder.

    Harry is assigned the computer account PC02. The management of the organization decides to transfer

    Harry from the sales department to the administration department. You plan to move Harry?s computer to

    the administration department instead of allocating a new computer to Harry. Which of the following options

    will enable you to accomplish this task?

    a. Move the computer account, PC02, from the sales organizational unit to the administration organizational

    unit.

    b. Enable the computer account, PC02, in the administration organizational unit.

    c. Disable the computer account, PC02, in the sales organizational unit.

    d. Create a new computer account, PC02, in the administration organizational unit.

    Consider the followi